From 2b1cfe349676f8a853090ce5285979ef8c9bf931 Mon Sep 17 00:00:00 2001 From: github-actions Date: Wed, 14 Aug 2024 16:03:08 +0000 Subject: [PATCH] NVD Sync 2024-08-14 16:03 --- cpematch/01/0190B0D7-8EB7-47E7-9889-501A420FD0A4.json | 1 + cpematch/05/05C37892-B4F9-4334-BA48-24844F0ED8FC.json | 1 + cpematch/07/0720413E-F29A-4C0A-9B57-5158A778C4A2.json | 1 + cpematch/0E/0E3B24C0-B01B-4770-B0A5-14B46B2D6226.json | 1 + cpematch/13/138634FF-1840-4C45-8CDE-6174B6F50352.json | 1 + cpematch/18/1800F41A-F9C3-4BF1-90DA-409324237D72.json | 1 + cpematch/21/21986A2A-8166-486E-964D-C4A0CECE9AE2.json | 1 + cpematch/33/33EE6034-4A66-4C20-A2A1-BC0FEFA2C7B5.json | 1 + cpematch/44/4477EA85-2B1F-4C08-B46B-5115BAB2A6D8.json | 1 + cpematch/46/464A3580-D632-43EB-93EF-E2A1A5736F14.json | 1 + cpematch/49/49902D45-21DA-4B6B-BBA3-1597AA3FB4CC.json | 1 + cpematch/58/58C777F7-983D-4207-A5C8-0BAC3F79ECCC.json | 1 + cpematch/66/661F6328-0605-4612-B12A-9B1B49595943.json | 1 + cpematch/6B/6BFB68AD-DB7E-4C4C-B598-274D83D12C4B.json | 1 + cpematch/6D/6D4811C1-BE73-4A45-9A5F-725A064020E0.json | 1 + cpematch/77/77939C6B-1EF5-4B34-9133-931067B96F97.json | 1 + cpematch/78/78CEEA24-E86D-4BF9-9325-38611B5DE120.json | 1 + cpematch/82/820ACE51-CA57-4D5E-8E80-08EC48BAC7C0.json | 1 + cpematch/82/82B85217-BCB4-4004-BED8-5DBC467D872A.json | 1 + cpematch/94/947F2995-C201-4F06-BC13-C290473D9C17.json | 1 + cpematch/9B/9B129476-8F48-47B8-9EF8-830715631720.json | 1 + cpematch/9D/9D8E9231-015C-48A6-BBDD-9DCEA3145858.json | 1 + cpematch/9D/9DE6F57D-3CD4-4D8C-BF80-7F84ECD77723.json | 1 + cpematch/A8/A85D5CC0-9FE9-4580-BB89-9BAEDD80CC75.json | 1 + cpematch/A9/A9455FD0-C674-4865-A9CD-23F5D6913452.json | 1 + cpematch/B4/B44E6F98-ADC6-4CC9-9DC7-7241AA68A8BC.json | 1 + cpematch/BD/BDD9C1E0-276A-4A51-8950-6F67C00A2FDE.json | 1 + cpematch/C0/C049E2AD-2A83-4CAB-BBB3-83ADDFF2DDC1.json | 1 + cpematch/DB/DBF30545-99A1-457E-AEB5-BABD0F01942A.json | 1 + cpematch/E7/E79823D1-656B-47ED-B919-817CF98B423B.json | 2 +- cpematch/F3/F3A29B28-4959-4156-B77A-5D38B896029B.json | 1 + cpematch/F6/F65CA56D-7F34-4030-BC82-5BA0BDEE86C8.json | 1 + cpematch/FC/FCD55BE5-59AF-4C75-9187-A90F23262716.json | 1 + cve/2012/CVE-2012-4792.json | 2 +- cve/2020/CVE-2020-9377.json | 2 +- cve/2021/CVE-2021-36741.json | 2 +- cve/2021/CVE-2021-44529.json | 2 +- cve/2022/CVE-2022-22948.json | 2 +- cve/2022/CVE-2022-2856.json | 2 +- cve/2022/CVE-2022-48618.json | 2 +- cve/2023/CVE-2023-21237.json | 2 +- cve/2023/CVE-2023-21823.json | 2 +- cve/2023/CVE-2023-22527.json | 2 +- cve/2023/CVE-2023-23752.json | 2 +- cve/2023/CVE-2023-24332.json | 2 +- cve/2023/CVE-2023-28229.json | 2 +- cve/2023/CVE-2023-29336.json | 2 +- cve/2023/CVE-2023-31348.json | 2 +- cve/2023/CVE-2023-34362.json | 2 +- cve/2023/CVE-2023-34424.json | 1 + cve/2023/CVE-2023-35061.json | 2 +- cve/2023/CVE-2023-35123.json | 1 + cve/2023/CVE-2023-35311.json | 2 +- cve/2023/CVE-2023-36033.json | 2 +- cve/2023/CVE-2023-36036.json | 2 +- cve/2023/CVE-2023-36563.json | 2 +- cve/2023/CVE-2023-36802.json | 2 +- cve/2023/CVE-2023-38035.json | 2 +- cve/2023/CVE-2023-38655.json | 1 + cve/2023/CVE-2023-38831.json | 2 +- cve/2023/CVE-2023-40067.json | 1 + cve/2023/CVE-2023-41993.json | 2 +- cve/2023/CVE-2023-42667.json | 1 + cve/2023/CVE-2023-43489.json | 1 + cve/2023/CVE-2023-43747.json | 1 + cve/2023/CVE-2023-43770.json | 2 +- cve/2023/CVE-2023-48361.json | 1 + cve/2023/CVE-2023-49114.json | 2 +- cve/2023/CVE-2023-49141.json | 1 + cve/2023/CVE-2023-49144.json | 1 + cve/2023/CVE-2023-7245.json | 2 +- cve/2024/CVE-2024-20082.json | 2 +- cve/2024/CVE-2024-20789.json | 1 + cve/2024/CVE-2024-20790.json | 1 + cve/2024/CVE-2024-21766.json | 1 + cve/2024/CVE-2024-21769.json | 1 + cve/2024/CVE-2024-21784.json | 1 + cve/2024/CVE-2024-21787.json | 1 + cve/2024/CVE-2024-21801.json | 1 + cve/2024/CVE-2024-21806.json | 1 + cve/2024/CVE-2024-21807.json | 1 + cve/2024/CVE-2024-21810.json | 1 + cve/2024/CVE-2024-21844.json | 1 + cve/2024/CVE-2024-21857.json | 1 + cve/2024/CVE-2024-22184.json | 1 + cve/2024/CVE-2024-22374.json | 1 + cve/2024/CVE-2024-22376.json | 1 + cve/2024/CVE-2024-22378.json | 1 + cve/2024/CVE-2024-23489.json | 1 + cve/2024/CVE-2024-23491.json | 1 + cve/2024/CVE-2024-23495.json | 1 + cve/2024/CVE-2024-23497.json | 1 + cve/2024/CVE-2024-23499.json | 1 + cve/2024/CVE-2024-23907.json | 1 + cve/2024/CVE-2024-23908.json | 1 + cve/2024/CVE-2024-23909.json | 1 + cve/2024/CVE-2024-23974.json | 1 + cve/2024/CVE-2024-23981.json | 1 + cve/2024/CVE-2024-24580.json | 1 + cve/2024/CVE-2024-24720.json | 2 +- cve/2024/CVE-2024-24853.json | 1 + cve/2024/CVE-2024-24973.json | 1 + cve/2024/CVE-2024-24977.json | 1 + cve/2024/CVE-2024-24980.json | 1 + cve/2024/CVE-2024-24983.json | 1 + cve/2024/CVE-2024-24986.json | 1 + cve/2024/CVE-2024-25157.json | 1 + cve/2024/CVE-2024-25561.json | 1 + cve/2024/CVE-2024-25562.json | 1 + cve/2024/CVE-2024-25576.json | 1 + cve/2024/CVE-2024-25892.json | 2 +- cve/2024/CVE-2024-25939.json | 1 + cve/2024/CVE-2024-26022.json | 1 + cve/2024/CVE-2024-26025.json | 1 + cve/2024/CVE-2024-26027.json | 1 + cve/2024/CVE-2024-26621.json | 2 +- cve/2024/CVE-2024-27455.json | 2 +- cve/2024/CVE-2024-27461.json | 1 + cve/2024/CVE-2024-28046.json | 1 + cve/2024/CVE-2024-28050.json | 1 + cve/2024/CVE-2024-28172.json | 1 + cve/2024/CVE-2024-28383.json | 2 +- cve/2024/CVE-2024-28876.json | 1 + cve/2024/CVE-2024-28887.json | 1 + cve/2024/CVE-2024-28947.json | 1 + cve/2024/CVE-2024-28953.json | 1 + cve/2024/CVE-2024-29015.json | 1 + cve/2024/CVE-2024-31816.json | 2 +- cve/2024/CVE-2024-34117.json | 1 + cve/2024/CVE-2024-34118.json | 1 + cve/2024/CVE-2024-34124.json | 1 + cve/2024/CVE-2024-34125.json | 1 + cve/2024/CVE-2024-34126.json | 1 + cve/2024/CVE-2024-34127.json | 1 + cve/2024/CVE-2024-34133.json | 1 + cve/2024/CVE-2024-34134.json | 1 + cve/2024/CVE-2024-34135.json | 1 + cve/2024/CVE-2024-34136.json | 1 + cve/2024/CVE-2024-34137.json | 1 + cve/2024/CVE-2024-34138.json | 1 + cve/2024/CVE-2024-34163.json | 1 + cve/2024/CVE-2024-36136.json | 2 +- cve/2024/CVE-2024-37028.json | 1 + cve/2024/CVE-2024-37036.json | 2 +- cve/2024/CVE-2024-37373.json | 2 +- cve/2024/CVE-2024-37399.json | 2 +- cve/2024/CVE-2024-37662.json | 2 +- cve/2024/CVE-2024-38213.json | 2 +- cve/2024/CVE-2024-38652.json | 2 +- cve/2024/CVE-2024-38653.json | 2 +- cve/2024/CVE-2024-39283.json | 1 + cve/2024/CVE-2024-39383.json | 1 + cve/2024/CVE-2024-39386.json | 1 + cve/2024/CVE-2024-39387.json | 1 + cve/2024/CVE-2024-39388.json | 1 + cve/2024/CVE-2024-39389.json | 1 + cve/2024/CVE-2024-39390.json | 1 + cve/2024/CVE-2024-39391.json | 1 + cve/2024/CVE-2024-39393.json | 1 + cve/2024/CVE-2024-39394.json | 1 + cve/2024/CVE-2024-39395.json | 1 + cve/2024/CVE-2024-39397.json | 2 +- cve/2024/CVE-2024-39398.json | 2 +- cve/2024/CVE-2024-39399.json | 2 +- cve/2024/CVE-2024-39400.json | 2 +- cve/2024/CVE-2024-39401.json | 2 +- cve/2024/CVE-2024-39402.json | 2 +- cve/2024/CVE-2024-39403.json | 2 +- cve/2024/CVE-2024-39404.json | 2 +- cve/2024/CVE-2024-39405.json | 2 +- cve/2024/CVE-2024-39406.json | 2 +- cve/2024/CVE-2024-39407.json | 2 +- cve/2024/CVE-2024-39408.json | 2 +- cve/2024/CVE-2024-39409.json | 2 +- cve/2024/CVE-2024-39410.json | 2 +- cve/2024/CVE-2024-39411.json | 2 +- cve/2024/CVE-2024-39412.json | 2 +- cve/2024/CVE-2024-39413.json | 2 +- cve/2024/CVE-2024-39414.json | 2 +- cve/2024/CVE-2024-39415.json | 2 +- cve/2024/CVE-2024-39416.json | 2 +- cve/2024/CVE-2024-39417.json | 2 +- cve/2024/CVE-2024-39418.json | 2 +- cve/2024/CVE-2024-39419.json | 2 +- cve/2024/CVE-2024-39420.json | 1 + cve/2024/CVE-2024-39422.json | 1 + cve/2024/CVE-2024-39423.json | 1 + cve/2024/CVE-2024-39424.json | 1 + cve/2024/CVE-2024-39425.json | 1 + cve/2024/CVE-2024-39426.json | 1 + cve/2024/CVE-2024-39472.json | 2 +- cve/2024/CVE-2024-39778.json | 1 + cve/2024/CVE-2024-39792.json | 1 + cve/2024/CVE-2024-39809.json | 1 + cve/2024/CVE-2024-41042.json | 2 +- cve/2024/CVE-2024-41164.json | 1 + cve/2024/CVE-2024-41719.json | 1 + cve/2024/CVE-2024-41723.json | 1 + cve/2024/CVE-2024-41727.json | 1 + cve/2024/CVE-2024-41830.json | 1 + cve/2024/CVE-2024-41831.json | 1 + cve/2024/CVE-2024-41832.json | 1 + cve/2024/CVE-2024-41833.json | 1 + cve/2024/CVE-2024-41834.json | 1 + cve/2024/CVE-2024-41835.json | 1 + cve/2024/CVE-2024-41840.json | 1 + cve/2024/CVE-2024-41850.json | 1 + cve/2024/CVE-2024-41851.json | 1 + cve/2024/CVE-2024-41852.json | 1 + cve/2024/CVE-2024-41853.json | 1 + cve/2024/CVE-2024-41854.json | 1 + cve/2024/CVE-2024-41856.json | 1 + cve/2024/CVE-2024-41865.json | 1 + cve/2024/CVE-2024-41866.json | 1 + cve/2024/CVE-2024-42258.json | 2 +- cve/2024/CVE-2024-42259.json | 1 + cve/2024/CVE-2024-42739.json | 2 +- cve/2024/CVE-2024-5894.json | 2 +- cve/2024/CVE-2024-5895.json | 2 +- cve/2024/CVE-2024-6123.json | 2 +- cve/2024/CVE-2024-7347.json | 1 + cve/2024/CVE-2024-7790.json | 1 + syncdate.json | 2 +- 223 files changed, 223 insertions(+), 75 deletions(-) create mode 100644 cpematch/01/0190B0D7-8EB7-47E7-9889-501A420FD0A4.json create mode 100644 cpematch/05/05C37892-B4F9-4334-BA48-24844F0ED8FC.json create mode 100644 cpematch/07/0720413E-F29A-4C0A-9B57-5158A778C4A2.json create mode 100644 cpematch/0E/0E3B24C0-B01B-4770-B0A5-14B46B2D6226.json create mode 100644 cpematch/13/138634FF-1840-4C45-8CDE-6174B6F50352.json create mode 100644 cpematch/18/1800F41A-F9C3-4BF1-90DA-409324237D72.json create mode 100644 cpematch/21/21986A2A-8166-486E-964D-C4A0CECE9AE2.json create mode 100644 cpematch/33/33EE6034-4A66-4C20-A2A1-BC0FEFA2C7B5.json create mode 100644 cpematch/44/4477EA85-2B1F-4C08-B46B-5115BAB2A6D8.json create mode 100644 cpematch/46/464A3580-D632-43EB-93EF-E2A1A5736F14.json create mode 100644 cpematch/49/49902D45-21DA-4B6B-BBA3-1597AA3FB4CC.json create mode 100644 cpematch/58/58C777F7-983D-4207-A5C8-0BAC3F79ECCC.json create mode 100644 cpematch/66/661F6328-0605-4612-B12A-9B1B49595943.json create mode 100644 cpematch/6B/6BFB68AD-DB7E-4C4C-B598-274D83D12C4B.json create mode 100644 cpematch/6D/6D4811C1-BE73-4A45-9A5F-725A064020E0.json create mode 100644 cpematch/77/77939C6B-1EF5-4B34-9133-931067B96F97.json create mode 100644 cpematch/78/78CEEA24-E86D-4BF9-9325-38611B5DE120.json create mode 100644 cpematch/82/820ACE51-CA57-4D5E-8E80-08EC48BAC7C0.json create mode 100644 cpematch/82/82B85217-BCB4-4004-BED8-5DBC467D872A.json create mode 100644 cpematch/94/947F2995-C201-4F06-BC13-C290473D9C17.json create mode 100644 cpematch/9B/9B129476-8F48-47B8-9EF8-830715631720.json create mode 100644 cpematch/9D/9D8E9231-015C-48A6-BBDD-9DCEA3145858.json create mode 100644 cpematch/9D/9DE6F57D-3CD4-4D8C-BF80-7F84ECD77723.json create mode 100644 cpematch/A8/A85D5CC0-9FE9-4580-BB89-9BAEDD80CC75.json create mode 100644 cpematch/A9/A9455FD0-C674-4865-A9CD-23F5D6913452.json create mode 100644 cpematch/B4/B44E6F98-ADC6-4CC9-9DC7-7241AA68A8BC.json create mode 100644 cpematch/BD/BDD9C1E0-276A-4A51-8950-6F67C00A2FDE.json create mode 100644 cpematch/C0/C049E2AD-2A83-4CAB-BBB3-83ADDFF2DDC1.json create mode 100644 cpematch/DB/DBF30545-99A1-457E-AEB5-BABD0F01942A.json create mode 100644 cpematch/F3/F3A29B28-4959-4156-B77A-5D38B896029B.json create mode 100644 cpematch/F6/F65CA56D-7F34-4030-BC82-5BA0BDEE86C8.json create mode 100644 cpematch/FC/FCD55BE5-59AF-4C75-9187-A90F23262716.json create mode 100644 cve/2023/CVE-2023-34424.json create mode 100644 cve/2023/CVE-2023-35123.json create mode 100644 cve/2023/CVE-2023-38655.json create mode 100644 cve/2023/CVE-2023-40067.json create mode 100644 cve/2023/CVE-2023-42667.json create mode 100644 cve/2023/CVE-2023-43489.json create mode 100644 cve/2023/CVE-2023-43747.json create mode 100644 cve/2023/CVE-2023-48361.json create mode 100644 cve/2023/CVE-2023-49141.json create mode 100644 cve/2023/CVE-2023-49144.json create mode 100644 cve/2024/CVE-2024-20789.json create mode 100644 cve/2024/CVE-2024-20790.json create mode 100644 cve/2024/CVE-2024-21766.json create mode 100644 cve/2024/CVE-2024-21769.json create mode 100644 cve/2024/CVE-2024-21784.json create mode 100644 cve/2024/CVE-2024-21787.json create mode 100644 cve/2024/CVE-2024-21801.json create mode 100644 cve/2024/CVE-2024-21806.json create mode 100644 cve/2024/CVE-2024-21807.json create mode 100644 cve/2024/CVE-2024-21810.json create mode 100644 cve/2024/CVE-2024-21844.json create mode 100644 cve/2024/CVE-2024-21857.json create mode 100644 cve/2024/CVE-2024-22184.json create mode 100644 cve/2024/CVE-2024-22374.json create mode 100644 cve/2024/CVE-2024-22376.json create mode 100644 cve/2024/CVE-2024-22378.json create mode 100644 cve/2024/CVE-2024-23489.json create mode 100644 cve/2024/CVE-2024-23491.json create mode 100644 cve/2024/CVE-2024-23495.json create mode 100644 cve/2024/CVE-2024-23497.json create mode 100644 cve/2024/CVE-2024-23499.json create mode 100644 cve/2024/CVE-2024-23907.json create mode 100644 cve/2024/CVE-2024-23908.json create mode 100644 cve/2024/CVE-2024-23909.json create mode 100644 cve/2024/CVE-2024-23974.json create mode 100644 cve/2024/CVE-2024-23981.json create mode 100644 cve/2024/CVE-2024-24580.json create mode 100644 cve/2024/CVE-2024-24853.json create mode 100644 cve/2024/CVE-2024-24973.json create mode 100644 cve/2024/CVE-2024-24977.json create mode 100644 cve/2024/CVE-2024-24980.json create mode 100644 cve/2024/CVE-2024-24983.json create mode 100644 cve/2024/CVE-2024-24986.json create mode 100644 cve/2024/CVE-2024-25157.json create mode 100644 cve/2024/CVE-2024-25561.json create mode 100644 cve/2024/CVE-2024-25562.json create mode 100644 cve/2024/CVE-2024-25576.json create mode 100644 cve/2024/CVE-2024-25939.json create mode 100644 cve/2024/CVE-2024-26022.json create mode 100644 cve/2024/CVE-2024-26025.json create mode 100644 cve/2024/CVE-2024-26027.json create mode 100644 cve/2024/CVE-2024-27461.json create mode 100644 cve/2024/CVE-2024-28046.json create mode 100644 cve/2024/CVE-2024-28050.json create mode 100644 cve/2024/CVE-2024-28172.json create mode 100644 cve/2024/CVE-2024-28876.json create mode 100644 cve/2024/CVE-2024-28887.json create mode 100644 cve/2024/CVE-2024-28947.json create mode 100644 cve/2024/CVE-2024-28953.json create mode 100644 cve/2024/CVE-2024-29015.json create mode 100644 cve/2024/CVE-2024-34117.json create mode 100644 cve/2024/CVE-2024-34118.json create mode 100644 cve/2024/CVE-2024-34124.json create mode 100644 cve/2024/CVE-2024-34125.json create mode 100644 cve/2024/CVE-2024-34126.json create mode 100644 cve/2024/CVE-2024-34127.json create mode 100644 cve/2024/CVE-2024-34133.json create mode 100644 cve/2024/CVE-2024-34134.json create mode 100644 cve/2024/CVE-2024-34135.json create mode 100644 cve/2024/CVE-2024-34136.json create mode 100644 cve/2024/CVE-2024-34137.json create mode 100644 cve/2024/CVE-2024-34138.json create mode 100644 cve/2024/CVE-2024-34163.json create mode 100644 cve/2024/CVE-2024-37028.json create mode 100644 cve/2024/CVE-2024-39283.json create mode 100644 cve/2024/CVE-2024-39383.json create mode 100644 cve/2024/CVE-2024-39386.json create mode 100644 cve/2024/CVE-2024-39387.json create mode 100644 cve/2024/CVE-2024-39388.json create mode 100644 cve/2024/CVE-2024-39389.json create mode 100644 cve/2024/CVE-2024-39390.json create mode 100644 cve/2024/CVE-2024-39391.json create mode 100644 cve/2024/CVE-2024-39393.json create mode 100644 cve/2024/CVE-2024-39394.json create mode 100644 cve/2024/CVE-2024-39395.json create mode 100644 cve/2024/CVE-2024-39420.json create mode 100644 cve/2024/CVE-2024-39422.json create mode 100644 cve/2024/CVE-2024-39423.json create mode 100644 cve/2024/CVE-2024-39424.json create mode 100644 cve/2024/CVE-2024-39425.json create mode 100644 cve/2024/CVE-2024-39426.json create mode 100644 cve/2024/CVE-2024-39778.json create mode 100644 cve/2024/CVE-2024-39792.json create mode 100644 cve/2024/CVE-2024-39809.json create mode 100644 cve/2024/CVE-2024-41164.json create mode 100644 cve/2024/CVE-2024-41719.json create mode 100644 cve/2024/CVE-2024-41723.json create mode 100644 cve/2024/CVE-2024-41727.json create mode 100644 cve/2024/CVE-2024-41830.json create mode 100644 cve/2024/CVE-2024-41831.json create mode 100644 cve/2024/CVE-2024-41832.json create mode 100644 cve/2024/CVE-2024-41833.json create mode 100644 cve/2024/CVE-2024-41834.json create mode 100644 cve/2024/CVE-2024-41835.json create mode 100644 cve/2024/CVE-2024-41840.json create mode 100644 cve/2024/CVE-2024-41850.json create mode 100644 cve/2024/CVE-2024-41851.json create mode 100644 cve/2024/CVE-2024-41852.json create mode 100644 cve/2024/CVE-2024-41853.json create mode 100644 cve/2024/CVE-2024-41854.json create mode 100644 cve/2024/CVE-2024-41856.json create mode 100644 cve/2024/CVE-2024-41865.json create mode 100644 cve/2024/CVE-2024-41866.json create mode 100644 cve/2024/CVE-2024-42259.json create mode 100644 cve/2024/CVE-2024-7347.json create mode 100644 cve/2024/CVE-2024-7790.json diff --git a/cpematch/01/0190B0D7-8EB7-47E7-9889-501A420FD0A4.json b/cpematch/01/0190B0D7-8EB7-47E7-9889-501A420FD0A4.json new file mode 100644 index 00000000000..5dae69822eb --- /dev/null +++ b/cpematch/01/0190B0D7-8EB7-47E7-9889-501A420FD0A4.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "0190B0D7-8EB7-47E7-9889-501A420FD0A4", "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.8.0", "versionEndExcluding": "17.8.13", "lastModified": "2024-08-14T15:43:15.770", "cpeLastModified": "2024-08-14T15:43:15.770", "created": "2024-08-14T15:43:15.770", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:microsoft:visual_studio_2022:17.8.0:*:*:*:*:*:*:*", "cpeNameId": "10FE9DC4-911B-4237-8F50-52D20E2DAA7E"}, {"cpeName": "cpe:2.3:a:microsoft:visual_studio_2022:17.8.4:*:*:*:*:*:*:*", "cpeNameId": "307B63EB-F6B5-4C03-9782-ABB9BE1C2417"}]}} \ No newline at end of file diff --git a/cpematch/05/05C37892-B4F9-4334-BA48-24844F0ED8FC.json b/cpematch/05/05C37892-B4F9-4334-BA48-24844F0ED8FC.json new file mode 100644 index 00000000000..9ba5ccb43fb --- /dev/null +++ b/cpematch/05/05C37892-B4F9-4334-BA48-24844F0ED8FC.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "05C37892-B4F9-4334-BA48-24844F0ED8FC", "criteria": "cpe:2.3:h:schneider-electric:sage_rtu_firmware:*:*:*:*:*:*:*:*", "versionEndIncluding": "c3414-500-s02k5_p8", "lastModified": "2024-08-14T14:07:52.347", "cpeLastModified": "2024-08-14T14:07:52.347", "created": "2024-08-14T14:07:52.347", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/07/0720413E-F29A-4C0A-9B57-5158A778C4A2.json b/cpematch/07/0720413E-F29A-4C0A-9B57-5158A778C4A2.json new file mode 100644 index 00000000000..8eebacb5059 --- /dev/null +++ b/cpematch/07/0720413E-F29A-4C0A-9B57-5158A778C4A2.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "0720413E-F29A-4C0A-9B57-5158A778C4A2", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15.149", "versionEndExcluding": "5.15.163", "lastModified": "2024-08-14T15:37:41.880", "cpeLastModified": "2024-08-14T15:37:41.880", "created": "2024-08-14T15:37:41.880", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.150:*:*:*:*:*:*:*", "cpeNameId": "405263B7-A847-493D-BAC8-67CDC081E8A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.156:*:*:*:*:*:*:*", "cpeNameId": "0208D826-E36F-43ED-94E2-47B3786BDA8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.158:*:*:*:*:*:*:*", "cpeNameId": "F0BD86B6-9DA2-4CB5-925F-AED18EA69B7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.160:*:*:*:*:*:*:*", "cpeNameId": "39762989-4F30-40E8-9958-8100639F003F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.161:*:*:*:*:*:*:*", "cpeNameId": "93EFCF93-5625-453D-B8C8-D532F2F6B2EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.162:*:*:*:*:*:*:*", "cpeNameId": "AD93992B-560A-4880-AB8E-2B12E1ED9CE6"}]}} \ No newline at end of file diff --git a/cpematch/0E/0E3B24C0-B01B-4770-B0A5-14B46B2D6226.json b/cpematch/0E/0E3B24C0-B01B-4770-B0A5-14B46B2D6226.json new file mode 100644 index 00000000000..d55959da0b8 --- /dev/null +++ b/cpematch/0E/0E3B24C0-B01B-4770-B0A5-14B46B2D6226.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "0E3B24C0-B01B-4770-B0A5-14B46B2D6226", "criteria": "cpe:2.3:a:microsoft:azure_connected_machine_agent:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.44", "lastModified": "2024-08-14T15:37:55.153", "cpeLastModified": "2024-08-14T15:37:55.153", "created": "2024-08-14T15:37:55.153", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:microsoft:azure_connected_machine_agent:-:*:*:*:*:*:*:*", "cpeNameId": "4E719348-9BB5-4CBF-AEEF-56141310EDA9"}, {"cpeName": "cpe:2.3:a:microsoft:azure_connected_machine_agent:1.34:*:*:*:*:*:*:*", "cpeNameId": "60E06120-B529-4181-8869-74EC125300DA"}, {"cpeName": "cpe:2.3:a:microsoft:azure_connected_machine_agent:1.35:*:*:*:*:*:*:*", "cpeNameId": "4769BBC1-5EE5-46A3-B568-0E49BDCB6EED"}, {"cpeName": "cpe:2.3:a:microsoft:azure_connected_machine_agent:1.36:*:*:*:*:*:*:*", "cpeNameId": "17C8A575-579E-45EA-9505-743319FDC0FC"}, {"cpeName": "cpe:2.3:a:microsoft:azure_connected_machine_agent:1.37:*:*:*:*:*:*:*", "cpeNameId": "F05CB5E9-EDD8-4837-BB8D-B770A3091001"}, {"cpeName": "cpe:2.3:a:microsoft:azure_connected_machine_agent:1.38:*:*:*:*:*:*:*", "cpeNameId": "ED09B3AE-CAAB-4A87-B854-F064F260021A"}]}} \ No newline at end of file diff --git a/cpematch/13/138634FF-1840-4C45-8CDE-6174B6F50352.json b/cpematch/13/138634FF-1840-4C45-8CDE-6174B6F50352.json new file mode 100644 index 00000000000..a8bf1324db3 --- /dev/null +++ b/cpematch/13/138634FF-1840-4C45-8CDE-6174B6F50352.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "138634FF-1840-4C45-8CDE-6174B6F50352", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.10.219", "versionEndExcluding": "5.10.222", "lastModified": "2024-08-14T15:37:41.880", "cpeLastModified": "2024-08-14T15:37:41.880", "created": "2024-08-14T15:37:41.880", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.219:*:*:*:*:*:*:*", "cpeNameId": "C7F27EB7-A65A-45A2-A904-9F60507D342A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.220:*:*:*:*:*:*:*", "cpeNameId": "447A4E02-26AC-4CA2-B76D-B3508CF9B860"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.221:*:*:*:*:*:*:*", "cpeNameId": "436B2D40-F48C-4162-99D2-30D16807E3B0"}]}} \ No newline at end of file diff --git a/cpematch/18/1800F41A-F9C3-4BF1-90DA-409324237D72.json b/cpematch/18/1800F41A-F9C3-4BF1-90DA-409324237D72.json new file mode 100644 index 00000000000..d7c2bac2d13 --- /dev/null +++ b/cpematch/18/1800F41A-F9C3-4BF1-90DA-409324237D72.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "1800F41A-F9C3-4BF1-90DA-409324237D72", "criteria": "cpe:2.3:o:enphase:iq_gateway_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4", "versionEndIncluding": "7", "lastModified": "2024-08-14T15:59:20.203", "cpeLastModified": "2024-08-14T15:59:20.203", "created": "2024-08-14T15:59:20.203", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/21/21986A2A-8166-486E-964D-C4A0CECE9AE2.json b/cpematch/21/21986A2A-8166-486E-964D-C4A0CECE9AE2.json new file mode 100644 index 00000000000..201e8f94a3a --- /dev/null +++ b/cpematch/21/21986A2A-8166-486E-964D-C4A0CECE9AE2.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "21986A2A-8166-486E-964D-C4A0CECE9AE2", "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.10.0", "versionEndExcluding": "17.10.6", "lastModified": "2024-08-14T15:43:15.770", "cpeLastModified": "2024-08-14T15:43:15.770", "created": "2024-08-14T15:43:15.770", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/33/33EE6034-4A66-4C20-A2A1-BC0FEFA2C7B5.json b/cpematch/33/33EE6034-4A66-4C20-A2A1-BC0FEFA2C7B5.json new file mode 100644 index 00000000000..f773f720697 --- /dev/null +++ b/cpematch/33/33EE6034-4A66-4C20-A2A1-BC0FEFA2C7B5.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "33EE6034-4A66-4C20-A2A1-BC0FEFA2C7B5", "criteria": "cpe:2.3:o:dell:wyse_7040_thin_client_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.26.0", "lastModified": "2024-08-14T15:23:31.030", "cpeLastModified": "2024-08-14T15:23:31.030", "created": "2024-08-14T15:23:31.030", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:dell:wyse_7040_thin_client_firmware:-:*:*:*:*:*:*:*", "cpeNameId": "0EAADF8E-D355-4778-A5D5-7014EEA2FD1C"}, {"cpeName": "cpe:2.3:o:dell:wyse_7040_thin_client_firmware:1.19.0:*:*:*:*:*:*:*", "cpeNameId": "49F3C3DD-E009-4693-91CD-13BB213B84AE"}, {"cpeName": "cpe:2.3:o:dell:wyse_7040_thin_client_firmware:1.24.0:*:*:*:*:*:*:*", "cpeNameId": "050A1E3D-F470-47A5-9E5C-86FB3683A988"}]}} \ No newline at end of file diff --git a/cpematch/44/4477EA85-2B1F-4C08-B46B-5115BAB2A6D8.json b/cpematch/44/4477EA85-2B1F-4C08-B46B-5115BAB2A6D8.json new file mode 100644 index 00000000000..b94fce0b767 --- /dev/null +++ b/cpematch/44/4477EA85-2B1F-4C08-B46B-5115BAB2A6D8.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "4477EA85-2B1F-4C08-B46B-5115BAB2A6D8", "criteria": "cpe:2.3:o:dell:precision_3420_tower_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.32.0", "lastModified": "2024-08-14T15:23:31.030", "cpeLastModified": "2024-08-14T15:23:31.030", "created": "2024-08-14T15:23:31.030", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:dell:precision_3420_tower_firmware:-:*:*:*:*:*:*:*", "cpeNameId": "4D8E2508-887C-4CE5-B319-13743B729285"}, {"cpeName": "cpe:2.3:o:dell:precision_3420_tower_firmware:2.29.0:*:*:*:*:*:*:*", "cpeNameId": "ED39F5C5-EF1F-476D-A106-F5F3F711A97B"}]}} \ No newline at end of file diff --git a/cpematch/46/464A3580-D632-43EB-93EF-E2A1A5736F14.json b/cpematch/46/464A3580-D632-43EB-93EF-E2A1A5736F14.json new file mode 100644 index 00000000000..6a885152276 --- /dev/null +++ b/cpematch/46/464A3580-D632-43EB-93EF-E2A1A5736F14.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "464A3580-D632-43EB-93EF-E2A1A5736F14", "criteria": "cpe:2.3:a:oretnom23:online_eyewear_shop:1.0:*:*:*:*:*:*:*", "lastModified": "2024-08-14T14:05:23.013", "cpeLastModified": "2024-08-14T14:05:23.013", "created": "2024-08-14T14:05:23.013", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/49/49902D45-21DA-4B6B-BBA3-1597AA3FB4CC.json b/cpematch/49/49902D45-21DA-4B6B-BBA3-1597AA3FB4CC.json new file mode 100644 index 00000000000..f9bdac0288d --- /dev/null +++ b/cpematch/49/49902D45-21DA-4B6B-BBA3-1597AA3FB4CC.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "49902D45-21DA-4B6B-BBA3-1597AA3FB4CC", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "4.19.318", "lastModified": "2024-08-14T15:31:00.673", "cpeLastModified": "2024-08-14T15:31:00.673", "created": "2024-08-14T15:31:00.673", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:*:*:*:*:*:*:*", "cpeNameId": "E675CA19-0205-4D08-AD72-56813FC90E70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:-:*:*:*:*:*:*", "cpeNameId": "7378F6A7-89A4-4C9A-A54E-19252CD12A29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", "cpeNameId": "2C4825EF-D76D-4B26-9063-D92A4AB559D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", "cpeNameId": "40C9F38D-6AF4-4F10-B006-CB1752879625"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", "cpeNameId": "585940B2-EA29-4B97-BA4F-61B097C6CBEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", "cpeNameId": "02128A6F-BD25-4C7E-96B0-E934E0800527"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", "cpeNameId": "E3D54552-B5F7-483A-B434-50876D8BE038"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*", "cpeNameId": "7917FAA4-F74F-4EC3-8EFA-45271A7CB611"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*", "cpeNameId": "6705E5DC-2EA5-4339-A661-2FA31705DE42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.0:*:*:*:*:*:*:*", "cpeNameId": "65A07F88-5A18-4758-8009-E7B920F40BB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*", "cpeNameId": "19D521AB-0EC6-4522-B370-D65784E91786"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*", "cpeNameId": "11C5EA6B-3069-4756-8EB0-672A731B7AC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*", "cpeNameId": "CC519536-8DA7-4EC5-B61C-8681F99ACE91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*", "cpeNameId": "4BCDC685-168E-45BA-B094-60AA9C952B59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*", "cpeNameId": "6207B1AE-0269-4BD5-BDA7-AA74F02D1FB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*", "cpeNameId": "AA42AD78-B3F2-4383-B9C9-A1B638311A42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*", "cpeNameId": "41480C9A-E551-486E-93FF-6A29A22BAAD1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*", "cpeNameId": "13AA137D-8350-44EC-8441-5BB5718682B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*", "cpeNameId": "1D9B8597-0D82-4787-8645-DE471DEFD11E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*", "cpeNameId": "87DFB95C-8CFD-42A1-BA96-FFEACF82588D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*", "cpeNameId": "45A9FDEE-219A-4C1D-8655-C2CFC646F7F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*", "cpeNameId": "403E8590-8BD5-4AAB-98B2-AAB85799E004"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*", "cpeNameId": "69DAA3C2-5DA7-4095-9494-EB95050D5C17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*", "cpeNameId": "BF6CEA34-C360-46CC-A019-17C97110AB54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*", "cpeNameId": "79AD64FE-8BBF-4223-8681-058D2C8372AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*", "cpeNameId": "FC822FF0-8BBB-401D-809A-C21A970BEC3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*", "cpeNameId": "8844B560-DA2A-4108-A9AB-EFF569DA827D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*", "cpeNameId": "9E7DCDFE-98E8-4B87-B7CF-588CA714E476"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*", "cpeNameId": "409F6C37-8840-46DD-85DB-41DF168EC50A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*", "cpeNameId": "F3EC1D7C-D551-4FE4-9D6C-F8DB800AD02A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*", "cpeNameId": "FBE11D30-3565-49A0-8FF6-5BE71775F59C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*", "cpeNameId": "F9C36003-FBD9-475C-80D6-50D950056F4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*", "cpeNameId": "EC17CEC8-28AC-4AFA-BFCF-DB36D66DA96B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*", "cpeNameId": "45388B7F-6654-4BB0-9930-988F4074353C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*", "cpeNameId": "4863743C-6FAB-47B3-BD7E-02C91AD2F40A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*", "cpeNameId": "F9657A59-9283-4F6E-B331-BCB73DC618F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*", "cpeNameId": "0FA42FBB-5EC9-4ACB-A6D9-3766140F1D71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*", "cpeNameId": "4320A7E1-30F3-427F-97C3-F4367D341803"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*", "cpeNameId": "1B337381-F959-4399-A5F5-F0E8B61CDC14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*", "cpeNameId": "2EE72F21-D55D-480B-9451-5E6BDF5E931C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*", "cpeNameId": "A77A6813-5267-4B56-941D-CC457FFDAE51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*", "cpeNameId": "B834EA7C-1F83-41D8-B294-4D20D4FCDCCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*", "cpeNameId": "436BC3D4-9452-4850-8FBE-347D8E07B15E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*", "cpeNameId": "3EF9D92E-9A9C-4853-904F-F0631D5A252D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*", "cpeNameId": "02EDAB5F-5D03-47DD-9DE1-6ECACD88C6D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*", "cpeNameId": "6A091D60-9CFD-444F-8A1E-5EE48F65D9B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*", "cpeNameId": "C151F6F7-9640-42E1-A90D-005D6A2DA4E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*", "cpeNameId": "441BF329-7728-4258-BC0F-1F862629857E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*", "cpeNameId": "F469D65B-5013-4D44-97C6-6836DACD09F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*", "cpeNameId": "C2ADD944-42AB-4840-8900-090BE1CF7E75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*", "cpeNameId": "FD8DB916-9217-43FE-9E10-09CB422FED1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*", "cpeNameId": "B373C2B9-8D11-424F-B2DB-96D87E0EE182"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*", "cpeNameId": "63577543-E0B1-4295-83BA-AEC0CFE2CA67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*", "cpeNameId": "22C0156C-FD96-419C-B32B-B7094E00E141"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*", "cpeNameId": "0C86BCD6-2EBB-4DA8-9FE6-B66F1D0F5C66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*", "cpeNameId": "70E25B32-6AD5-4801-93A2-B16A871A102C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*", "cpeNameId": "40D74137-22F3-4AE3-AD16-2E83858740D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*", "cpeNameId": "7FAE531F-6ADB-4A5B-AD4D-C95BD3ADE7E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*", "cpeNameId": "DB682532-CEBA-4F65-8A1F-8A5ADA6C1868"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*", "cpeNameId": "7B38EDFF-EE60-42D1-B149-1726A0995C75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*", "cpeNameId": "8208AC95-1E18-4994-87B1-5FABA1C6DCC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*", "cpeNameId": "1292E697-8D68-493E-BC7E-A26C01903831"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*", "cpeNameId": "989B896A-4115-40C8-8AF9-1A3C764C5FB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*", "cpeNameId": "0522C8A4-4663-4F43-AAAF-86074AA109F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*", "cpeNameId": "7C1D5397-712D-4969-85F6-687827706FC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*", "cpeNameId": "C2EA4C85-8FB2-4652-8896-1F80CA69B4CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*", "cpeNameId": "D62265EA-FE33-4366-AC2E-60EF6D2D844A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*", "cpeNameId": "BD449DB4-A455-4DAA-9A5A-15C5C214E0E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*", "cpeNameId": "2C207BA3-3196-4162-A095-1BF15C1A40C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*", "cpeNameId": "6B52552D-E347-45FE-94C5-06CAF93047CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*", "cpeNameId": "BA7D8FCF-CEFA-479A-AC26-E0C3E6B7F41F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*", "cpeNameId": "831D56C8-73FC-4AB7-B0AE-6E97F2B6DEE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*", "cpeNameId": "92718423-DB5F-43F8-B50E-5A152FEB539C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*", "cpeNameId": "8A1828A7-EA44-44CC-8B84-9AF45830D686"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*", "cpeNameId": "5FADB7C1-8112-496C-91E4-8E433134A897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*", "cpeNameId": "70E429A5-8718-4201-8FA1-647CF2124B22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*", "cpeNameId": "4EE9D2D4-E60A-4B7C-AF46-939730C93FF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*", "cpeNameId": "7E91D5E5-AE29-4D71-B3DA-1DD89AEACFE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.69:*:*:*:*:*:*:*", "cpeNameId": "2947D661-699F-428E-B711-88005A7133C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.70:*:*:*:*:*:*:*", "cpeNameId": "67B242CD-5A0E-495E-9144-297D99750A21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.71:*:*:*:*:*:*:*", "cpeNameId": "628147F9-08F1-4660-A2BA-A56A13027ABE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.72:*:*:*:*:*:*:*", "cpeNameId": "FB49D42B-1F6C-4E5A-B4D2-848B86BD6415"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.73:*:*:*:*:*:*:*", "cpeNameId": "232E9DEE-969C-429A-8F35-E2BF995E5D9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.74:*:*:*:*:*:*:*", "cpeNameId": "E99EC0F2-5BC3-4E91-A664-08C56D488D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.75:*:*:*:*:*:*:*", "cpeNameId": "CEB2EFD5-48BD-4F69-B231-B7833D4BF597"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.76:*:*:*:*:*:*:*", "cpeNameId": "3796A094-63F8-44FB-9A81-94D6C5CDE459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.77:*:*:*:*:*:*:*", "cpeNameId": "A7A8A856-5781-4BBA-8329-FA71DCD6129B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.78:*:*:*:*:*:*:*", "cpeNameId": "68747D1F-FA23-444F-9602-07694CF7C245"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.79:*:*:*:*:*:*:*", "cpeNameId": "AF9BBD94-2571-45AF-98FA-7C1F9E48B476"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.80:*:*:*:*:*:*:*", "cpeNameId": "6100C07E-82B6-4EFC-B7E3-42E13A5EDFB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.81:*:*:*:*:*:*:*", "cpeNameId": "721BA4C3-5D58-46D7-AFA7-CF4AFB5922E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.82:*:*:*:*:*:*:*", "cpeNameId": "15CAC92C-9CCE-408D-8E54-784800BE06A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.83:*:*:*:*:*:*:*", "cpeNameId": "2826A327-2B91-46DF-97AD-617D889DC5B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.84:*:*:*:*:*:*:*", "cpeNameId": "6419F315-F012-47BE-B150-600BDF5DAB5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.85:*:*:*:*:*:*:*", "cpeNameId": "E42EB24B-5E95-482D-8606-3B68612956B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.86:*:*:*:*:*:*:*", "cpeNameId": "2ADA9A58-7414-48C0-8E14-C4C52867BDBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.87:*:*:*:*:*:*:*", "cpeNameId": "88328D39-6E68-4A6B-96CD-8AF0DBC12851"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.88:*:*:*:*:*:*:*", "cpeNameId": "C7C076EB-891E-4BBF-A97B-4A77D39AC9D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.89:*:*:*:*:*:*:*", "cpeNameId": "D2A0C560-0D1E-4D5C-A332-8CD32DF1C1D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.90:*:*:*:*:*:*:*", "cpeNameId": "744B6D49-F611-44B4-B39A-C204D21E3242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.91:*:*:*:*:*:*:*", "cpeNameId": "725F0655-1AC5-4187-A185-FFC269DE6FEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.92:*:*:*:*:*:*:*", "cpeNameId": "F7187593-4AED-4E10-92E9-6D3F82DD8579"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.93:*:*:*:*:*:*:*", "cpeNameId": "76399886-4A4B-44BF-8E93-0B92F48C99C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.94:*:*:*:*:*:*:*", "cpeNameId": "A3024F96-1973-43A6-A7FD-43343CF76EB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.95:*:*:*:*:*:*:*", "cpeNameId": "690FFA55-4453-4857-91C2-0D88810A66DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.96:*:*:*:*:*:*:*", "cpeNameId": "3A1ABD5D-BAD9-44B6-A0D4-1344F61E77DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.97:*:*:*:*:*:*:*", "cpeNameId": "71A37886-3645-4B90-9390-6CAF4FE60D6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.98:*:*:*:*:*:*:*", "cpeNameId": "D45B1D79-B01F-4320-9848-84F9EB4FE9AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.99:*:*:*:*:*:*:*", "cpeNameId": "EC8D5342-4755-4A6D-BA20-77E5F5370DEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.100:*:*:*:*:*:*:*", "cpeNameId": "F5951A11-6C81-4D3B-91BE-5CE7330BB269"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.101:*:*:*:*:*:*:*", "cpeNameId": "D8180B1F-6D3F-4CB6-9A15-24563250EBB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*", "cpeNameId": "1A99542D-BF2C-4927-A675-45A94E909357"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:-:*:*:*:*:*:*", "cpeNameId": "8DCEFDB7-A0F1-4A58-B4F7-E4938647D892"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*", "cpeNameId": "717D6C63-BFAA-4E03-9B6B-15AAC4F9407E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*", "cpeNameId": "7313BBA3-2A42-4FE2-A6BB-65365FE1CF07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*", "cpeNameId": "48093C34-2181-4EAB-A2B4-591509C094FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*", "cpeNameId": "DD0227A7-CC9C-4388-90DF-D06E801AF684"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", "cpeNameId": "BA7B47E4-ED28-4B5B-BD88-B5A1E86D045E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", "cpeNameId": "6769988D-645B-4085-A555-29C3B5A8D145"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", "cpeNameId": "B193E5C5-3B2C-4F7C-B904-A8FF6B790499"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", "cpeNameId": "7C3CAF66-E6E1-4714-A480-58CDA92428F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", "cpeNameId": "21D6F078-9090-4B3A-8106-59A51323BE4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", "cpeNameId": "AF71BFF8-6FC9-4730-AE11-71DA868C5588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", "cpeNameId": "7868FADA-294B-477B-802F-8E4BBC7E16E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*", "cpeNameId": "679A0479-F91E-4214-9DCE-24EC498FBBC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*", "cpeNameId": "FC6F89EB-BC20-4CBB-9469-7FE7354BB051"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*", "cpeNameId": "2CE5B5AD-8FE8-4A79-B181-64A7257B9177"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*", "cpeNameId": "C82F3FFF-8B8C-416B-A398-649413127215"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:-:*:*:*:*:*:*", "cpeNameId": "142046C3-CA5B-4025-9411-EB541CDE90D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*", "cpeNameId": "316C0C5A-74B0-4A97-A7E5-813A39172BE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*", "cpeNameId": "7137A9B1-7A4B-4C4C-B199-E40D514AE762"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*", "cpeNameId": "365499E2-4E7E-4277-9FC9-E026ED6D2AC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*", "cpeNameId": "62A6EC9B-6434-4B3E-87FB-002EF98FB3ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*", "cpeNameId": "628D835E-E0A1-4261-A2FE-AE27FABB7E27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*", "cpeNameId": "2A6A3167-3A00-4195-BFCE-F7293497B047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*", "cpeNameId": "06BE7B88-255B-49D0-A934-E81A66DD1B17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*", "cpeNameId": "C6B8D73E-0E31-44A4-98FF-914527843E1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*", "cpeNameId": "1D0A6492-1F10-4768-99E0-06D1ED8617AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*", "cpeNameId": "D8B392AA-EFBD-4200-A1F1-1E5C1CEF8C15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*", "cpeNameId": "EA189203-2158-4E92-A526-7E742E4C6B36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*", "cpeNameId": "906FC19A-1DB3-4ED7-8889-1E3A5E212724"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*", "cpeNameId": "7C2DC23E-215E-4973-AD3A-A28BEB5B9113"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*", "cpeNameId": "3431E73A-E239-4EF5-8463-5DE3CF01F38F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*", "cpeNameId": "A200B420-232A-433F-8CDE-ADA898D920A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*", "cpeNameId": "3DF0E7D8-B8D0-4C89-A679-517A3C3BAAD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*", "cpeNameId": "E35AD74A-5E15-4528-91E4-B098F9FBB16F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*", "cpeNameId": "BDA150E1-DCEE-4F0C-9280-126D1F954319"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*", "cpeNameId": "1BC78E93-7B8F-432C-82AD-51F8A9A393C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*", "cpeNameId": "9658E83F-D08C-4E8A-9133-2EC6AAE1D44D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*", "cpeNameId": "CE33893B-F7EF-4D5C-BCA0-60AD5366E384"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*", "cpeNameId": "18E74DD1-D0E9-444F-AAEB-D3CA998909EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*", "cpeNameId": "C392515E-4C53-4387-B556-82D87F083A13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*", "cpeNameId": "653C01CC-5895-420E-9664-9BE57DC5F876"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*", "cpeNameId": "D09E709A-BD26-4493-9781-BACA3475336E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*", "cpeNameId": "4B713D3E-DAD6-4620-B651-3563A957BA36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*", "cpeNameId": "D823C65C-9D03-4124-ABAA-87E1CCB6DE3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*", "cpeNameId": "C75CB737-F344-4186-94F0-1097298815A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*", "cpeNameId": "FEF99F56-94D5-4296-9901-AAA7B3D59E83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*", "cpeNameId": "D6BC9731-830A-4BAD-8FD5-34804F733854"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*", "cpeNameId": "180488F5-5C9E-46E4-B3D3-1D8CD40A4F68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*", "cpeNameId": "1A930330-058A-4709-A914-98A5DD1E6606"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*", "cpeNameId": "6A2B3F95-32E2-4F75-888B-FD6D995B9212"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*", "cpeNameId": "00AEA53A-CD82-4C14-90C6-48FAFEE855CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*", "cpeNameId": "B7E70A5A-8202-4848-833D-BF0CCBE7CCFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*", "cpeNameId": "D9CCE96A-ED37-4DDF-BF43-857F343B4105"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.31:*:*:*:*:*:*:*", "cpeNameId": "52A5EAA5-C3B7-4EFC-9AE6-F5C3B711A632"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.32:*:*:*:*:*:*:*", "cpeNameId": "22431C69-AED0-4983-BD1C-704CA647C81C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.33:*:*:*:*:*:*:*", "cpeNameId": "5B1BB2D1-60F4-4504-9362-6548F78EC490"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.34:*:*:*:*:*:*:*", "cpeNameId": "CB2D7E22-F1CA-4E4A-BE3E-2559040658CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.35:*:*:*:*:*:*:*", "cpeNameId": "B3E2A74F-382B-42E0-8E93-B30DC87668CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.36:*:*:*:*:*:*:*", "cpeNameId": "429AF5FC-B66D-41E2-9452-46F1DDF3F48A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.37:*:*:*:*:*:*:*", "cpeNameId": "81A05CDA-B968-415D-AFBD-3C5E8254454D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.38:*:*:*:*:*:*:*", "cpeNameId": "8618E6FF-54AE-4238-988E-28A0C522C38C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.39:*:*:*:*:*:*:*", "cpeNameId": "2F7B8E99-84A7-4707-85EF-49C9884C2D14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.40:*:*:*:*:*:*:*", "cpeNameId": "E0D96BE3-5CC1-4BF8-A364-C20AE8A67C38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.41:*:*:*:*:*:*:*", "cpeNameId": "6BBAAC8C-E86E-4B0D-9582-12E770A23E61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.42:*:*:*:*:*:*:*", "cpeNameId": "1BAE21D2-E437-4889-87D8-9E94B9BAB181"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.43:*:*:*:*:*:*:*", "cpeNameId": "83B86D4E-DEDC-41AC-9030-634723C5EFC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.44:*:*:*:*:*:*:*", "cpeNameId": "DEE09A89-7D01-4E76-AD76-5329742D49E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.45:*:*:*:*:*:*:*", "cpeNameId": "E0CC16F5-DF50-4020-BBE9-43BFDB29D211"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.46:*:*:*:*:*:*:*", "cpeNameId": "80407BC0-0457-4DA6-9EBE-49CAD337DD7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.47:*:*:*:*:*:*:*", "cpeNameId": "885540C4-709A-46DF-B98C-A237628D9051"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.48:*:*:*:*:*:*:*", "cpeNameId": "2CC641C9-5A91-47E5-A332-928854306A88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.49:*:*:*:*:*:*:*", "cpeNameId": "9A1FE922-9B98-4059-80B7-32F9EBB3BA15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.50:*:*:*:*:*:*:*", "cpeNameId": "78CEDB41-D210-4225-A89E-8ACE2FA7AC75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.51:*:*:*:*:*:*:*", "cpeNameId": "7D5E05DB-8EDC-4B50-BEC4-89A2706BD3A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.52:*:*:*:*:*:*:*", "cpeNameId": "33D503BA-CD64-4BC8-812D-548C75CFCC97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.53:*:*:*:*:*:*:*", "cpeNameId": "420B543D-D702-4BAD-B9C3-C7BC9F55C253"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.54:*:*:*:*:*:*:*", "cpeNameId": "E26DEAEA-FBAB-48A5-8493-D5392940231A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.55:*:*:*:*:*:*:*", "cpeNameId": "20A94EF2-E013-41B8-B9C3-6D8FAAFC4749"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.56:*:*:*:*:*:*:*", "cpeNameId": "AFC5FCF3-421F-4FB8-AA51-79DECEAB93CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.57:*:*:*:*:*:*:*", "cpeNameId": "869BA085-2A7A-47B5-9983-364A9A85A29A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.58:*:*:*:*:*:*:*", "cpeNameId": "BC8906BF-B55E-4384-8F06-41732DE13A1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.59:*:*:*:*:*:*:*", "cpeNameId": "653B786B-54D0-4EBB-90C4-7B2FB91A6865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.60:*:*:*:*:*:*:*", "cpeNameId": "47D7F6C3-43D8-4B41-8DC3-C7169377DD54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.61:*:*:*:*:*:*:*", "cpeNameId": "91BE8533-CEAE-4D12-8B71-75F81149DB79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.62:*:*:*:*:*:*:*", "cpeNameId": "B3E4D758-9655-434E-8CF9-32F57D3DC028"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.63:*:*:*:*:*:*:*", "cpeNameId": "1913A11B-D750-4125-85DA-B7FBFB0F616C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.64:*:*:*:*:*:*:*", "cpeNameId": "B494BFB3-2991-4ED8-A6C2-FF35DBB3B81F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.65:*:*:*:*:*:*:*", "cpeNameId": "4807B2C5-66DD-43D0-AB28-2A645FDC6CFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.66:*:*:*:*:*:*:*", "cpeNameId": "DE631770-040B-4FBC-8409-4F649697BD93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.67:*:*:*:*:*:*:*", "cpeNameId": "0143D4FC-B8AA-435D-B065-8A00A4E1F860"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.68:*:*:*:*:*:*:*", "cpeNameId": "66737E07-144A-4AD8-967C-A34C1024CA3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.69:*:*:*:*:*:*:*", "cpeNameId": "D781F8E9-0E92-4879-B8AE-67FD07175184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.70:*:*:*:*:*:*:*", "cpeNameId": "8320F56F-90A3-47FE-AA76-F470509A957F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.71:*:*:*:*:*:*:*", "cpeNameId": "3D480FDE-B0C6-47A7-9034-3C4E4266A8D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.72:*:*:*:*:*:*:*", "cpeNameId": "0BACD049-2C99-4393-BBC5-8D157511F6D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.73:*:*:*:*:*:*:*", "cpeNameId": "FB450388-7DF5-43E4-B9E6-98422EE4EECC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.74:*:*:*:*:*:*:*", "cpeNameId": "1E01BE1F-D164-4DDE-901B-CDE83773AC7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.75:*:*:*:*:*:*:*", "cpeNameId": "AD91985D-7F93-4062-82C3-471FDEDAC385"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.76:*:*:*:*:*:*:*", "cpeNameId": "081514E8-D66B-4305-815E-5228A9445ACC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.77:*:*:*:*:*:*:*", "cpeNameId": "B29A99D9-1903-4C10-B637-5BA73E5CF91F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.78:*:*:*:*:*:*:*", "cpeNameId": "85DFB807-5015-48B1-8BA4-F78E1ED57E01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.79:*:*:*:*:*:*:*", "cpeNameId": "F3A79ADD-F28F-4F4D-8A44-99592CAE87AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.80:*:*:*:*:*:*:*", "cpeNameId": "6D43B8AB-6A89-48F2-B814-0562507E0886"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.81:*:*:*:*:*:*:*", "cpeNameId": "FDAC9D48-6BC2-4148-91A4-5375B79F6194"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.82:*:*:*:*:*:*:*", "cpeNameId": "440DE5E6-BC9B-4F99-B4C4-74FB79557DBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.83:*:*:*:*:*:*:*", "cpeNameId": "EC87BF5B-A78F-485C-8265-AEAF964E1048"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.84:*:*:*:*:*:*:*", "cpeNameId": "B1DBD1CA-3EBB-4FEA-930D-A463D3B5921B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.85:*:*:*:*:*:*:*", "cpeNameId": "DCDC762A-1384-4BCC-A3DD-43D1BFC02FCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.86:*:*:*:*:*:*:*", "cpeNameId": "FBDBCA76-A7D1-43D3-B0E7-B2683167B1CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.87:*:*:*:*:*:*:*", "cpeNameId": "86FB8493-7660-4CDE-9547-2B6469544D95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.88:*:*:*:*:*:*:*", "cpeNameId": "0116376E-167D-4241-A75D-FF792BAE4C49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.89:*:*:*:*:*:*:*", "cpeNameId": "232DA74F-0A85-45E3-AFFE-75DF7D2E8316"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.90:*:*:*:*:*:*:*", "cpeNameId": "A94F5C70-1C71-4DC1-AF94-61988458182D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.91:*:*:*:*:*:*:*", "cpeNameId": "372857DB-A2E5-46B5-859C-5A447EB5EE9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.92:*:*:*:*:*:*:*", "cpeNameId": "52550675-1EB8-4A92-87E9-02773E1A829C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.93:*:*:*:*:*:*:*", "cpeNameId": "0307A2A8-6976-4C84-B71C-E0A83C53961E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.94:*:*:*:*:*:*:*", "cpeNameId": "418FC315-F587-41E6-A4CF-F356DEF9AD5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.95:*:*:*:*:*:*:*", "cpeNameId": "05080F6D-2FF4-477E-B59C-AD9A38D2E69C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.96:*:*:*:*:*:*:*", "cpeNameId": "F48B03A9-7823-4CE1-B36E-C1DD86837F0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.97:*:*:*:*:*:*:*", "cpeNameId": "6162425D-432F-4C49-8E27-04F75A166D60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.98:*:*:*:*:*:*:*", "cpeNameId": "8EB3E252-D235-4E82-BC61-723C64DAA65B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.99:*:*:*:*:*:*:*", "cpeNameId": "613BAE28-98F8-4906-AA51-820B3335EBBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.100:*:*:*:*:*:*:*", "cpeNameId": "3B370497-B377-424D-8A2A-05614E33E414"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.101:*:*:*:*:*:*:*", "cpeNameId": "C3229A18-8555-4037-BBC0-8C0852EDA4A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.102:*:*:*:*:*:*:*", "cpeNameId": "6EF92A3F-1DF7-4826-83C8-6AD59A39265D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", "cpeNameId": "4C56AF79-C2B9-4C63-A51E-9D4CB7529269"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:-:*:*:*:*:*:*", "cpeNameId": "216C7567-C83B-4498-B0CD-46431830482F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", "cpeNameId": "3165F23C-852B-45C1-B6FA-188E656427A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", "cpeNameId": "17CD7EFE-3E88-45D0-AC88-B03B00A4A0E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", "cpeNameId": "063AFF14-AB8B-4D13-8BFC-AF437607AE59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", "cpeNameId": "DA6C4271-F035-42BD-A918-49966E65D9DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", "cpeNameId": "260917D4-E4F2-4870-B50B-A942D3E00035"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", "cpeNameId": "E2B66DF7-767D-4223-986E-018BE688F462"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", "cpeNameId": "322E8592-6A21-4496-8DD7-F0E90FB0B08D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", "cpeNameId": "D542D5ED-4CF2-4408-A91F-FA978B1C5334"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", "cpeNameId": "271CBB6E-85D1-4ED7-958A-9ADF338CCB88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", "cpeNameId": "DFFF6BEB-FB02-424F-B4DA-DEE049E81395"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", "cpeNameId": "A08B75A7-1E6E-4B08-B2F6-D25FC72C3E7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*", "cpeNameId": "6A018015-0114-490B-80FC-B588B1F13E5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*", "cpeNameId": "FC6A036B-228C-4A5D-A41E-A36CF4BEB971"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*", "cpeNameId": "BC9B3FC7-EC05-42E5-BBEC-CBA38E38BD5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*", "cpeNameId": "3D1A21A4-5D3D-4FCD-8021-51F2E62F8719"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", "cpeNameId": "7F9645DF-BD4B-4479-BD61-A818171E36D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:-:*:*:*:*:*:*", "cpeNameId": "5C315BD5-D56F-498D-B5FC-77B6A6AF2571"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*", "cpeNameId": "9C50F743-0E91-4E50-B542-1DB40389CCFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*", "cpeNameId": "C7693E1E-3F4A-4B31-84DA-C32CC0A6B4A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*", "cpeNameId": "B869F0C3-5462-4A49-9C04-91717DAEBE48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*", "cpeNameId": "9169DD50-1F78-4AB2-AF6A-9A87A55CD5F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*", "cpeNameId": "6DFDA097-AE0D-4C22-A612-6B43191ED494"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*", "cpeNameId": "A2A13DB3-7362-432E-9956-47476E3C8594"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*", "cpeNameId": "F7DC5C7C-F1E4-4876-BB23-5AE2E0837698"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", "cpeNameId": "9C88F8A3-ECCB-428C-A8C5-B9952B20B8EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", "cpeNameId": "0BBD2F2B-55D2-4E99-A64D-85552721CF89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", "cpeNameId": "3BFBDB35-0D9A-4AED-BC40-130C68E136E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", "cpeNameId": "8B78F0EB-512E-4DF3-BBB0-B863DE170D9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", "cpeNameId": "6EC99C95-4E8A-4204-89A6-D55C83C78499"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", "cpeNameId": "58DB20D4-AD22-4075-9CC5-C4B2B758491C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", "cpeNameId": "42125DFB-604A-4336-BB50-FB32DBF2CDB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", "cpeNameId": "BEC6A864-F607-43DC-9A5C-6C9881A1638E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", "cpeNameId": "ADE87835-B344-47B2-8734-3BCA1035C217"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", "cpeNameId": "847E7314-8B34-4579-B3D5-D9D742132804"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", "cpeNameId": "C47995DE-5F8C-41A6-AD25-656557A3851C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", "cpeNameId": "2E13CD82-764F-45B1-BD27-BD9BA15D9AC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", "cpeNameId": "E892C72B-87E4-48C9-9425-2A40B8235644"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", "cpeNameId": "912F5A2C-795B-4A15-B3CD-DF691594C2A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", "cpeNameId": "3B4AC1FF-B222-4844-8AE1-9FA1685FA572"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", "cpeNameId": "66D514ED-5C2D-416B-B169-67B838575459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", "cpeNameId": "48DFA50A-628C-4C55-961D-ABF2052B406B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*", "cpeNameId": "E58E0E22-013B-43A0-8B3E-5E8854DDD393"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*", "cpeNameId": "77E923D8-A9BC-42BD-8C28-CBF54959A042"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*", "cpeNameId": "19FAA1FA-B770-4D3D-8FFA-CF117BF8FEC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*", "cpeNameId": "1FD4A547-6D4D-483F-892A-DB616570302F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*", "cpeNameId": "4533F044-1645-47CD-BD31-A7700CB4EE52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*", "cpeNameId": "755BD5E1-FC72-42F6-8C5C-40E449F32E0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*", "cpeNameId": "85CE79D8-3F06-40DE-B5EA-A99E9257D388"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*", "cpeNameId": "D7CD3755-1AEE-41DA-BB81-AEAB2A339000"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*", "cpeNameId": "BA83EAD2-B9D6-4AA6-B332-4D70AB1CE85C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*", "cpeNameId": "725D03ED-1B8B-4F7F-94DE-D163679B25A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*", "cpeNameId": "7B46EA94-4CEA-413A-B300-4BC8207D587E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*", "cpeNameId": "613792CE-5F01-4ECD-9273-74E35A76DACA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*", "cpeNameId": "16DDCFE6-2FB0-4ADE-B11D-297DD2135CF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*", "cpeNameId": "74B55E1A-5C97-49F4-84B4-281E7C53EA9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*", "cpeNameId": "732DD130-EDEF-48B4-AD0F-12010B578C01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.33:*:*:*:*:*:*:*", "cpeNameId": "18F2FE88-3208-4608-AE5C-3443C0D03E0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.34:*:*:*:*:*:*:*", "cpeNameId": "DC0A746D-3887-488F-A374-EF35CBC969D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.35:*:*:*:*:*:*:*", "cpeNameId": "B46CD7B2-4950-4D52-BDD2-817DCC9D13EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.36:*:*:*:*:*:*:*", "cpeNameId": "EB53E610-E9E2-4B1F-9816-2CEE82CCC4DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.37:*:*:*:*:*:*:*", "cpeNameId": "7380EA90-66F0-4EA0-B861-12AE47C28F9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.38:*:*:*:*:*:*:*", "cpeNameId": "606E3372-BAE9-48A8-BC16-866AAB02533A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.39:*:*:*:*:*:*:*", "cpeNameId": "A1B8D27F-3388-4370-B95B-7568B6BA975E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.40:*:*:*:*:*:*:*", "cpeNameId": "9D346BC6-FFA5-473E-ACFD-DAC361B91C5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.41:*:*:*:*:*:*:*", "cpeNameId": "268803F9-54B1-4A2E-A2F2-4CC26E6A84C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.42:*:*:*:*:*:*:*", "cpeNameId": "0904F99F-9733-447C-BF7E-FEBD996E5877"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.43:*:*:*:*:*:*:*", "cpeNameId": "D21701F8-F7C2-4916-A60D-AD66082E64E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.44:*:*:*:*:*:*:*", "cpeNameId": "8C57B372-D510-41A1-B427-0A796F78B306"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.45:*:*:*:*:*:*:*", "cpeNameId": "1B6AA52B-3A5F-4FA5-873D-00D3E3656401"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.46:*:*:*:*:*:*:*", "cpeNameId": "7DEE950A-5E8D-469E-8441-0CD012D6CD4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.47:*:*:*:*:*:*:*", "cpeNameId": "DA2E3BEC-E551-4742-BD82-5BC5E47EBE75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.48:*:*:*:*:*:*:*", "cpeNameId": "1EDB923A-9B3C-46CE-976C-150970DDCF32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.49:*:*:*:*:*:*:*", "cpeNameId": "A47A980A-97AC-40B9-AD50-1DA77D0A020B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.50:*:*:*:*:*:*:*", "cpeNameId": "730CBC8B-0C78-4C84-AFBE-D105CBD5C0F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.51:*:*:*:*:*:*:*", "cpeNameId": "A306D9A3-48CC-4DDC-99CC-E2D8183335DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.52:*:*:*:*:*:*:*", "cpeNameId": "EAC93D54-6A08-4475-B196-85F6673B3B6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.53:*:*:*:*:*:*:*", "cpeNameId": "F5B7DFA5-C039-40CC-82D0-2916C7F971B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.54:*:*:*:*:*:*:*", "cpeNameId": "786F2688-E780-46C4-8177-D9CABFC4AA9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.55:*:*:*:*:*:*:*", "cpeNameId": "3B8D1625-531A-4A51-8567-142C05E10F6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.56:*:*:*:*:*:*:*", "cpeNameId": "8385A08A-3F7B-43F8-8757-1667E3A28F42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.57:*:*:*:*:*:*:*", "cpeNameId": "B21C66D5-9C50-403B-BAE5-98D1F1D7001E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.58:*:*:*:*:*:*:*", "cpeNameId": "AAB1ABC2-DCE1-4550-B433-C2B1B419B330"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.59:*:*:*:*:*:*:*", "cpeNameId": "A2D32DA0-65C4-4274-A0FD-E8220E6B407D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.60:*:*:*:*:*:*:*", "cpeNameId": "6B960E11-5BB3-4E40-AE5F-90CFB7F2980B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.61:*:*:*:*:*:*:*", "cpeNameId": "257F2EE3-72EF-4629-94A4-F01A901E85D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.62:*:*:*:*:*:*:*", "cpeNameId": "F128274D-5BF9-45BE-9C1E-3B08DF64E504"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.63:*:*:*:*:*:*:*", "cpeNameId": "EB67B16A-E5A8-4DAE-A8F6-6CD9189F95A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.64:*:*:*:*:*:*:*", "cpeNameId": "21587FC1-355D-4B3F-A06D-DD171F1C62AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.65:*:*:*:*:*:*:*", "cpeNameId": "3B826B1E-86CA-420D-8929-50E4BCAB927C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.66:*:*:*:*:*:*:*", "cpeNameId": "004E1589-DAFD-4B02-A65B-41814392F976"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.67:*:*:*:*:*:*:*", "cpeNameId": "9C287C03-7C7B-4567-ABD1-2860784AC063"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.68:*:*:*:*:*:*:*", "cpeNameId": "6CEEBDCA-447C-4D40-B1CF-1433091347D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.69:*:*:*:*:*:*:*", "cpeNameId": "B60431E1-FFBB-4708-A8E2-47D1BE957937"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.70:*:*:*:*:*:*:*", "cpeNameId": "AF905E35-EF7E-4F3A-B286-8202F6D883E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.71:*:*:*:*:*:*:*", "cpeNameId": "1D7F6676-187E-4E98-816B-2D3ADD98271D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.72:*:*:*:*:*:*:*", "cpeNameId": "8D85776B-17BC-471E-A6C3-3405CEDEACC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.73:*:*:*:*:*:*:*", "cpeNameId": "58070F9F-FAC4-4033-A486-4275D7C14EAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.74:*:*:*:*:*:*:*", "cpeNameId": "3908F399-E82F-4734-BFCC-DF569910954D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.75:*:*:*:*:*:*:*", "cpeNameId": "37F2005A-3B64-459E-BECF-5DDF3DC26198"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.76:*:*:*:*:*:*:*", "cpeNameId": "54E1E032-2977-43E0-A0E2-33EE4B8D605D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.77:*:*:*:*:*:*:*", "cpeNameId": "3CE3F6B9-7686-49FF-9E5D-A7FC5B22C04B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.78:*:*:*:*:*:*:*", "cpeNameId": "9A4F3A55-778F-4D01-BD21-BB057B317C80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.79:*:*:*:*:*:*:*", "cpeNameId": "A3B58A38-1DB3-425B-83CB-4D6E9B0D50CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.80:*:*:*:*:*:*:*", "cpeNameId": "013D0308-EFC0-48E6-ABE9-97E8677D7956"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.81:*:*:*:*:*:*:*", "cpeNameId": "C76DEE0E-3C76-4C34-AE57-4F269C0C8345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.82:*:*:*:*:*:*:*", "cpeNameId": "E0ECA58C-8488-4280-8227-9FD106C4965D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.83:*:*:*:*:*:*:*", "cpeNameId": "B4592A01-0026-4F16-8862-E50EBED75F70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.84:*:*:*:*:*:*:*", "cpeNameId": "A57E9CF5-FB3E-40F3-9C3F-2C5D3CD218A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.85:*:*:*:*:*:*:*", "cpeNameId": "6DA39A76-5294-44B8-A319-EC0B34E50AC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.86:*:*:*:*:*:*:*", "cpeNameId": "A5C5F48A-B66E-4C7F-9FF2-C5F0A406CACE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.87:*:*:*:*:*:*:*", "cpeNameId": "2B757A0C-5A39-432A-9B8C-037BA527E46A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.88:*:*:*:*:*:*:*", "cpeNameId": "463F88B6-C5A7-4EE5-8FC4-8D7DE9BB2ADF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.89:*:*:*:*:*:*:*", "cpeNameId": "05E83609-D10C-43C4-82CC-F48ACFBA0C0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.90:*:*:*:*:*:*:*", "cpeNameId": "AF639F1D-3DB5-4B65-A297-86F88DCEB6BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.91:*:*:*:*:*:*:*", "cpeNameId": "9BD75AFF-1561-4D4E-AEF7-08C63165754D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.92:*:*:*:*:*:*:*", "cpeNameId": "E43540C5-4034-4B55-9F86-EAD8C1B35822"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.93:*:*:*:*:*:*:*", "cpeNameId": "6A67D1C1-1FD3-4FDA-A30F-B9CF2557E49B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.94:*:*:*:*:*:*:*", "cpeNameId": "EE56E2B3-234B-428F-94CC-8284B83F0F80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.95:*:*:*:*:*:*:*", "cpeNameId": "7586CF73-B96D-40A6-B25A-CB257A3C0B1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.96:*:*:*:*:*:*:*", "cpeNameId": "B3B099C7-C246-4260-BE85-5F4A32C48C8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.97:*:*:*:*:*:*:*", "cpeNameId": "226A5757-D8F7-464F-8061-3DFD1D7016F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.98:*:*:*:*:*:*:*", "cpeNameId": "8FD90207-404B-4137-A313-C80EF0209E29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.99:*:*:*:*:*:*:*", "cpeNameId": "A0C62D21-AD27-457A-B628-B0FA831541FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.100:*:*:*:*:*:*:*", "cpeNameId": "22E87AE1-0C4D-481A-9AB6-122958F7B806"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.101:*:*:*:*:*:*:*", "cpeNameId": "5F633063-4C78-4FFE-9C72-DFE721C5B99D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.102:*:*:*:*:*:*:*", "cpeNameId": "644B6E4C-743F-4DDB-A586-AF5E6C336D22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.103:*:*:*:*:*:*:*", "cpeNameId": "501E0F8B-5756-4E68-BEDA-3ABEA9EBECAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.104:*:*:*:*:*:*:*", "cpeNameId": "67111E0D-8FA5-41D2-A1FE-96F1B3972EF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.105:*:*:*:*:*:*:*", "cpeNameId": "05B2F693-9415-403E-B362-3E90E78F5205"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.106:*:*:*:*:*:*:*", "cpeNameId": "7076EF21-2974-477F-A77F-028724B1ECF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.107:*:*:*:*:*:*:*", "cpeNameId": "CA13D9EC-2887-46B7-895C-E9FC341E03C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.108:*:*:*:*:*:*:*", "cpeNameId": "434B3877-E6A2-433B-BAE5-71843920F36B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.109:*:*:*:*:*:*:*", "cpeNameId": "5E51C67B-8C45-4064-8260-480C281CBA63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.110:*:*:*:*:*:*:*", "cpeNameId": "C34040E5-A03A-42A5-AF5B-F3DF66D0329F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.111:*:*:*:*:*:*:*", "cpeNameId": "8B9A38AA-B537-468D-8A06-3C4BB659EDEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.112:*:*:*:*:*:*:*", "cpeNameId": "C8F2983E-8CEE-474F-9B08-E9C13AD643D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.113:*:*:*:*:*:*:*", "cpeNameId": "A7A120EC-E789-4387-B8A3-FCB1DEAC68EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5:*:*:*:*:*:*:*", "cpeNameId": "A5FD173E-DCE9-4A69-AFAB-4CD661963D1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*", "cpeNameId": "9B2B4A5A-182C-4EF3-9D8E-214596C544A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*", "cpeNameId": "C76B49BF-115F-4134-BF91-EBB32275B777"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*", "cpeNameId": "0A4A6E87-E6AA-4D67-B8AA-94C4024B4474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*", "cpeNameId": "D20FBE76-D905-4FDD-AC99-2F52A2BF36E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*", "cpeNameId": "5ED861D7-7EB8-497E-8D9C-7AC8A6BD5245"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*", "cpeNameId": "F9C71974-A2F0-4B3D-8796-B8BD961BC536"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*", "cpeNameId": "FE42B3DE-771E-4966-8642-AFC84050F1A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*", "cpeNameId": "1A03B0CC-33D1-4F25-A957-2010FA603996"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:-:*:*:*:*:*:*", "cpeNameId": "94EF24E5-AA7C-4277-B924-7F01A6E54EA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc2:*:*:*:*:*:*", "cpeNameId": "BA0D05E0-1454-4C4F-9409-3DBAFC0ADF06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc3:*:*:*:*:*:*", "cpeNameId": "9191F237-1AB0-40B5-9AAF-04F6014FCDC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc4:*:*:*:*:*:*", "cpeNameId": "3CDE86D5-C3D3-4542-8F21-59142E917226"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc5:*:*:*:*:*:*", "cpeNameId": "73692F50-41B2-415B-8861-6BC9B52A0AEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc6:*:*:*:*:*:*", "cpeNameId": "105B97CB-41FC-45C9-A16C-EB81B3B5A329"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc7:*:*:*:*:*:*", "cpeNameId": "F7C56EFA-52F1-42F7-9324-C4678DEF9F96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*", "cpeNameId": "A8A058FA-E4EE-416E-B539-00D8F5473CC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*", "cpeNameId": "D5F87239-7A88-434F-9A9E-959FF775108E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*", "cpeNameId": "0BB0846D-DD56-4DE7-ABBC-B43558653DA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*", "cpeNameId": "B723EFC1-63BE-4D9A-A008-E02845D21C9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*", "cpeNameId": "FB9206A1-D3F5-4400-82E6-34A78EAF67A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*", "cpeNameId": "020B7DA4-CE48-49F2-991B-0DCB0AF4935A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*", "cpeNameId": "3606EADE-8161-4284-A09A-0FFA420DAE96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*", "cpeNameId": "6763F9A3-4305-41BF-946E-72CC19EE01F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*", "cpeNameId": "D2E19931-EB6A-4A08-9589-BBC4B2BA05E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*", "cpeNameId": "CD2E3A03-F96F-493D-9B0E-B96309D9AA93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*", "cpeNameId": "A0E05409-4816-417B-A5B2-55F4BBBF45C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*", "cpeNameId": "12E1A3C4-D097-4545-B736-EB5C3A3A3887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*", "cpeNameId": "268526F8-8DBF-4883-8CE7-55CD76A58517"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*", "cpeNameId": "B2A9865E-EDBE-452A-9E87-394FF9A4DD2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*", "cpeNameId": "91F07A30-7EF7-4870-86F8-D4E479920742"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*", "cpeNameId": "16D48241-0C39-40FF-9BDD-FAC0AE667976"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*", "cpeNameId": "4ACA5D3D-9862-46D6-8025-C8B2FBFD0C63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*", "cpeNameId": "A9A20F11-EA62-4A06-B773-E0E0CA1DB1D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*", "cpeNameId": "DAC40CB3-B9AC-4DDC-AD0E-EFBAF468A80D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*", "cpeNameId": "6DA3C651-639E-49B7-91A6-9352A51BB428"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*", "cpeNameId": "43546599-BC37-4DDF-8692-717B4E3F9D04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*", "cpeNameId": "168DEBA5-591C-4BE5-B321-3432CF2FBE1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8:*:*:*:*:*:*:*", "cpeNameId": "793FEE4E-6EB3-4AD3-8C35-45212DB9045D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", "cpeNameId": "0874112F-8BB6-4619-A940-6E6B71E792F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", "cpeNameId": "01FC3991-C111-44A7-808F-0278121EA54A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", "cpeNameId": "8811DE61-6DB4-4ADE-8F83-41A29664D527"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", "cpeNameId": "EC3384F9-D061-46C5-9774-76248C5ACE93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*", "cpeNameId": "516830CB-D744-432F-92FE-763EDE2CA5F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*", "cpeNameId": "43AAC1FC-42D7-4D1A-A963-CAB639DD8B00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*", "cpeNameId": "50313D29-F34E-4C0D-9144-484B999408DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*", "cpeNameId": "5072B87F-09B0-417E-AD87-62C547BACCCC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*", "cpeNameId": "0B3A862B-7B4A-4047-8B20-95188E30CC05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*", "cpeNameId": "C2049E4B-7E7F-4EE7-9BB1-521933C89D8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*", "cpeNameId": "B409C2ED-789D-4ED8-A8CB-01600CAAA35E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*", "cpeNameId": "D0A3901E-C3E7-42ED-802E-A62C1062B5B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*", "cpeNameId": "85546B06-87AF-486E-8CC0-938579A020EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*", "cpeNameId": "342CDE85-BF76-4CEB-8BA4-67ADC711496D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:*:*:*:*:*:*:*", "cpeNameId": "C9009932-A990-4A1B-BE48-BED9A9A7FC65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:-:*:*:*:*:*:*", "cpeNameId": "1CCCD217-0A7E-40A1-9520-617E661F1645"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*", "cpeNameId": "A7AE781E-2F1A-4C28-9CC5-476CE68CF1D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*", "cpeNameId": "5A29C44C-C923-4D5B-931C-0CE194896E8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*", "cpeNameId": "8793DB1D-710C-41A5-8BE4-895C45978720"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*", "cpeNameId": "A2345A72-55AE-4255-A7C4-73FDC8CDEF5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*", "cpeNameId": "EB60446B-804B-4948-B1B3-754169BD691E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*", "cpeNameId": "24401905-3848-4876-894C-45120BA6A0CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*", "cpeNameId": "2076878B-89D6-47D8-9572-9B9689FC2BEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*", "cpeNameId": "169A5C5F-B455-4F6F-BF24-A312ECAFCE52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*", "cpeNameId": "FCFDFA6F-C701-4BB1-8735-6C1F0E706C8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*", "cpeNameId": "34F883C1-8869-4871-A2C2-7A4EBE52A72A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*", "cpeNameId": "F698940C-F9F2-4ED7-9AB5-4D5A2A3D7CE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*", "cpeNameId": "3126DB9D-16C5-48EB-8548-304D58230779"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*", "cpeNameId": "01A51FAA-3D22-4445-9C47-192575EEA608"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*", "cpeNameId": "750F5059-2C73-4554-9789-1D880CA5DEE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*", "cpeNameId": "D928DDB6-091C-4CA2-804C-390334A896B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*", "cpeNameId": "4EEC2898-AB1B-482B-AFC9-4849B0140622"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*", "cpeNameId": "D1ADF9CE-CF40-44B5-A7D1-82EEAA8FCBB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*", "cpeNameId": "73EAE99F-3F30-429A-8C6D-22AB052D61AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*", "cpeNameId": "58920DA7-409B-42BB-932E-76F0BE199BD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*", "cpeNameId": "627457F8-5AC8-4B56-90A8-F5817CEA1A02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:-:*:*:*:*:*:*", "cpeNameId": "B5D985BC-815C-4878-890F-A3CACB0B2C04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc1:*:*:*:*:*:*", "cpeNameId": "2B6DFE57-F18D-4466-8009-E56C1322A73B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc2:*:*:*:*:*:*", "cpeNameId": "76E6C370-1859-4C7D-B9C3-C461D4932777"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc3:*:*:*:*:*:*", "cpeNameId": "15784D14-3246-468A-8294-6B24FF62FDA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc4:*:*:*:*:*:*", "cpeNameId": "EB4B221D-C82B-4A7B-9143-25F7EA059041"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc5:*:*:*:*:*:*", "cpeNameId": "A0635D56-7D89-4FE8-94DC-5E62E64EF17D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc6:*:*:*:*:*:*", "cpeNameId": "CC3F67C3-CA69-4A13-8ACF-FC21990D5FAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc7:*:*:*:*:*:*", "cpeNameId": "5D39315F-8D24-4FCF-90B9-6E9369644DBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*", "cpeNameId": "36E0C37B-1059-4ECE-A8A8-4E7085ECB47E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*", "cpeNameId": "36540352-DC52-4A5E-8E8C-9D05136A05BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*", "cpeNameId": "42630BB7-77F6-4E7E-8C9F-10D082BE9C86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*", "cpeNameId": "E35AB549-17AC-49BF-8ED9-15669310F079"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*", "cpeNameId": "BDBF9D93-EFD8-4A4E-81C9-0F0C75FC16A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*", "cpeNameId": "610F682A-AF20-4B5D-AA11-4F42C35B76D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*", "cpeNameId": "ADD79206-8D78-4BE9-B026-B1F822CDE556"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*", "cpeNameId": "6F974AC6-0755-4F37-8412-02C361FEFB12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*", "cpeNameId": "890670E2-6785-47F4-86DE-93B58D48B91E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*", "cpeNameId": "CE332AF0-A825-4216-B40B-930150C5CDF6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*", "cpeNameId": "3E14F0B1-F85F-470B-B3DC-348B4784E611"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*", "cpeNameId": "8D5DC9C4-BC9C-408F-AB6E-B71546668696"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*", "cpeNameId": "25D38678-6147-4568-8FCC-CC82359417D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*", "cpeNameId": "4EB118D0-AE6E-44C9-9969-CF2294698B06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*", "cpeNameId": "0A0706BE-9D8C-4781-B317-F73AFB379711"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*", "cpeNameId": "64EE6331-F08C-4AD1-96F8-AB203BD22BFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*", "cpeNameId": "815A07AB-2704-473B-8438-AE69C1068040"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*", "cpeNameId": "DBD88C4C-3287-43EE-ACB7-E5048E733D9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.19:*:*:*:*:*:*:*", "cpeNameId": "85991037-0786-4EED-81E7-6891E7A8DC2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.20:*:*:*:*:*:*:*", "cpeNameId": "1403FE7F-53BC-4C3A-A0A6-0F284E097303"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.21:*:*:*:*:*:*:*", "cpeNameId": "7625E253-3F26-4923-9690-002AC4F18351"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.22:*:*:*:*:*:*:*", "cpeNameId": "55C8CD03-5BC7-48AE-AEF8-491EC0CCFBE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.23:*:*:*:*:*:*:*", "cpeNameId": "DDBF32C8-F3C1-4FDD-94EC-2CB12DDD301A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.24:*:*:*:*:*:*:*", "cpeNameId": "F71917E6-D98D-4017-9410-E250F98E5150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.25:*:*:*:*:*:*:*", "cpeNameId": "D1DB0CB7-8777-4FFA-BDA7-0E905821248D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.26:*:*:*:*:*:*:*", "cpeNameId": "5C216138-ADC4-4B4B-832A-0D5F45CB8601"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.27:*:*:*:*:*:*:*", "cpeNameId": "C0842F91-5527-418E-893E-2815B0B25B12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.28:*:*:*:*:*:*:*", "cpeNameId": "455FB880-6681-4F6E-B7EE-DAB35E68ED00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.29:*:*:*:*:*:*:*", "cpeNameId": "7ECF8E96-BB6C-48A1-A939-CAF7EEF01DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.30:*:*:*:*:*:*:*", "cpeNameId": "431061A4-8B29-44AC-8B5A-B00B492AF919"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.31:*:*:*:*:*:*:*", "cpeNameId": "C7A2D5DC-2AB9-4CB0-85B6-E9E3D52ECAE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.32:*:*:*:*:*:*:*", "cpeNameId": "C9B41E65-9F6F-409B-AE9A-82BB1AE405AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.33:*:*:*:*:*:*:*", "cpeNameId": "84FA7866-7446-4F3E-AFE7-B678A77F7678"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.34:*:*:*:*:*:*:*", "cpeNameId": "B37F635D-70D3-4A0F-BC7A-F724A00597EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.35:*:*:*:*:*:*:*", "cpeNameId": "6C02AEA8-E18E-4CE2-983F-FD54F170D970"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.36:*:*:*:*:*:*:*", "cpeNameId": "58D3B0A5-3DD9-46A6-AF11-FDC7670F9A5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.37:*:*:*:*:*:*:*", "cpeNameId": "705AAD20-057F-4E96-8054-5ABFA09DEC45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.38:*:*:*:*:*:*:*", "cpeNameId": "59548517-C5F0-4917-ADF8-4C33A8590526"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.39:*:*:*:*:*:*:*", "cpeNameId": "27F7B769-9A4C-4AB9-9D07-18AAD41D0EEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.40:*:*:*:*:*:*:*", "cpeNameId": "9AAB506F-9A8F-40DD-ADD8-800C9EF8158F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.41:*:*:*:*:*:*:*", "cpeNameId": "92E1E10B-853E-4B5D-965A-EC219484816B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.42:*:*:*:*:*:*:*", "cpeNameId": "3E99C617-2C7C-49FB-A83C-8D425936A8EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.43:*:*:*:*:*:*:*", "cpeNameId": "D6410957-5E95-48A0-BCA9-2235FAED1FE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.44:*:*:*:*:*:*:*", "cpeNameId": "93A1603D-5749-4D3E-AEC4-2EA665A4682B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.45:*:*:*:*:*:*:*", "cpeNameId": "B739CA1D-E0B1-4D30-B7CE-E66FA1FFDBBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.46:*:*:*:*:*:*:*", "cpeNameId": "E3725D22-0894-4887-A626-825BEB339578"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.47:*:*:*:*:*:*:*", "cpeNameId": "39640B61-C244-43C9-AB0C-6A220A1A5A56"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.48:*:*:*:*:*:*:*", "cpeNameId": "E6788528-AE41-473C-949B-710669D2D819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.49:*:*:*:*:*:*:*", "cpeNameId": "D26658AF-CBE6-4E04-BF1A-F72C6E324B13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.50:*:*:*:*:*:*:*", "cpeNameId": "524F7BF2-2CE3-4AF7-B2CE-27BDE272F5CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.51:*:*:*:*:*:*:*", "cpeNameId": "5A46A50B-BE7A-422E-B5A5-85C4E7A9086B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.52:*:*:*:*:*:*:*", "cpeNameId": "BC501D66-6C4E-4287-B6B1-AF31DB34E6DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.53:*:*:*:*:*:*:*", "cpeNameId": "A7F6AE2D-5239-42A4-BE47-B8405AFE4F15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.54:*:*:*:*:*:*:*", "cpeNameId": "FCAF15A4-5502-4988-972D-03C4FC1C8006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.55:*:*:*:*:*:*:*", "cpeNameId": "6068E853-E361-413E-A374-6140BA7E3AEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.56:*:*:*:*:*:*:*", "cpeNameId": "4FC2A2C4-F834-43B1-8C2F-55BB48AD6576"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.57:*:*:*:*:*:*:*", "cpeNameId": "9EA2D1E4-4425-45AF-9C93-193BB49EA83A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.58:*:*:*:*:*:*:*", "cpeNameId": "74FD8119-9DCC-4CF1-BF22-CC9B0975F993"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.59:*:*:*:*:*:*:*", "cpeNameId": "97034175-79EB-4975-AEED-2C504169DAD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.60:*:*:*:*:*:*:*", "cpeNameId": "F2AD8245-8B96-45BF-9E5D-0B24A3CE878D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.61:*:*:*:*:*:*:*", "cpeNameId": "2338CE12-153B-40A1-9200-757DE8EE2B31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.62:*:*:*:*:*:*:*", "cpeNameId": "BFA482D2-DAFA-43D9-BAD5-454D33FC986E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.63:*:*:*:*:*:*:*", "cpeNameId": "DE75E0A4-72AF-42DD-9A60-28DD82E24567"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.64:*:*:*:*:*:*:*", "cpeNameId": "57E7B27B-9D49-425A-AD27-D1FC5F1F5007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.65:*:*:*:*:*:*:*", "cpeNameId": "FC5F79AC-A9F4-46F9-8390-21319C190DE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.66:*:*:*:*:*:*:*", "cpeNameId": "267199FD-8267-4026-B0D5-8120C74CA81C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.67:*:*:*:*:*:*:*", "cpeNameId": "2FB70320-422D-41C6-9BE6-A90DA6C50C45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.68:*:*:*:*:*:*:*", "cpeNameId": "990F0E4A-3D05-4A24-93B9-821C5FA89E61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.69:*:*:*:*:*:*:*", "cpeNameId": "86B87B65-18E8-46B1-BA2D-818DA2A97589"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.70:*:*:*:*:*:*:*", "cpeNameId": "14F9E78A-8939-4871-8C3A-176553FCE3F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.71:*:*:*:*:*:*:*", "cpeNameId": "AD18BF6A-8E8A-4F49-A685-7C52C567A804"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.72:*:*:*:*:*:*:*", "cpeNameId": "FBA9034E-BB55-4749-90A9-98D200B4655A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.73:*:*:*:*:*:*:*", "cpeNameId": "B7587B68-C990-47CF-BD9F-FC8A8AAAB01D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.74:*:*:*:*:*:*:*", "cpeNameId": "1EABE4F9-0363-4FE7-B6CE-415714E38C9E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.75:*:*:*:*:*:*:*", "cpeNameId": "2244EA46-B3EA-4AA6-A739-DC99BA897D8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.76:*:*:*:*:*:*:*", "cpeNameId": "54446C18-F95D-4767-9E2A-BBB520D1578B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.77:*:*:*:*:*:*:*", "cpeNameId": "8B94B3BD-37A2-46C8-B443-C69BAE2A93D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.78:*:*:*:*:*:*:*", "cpeNameId": "4B0A2778-F0C7-4932-9B59-5DBAC0E56BC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.79:*:*:*:*:*:*:*", "cpeNameId": "E60581E5-899D-4C89-AB6F-CB591072FC40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.80:*:*:*:*:*:*:*", "cpeNameId": "B264E855-88CD-4497-AD61-BAD605BDADB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.81:*:*:*:*:*:*:*", "cpeNameId": "DF2C4C4B-9057-4E0E-9AB3-CFAEBB2B3FC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.82:*:*:*:*:*:*:*", "cpeNameId": "FCD95819-4985-4986-836B-C60A6A7603A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.83:*:*:*:*:*:*:*", "cpeNameId": "7857A3A2-6650-4E55-B69A-36A1C220AE69"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.84:*:*:*:*:*:*:*", "cpeNameId": "58854616-0E47-43CA-8F84-2820A63B578A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.85:*:*:*:*:*:*:*", "cpeNameId": "DED66AEB-55F2-4E73-9E63-A2A351B7C4A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.86:*:*:*:*:*:*:*", "cpeNameId": "9AD4F8F7-DD35-4753-B28D-89AF3A118AE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.87:*:*:*:*:*:*:*", "cpeNameId": "5DB0B4F9-191A-4190-B894-133F8D8D69D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.88:*:*:*:*:*:*:*", "cpeNameId": "4C7015DD-D345-46D2-BEDB-6C2371BA4CCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.89:*:*:*:*:*:*:*", "cpeNameId": "4AB80BF4-4DA6-4A21-9170-271328D4BE10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.90:*:*:*:*:*:*:*", "cpeNameId": "4DDE1841-2392-477A-AC6A-05EE08C442AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.91:*:*:*:*:*:*:*", "cpeNameId": "866D88DB-8640-4219-A519-C9D1DFE75A0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.92:*:*:*:*:*:*:*", "cpeNameId": "CCF4FE02-E968-4718-B0C1-E34611B4A678"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.93:*:*:*:*:*:*:*", "cpeNameId": "3466DEC0-18B6-4CCC-9035-699DB58A08DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.94:*:*:*:*:*:*:*", "cpeNameId": "E2E267A5-F455-4F4B-B0DC-32695915F1F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.95:*:*:*:*:*:*:*", "cpeNameId": "1A09E587-339A-4653-897D-90351A1B1025"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.96:*:*:*:*:*:*:*", "cpeNameId": "C1173A8A-4845-4811-B351-EC99088D9CC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.97:*:*:*:*:*:*:*", "cpeNameId": "164972DF-5261-4E50-AA72-0D593A06093E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.98:*:*:*:*:*:*:*", "cpeNameId": "959D88A5-1F60-4CC0-AA2A-FE4CA946B52C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.99:*:*:*:*:*:*:*", "cpeNameId": "83FA5052-1126-43B6-B154-9693B0DC5D68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.100:*:*:*:*:*:*:*", "cpeNameId": "FE74990F-736C-40A6-B9A6-5DB0862A3598"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.101:*:*:*:*:*:*:*", "cpeNameId": "65A3F087-7FDD-464B-B5E8-11A123B6FED0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.102:*:*:*:*:*:*:*", "cpeNameId": "4361D9D4-566F-48FA-A9B5-9DF5F480F87D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.103:*:*:*:*:*:*:*", "cpeNameId": "96462486-A899-4D91-AE51-05076698C747"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.104:*:*:*:*:*:*:*", "cpeNameId": "68B1A24A-226E-4C33-B506-68A97B8EB668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.105:*:*:*:*:*:*:*", "cpeNameId": "DEDE9948-C1FC-49B3-8506-3D2951BFBB59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.106:*:*:*:*:*:*:*", "cpeNameId": "A4F41E53-E5A7-48F9-98A4-AD0AC46B29E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.107:*:*:*:*:*:*:*", "cpeNameId": "D381BFF6-927D-4DCA-BB4F-4F42E77DEF75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.108:*:*:*:*:*:*:*", "cpeNameId": "3398626D-D51A-4F5B-A24A-F23C0D2CB910"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*", "cpeNameId": "F75AFEC9-47FA-4037-90F6-A48AA82289C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc1:*:*:*:*:*:*", "cpeNameId": "5BEAC0E5-F63C-4AC6-95FC-CF80E30AA77E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc2:*:*:*:*:*:*", "cpeNameId": "E5BBF478-F0EE-487A-B822-0C3E66912C59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc3:*:*:*:*:*:*", "cpeNameId": "88CE34B4-9D9A-4AC8-B6F3-79A4DFA9D46A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc4:*:*:*:*:*:*", "cpeNameId": "9C7C660C-5CB3-49CB-A94E-E772F275C30F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc5:*:*:*:*:*:*", "cpeNameId": "91C8A273-5AF6-4E43-B09C-880A80B8CE77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc6:*:*:*:*:*:*", "cpeNameId": "B6A758CD-437D-4073-87A1-259DCE2BB31B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc7:*:*:*:*:*:*", "cpeNameId": "B599BCFA-E2F9-4870-B34B-223562EA4FFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*", "cpeNameId": "8D482F9D-E3F6-4C32-A00C-415D1326F573"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*", "cpeNameId": "952A504C-0AED-46A3-A44F-2804AC428A64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*", "cpeNameId": "07351A9F-CF21-4D89-ABC4-595BA4B6117E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*", "cpeNameId": "D864C50A-53DD-4BFA-B846-4CB6EB1F718C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*", "cpeNameId": "2FB9015E-80F3-48F4-AF87-1A0308E755BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*", "cpeNameId": "2E8F4459-22C0-4006-8760-2A3DF30E1EBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.7:*:*:*:*:*:*:*", "cpeNameId": "04ED3CC1-93AA-46B8-81B8-2A1EBF958C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.8:*:*:*:*:*:*:*", "cpeNameId": "E46B14D2-5050-4359-992A-E025238FB60E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.9:*:*:*:*:*:*:*", "cpeNameId": "8F22E34B-3CBD-4F71-9C93-10511FEC2ECE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.10:*:*:*:*:*:*:*", "cpeNameId": "53E5A537-6C5E-463B-8BBA-F29456EC0728"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*", "cpeNameId": "64B896A7-E835-4D8C-BA75-179A4A1C5A21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*", "cpeNameId": "A5798E8B-25FE-4B2F-8425-ADA099CB6469"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*", "cpeNameId": "00133E45-0260-47F0-93EB-50C9DA890A91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.3:*:*:*:*:*:*:*", "cpeNameId": "905F7914-1CF3-47AE-8017-2577783E2B1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.4:*:*:*:*:*:*:*", "cpeNameId": "3C6255BD-73CA-4B3B-BA1A-2B0C6B21C127"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.5:*:*:*:*:*:*:*", "cpeNameId": "5AB5DA1C-54FE-4065-9A6C-CF4292F5C766"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.6:*:*:*:*:*:*:*", "cpeNameId": "F94EAD8F-C9AF-4A71-8833-BEBB089C650B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.7:*:*:*:*:*:*:*", "cpeNameId": "65DC5222-0DF1-4F28-B48D-1B6987E4A250"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.8:*:*:*:*:*:*:*", "cpeNameId": "501F73DF-5349-4A18-AEC2-2DDA0FE61C2C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.9:*:*:*:*:*:*:*", "cpeNameId": "614BF4FA-00CF-48BB-AB0B-24268FD8116B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.10:*:*:*:*:*:*:*", "cpeNameId": "EE2F0BFF-481B-4403-85E8-CD3BEF29C49F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.11:*:*:*:*:*:*:*", "cpeNameId": "9EED81CF-D6C3-4521-8AA7-1057F00F4A84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.12:*:*:*:*:*:*:*", "cpeNameId": "07A81603-5E43-4FAF-950A-8E9C84F2A7EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.13:*:*:*:*:*:*:*", "cpeNameId": "BE3BAA85-6B7B-4893-9B06-0743B846FAF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.14:*:*:*:*:*:*:*", "cpeNameId": "5CA9D680-CF72-4880-A263-7B5053CCC57D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.15:*:*:*:*:*:*:*", "cpeNameId": "52A55F4F-315E-4768-B2E3-13E044CC2598"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.16:*:*:*:*:*:*:*", "cpeNameId": "6DD80A01-AF1D-451B-B71E-6C35D01D3582"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.17:*:*:*:*:*:*:*", "cpeNameId": "677145FC-D4B5-46BC-B20B-2E89A95A75C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.18:*:*:*:*:*:*:*", "cpeNameId": "0AEA1E6B-EDCC-4C8B-B8BD-49EF072F9662"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.19:*:*:*:*:*:*:*", "cpeNameId": "67D3A852-7617-495D-90B6-F9162A2DA19B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.20:*:*:*:*:*:*:*", "cpeNameId": "A50A0202-7561-46CE-BB13-70B1C30B44F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.21:*:*:*:*:*:*:*", "cpeNameId": "D0C55472-843A-4E56-883B-FC8286BDA3D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.22:*:*:*:*:*:*:*", "cpeNameId": "43C97962-E307-4C33-9E7B-67C5B93CC4B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.23:*:*:*:*:*:*:*", "cpeNameId": "987EFE31-3789-47AF-99E0-48473B4B4A50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.24:*:*:*:*:*:*:*", "cpeNameId": "C4697F43-ADAD-45A8-BC55-DEF93AF196A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.25:*:*:*:*:*:*:*", "cpeNameId": "8879CA5B-DB0D-4589-9CDE-DBD94EF6FBE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.26:*:*:*:*:*:*:*", "cpeNameId": "329DD992-7C17-47BA-B421-8CD73D49D6EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.27:*:*:*:*:*:*:*", "cpeNameId": "41303B07-D3D7-40F8-93F1-85CD3343490C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.28:*:*:*:*:*:*:*", "cpeNameId": "035C87B6-8568-4673-B414-7E2BC872AE43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.29:*:*:*:*:*:*:*", "cpeNameId": "14E4850D-2E72-49C1-9977-072FFAFF85EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.30:*:*:*:*:*:*:*", "cpeNameId": "FDFE0F89-D3F8-4D4D-9CE1-0E88C232EFE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.31:*:*:*:*:*:*:*", "cpeNameId": "778A3B9C-55D6-43B6-A5F8-6EB19EB7516D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.32:*:*:*:*:*:*:*", "cpeNameId": "F0E31FB4-CC29-4E44-9497-00FA47A8E9BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.33:*:*:*:*:*:*:*", "cpeNameId": "EBD62036-9111-43E7-A5F8-EACF7BCB75FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.34:*:*:*:*:*:*:*", "cpeNameId": "BE875471-EB8B-4187-A218-79BF0160106F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.35:*:*:*:*:*:*:*", "cpeNameId": "A1D08608-8242-4271-ABA8-24F53563796A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.36:*:*:*:*:*:*:*", "cpeNameId": "87BAFA75-3062-4330-B30E-BB3379D61996"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.37:*:*:*:*:*:*:*", "cpeNameId": "DFD328E2-C1A1-443F-B9B2-61E154FEC308"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.38:*:*:*:*:*:*:*", "cpeNameId": "A0C6DBCC-E339-44A2-BF07-C4BFA0A75218"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.39:*:*:*:*:*:*:*", "cpeNameId": "B8A25CCA-C76A-4C4A-A287-4263E9F193F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.40:*:*:*:*:*:*:*", "cpeNameId": "F7FC78A4-49B1-4BD5-A239-2913792F0D38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.41:*:*:*:*:*:*:*", "cpeNameId": "E61ADF4E-64CA-44F9-BB10-8E05E4F9A49E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.42:*:*:*:*:*:*:*", "cpeNameId": "DF51174B-8193-49A6-AA5F-A88E55B5689C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.43:*:*:*:*:*:*:*", "cpeNameId": "660F6036-C153-4C4D-9C1C-8251780FD091"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.44:*:*:*:*:*:*:*", "cpeNameId": "AC5B232F-9000-4773-ACC7-A089BD2D1F95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.45:*:*:*:*:*:*:*", "cpeNameId": "61441944-DB00-4959-9CF1-2FB0ABA9BD3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.46:*:*:*:*:*:*:*", "cpeNameId": "49C78690-FF34-46C0-90E0-C8364AB6302C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.47:*:*:*:*:*:*:*", "cpeNameId": "25525F05-9701-4C5F-A520-5CE5D3F098F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.48:*:*:*:*:*:*:*", "cpeNameId": "9E751725-7306-4149-8716-76DF78D28E0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.49:*:*:*:*:*:*:*", "cpeNameId": "26C4C2E6-B873-4617-839A-CEB90C44DEB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.50:*:*:*:*:*:*:*", "cpeNameId": "25B9F5A0-597A-4CDB-BAD2-7EFDED049ADB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.51:*:*:*:*:*:*:*", "cpeNameId": "23960434-54B9-4CD3-8259-27E868FAD8F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.52:*:*:*:*:*:*:*", "cpeNameId": "CDD83033-874F-48F5-87AA-954427858E93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.53:*:*:*:*:*:*:*", "cpeNameId": "DE70E58D-E54C-4EBF-AF80-073F06F48E96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.54:*:*:*:*:*:*:*", "cpeNameId": "A55F66D7-EFCC-4B69-A1DF-E079988DE459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.55:*:*:*:*:*:*:*", "cpeNameId": "992B91FA-ED2E-472B-A540-8EDDDAB546DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.56:*:*:*:*:*:*:*", "cpeNameId": "C3E5ED56-2BFD-4B5B-A868-64FE8F556673"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.57:*:*:*:*:*:*:*", "cpeNameId": "5EB333E2-620D-4F48-9162-3A2A7269A5FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.58:*:*:*:*:*:*:*", "cpeNameId": "91C923D0-3C2B-491F-BE0E-5283907AE153"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.59:*:*:*:*:*:*:*", "cpeNameId": "809D9A62-1091-437F-828C-E08C6DDA03D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.60:*:*:*:*:*:*:*", "cpeNameId": "402B78BE-A405-4665-9836-AD6043AD7D70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.61:*:*:*:*:*:*:*", "cpeNameId": "A331CC45-D7C5-4930-8DA9-0FD2976C829B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.62:*:*:*:*:*:*:*", "cpeNameId": "B4FF0AA0-3B07-45DC-949B-053D7F53CC6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.63:*:*:*:*:*:*:*", "cpeNameId": "B0B58B50-8AEA-449F-9AEF-89713152EAE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.64:*:*:*:*:*:*:*", "cpeNameId": "0C9BB368-F2ED-4C3B-8E8A-295D5EA7B6D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.65:*:*:*:*:*:*:*", "cpeNameId": "2614B472-06A6-4DB5-99FE-6D6DB58EE9F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.66:*:*:*:*:*:*:*", "cpeNameId": "46C58247-7B77-4957-8C6C-256801A1BD7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.67:*:*:*:*:*:*:*", "cpeNameId": "E79A8ECB-6A3E-458B-874A-246BF02438F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.68:*:*:*:*:*:*:*", "cpeNameId": "A66131F6-5BD1-4DE0-BD71-24B8F8E8A0E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.69:*:*:*:*:*:*:*", "cpeNameId": "747F4A0A-795F-4764-84EA-F1E4B3C0AFA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.70:*:*:*:*:*:*:*", "cpeNameId": "2BD55A5D-F95E-4980-838F-3D2C95475702"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.71:*:*:*:*:*:*:*", "cpeNameId": "D1DCC046-F7A5-4700-9F36-C18E6B97E247"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.72:*:*:*:*:*:*:*", "cpeNameId": "6418388D-4EA9-4676-B750-23B1E05EDB03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.73:*:*:*:*:*:*:*", "cpeNameId": "2E62C9EE-C007-44BA-B1EE-B6F56AABFD62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.74:*:*:*:*:*:*:*", "cpeNameId": "61D92C4C-6A59-45EA-B16A-A877DBF5267F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13:*:*:*:*:*:*:*", "cpeNameId": "7675C9E5-D99B-4559-813B-08F5409902B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13:rc1:*:*:*:*:*:*", "cpeNameId": "704510E8-D773-421C-B4B8-F1B71978C66A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.1:*:*:*:*:*:*:*", "cpeNameId": "7179867B-6349-4785-A0E8-F5F482F45ED0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.2:*:*:*:*:*:*:*", "cpeNameId": "7C5BFB48-EF90-4264-BC04-7F16B6FED2A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.3:*:*:*:*:*:*:*", "cpeNameId": "FE5C9534-292E-4E03-8F5E-58B54CE6E1BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.4:*:*:*:*:*:*:*", "cpeNameId": "9B186AFD-8409-43C0-A7BE-FD3922148612"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.5:*:*:*:*:*:*:*", "cpeNameId": "0BB9D21D-FEA0-4AD0-B648-28D885F21C32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.6:*:*:*:*:*:*:*", "cpeNameId": "1D6D97DE-0481-4C82-BB8A-832867572022"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.7:*:*:*:*:*:*:*", "cpeNameId": "7CA0A0D0-0BFB-4F04-B3C6-7E4392BBFF31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.8:*:*:*:*:*:*:*", "cpeNameId": "098C278A-3A8A-4510-9EAC-C3341B334B88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.9:*:*:*:*:*:*:*", "cpeNameId": "BD4E7777-D71C-4C8F-891F-A0571D2B9107"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.10:*:*:*:*:*:*:*", "cpeNameId": "C6AEDFDC-DBD6-4D00-AE8C-45230E3B90C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.11:*:*:*:*:*:*:*", "cpeNameId": "1D513E96-5147-4AC0-B88E-39D255397849"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:-:*:*:*:*:*:*", "cpeNameId": "1D9BAB2A-ACD5-4894-ACF3-BB019C0D9DAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc1:*:*:*:*:*:*", "cpeNameId": "275C31DB-1803-404A-B330-5C8BDA278F3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc2:*:*:*:*:*:*", "cpeNameId": "F3F198B6-5F96-4DAA-AD09-6239B6A86D74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc3:*:*:*:*:*:*", "cpeNameId": "69BAE2C9-57F4-4215-8AFC-A08082F91F89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc4:*:*:*:*:*:*", "cpeNameId": "EDD65366-2557-44F5-B9BA-DD37AE036110"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc5:*:*:*:*:*:*", "cpeNameId": "E044E8FA-940A-4293-83C0-4F42F00E30B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc6:*:*:*:*:*:*", "cpeNameId": "D98D7A2C-5208-41E2-8E41-2EF23273F91C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc7:*:*:*:*:*:*", "cpeNameId": "1CFADBD3-9088-42D7-AD96-2B90F566D83E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc8:*:*:*:*:*:*", "cpeNameId": "C353F80F-94CD-4CE0-8B55-EFADABD82F01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.1:*:*:*:*:*:*:*", "cpeNameId": "EFAAC9F0-0CBF-41F8-BFAA-792B68ACC080"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.2:*:*:*:*:*:*:*", "cpeNameId": "7C11DBE5-5367-4A8C-8892-1845187B0DAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.3:*:*:*:*:*:*:*", "cpeNameId": "31D44284-BB44-4E6E-837C-3ACB4B6D3B98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.4:*:*:*:*:*:*:*", "cpeNameId": "E0BEF371-B9BB-47D0-A565-4A5235548473"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.5:*:*:*:*:*:*:*", "cpeNameId": "3D16437E-1E60-4921-8A0D-D7A9D92B8765"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.6:*:*:*:*:*:*:*", "cpeNameId": "2F640FC6-6044-448F-8821-0CEED7B2FA99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.7:*:*:*:*:*:*:*", "cpeNameId": "32195292-ACC9-4769-B0F5-B4A1556413D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.8:*:*:*:*:*:*:*", "cpeNameId": "F58DCB69-AF8A-46D0-908D-C46050B56588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.9:*:*:*:*:*:*:*", "cpeNameId": "8A9A99A1-8548-4708-B249-945CAB4E0BDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.10:*:*:*:*:*:*:*", "cpeNameId": "310204CE-EB36-4207-BE51-01B4EFA21612"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.11:*:*:*:*:*:*:*", "cpeNameId": "5EFDD809-F451-448D-BCA3-D8F1423877E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.12:*:*:*:*:*:*:*", "cpeNameId": "5B4BD86F-D2A6-4800-8D5E-1F27F58F683F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.13:*:*:*:*:*:*:*", "cpeNameId": "1C190740-B2F4-4F2E-B6A0-98D96316968B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.14:*:*:*:*:*:*:*", "cpeNameId": "F655EE2A-0907-4AC1-969D-75421AA873BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.15:*:*:*:*:*:*:*", "cpeNameId": "CF8F0970-8DD7-4AFC-8BB3-CDDD4C0CCFCE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.16:*:*:*:*:*:*:*", "cpeNameId": "6E51D89B-7B3C-4B01-98F6-9EE63EECF0C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.17:*:*:*:*:*:*:*", "cpeNameId": "8C60A84F-4C1E-4745-8479-2DAB0F2AFA85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.18:*:*:*:*:*:*:*", "cpeNameId": "7E2BED9C-EA21-4C51-924B-226BBFCED950"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.19:*:*:*:*:*:*:*", "cpeNameId": "EE4C5E0E-CE83-4E30-A6ED-F00D310F1007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.20:*:*:*:*:*:*:*", "cpeNameId": "613E1F2F-51D2-47FB-9BEC-1500252E750F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.21:*:*:*:*:*:*:*", "cpeNameId": "46C29139-C9A6-4F18-922A-7B6B84739E19"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.22:*:*:*:*:*:*:*", "cpeNameId": "E3884214-BF14-43D5-AD47-28C63E8F2549"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.23:*:*:*:*:*:*:*", "cpeNameId": "1E15C7AB-DB2A-4383-9307-9ECDB67459D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.24:*:*:*:*:*:*:*", "cpeNameId": "3D260DE8-01A1-46E9-BA73-FC19FB9909E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.25:*:*:*:*:*:*:*", "cpeNameId": "BE686202-3204-4E6D-94A1-DFBF267BE150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.26:*:*:*:*:*:*:*", "cpeNameId": "0D6CB817-59F8-4416-95A7-0187B315FC43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.27:*:*:*:*:*:*:*", "cpeNameId": "CDA9DAD3-11EE-4616-B437-8E5A016D2663"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.28:*:*:*:*:*:*:*", "cpeNameId": "87E8D5EC-7107-4A8B-90C6-EED05AC9F068"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.29:*:*:*:*:*:*:*", "cpeNameId": "477180AC-6496-43B7-BD33-B88FA9DF1BD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.30:*:*:*:*:*:*:*", "cpeNameId": "69E9067D-3CDF-4A22-AF5F-64F8262A08A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.31:*:*:*:*:*:*:*", "cpeNameId": "3197F63D-4282-4176-B9F0-3C9ED1852338"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.32:*:*:*:*:*:*:*", "cpeNameId": "BD3E1C90-E84E-4240-B5DB-EE0A640428D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.33:*:*:*:*:*:*:*", "cpeNameId": "D7DDB6E3-CAA5-4CDA-BC12-1051EB8A4915"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.34:*:*:*:*:*:*:*", "cpeNameId": "B4D681EA-C675-4F30-BA58-C00E1A1BF0C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.35:*:*:*:*:*:*:*", "cpeNameId": "10D5F3CC-5CE4-433A-8EE2-6C26D0B0F104"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.36:*:*:*:*:*:*:*", "cpeNameId": "2C87858B-A357-4109-8F4A-43F30D955337"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.37:*:*:*:*:*:*:*", "cpeNameId": "438D314D-81C9-46E2-A074-D3CDC8150A31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.38:*:*:*:*:*:*:*", "cpeNameId": "56FF2B04-ACFB-4CB5-B622-2500B7EBCF9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.39:*:*:*:*:*:*:*", "cpeNameId": "F188A8FC-42B2-484D-92F3-9820A0AFB215"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.40:*:*:*:*:*:*:*", "cpeNameId": "1C91D5D4-7E7C-4DE2-8485-580F7BC1DA94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.41:*:*:*:*:*:*:*", "cpeNameId": "4FA8915E-F7A0-4EB2-B56B-A91F138153FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.42:*:*:*:*:*:*:*", "cpeNameId": "CDE8EDFB-FA30-425F-AD32-F8BB598FE9DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.43:*:*:*:*:*:*:*", "cpeNameId": "329775D3-608C-469E-9BF0-27B5743333B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.44:*:*:*:*:*:*:*", "cpeNameId": "5FCF03F5-EC66-466B-95F0-DCD0F290D8B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.45:*:*:*:*:*:*:*", "cpeNameId": "E46E69E4-EFEE-439E-9C2F-456ABD7FFFFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.46:*:*:*:*:*:*:*", "cpeNameId": "AAE75E9F-C997-4361-85ED-01A12A505971"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.47:*:*:*:*:*:*:*", "cpeNameId": "4DCD068C-F3EC-4D35-909D-E00796FDF9D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.48:*:*:*:*:*:*:*", "cpeNameId": "072DDFA0-91FD-48BE-AC5C-B580C6CB6640"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.49:*:*:*:*:*:*:*", "cpeNameId": "5ABF4B87-D1FF-468F-BE3E-F00B44DD2DA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.50:*:*:*:*:*:*:*", "cpeNameId": "6F239227-0791-4643-B831-84C1A08668CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.51:*:*:*:*:*:*:*", "cpeNameId": "D9D7B3F3-0FAD-4727-82ED-D1B01BEA5CAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.52:*:*:*:*:*:*:*", "cpeNameId": "FA995237-C4AE-4356-AFCB-3ACFC2F06435"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.53:*:*:*:*:*:*:*", "cpeNameId": "97407565-A5B7-46B0-878B-76A598FD0DC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.54:*:*:*:*:*:*:*", "cpeNameId": "73ED7AF3-B159-47BD-A2D7-3D2099B9549F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.55:*:*:*:*:*:*:*", "cpeNameId": "1C7DC9FB-31E4-4495-914C-BDF430224F2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.56:*:*:*:*:*:*:*", "cpeNameId": "2B87E36E-C9C7-4287-B88E-B58CCDBEE8CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.57:*:*:*:*:*:*:*", "cpeNameId": "89CDF3D4-923A-42EB-B4F1-396752130549"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.58:*:*:*:*:*:*:*", "cpeNameId": "50F34BAE-FD72-4BA7-BDF3-2F063E263FE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.59:*:*:*:*:*:*:*", "cpeNameId": "C17D896B-B112-4147-8B4E-D6809500DD0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.60:*:*:*:*:*:*:*", "cpeNameId": "CB0E701E-6E22-4C6B-ADC4-F7C9FED3490A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.61:*:*:*:*:*:*:*", "cpeNameId": "D5EC3A9F-488B-459B-B671-3CFF36C5264E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.62:*:*:*:*:*:*:*", "cpeNameId": "AAB9B2FA-7944-4BC7-9A19-C851CA4CA046"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.63:*:*:*:*:*:*:*", "cpeNameId": "7C8CFA70-2A89-4466-BF4E-58399541737F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.64:*:*:*:*:*:*:*", "cpeNameId": "2A0CBD6F-B950-4E1E-A538-EAC32B0F8D04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.65:*:*:*:*:*:*:*", "cpeNameId": "302F00DB-6B4E-4974-9504-734827154FB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.66:*:*:*:*:*:*:*", "cpeNameId": "D99E638B-B0EC-4DF7-8DFB-AA72926214AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.67:*:*:*:*:*:*:*", "cpeNameId": "2D123B44-2856-465B-BD85-533B959BB396"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.68:*:*:*:*:*:*:*", "cpeNameId": "6F411166-BE23-4D70-BAA4-2C37BCCCA795"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.69:*:*:*:*:*:*:*", "cpeNameId": "0DCE2177-093F-482E-8271-5BE75B5C4316"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.70:*:*:*:*:*:*:*", "cpeNameId": "829DAB82-FBA0-4C3D-852F-AF4920CE367B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.71:*:*:*:*:*:*:*", "cpeNameId": "8B763B63-7E89-4D31-B562-617198EB7A38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.72:*:*:*:*:*:*:*", "cpeNameId": "DDEAEE70-1BEB-4C35-938A-7A2F0D5FF364"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.73:*:*:*:*:*:*:*", "cpeNameId": "5FBBDAD5-3210-49BC-B74C-1A3A59E38BD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.74:*:*:*:*:*:*:*", "cpeNameId": "19C0B93D-C2D2-455F-BB51-70561B410251"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.75:*:*:*:*:*:*:*", "cpeNameId": "07647DB4-686E-4102-8A4B-FB7F7F4815D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.76:*:*:*:*:*:*:*", "cpeNameId": "225864D5-2AA2-4307-9AE4-36E4AE04110A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.77:*:*:*:*:*:*:*", "cpeNameId": "22C497DB-E1E3-4DFD-8E34-49796EAC1A3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.78:*:*:*:*:*:*:*", "cpeNameId": "426F0C47-6D01-4224-92EF-986D75736A21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.79:*:*:*:*:*:*:*", "cpeNameId": "D1756F76-C011-4755-82E3-997A11C5E1BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:*:*:*:*:*:*:*", "cpeNameId": "F0E9A4B8-14FC-4869-AD9F-6246C6547675"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:-:*:*:*:*:*:*", "cpeNameId": "E641A360-B4B9-4DF0-8F2E-7D5595E4CB00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc1:*:*:*:*:*:*", "cpeNameId": "118BFA5A-5522-46F1-8AE9-B68045907253"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc2:*:*:*:*:*:*", "cpeNameId": "EC2F3273-918F-4CA8-8E3E-B0CBAE13039F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc3:*:*:*:*:*:*", "cpeNameId": "85138DF9-2827-446B-B366-B0A20F1CAC4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc4:*:*:*:*:*:*", "cpeNameId": "9EDCB3A7-36AC-4876-899D-C730BFBD51C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc6:*:*:*:*:*:*", "cpeNameId": "513428B6-9ED7-429F-8EFA-414B66BB9A0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc7:*:*:*:*:*:*", "cpeNameId": "8C4E9BE9-AD91-4485-BE20-EBB81C5855B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc8:*:*:*:*:*:*", "cpeNameId": "8706AA2E-64B2-412F-8C3C-C71110DE9BC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.1:*:*:*:*:*:*:*", "cpeNameId": "A0C9E4D7-B2A7-483B-98B7-A2CA6D9E0C7B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.2:*:*:*:*:*:*:*", "cpeNameId": "D3F1222D-3C96-4F9A-B451-BA8C6AB11559"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.3:*:*:*:*:*:*:*", "cpeNameId": "6D3E9B6B-73D6-47CD-83DF-D15B7FAE0B54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.4:*:*:*:*:*:*:*", "cpeNameId": "D09D6559-426F-401C-AAEA-50AA0131727F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.5:*:*:*:*:*:*:*", "cpeNameId": "4576C52F-F54C-4DAF-99E7-64A078AFC64F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.6:*:*:*:*:*:*:*", "cpeNameId": "F8ACD41C-8286-4481-AB2B-251455CA1DFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.7:*:*:*:*:*:*:*", "cpeNameId": "514EE5B7-BC9B-4A33-BFE3-F58F36176143"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.8:*:*:*:*:*:*:*", "cpeNameId": "D7988546-C2DA-43EF-A366-BA433414B2BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.9:*:*:*:*:*:*:*", "cpeNameId": "4A4616C1-AC52-4DAB-8A9E-EFF2995ACC3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.10:*:*:*:*:*:*:*", "cpeNameId": "404717ED-8092-4310-B1D7-09DBE376FE7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16:*:*:*:*:*:*:*", "cpeNameId": "0D147325-751C-4432-8659-4B28F342226C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*", "cpeNameId": "978149A6-9A39-4896-AE9F-AE62071FF0B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.1:*:*:*:*:*:*:*", "cpeNameId": "62B44D66-3148-4898-8789-85C8A7B27A40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.2:*:*:*:*:*:*:*", "cpeNameId": "C76FB5C0-1C39-4E68-8F46-31FE00C018CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.3:*:*:*:*:*:*:*", "cpeNameId": "88CCC2DD-0D9D-410C-8C24-92C5FC988B82"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.4:*:*:*:*:*:*:*", "cpeNameId": "033756ED-A578-42B2-93F2-36560EDDA0B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.5:*:*:*:*:*:*:*", "cpeNameId": "CAA952A3-3352-40F3-AD85-1764E26C6931"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.6:*:*:*:*:*:*:*", "cpeNameId": "EAF67B7C-FC7F-43DF-8238-C00AB67C30F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.7:*:*:*:*:*:*:*", "cpeNameId": "2CC42649-1736-4748-8194-179E2F0576BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.35:*:*:*:*:*:*:*", "cpeNameId": "04FCF80C-585D-4A46-B874-49F9672541BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.36:*:*:*:*:*:*:*", "cpeNameId": "087658D7-B58E-49B5-AAF6-8268B05E6801"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.37:*:*:*:*:*:*:*", "cpeNameId": "01DE314D-2401-4FC2-8A9A-2D73356FDC23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.38:*:*:*:*:*:*:*", "cpeNameId": "FCB85B1F-907F-4B32-B4D7-37B6BD2355F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.39:*:*:*:*:*:*:*", "cpeNameId": "1D6982FB-0E82-41B7-A209-5B5CF756BD9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.40:*:*:*:*:*:*:*", "cpeNameId": "B0B9A3E3-4FEC-413C-A97B-99E3FDDA1602"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.41:*:*:*:*:*:*:*", "cpeNameId": "65CBCBE3-A3F8-4CF6-BC30-24E77EBDE2A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.42:*:*:*:*:*:*:*", "cpeNameId": "08CBF40F-1294-44E1-95AA-51B23466AD26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.43:*:*:*:*:*:*:*", "cpeNameId": "68A8F4F3-A708-4BC7-B7FD-DCB35047847F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.44:*:*:*:*:*:*:*", "cpeNameId": "61DC1733-CCD9-47CD-8CA1-44C38CBFCC4F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.45:*:*:*:*:*:*:*", "cpeNameId": "ABB4790F-1BAE-4D38-BFAA-06F009031F1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.46:*:*:*:*:*:*:*", "cpeNameId": "E9B9FB14-2860-4B64-AF08-18BA9BE7489B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.47:*:*:*:*:*:*:*", "cpeNameId": "26E01A49-3E16-4ED9-9681-62B3030AB68A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.48:*:*:*:*:*:*:*", "cpeNameId": "69C3C6D6-E1FA-4EC4-80C1-C02F61938549"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.49:*:*:*:*:*:*:*", "cpeNameId": "416FEB34-45F8-4398-8D94-3805E8C7F3DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.50:*:*:*:*:*:*:*", "cpeNameId": "BF545EBF-5A06-4463-A52C-939143C580E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.51:*:*:*:*:*:*:*", "cpeNameId": "5BD775DA-9D01-4314-96F7-743320925FA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.52:*:*:*:*:*:*:*", "cpeNameId": "D0476FA4-F223-4687-AB62-A1AE985BF592"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.53:*:*:*:*:*:*:*", "cpeNameId": "B2F445F5-D0DA-4817-B4D5-137180AD5EE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.54:*:*:*:*:*:*:*", "cpeNameId": "0C7A45E6-72C3-4478-BEFF-7BF02CB07848"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.55:*:*:*:*:*:*:*", "cpeNameId": "52C0AE2C-F11A-4174-ACBB-506C1945AB0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.56:*:*:*:*:*:*:*", "cpeNameId": "C24A3322-D73A-4F67-9340-8EA61B5A9913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.57:*:*:*:*:*:*:*", "cpeNameId": "5F55BFFB-BC77-4271-9D63-FBFC6DE367B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.58:*:*:*:*:*:*:*", "cpeNameId": "09BE3ADC-1C8E-4BCC-A2D7-CCB66F4CE9B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.59:*:*:*:*:*:*:*", "cpeNameId": "25C6AB87-321E-4ADB-9F0F-3F606FBDC85A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.60:*:*:*:*:*:*:*", "cpeNameId": "ADD78C70-C158-4BCE-950E-EDF40A095E89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.61:*:*:*:*:*:*:*", "cpeNameId": "F123EECC-8D3D-4E62-9071-7C1A6BCF61C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.62:*:*:*:*:*:*:*", "cpeNameId": "1DC81E13-D26C-4C7B-8932-91A5073057F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.63:*:*:*:*:*:*:*", "cpeNameId": "B3E66409-84A3-4541-9768-86B8A51FB328"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.64:*:*:*:*:*:*:*", "cpeNameId": "B0AEA29E-085F-407C-B0F3-20D641DBD474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.65:*:*:*:*:*:*:*", "cpeNameId": "A025E699-97C5-4D0B-8082-84811E504EEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.66:*:*:*:*:*:*:*", "cpeNameId": "FF4394B2-3DAD-482E-9DB2-444FA72C90F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.67:*:*:*:*:*:*:*", "cpeNameId": "6ED98836-A7F3-43B9-838B-FF7C8C794A1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.68:*:*:*:*:*:*:*", "cpeNameId": "71C1BFAF-7826-4AB7-BE91-1AF3A92AC920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.69:*:*:*:*:*:*:*", "cpeNameId": "9024E2C0-9705-46EE-BD72-1DC5C1D5D785"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.70:*:*:*:*:*:*:*", "cpeNameId": "97A1310D-F625-405E-8439-0B6C54C8F011"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.71:*:*:*:*:*:*:*", "cpeNameId": "BF4D80F6-8CAA-4B90-B41A-0BD714A4ED93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.72:*:*:*:*:*:*:*", "cpeNameId": "E54CF846-FAD0-4CF6-8A14-764972F7D25C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.73:*:*:*:*:*:*:*", "cpeNameId": "E31B871E-95F6-4B60-A6DA-3B354BC4EF44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.74:*:*:*:*:*:*:*", "cpeNameId": "7920F5D1-2B11-49FF-B408-C65F37D88BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.75:*:*:*:*:*:*:*", "cpeNameId": "A47B8AA9-37AC-49E5-B070-EE3DCE8C8677"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.76:*:*:*:*:*:*:*", "cpeNameId": "959BDC84-98A1-40BC-9D43-4D2EEF86C8EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.77:*:*:*:*:*:*:*", "cpeNameId": "DEFA7CAA-BE16-492B-9870-4923CE650385"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.78:*:*:*:*:*:*:*", "cpeNameId": "55234DEE-0470-4F77-8FD7-B2DB8B6368B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.79:*:*:*:*:*:*:*", "cpeNameId": "9824EA76-6C32-4A7B-B006-82D91D850B89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.80:*:*:*:*:*:*:*", "cpeNameId": "312A9A1F-D081-4587-A76D-C887235B4C72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.81:*:*:*:*:*:*:*", "cpeNameId": "6B15290F-5938-4189-91FF-0B4C031D83C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.82:*:*:*:*:*:*:*", "cpeNameId": "1EECAED3-55C7-4248-B820-CCCD7AC5E773"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.83:*:*:*:*:*:*:*", "cpeNameId": "CC455596-4F37-4CDE-9744-CC84AB6C0E0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.84:*:*:*:*:*:*:*", "cpeNameId": "1BF22FC0-A0DE-4998-9596-36F1A60919B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.85:*:*:*:*:*:*:*", "cpeNameId": "8AA6F9DE-FBD3-4565-9C90-428D82F9E14C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17:*:*:*:*:*:*:*", "cpeNameId": "1C3AFAF2-7B60-4F0C-B03C-5FB23A17280C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.1:*:*:*:*:*:*:*", "cpeNameId": "4CFBD0A5-3336-4C03-B114-6F24B3EDE0C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.2:*:*:*:*:*:*:*", "cpeNameId": "1A9A9411-A41C-4B05-AF63-0D77398E4BE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.3:*:*:*:*:*:*:*", "cpeNameId": "3B1A96B9-0491-421C-A330-FC4942D56074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.4:*:*:*:*:*:*:*", "cpeNameId": "8DA7D44B-1C84-4608-ADB0-36FEB71F4E44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.5:*:*:*:*:*:*:*", "cpeNameId": "D706D66E-EEB4-431D-A085-7EB09F42E0F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.6:*:*:*:*:*:*:*", "cpeNameId": "74FB6A46-0FBA-4D8B-B54C-906EACFF73E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.7:*:*:*:*:*:*:*", "cpeNameId": "C5487351-49B5-43D6-8449-75C42F235EAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.8:*:*:*:*:*:*:*", "cpeNameId": "32C73375-6506-47D5-8DE9-749A737042B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*", "cpeNameId": "F9D4BE1A-3B0A-4CDE-9B48-B4C0DD148C1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc1:*:*:*:*:*:*", "cpeNameId": "2C08DAAC-1B87-402B-B67D-A2E19BF96F72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc2:*:*:*:*:*:*", "cpeNameId": "B98E56E8-4D53-441B-A181-19DCB300435A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc3:*:*:*:*:*:*", "cpeNameId": "EC696823-660D-4297-BA88-C66382298ABF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc4:*:*:*:*:*:*", "cpeNameId": "8750CEAE-92CD-4BC5-991C-DF76F763EAB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc5:*:*:*:*:*:*", "cpeNameId": "5D8CBF93-33A1-44E6-B546-246AAE0C400B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.0:*:*:*:*:*:*:*", "cpeNameId": "DDFDD9DC-91E2-469C-A81D-EF131DD78832"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.1:*:*:*:*:*:*:*", "cpeNameId": "915A4DF7-BFBB-4377-8FF5-F12B469805B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.2:*:*:*:*:*:*:*", "cpeNameId": "61EA132A-8D2F-4400-87BD-98DEB73C2F58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.3:*:*:*:*:*:*:*", "cpeNameId": "B313C760-856E-4DBF-890C-240E2AA6BC95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.4:*:*:*:*:*:*:*", "cpeNameId": "3591FD85-8FD0-46CE-9251-9C43339298A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.5:*:*:*:*:*:*:*", "cpeNameId": "F31FEA15-EAFE-4BF4-8E2B-A8FC4A3367FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.6:*:*:*:*:*:*:*", "cpeNameId": "CB32ACB7-6117-4707-86A5-F913CA60E374"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.7:*:*:*:*:*:*:*", "cpeNameId": "D343B89B-7DEF-4D67-B107-05E6A2BD28C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.8:*:*:*:*:*:*:*", "cpeNameId": "7378B9B1-73C9-407B-AA9D-73E1F260005E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.9:*:*:*:*:*:*:*", "cpeNameId": "00178340-62AA-43C8-B841-7FAFFC043F5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.10:*:*:*:*:*:*:*", "cpeNameId": "1863E12C-9335-4CA7-8903-1C678070902D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.11:*:*:*:*:*:*:*", "cpeNameId": "6EA68AAA-65DA-4CFE-9632-3B2A44EB40A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.12:*:*:*:*:*:*:*", "cpeNameId": "40E473C0-2FAB-413A-9682-D9D72FA7CCAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.13:*:*:*:*:*:*:*", "cpeNameId": "CDC0061A-C366-48D4-950F-C46826707BE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.14:*:*:*:*:*:*:*", "cpeNameId": "B233D49C-12C6-4F7E-B156-C7DCE793C029"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.15:*:*:*:*:*:*:*", "cpeNameId": "592E4CB0-FA15-40A8-9A88-1D2C798ED507"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.16:*:*:*:*:*:*:*", "cpeNameId": "E6EC955E-AD15-47A5-A573-7E9079D8B459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.17:*:*:*:*:*:*:*", "cpeNameId": "99986C05-5DA3-45DF-8230-37B83B60F6DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.18:*:*:*:*:*:*:*", "cpeNameId": "FB1B3A35-091B-4474-A8F4-25C08D786F5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.19:*:*:*:*:*:*:*", "cpeNameId": "1CAA99E1-8AC0-4AFA-8747-B4489B51AC66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.20:*:*:*:*:*:*:*", "cpeNameId": "7DACC3BC-2976-4332-A117-7DF50B773BC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.21:*:*:*:*:*:*:*", "cpeNameId": "3F39EDFF-F17E-4502-90A7-4DA1F138372A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.22:*:*:*:*:*:*:*", "cpeNameId": "2FDAE819-7A17-4557-AD19-642879E1182F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.23:*:*:*:*:*:*:*", "cpeNameId": "FE2290B4-A963-40C6-AD68-34370800D2B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.24:*:*:*:*:*:*:*", "cpeNameId": "235EBC6D-7552-4A73-8E08-3AE548DBD5AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.25:*:*:*:*:*:*:*", "cpeNameId": "336B63E1-2FB7-448D-A788-054BFEE89DD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.26:*:*:*:*:*:*:*", "cpeNameId": "61F6061B-A43C-4C37-B595-B91E1F8B7105"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.27:*:*:*:*:*:*:*", "cpeNameId": "3C2E31EE-06B3-4846-9B90-489E8FB853F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.28:*:*:*:*:*:*:*", "cpeNameId": "55CB6B1F-6698-47C6-8F29-E879975094F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.29:*:*:*:*:*:*:*", "cpeNameId": "89400C79-96C2-464F-B2A3-ADE57C4216BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.30:*:*:*:*:*:*:*", "cpeNameId": "9864D7F0-5414-4C5E-A30C-46A67178CB89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.31:*:*:*:*:*:*:*", "cpeNameId": "E54C1BE3-616D-40E5-B3E4-7FEF1926F641"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.32:*:*:*:*:*:*:*", "cpeNameId": "540C8FCB-ED21-42C2-AF0C-4FFDDC9EA949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.33:*:*:*:*:*:*:*", "cpeNameId": "BF29E394-3C1F-48CA-89D7-F19C7D606EEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.34:*:*:*:*:*:*:*", "cpeNameId": "A898F0CF-0EF4-4314-A0E4-ACCA5888C8D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.35:*:*:*:*:*:*:*", "cpeNameId": "C823F021-BE62-47FD-B2A6-2B717AF21A49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.36:*:*:*:*:*:*:*", "cpeNameId": "6F9F7FDA-3741-4D39-A0AB-A5378A54CAED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.37:*:*:*:*:*:*:*", "cpeNameId": "B12E94B9-0ACD-42A6-806F-C0F956BE7D0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.38:*:*:*:*:*:*:*", "cpeNameId": "046E1F1D-D2D5-4D3B-B02D-E509E52DC8F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.39:*:*:*:*:*:*:*", "cpeNameId": "F79826FA-BE26-40EF-8B58-992A444A016F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.40:*:*:*:*:*:*:*", "cpeNameId": "9E7E1DFB-6312-4620-8FD6-1678E7C0A930"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.41:*:*:*:*:*:*:*", "cpeNameId": "28D7776C-D60C-4278-88CF-3CD71BC7139B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.42:*:*:*:*:*:*:*", "cpeNameId": "2A963EE0-93C9-43DC-9ACC-E5609EC4CC59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.43:*:*:*:*:*:*:*", "cpeNameId": "73701687-A705-4A48-9984-996B82994F8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.44:*:*:*:*:*:*:*", "cpeNameId": "CDC11CC8-AA61-47D7-8AD0-B375F643AF6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.45:*:*:*:*:*:*:*", "cpeNameId": "27D85C73-E2E1-4221-BA98-F5EF49839996"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.46:*:*:*:*:*:*:*", "cpeNameId": "08B323A1-7FC2-4B2E-8C08-71303053B4C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.47:*:*:*:*:*:*:*", "cpeNameId": "46D96B0A-80FE-4FFD-A6E9-142BF845C350"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.48:*:*:*:*:*:*:*", "cpeNameId": "18D2D332-851F-4D9A-B3DD-E82627FC1A9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.49:*:*:*:*:*:*:*", "cpeNameId": "DE88F0D2-93F3-4A2B-BA54-E3A4BD34DECA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.50:*:*:*:*:*:*:*", "cpeNameId": "EEFB2967-F096-4CAE-9B1F-DD5AE90B7610"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.51:*:*:*:*:*:*:*", "cpeNameId": "B816BFFA-7439-479C-84DF-669697E09FEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.52:*:*:*:*:*:*:*", "cpeNameId": "E53F2A26-9D36-4950-85C8-39E4658EB9F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.53:*:*:*:*:*:*:*", "cpeNameId": "6729A6C7-F654-42CE-BF65-FF6D721D43E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.54:*:*:*:*:*:*:*", "cpeNameId": "26482DBA-47E0-4708-8F5E-C5FF92E44C33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.55:*:*:*:*:*:*:*", "cpeNameId": "B39A27A3-C88B-4BF0-AADA-961257B1373E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.56:*:*:*:*:*:*:*", "cpeNameId": "FC7D4FF8-F7FE-4330-BADD-64738DA5954D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.57:*:*:*:*:*:*:*", "cpeNameId": "862F472A-9630-49AE-99CA-F03460E0FD2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.58:*:*:*:*:*:*:*", "cpeNameId": "82FC879F-8E36-4045-89D9-2C2FE5EB03C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.59:*:*:*:*:*:*:*", "cpeNameId": "5E17937E-582B-4B6B-A9B1-004578BBD4E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.60:*:*:*:*:*:*:*", "cpeNameId": "40A3973B-6C46-4BEE-A0F2-B94ABD55B3A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.61:*:*:*:*:*:*:*", "cpeNameId": "8F7DA9D6-8FD1-417B-92B2-342F88AAF757"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.62:*:*:*:*:*:*:*", "cpeNameId": "9FC70B62-2EF8-480C-B87F-B2538C2C92C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.63:*:*:*:*:*:*:*", "cpeNameId": "65C52AE5-5F34-4C11-BAC5-BD8A2ECD5DA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.64:*:*:*:*:*:*:*", "cpeNameId": "34401E8C-8EFA-44EF-8380-957152BE7BD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.65:*:*:*:*:*:*:*", "cpeNameId": "BF906FA5-AAF6-4789-A72B-53210F4BA0E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.66:*:*:*:*:*:*:*", "cpeNameId": "C303E030-6DC3-49CC-887D-A2E85FC91824"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.67:*:*:*:*:*:*:*", "cpeNameId": "2D980A8B-240A-44A1-A024-4A195F62DA46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.68:*:*:*:*:*:*:*", "cpeNameId": "9B10FF41-0412-47D6-94A3-9FB0414972E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.69:*:*:*:*:*:*:*", "cpeNameId": "BAD998E6-FBAB-4547-9812-C97362922FE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.70:*:*:*:*:*:*:*", "cpeNameId": "FE042B21-3E19-4A1F-BC7B-5F412999C8D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.71:*:*:*:*:*:*:*", "cpeNameId": "8E589A57-9EEA-43A8-B751-65AEDCBA5EBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.72:*:*:*:*:*:*:*", "cpeNameId": "C0708F75-A272-461D-AC54-610C880B05FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.73:*:*:*:*:*:*:*", "cpeNameId": "9309A9A1-CCD2-4E14-ACCF-37CA3881E474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.74:*:*:*:*:*:*:*", "cpeNameId": "C2B9924E-E542-4ED9-BF3B-6AA15288A545"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.75:*:*:*:*:*:*:*", "cpeNameId": "B4C12350-C8FC-45C9-A4E1-49EBAB0EABDF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.76:*:*:*:*:*:*:*", "cpeNameId": "9111BF49-BD08-43DC-A12A-DEBDA76D9639"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.77:*:*:*:*:*:*:*", "cpeNameId": "DB4ABECE-0600-4A46-A19C-CA856235940D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.78:*:*:*:*:*:*:*", "cpeNameId": "53BA34DD-CA76-4E31-9623-EEF2D80003E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.79:*:*:*:*:*:*:*", "cpeNameId": "0D20FC52-2D8E-4C84-9ED9-B9B67C41980F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.80:*:*:*:*:*:*:*", "cpeNameId": "B8CFFD61-70A0-40B9-8F6B-79DE799AFB34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.81:*:*:*:*:*:*:*", "cpeNameId": "E87C6B62-BFE1-4E7F-8A08-BE3096DA3704"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.82:*:*:*:*:*:*:*", "cpeNameId": "A073A26A-0CD7-4859-BDCF-07C873E50EE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.83:*:*:*:*:*:*:*", "cpeNameId": "5D88F978-B18D-46CC-9CCA-63A39EEE0EE9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.84:*:*:*:*:*:*:*", "cpeNameId": "02B47410-42B7-4C91-B780-D4324FFE1BB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.85:*:*:*:*:*:*:*", "cpeNameId": "9AE73ACC-86F0-4918-956F-81D6F33038B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.86:*:*:*:*:*:*:*", "cpeNameId": "5283AAAD-5F4D-46AA-9048-18103B049B8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.87:*:*:*:*:*:*:*", "cpeNameId": "A019755C-3B46-4FD3-BFAB-82CF5EAC84F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.88:*:*:*:*:*:*:*", "cpeNameId": "54DCA64B-7B9C-4A8E-BC6C-B9D3D27FC058"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.89:*:*:*:*:*:*:*", "cpeNameId": "69894EDF-EFC1-41A2-BA9F-4E970B91B5C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.90:*:*:*:*:*:*:*", "cpeNameId": "04FA57A5-0325-43E2-8FB8-96EBFDD3491D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.91:*:*:*:*:*:*:*", "cpeNameId": "1F4835B9-5B62-44D9-AACE-40C44269670C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.92:*:*:*:*:*:*:*", "cpeNameId": "955DE0A3-75D7-462A-9377-74292FBC6341"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.93:*:*:*:*:*:*:*", "cpeNameId": "D6E12C7F-315A-4EE0-B4FA-AD2AFB607360"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.94:*:*:*:*:*:*:*", "cpeNameId": "0934723A-985A-493A-A2D9-6D8C2229566F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.95:*:*:*:*:*:*:*", "cpeNameId": "20D1EC52-AAF2-4905-A653-EC8B98927F1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.96:*:*:*:*:*:*:*", "cpeNameId": "666B8EDB-B957-4DE2-89E1-432393D0F4FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.97:*:*:*:*:*:*:*", "cpeNameId": "E60FE8A1-6A5D-4B84-9ADE-6ED50E56B3D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.98:*:*:*:*:*:*:*", "cpeNameId": "69DCB9B5-ECD8-4821-8301-657BC0EB5936"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.99:*:*:*:*:*:*:*", "cpeNameId": "A4BFD292-1CCF-49CE-BEF6-CCD2AD23BCBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.100:*:*:*:*:*:*:*", "cpeNameId": "E2CC6E4F-2430-4053-B02A-E8D7BFB6D3AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.101:*:*:*:*:*:*:*", "cpeNameId": "875D85CF-01D3-42D0-9F68-54F211512EA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.102:*:*:*:*:*:*:*", "cpeNameId": "4015E4BA-544E-4034-A09D-0F26A37DC7DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.103:*:*:*:*:*:*:*", "cpeNameId": "9FF57CE8-73E2-4F25-8D82-B1D17024F4CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.104:*:*:*:*:*:*:*", "cpeNameId": "D3CB4966-9F15-459A-A1CA-DEFCDEF9CC2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.105:*:*:*:*:*:*:*", "cpeNameId": "68DF0A6E-3B27-43B4-9FAE-EA4275B9F373"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.106:*:*:*:*:*:*:*", "cpeNameId": "B42541D4-595C-4FFE-839D-100EACCA6240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.107:*:*:*:*:*:*:*", "cpeNameId": "A40753B8-610A-4157-AFA6-E5D4478B0336"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.108:*:*:*:*:*:*:*", "cpeNameId": "02084D31-1A6E-400E-AE2A-93E8D94F0E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.109:*:*:*:*:*:*:*", "cpeNameId": "E40A4E2C-FC77-4E2B-B9A2-948463D3BDAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.110:*:*:*:*:*:*:*", "cpeNameId": "14CFFFE9-7DE0-4990-947F-07BFDD13FD96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.111:*:*:*:*:*:*:*", "cpeNameId": "2BF0E1DA-1756-4B18-BE30-EDEE9C61E1C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.112:*:*:*:*:*:*:*", "cpeNameId": "C74C49FA-F24A-476C-BD5F-07458987BA4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.113:*:*:*:*:*:*:*", "cpeNameId": "E298C83E-B3CB-407E-8552-50EBADDE68E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.114:*:*:*:*:*:*:*", "cpeNameId": "D2EB3FF5-D7BF-4BD0-A7F6-3634CA03461A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.115:*:*:*:*:*:*:*", "cpeNameId": "752A887F-74E6-43F3-9A9F-70DC0CEF2054"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.116:*:*:*:*:*:*:*", "cpeNameId": "9E1D6133-AE78-4FA5-AE62-AB3A673D609E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.117:*:*:*:*:*:*:*", "cpeNameId": "8C4F542A-02E8-4044-B2E9-58394393AB14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.118:*:*:*:*:*:*:*", "cpeNameId": "0065E5C1-1EE8-4646-8FD5-24F9BF694D6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.119:*:*:*:*:*:*:*", "cpeNameId": "AFFDE9D3-AD3A-4F1A-B71F-F74505EBB108"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.120:*:*:*:*:*:*:*", "cpeNameId": "6A5FE4B4-896F-4A7E-9FAF-FDAD3DA8EED6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.121:*:*:*:*:*:*:*", "cpeNameId": "8534B956-8D0F-413D-8FAE-DCFD2044F8BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.122:*:*:*:*:*:*:*", "cpeNameId": "0EBA8A3C-CA75-41CA-AFAF-F51498E015BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.123:*:*:*:*:*:*:*", "cpeNameId": "AC45DD79-E0AA-4B4E-84F5-C98169C29661"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.124:*:*:*:*:*:*:*", "cpeNameId": "D2521793-534C-46AF-A53F-46FACB8CD23A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.125:*:*:*:*:*:*:*", "cpeNameId": "12CD0E92-5675-4FF0-9F98-427365913FC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.126:*:*:*:*:*:*:*", "cpeNameId": "5AD835DC-8470-4BDC-8A50-0BF470B522A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.127:*:*:*:*:*:*:*", "cpeNameId": "FCC0AB74-D519-4931-8C2A-2E19ABD8CFE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.128:*:*:*:*:*:*:*", "cpeNameId": "51C5B7F1-FBC7-472A-B1D2-FE0107EFED40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.129:*:*:*:*:*:*:*", "cpeNameId": "EBC1F65E-5B87-48AA-84ED-EB4FF45F6CC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.130:*:*:*:*:*:*:*", "cpeNameId": "0EE70948-23B6-42AD-8240-9E3C647B4AEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.131:*:*:*:*:*:*:*", "cpeNameId": "313E460E-3FF5-4346-BAF7-D4E40F2725BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.132:*:*:*:*:*:*:*", "cpeNameId": "91FAE139-A381-4CB6-AD5C-BA097F8CA0F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.133:*:*:*:*:*:*:*", "cpeNameId": "11D0AF26-BA8B-48F4-83CB-564FBF3505F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.134:*:*:*:*:*:*:*", "cpeNameId": "EE94A171-F631-4BEC-B4D6-5DA5FE518A90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.135:*:*:*:*:*:*:*", "cpeNameId": "99A0517F-6E2A-4257-8E0B-ABE31ED203D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.136:*:*:*:*:*:*:*", "cpeNameId": "353234F0-3D4F-4097-A9CE-19AFD3AC1141"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.137:*:*:*:*:*:*:*", "cpeNameId": "6CBCB4EB-B43A-456F-8347-78B6A0C77D9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.138:*:*:*:*:*:*:*", "cpeNameId": "DAEAE81D-810E-470B-8771-C6D10318283C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.139:*:*:*:*:*:*:*", "cpeNameId": "09E363F2-7B35-494F-AB64-BC12A8F927F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.140:*:*:*:*:*:*:*", "cpeNameId": "B4CEB136-3486-42D6-BE13-A28F0130DFDC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19:*:*:*:*:*:*:*", "cpeNameId": "C973645C-6420-4074-B349-D0258E3D194B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.1:*:*:*:*:*:*:*", "cpeNameId": "0615B00B-01C8-4962-B618-0F0077C902EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.2:*:*:*:*:*:*:*", "cpeNameId": "A989C578-40B5-4142-83F4-09DBB6C1D6C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.3:*:*:*:*:*:*:*", "cpeNameId": "A00F6B4F-6EE2-4BE2-BDCF-D2B45F757BC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.4:*:*:*:*:*:*:*", "cpeNameId": "B662D9C1-3A06-4D21-BE69-6C4CDD94904A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.5:*:*:*:*:*:*:*", "cpeNameId": "D52D426F-6E8E-4596-8A1C-3314BC96D9D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.6:*:*:*:*:*:*:*", "cpeNameId": "3AD744FD-0BEB-483F-815F-C6E51AFCF27E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.7:*:*:*:*:*:*:*", "cpeNameId": "7F6B22A7-0360-4212-B359-F3BB4407AE1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.8:*:*:*:*:*:*:*", "cpeNameId": "743B104B-252C-4AFB-B236-9A67EB0AC44B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4:*:*:*:*:*:*:*", "cpeNameId": "D2B71FFC-740C-4263-B936-A3C1B18E5F9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:*", "cpeNameId": "2467EFC2-0000-4EE5-AD91-D4EDD1009228"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:-:*:*:*:*:*:*", "cpeNameId": "5738F26A-6508-4BF6-9CE4-A275613579B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc1:*:*:*:*:*:*", "cpeNameId": "32082640-7AF2-43DC-861C-F7FDA79B77DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc2:*:*:*:*:*:*", "cpeNameId": "F242212B-DE46-4CFF-B235-0B7C7ABAD0DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc3:*:*:*:*:*:*", "cpeNameId": "A2FD0ED3-319A-4B99-A2B0-525C9A5EEAE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc4:*:*:*:*:*:*", "cpeNameId": "2837FE21-53FD-48DF-884C-B1D3118F280A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc5:*:*:*:*:*:*", "cpeNameId": "05739160-269D-481A-BFB6-81FE05B65C37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc6:*:*:*:*:*:*", "cpeNameId": "8719C069-AD38-4A89-91A1-8029796ECD84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc7:*:*:*:*:*:*", "cpeNameId": "5CE65CCE-AFF6-4487-8CE9-8B45B2060D90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.0:*:*:*:*:*:*:*", "cpeNameId": "C74E8950-0E12-4101-95D1-E4ABEC24652B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.1:*:*:*:*:*:*:*", "cpeNameId": "1405D246-2EB0-436A-88E3-C03CA8E8E3D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.2:*:*:*:*:*:*:*", "cpeNameId": "A0754CD9-F6FC-4BD9-A2AC-B00BD276E947"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.3:*:*:*:*:*:*:*", "cpeNameId": "6A16B7AF-DE24-4294-9E0C-9B402E8A089D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.4:*:*:*:*:*:*:*", "cpeNameId": "DC4F99B3-78CC-451C-A8B5-105EB9667877"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.5:*:*:*:*:*:*:*", "cpeNameId": "0B384EE6-AE66-46B5-BBC4-30BF3DB7A9DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.6:*:*:*:*:*:*:*", "cpeNameId": "EE0CD574-1AB5-4573-A704-B9CAF5530988"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.7:*:*:*:*:*:*:*", "cpeNameId": "638DED59-9BB4-4E64-93F3-C949D3CF5A2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.8:*:*:*:*:*:*:*", "cpeNameId": "AF6AE96F-7CCD-461C-9355-98057BEC1163"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.9:*:*:*:*:*:*:*", "cpeNameId": "4686AB63-EA79-4CFD-AFFF-25B474BD744B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:*:*:*:*:*:*:*", "cpeNameId": "1FD3A881-A85E-46E6-9F04-0C314F91A869"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:-:*:*:*:*:*:*", "cpeNameId": "C6DDBD3E-D424-41BB-B833-75F7C2F0C29D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc1:*:*:*:*:*:*", "cpeNameId": "6B1B5862-39FF-4533-A6F8-59DB9CB0D48D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc2:*:*:*:*:*:*", "cpeNameId": "3F509385-C4B5-4E24-90C5-EE164AFF3168"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc3:*:*:*:*:*:*", "cpeNameId": "1CA1E37C-026B-4EF1-9E1A-4EDE68FD1DD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc4:*:*:*:*:*:*", "cpeNameId": "11740404-17D1-4BAA-8744-153C7F8FA01D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc5:*:*:*:*:*:*", "cpeNameId": "806EB383-7517-4BB0-8942-BBBB362C0745"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc6:*:*:*:*:*:*", "cpeNameId": "6353B931-84FF-4DD3-AB70-3019EDE9CBBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc7:*:*:*:*:*:*", "cpeNameId": "225B922C-F2C3-4DCF-A5C6-D66E365CEA33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc8:*:*:*:*:*:*", "cpeNameId": "9695C06A-6BF6-4E18-9A6C-1469B44753DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.0:*:*:*:*:*:*:*", "cpeNameId": "EA6178D9-E4A5-4DFF-8D43-5AB0131EB529"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.1:*:*:*:*:*:*:*", "cpeNameId": "A38CD077-9F8E-4572-B614-18D8DA41CE25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.2:*:*:*:*:*:*:*", "cpeNameId": "F0D170E2-6B84-4760-B53F-830D6160C302"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.3:*:*:*:*:*:*:*", "cpeNameId": "C13A70C1-8523-44FE-B12D-B9035AAA5E6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.4:*:*:*:*:*:*:*", "cpeNameId": "1FFB4199-8707-4CAD-8070-7E3066F8C868"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.5:*:*:*:*:*:*:*", "cpeNameId": "4418AD31-4638-4D43-BB32-AFF4C9B8C430"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.6:*:*:*:*:*:*:*", "cpeNameId": "C4F667A2-5EEB-4749-8EE1-C095E9EF5EB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.7:*:*:*:*:*:*:*", "cpeNameId": "23ED7B6D-AC5F-4D76-8232-EB87EB162D91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.8:*:*:*:*:*:*:*", "cpeNameId": "17C5A2CC-1906-46F6-982C-BDC57416938F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.9:*:*:*:*:*:*:*", "cpeNameId": "5EA18DB4-A8D4-4A3B-9BA9-35A529203034"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.10:*:*:*:*:*:*:*", "cpeNameId": "14FD8473-B0D4-4769-B4F1-B8C02974B0C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.11:*:*:*:*:*:*:*", "cpeNameId": "B08A1A95-E122-4BFC-9D4E-968E285140AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.12:*:*:*:*:*:*:*", "cpeNameId": "6F2E15B4-A02A-4DCC-AD8F-C32754D76BE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.13:*:*:*:*:*:*:*", "cpeNameId": "B44A7452-7F4C-4256-A6BA-92386941F1F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.14:*:*:*:*:*:*:*", "cpeNameId": "89A0B4D3-D197-4ACF-AABB-235B577E8835"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.15:*:*:*:*:*:*:*", "cpeNameId": "3F9E4481-B888-43A6-900E-6D059E24F4DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.16:*:*:*:*:*:*:*", "cpeNameId": "F376E601-5D90-4101-9249-D18FB4F379AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.17:*:*:*:*:*:*:*", "cpeNameId": "951AD518-B4DB-407A-A06A-6DF0E89752BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.18:*:*:*:*:*:*:*", "cpeNameId": "AE6C698F-784D-4841-9352-B1A0F17613FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.19:*:*:*:*:*:*:*", "cpeNameId": "2BB57DCF-EAFB-4662-BE1F-0878957F6D71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.20:*:*:*:*:*:*:*", "cpeNameId": "FDDD9390-36CC-48A2-BB78-32670780CC92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.21:*:*:*:*:*:*:*", "cpeNameId": "48BC0496-DEEC-4779-BE64-E5E48C91AA6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.22:*:*:*:*:*:*:*", "cpeNameId": "D2B401B4-792A-4339-9798-C1FC1EB14397"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.23:*:*:*:*:*:*:*", "cpeNameId": "1604FFD1-E146-4F99-BDA2-5B214E88FFF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.24:*:*:*:*:*:*:*", "cpeNameId": "4F575F6F-792C-4930-B91B-ED38EA9DA5EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.25:*:*:*:*:*:*:*", "cpeNameId": "1118DD03-426F-4352-875B-57BDA42AF9C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.26:*:*:*:*:*:*:*", "cpeNameId": "F8E3B08B-72FE-4D6C-8D4E-04887E5E219E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.27:*:*:*:*:*:*:*", "cpeNameId": "1CB06853-22B6-40EA-ADBA-E429E2F967E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.28:*:*:*:*:*:*:*", "cpeNameId": "7D4A498E-31B1-4840-BE23-5AA268DA7CAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.29:*:*:*:*:*:*:*", "cpeNameId": "CC42303B-B170-4BD6-A178-EC4B45171DA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.30:*:*:*:*:*:*:*", "cpeNameId": "A9DF6117-615B-44EC-A8CF-63531F4F8B96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.31:*:*:*:*:*:*:*", "cpeNameId": "B25FC13E-EF58-4754-8035-6DF270313557"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.32:*:*:*:*:*:*:*", "cpeNameId": "1AD020F9-7A83-4BD3-A2E0-2AA1621A5FDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.33:*:*:*:*:*:*:*", "cpeNameId": "E8C8975E-91CB-4038-8B7E-D36B9F3B6FAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.34:*:*:*:*:*:*:*", "cpeNameId": "ABF7E934-AAF2-4335-A0B1-99BB16D3F751"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.35:*:*:*:*:*:*:*", "cpeNameId": "799F3962-5C6C-499B-B281-D38FDDDDFA05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.36:*:*:*:*:*:*:*", "cpeNameId": "2D3FECAF-623C-4B31-B72B-04AB4D4007D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.37:*:*:*:*:*:*:*", "cpeNameId": "C89EE90D-595D-4E01-9574-4168BE770CBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.38:*:*:*:*:*:*:*", "cpeNameId": "F65CB61E-C061-4406-BB74-A274E0F13AC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.39:*:*:*:*:*:*:*", "cpeNameId": "193A927C-9887-4A27-9759-44EB6E639C37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.40:*:*:*:*:*:*:*", "cpeNameId": "1BC48C28-CC5A-47C7-9BA5-80E19916D9FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.41:*:*:*:*:*:*:*", "cpeNameId": "D465391D-62E6-4FF3-893B-1CBCCB1B5AEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.42:*:*:*:*:*:*:*", "cpeNameId": "9554D22C-0782-46F4-86CD-E321E7BCDA3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.43:*:*:*:*:*:*:*", "cpeNameId": "ED423577-D69F-4F39-9D75-87F23173AD7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.44:*:*:*:*:*:*:*", "cpeNameId": "044011D5-1E1C-4714-9B25-DAE9851DDFD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.45:*:*:*:*:*:*:*", "cpeNameId": "22EF791D-7C93-4259-963D-9B874F241973"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.46:*:*:*:*:*:*:*", "cpeNameId": "DEFA34B6-5C67-453A-9BCF-92468BC0AF3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.47:*:*:*:*:*:*:*", "cpeNameId": "7429D270-4092-44FF-B09B-01982EEDBA7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.48:*:*:*:*:*:*:*", "cpeNameId": "B52A9A77-1E36-4973-BF17-27C7809BC6A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.49:*:*:*:*:*:*:*", "cpeNameId": "FA0B3866-E1F1-49FE-AFE1-50C763DE1577"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.50:*:*:*:*:*:*:*", "cpeNameId": "99E2646C-4911-4586-B948-35F31C67FF12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.51:*:*:*:*:*:*:*", "cpeNameId": "83DD1B25-C576-4C00-8B5E-DE5C5E0F9BFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.52:*:*:*:*:*:*:*", "cpeNameId": "432CA14E-8ED4-4D41-9A1A-FA2EDE5DB5BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:*:*:*:*:*:*:*", "cpeNameId": "8CEC5C41-7D54-46C5-B51A-C5B7000A261F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:-:*:*:*:*:*:*", "cpeNameId": "404233EA-3A42-4415-807C-2795535D8FBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc1:*:*:*:*:*:*", "cpeNameId": "01F7FC99-0732-43C2-8441-6075EF18BB1F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc2:*:*:*:*:*:*", "cpeNameId": "C762486A-6A4C-423C-A02C-6ADFD08E43BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc3:*:*:*:*:*:*", "cpeNameId": "90E588AC-AB0B-48E5-A4EC-9961E9446253"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc4:*:*:*:*:*:*", "cpeNameId": "C00F12B9-3630-403F-BD9F-ECEE434557B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc5:*:*:*:*:*:*", "cpeNameId": "D9578F1C-2720-4A5A-ADA6-BECCFC1A06B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc6:*:*:*:*:*:*", "cpeNameId": "E6A0149C-F476-4468-8E02-E086BA1ED75C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc7:*:*:*:*:*:*", "cpeNameId": "6EC892D2-6A54-4C68-A736-41A37FAB43DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc8:*:*:*:*:*:*", "cpeNameId": "B3C3E05F-1E32-4C9F-9985-7861C068651A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.0:*:*:*:*:*:*:*", "cpeNameId": "E7F7C907-29DD-4C0A-B62F-238D64F9CA52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.1:*:*:*:*:*:*:*", "cpeNameId": "BD114713-34F2-4BB0-B53A-EDFE8CC646C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.2:*:*:*:*:*:*:*", "cpeNameId": "BD0AD63F-B1DF-45C3-98B9-29E84D6847F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.3:*:*:*:*:*:*:*", "cpeNameId": "AF52399D-722B-4373-AEB0-048D636AC2D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.4:*:*:*:*:*:*:*", "cpeNameId": "F7C3C103-F75A-4C0C-8360-F8E059CFFE6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.5:*:*:*:*:*:*:*", "cpeNameId": "B1A5B3B7-86C0-4DF5-AF49-AEE88B639819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.6:*:*:*:*:*:*:*", "cpeNameId": "8CEA01FC-7DCC-4A1B-A083-9628EF0C034C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.7:*:*:*:*:*:*:*", "cpeNameId": "8C8CB29B-5E42-4AB5-ABDF-380C0B00A9C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.8:*:*:*:*:*:*:*", "cpeNameId": "2019892E-BCC2-4F18-A09D-0C09DBB0B787"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:*:*:*:*:*:*:*", "cpeNameId": "9C6EAC12-A07A-4F5F-B78B-EB96D2D331B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:-:*:*:*:*:*:*", "cpeNameId": "73A7EEE5-C389-4C3B-BC22-FD0CDEC18F45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc1:*:*:*:*:*:*", "cpeNameId": "69D84DB0-013C-4357-85CB-AB0756FAF083"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc2:*:*:*:*:*:*", "cpeNameId": "20D634C6-571A-4D59-B99F-806C7C7548B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc3:*:*:*:*:*:*", "cpeNameId": "ED000931-A13B-4853-B3D4-48D4DB46514D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc4:*:*:*:*:*:*", "cpeNameId": "86DE3CD3-8810-4414-9AE9-230B9E548F43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc5:*:*:*:*:*:*", "cpeNameId": "9B329FAB-EC7B-4C85-A23B-F56E55260B89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc6:*:*:*:*:*:*", "cpeNameId": "19AB03B2-6B8E-48A6-8D90-AD40402612EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc7:*:*:*:*:*:*", "cpeNameId": "3A65D171-7A9B-43D9-BD44-4BD4AFCD61BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.0:*:*:*:*:*:*:*", "cpeNameId": "554AE6B2-BA69-4DD7-A0E2-05897523452F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.1:*:*:*:*:*:*:*", "cpeNameId": "AC05011D-579A-4D7B-9A9B-39BFE3CE1E00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.2:*:*:*:*:*:*:*", "cpeNameId": "0DCE2CF9-7D6A-4032-B153-628BB91676FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.3:*:*:*:*:*:*:*", "cpeNameId": "40C7AB11-ABD7-49EE-98A7-8E3E957B197B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.4:*:*:*:*:*:*:*", "cpeNameId": "7A430ED7-4026-4E2C-967E-BCA3B17D9E39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.5:*:*:*:*:*:*:*", "cpeNameId": "B741D92F-7E21-4E6D-A751-19851AD4D07E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.6:*:*:*:*:*:*:*", "cpeNameId": "75E10032-3935-488F-B062-EA74AD1C6F42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:*:*:*:*:*:*:*", "cpeNameId": "0CC82592-969E-42E2-995A-77254AC2858C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:-:*:*:*:*:*:*", "cpeNameId": "DCDA1601-B9CC-4CAB-9045-7E418185A857"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc1:*:*:*:*:*:*", "cpeNameId": "D57BA72B-FFA4-4EDD-8609-41604BD7A8FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc2:*:*:*:*:*:*", "cpeNameId": "428C4926-D233-44E4-9B15-420D7DF499BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc3:*:*:*:*:*:*", "cpeNameId": "B3340F47-0DC7-497C-A2C4-0A2ACCC36821"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc4:*:*:*:*:*:*", "cpeNameId": "C349F878-71AE-4CB6-95C2-A0E2D2869BDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc5:*:*:*:*:*:*", "cpeNameId": "E13E25C1-84C9-4A2B-AB57-E2860569C7B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc6:*:*:*:*:*:*", "cpeNameId": "8EC67A5C-56D4-48A6-9A12-290C0BAF8BB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc7:*:*:*:*:*:*", "cpeNameId": "72A4C1AB-870E-43CE-B616-36F9036E8040"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc8:*:*:*:*:*:*", "cpeNameId": "0D491AC8-EF6D-49D2-ABE3-14C900AEDC84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.0:*:*:*:*:*:*:*", "cpeNameId": "F76C4499-1C1F-40BB-B72D-3CCBE24F9983"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.0-96.119:*:*:*:*:*:*:*", "cpeNameId": "FA8FC4BC-B432-45F3-BA3A-36629C2FB2BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.1:*:*:*:*:*:*:*", "cpeNameId": "7FE8FBE3-1F3E-4E59-971E-80D2291E9F04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.2:*:*:*:*:*:*:*", "cpeNameId": "933EC82A-7117-4C3B-BAC3-B730E8177D68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.3:*:*:*:*:*:*:*", "cpeNameId": "4E8A4278-3F30-4F35-9A7D-E4ACB320AB90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.4:*:*:*:*:*:*:*", "cpeNameId": "EFCC9662-D66A-4E22-BCF6-D92D4FC3C9BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.5:*:*:*:*:*:*:*", "cpeNameId": "5E5D47B0-7380-4061-ACA1-07FA5F5EE3F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.6:*:*:*:*:*:*:*", "cpeNameId": "5AAADD86-5C57-4D1C-BAF8-A41D33BA47B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.7:*:*:*:*:*:*:*", "cpeNameId": "C3A6FFE6-7A8C-4F45-9950-821FEDE12755"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.8:*:*:*:*:*:*:*", "cpeNameId": "CD6D9EA8-5907-480D-826A-CFD853176989"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.9:*:*:*:*:*:*:*", "cpeNameId": "697729A2-369A-4485-A6D2-9128FBDEF13D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.10:*:*:*:*:*:*:*", "cpeNameId": "9C401888-D849-494A-8807-0F4A1B7F3B90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.11:*:*:*:*:*:*:*", "cpeNameId": "41ADE2D0-F20F-4609-BE2E-2A52D8B77B4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.12:*:*:*:*:*:*:*", "cpeNameId": "4624CFD6-9443-42DD-BF38-1E4C0F85942A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.13:*:*:*:*:*:*:*", "cpeNameId": "BFC70B7E-E345-473D-B885-17CB43DEFDE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.14:*:*:*:*:*:*:*", "cpeNameId": "BC242831-9967-4C30-81DC-DF10A52E8A9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.15:*:*:*:*:*:*:*", "cpeNameId": "68D73D19-ABB3-4703-8D3D-006872776B09"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.16:*:*:*:*:*:*:*", "cpeNameId": "3BBB71CE-8252-4DAF-B2E0-9D4895CFAFF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.17:*:*:*:*:*:*:*", "cpeNameId": "61C83B74-8A5A-482F-B7CB-DFF85EE2A312"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.18:*:*:*:*:*:*:*", "cpeNameId": "87EF4F10-A5FA-4EA9-BB2C-B7AE2D0E2731"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.19:*:*:*:*:*:*:*", "cpeNameId": "6A3F3026-8C21-4CCB-A985-C93A889BEFF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.20:*:*:*:*:*:*:*", "cpeNameId": "156A1C57-B0CC-403A-9A99-F087A22AB63E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.21:*:*:*:*:*:*:*", "cpeNameId": "5B9FCBCD-BDA2-45BF-BF11-2DB2990B0E8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.22:*:*:*:*:*:*:*", "cpeNameId": "FEB1E36A-8777-49D3-B7AD-75F2D75C9AFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.23:*:*:*:*:*:*:*", "cpeNameId": "A5F83DF2-1CE5-4789-806F-A232112BDE55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.24:*:*:*:*:*:*:*", "cpeNameId": "9812732F-FD5D-4295-ADE7-D9F6E4126590"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.25:*:*:*:*:*:*:*", "cpeNameId": "1EDD6CD5-A9B7-4969-BCA1-18A7E453F27F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.26:*:*:*:*:*:*:*", "cpeNameId": "5A3C3EA9-B55D-4700-82DA-253D22CD1099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.27:*:*:*:*:*:*:*", "cpeNameId": "D6AC0EFD-9C1B-45F5-BAEB-B18D8B02AAF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.28:*:*:*:*:*:*:*", "cpeNameId": "B31EBB97-91D1-4EAB-BB83-DBB22040DDB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.29:*:*:*:*:*:*:*", "cpeNameId": "D3C8008A-8BFC-4A96-887F-416BE9E64691"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.30:*:*:*:*:*:*:*", "cpeNameId": "889B12BB-2EDF-4EA0-8A84-62F616E4053D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.31:*:*:*:*:*:*:*", "cpeNameId": "1FECAF9A-B388-429C-8ACA-9CD4E510E0B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.32:*:*:*:*:*:*:*", "cpeNameId": "FC81D3C5-1E0B-47F7-BB37-585C75FE67AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.33:*:*:*:*:*:*:*", "cpeNameId": "F823ED2B-606F-4195-997D-331C64592007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.34:*:*:*:*:*:*:*", "cpeNameId": "B45CC685-7AF6-45F4-8D75-1FCE15D97A6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.35:*:*:*:*:*:*:*", "cpeNameId": "C850B81D-E6A8-4FCB-B155-B63AFC9A4832"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.36:*:*:*:*:*:*:*", "cpeNameId": "C61E381E-000B-4731-AF8D-90BF59F11A85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.37:*:*:*:*:*:*:*", "cpeNameId": "24FED760-B194-43AE-9B94-115470E988D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.38:*:*:*:*:*:*:*", "cpeNameId": "878B3AEA-B1D0-4A02-BC68-376A6286D5DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.39:*:*:*:*:*:*:*", "cpeNameId": "9774A99C-3F08-496D-AAF3-A830DB1E5717"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.40:*:*:*:*:*:*:*", "cpeNameId": "C179136B-E80A-4B7C-A763-39BA95DD48D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.41:*:*:*:*:*:*:*", "cpeNameId": "44E2FCC4-8347-446A-9CBD-BE5CCABCB0E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.42:*:*:*:*:*:*:*", "cpeNameId": "451A60BC-B7FE-43C5-9F7D-99F56719B263"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.43:*:*:*:*:*:*:*", "cpeNameId": "05E45126-5143-4405-B7D6-679436FF23E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.44:*:*:*:*:*:*:*", "cpeNameId": "F6BDB13D-4380-4230-A021-51155E9CD1B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.45:*:*:*:*:*:*:*", "cpeNameId": "356F009A-A387-4214-A12D-68F7FE52D6C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.46:*:*:*:*:*:*:*", "cpeNameId": "CCAF1CFF-7B49-4A7C-ADFB-8EB68042F3D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.47:*:*:*:*:*:*:*", "cpeNameId": "8FDA50AF-A48C-496F-8BAA-1D39488F88B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.48:*:*:*:*:*:*:*", "cpeNameId": "9CCE40F5-05B5-44AA-BDA0-6268E8E16F89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.49:*:*:*:*:*:*:*", "cpeNameId": "47151518-D679-4658-8B7D-77F977FC6B20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.50:*:*:*:*:*:*:*", "cpeNameId": "F2BEC0AE-3B47-4DC7-BBF2-FF7AFD9744AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.51:*:*:*:*:*:*:*", "cpeNameId": "03CF782E-4825-46C5-92C6-1F9958428D4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.52:*:*:*:*:*:*:*", "cpeNameId": "CE25CEF9-6DE1-4CB6-8685-9ECE06228051"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.53:*:*:*:*:*:*:*", "cpeNameId": "44AD121F-711F-44FC-A42D-EEE3B49EF09B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.54:*:*:*:*:*:*:*", "cpeNameId": "D8545A61-0DE7-4887-A656-6AC1F6D99FA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.55:*:*:*:*:*:*:*", "cpeNameId": "812EE9D9-8B2A-4184-B2A3-1AE01523E622"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.56:*:*:*:*:*:*:*", "cpeNameId": "8D293DF8-3B9F-4930-8F77-29BE00E2A3FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.57:*:*:*:*:*:*:*", "cpeNameId": "38589104-9F4F-4999-8D51-B1E5D6CE806B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.58:*:*:*:*:*:*:*", "cpeNameId": "E394318F-A063-476A-89D0-696A69816F05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.59:*:*:*:*:*:*:*", "cpeNameId": "9942A355-2E0F-445D-914A-ABF78CCBC64F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.60:*:*:*:*:*:*:*", "cpeNameId": "4616A735-3236-4490-9E4A-CF13C9198115"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.61:*:*:*:*:*:*:*", "cpeNameId": "300906FB-8359-4D31-9C79-B8B654D390F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.62:*:*:*:*:*:*:*", "cpeNameId": "2323C950-541C-42D2-AD38-2ED9A3870714"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.63:*:*:*:*:*:*:*", "cpeNameId": "9138BACD-3DB4-4D5B-A566-F9BCF825B1FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.64:*:*:*:*:*:*:*", "cpeNameId": "D4B84632-21BF-41F4-BE43-63DF430DD2DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.65:*:*:*:*:*:*:*", "cpeNameId": "7A6C5D5A-5258-4AF9-8102-E570944A3E58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.66:*:*:*:*:*:*:*", "cpeNameId": "C9AF7B6B-F888-4211-AD00-F9B56C34D41C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.67:*:*:*:*:*:*:*", "cpeNameId": "EC917E6E-35A5-45BB-AE1E-1079402EA052"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.68:*:*:*:*:*:*:*", "cpeNameId": "ECE8EEAA-08BD-43F9-A8ED-CB46263E4373"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.69:*:*:*:*:*:*:*", "cpeNameId": "8C9C110C-0041-4B82-BDD7-F54A5030D278"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.70:*:*:*:*:*:*:*", "cpeNameId": "F751372D-061C-47E2-B8C5-CB32070152B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.71:*:*:*:*:*:*:*", "cpeNameId": "B3729C0E-0348-4130-B789-2CE7EA174E4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.72:*:*:*:*:*:*:*", "cpeNameId": "CB32A8F5-4963-457B-AFA2-426B4EDB82AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.73:*:*:*:*:*:*:*", "cpeNameId": "D84BE462-BD26-4182-8BA9-0B9EAB4650D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.74:*:*:*:*:*:*:*", "cpeNameId": "D5ED1938-4B1C-4997-8083-C7E1CD229E72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.75:*:*:*:*:*:*:*", "cpeNameId": "38E49F41-BA58-4A52-8420-6A2FF96516D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.76:*:*:*:*:*:*:*", "cpeNameId": "20077160-E24C-47C3-B452-81625E2B87BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.77:*:*:*:*:*:*:*", "cpeNameId": "1C995C66-DCAD-450A-8DEC-5480C57765E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.78:*:*:*:*:*:*:*", "cpeNameId": "06EA7B0F-FE44-439E-8B6E-DA05D4ACD725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.79:*:*:*:*:*:*:*", "cpeNameId": "5185E87B-AE55-427C-A0E4-8E016F945043"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.80:*:*:*:*:*:*:*", "cpeNameId": "B145CA1C-23F8-46A4-97FC-57471354BC07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.81:*:*:*:*:*:*:*", "cpeNameId": "B46BADB5-A906-4989-A597-BB056C289302"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.82:*:*:*:*:*:*:*", "cpeNameId": "395C2214-5D0D-4E6E-821C-93B4BA0B3D7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.83:*:*:*:*:*:*:*", "cpeNameId": "C7F9481A-F00C-4A7D-A28C-52A2F0FA0DAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.84:*:*:*:*:*:*:*", "cpeNameId": "E350E11E-1917-4413-BB8F-5D9EAEB49411"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.85:*:*:*:*:*:*:*", "cpeNameId": "0D076280-76F9-4824-A0C8-B5F6C086DCE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.86:*:*:*:*:*:*:*", "cpeNameId": "2ABB7C71-884C-4E5D-85F3-4AC8FA166985"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.87:*:*:*:*:*:*:*", "cpeNameId": "DD6C21E4-7565-4317-B325-96EA55C92F33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.88:*:*:*:*:*:*:*", "cpeNameId": "608B4295-455B-4572-A5A8-03BEB29D75CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.89:*:*:*:*:*:*:*", "cpeNameId": "88644B26-E539-4D71-91F5-9B2749B8706D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.90:*:*:*:*:*:*:*", "cpeNameId": "2997B73D-574C-45C1-88FA-7AD9B7C963F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.91:*:*:*:*:*:*:*", "cpeNameId": "D55C911B-0765-456B-9985-8CBFFB0954AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.92:*:*:*:*:*:*:*", "cpeNameId": "4C8AF219-5201-49E9-94A4-1BE15403A27D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.93:*:*:*:*:*:*:*", "cpeNameId": "164A1A90-B36C-4454-B89D-6719CA368178"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.94:*:*:*:*:*:*:*", "cpeNameId": "31D8CD9C-DADC-46D8-B8CA-77FCD24C8691"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.95:*:*:*:*:*:*:*", "cpeNameId": "8CD707EB-3889-4DC9-839B-EB9F5CDD4587"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.96:*:*:*:*:*:*:*", "cpeNameId": "0CB79FE3-A3D1-4F1D-9A44-88FD75CE1C13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.97:*:*:*:*:*:*:*", "cpeNameId": "F3990863-8D9C-4374-B274-E62B91534FC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.98:*:*:*:*:*:*:*", "cpeNameId": "0726D23D-8D13-4988-8654-D33A1386B6FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.99:*:*:*:*:*:*:*", "cpeNameId": "C3D8AB2A-6DEC-40D8-AD3E-7447A9736092"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.100:*:*:*:*:*:*:*", "cpeNameId": "F903471F-7DC5-4168-BAF1-AE02C3E43321"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.101:*:*:*:*:*:*:*", "cpeNameId": "C94D5AD3-E24B-4D44-AF5F-09128A434F3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.102:*:*:*:*:*:*:*", "cpeNameId": "DBBDB1E6-0160-417F-8EBA-E4A143CA41D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.103:*:*:*:*:*:*:*", "cpeNameId": "18570476-ABFC-4A8C-BBEF-AED9E53F6C34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.104:*:*:*:*:*:*:*", "cpeNameId": "1B28A2BA-810E-4B40-83E9-4BED770D72EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.105:*:*:*:*:*:*:*", "cpeNameId": "C25BB8A0-D93C-4071-BBED-99386B18DAE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.106:*:*:*:*:*:*:*", "cpeNameId": "2B75F5E1-5335-4AD7-9441-F3CBA98EF747"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.107:*:*:*:*:*:*:*", "cpeNameId": "449985A4-B44D-4C2A-9413-1BDA709D9E01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.108:*:*:*:*:*:*:*", "cpeNameId": "E04D3E71-E5C0-40B4-AC12-FFE336978A74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.109:*:*:*:*:*:*:*", "cpeNameId": "F3940127-6BEE-4F2E-B44A-FAACA6BFF9F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.110:*:*:*:*:*:*:*", "cpeNameId": "7F88E543-8723-481B-BBE2-757F82EA8100"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.111:*:*:*:*:*:*:*", "cpeNameId": "ED95CF08-486A-43C7-9DFE-966644DCC377"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.112:*:*:*:*:*:*:*", "cpeNameId": "11F03D25-057A-4661-9D80-0287A9FC3E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.113:*:*:*:*:*:*:*", "cpeNameId": "B6607762-D34E-4781-B5FB-A0663816E6BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.114:*:*:*:*:*:*:*", "cpeNameId": "0543C55A-12A4-4B28-BA66-452EFFAC7098"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.115:*:*:*:*:*:*:*", "cpeNameId": "C8AFB8B7-895F-4DFE-A789-B5B8891EF694"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.116:*:*:*:*:*:*:*", "cpeNameId": "4C78171E-3ADE-4991-8A87-86C1CAB609EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.117:*:*:*:*:*:*:*", "cpeNameId": "A52DAAA6-AEDB-4A29-AB9A-B6F61101C486"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.118:*:*:*:*:*:*:*", "cpeNameId": "5C8DB1F1-2B65-41C5-AAC5-4B49BB90F6F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.119:*:*:*:*:*:*:*", "cpeNameId": "7636EB46-4587-49F1-A3DE-E99CD375F5D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.120:*:*:*:*:*:*:*", "cpeNameId": "FFBA4ECA-45CC-480D-A349-474A02528A5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.121:*:*:*:*:*:*:*", "cpeNameId": "53674370-5B99-49DE-B239-324189EB5699"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.122:*:*:*:*:*:*:*", "cpeNameId": "E2DD9DE8-2CB7-487E-846A-56FAD08E199A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.123:*:*:*:*:*:*:*", "cpeNameId": "C15400AA-A918-43A6-90B9-9C7975A9D308"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.124:*:*:*:*:*:*:*", "cpeNameId": "BBB6E83C-5BA4-4226-9E3B-C23F3FCE248D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.125:*:*:*:*:*:*:*", "cpeNameId": "58B7AA16-617E-40FE-B192-6ABD6C1E05C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.126:*:*:*:*:*:*:*", "cpeNameId": "C4C1F614-3186-456E-BD0F-3715273D010F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.127:*:*:*:*:*:*:*", "cpeNameId": "5E2E2078-968E-4730-8CAA-59B48CC007CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.128:*:*:*:*:*:*:*", "cpeNameId": "19D36CCE-3249-41DA-926C-42ED9DAF91C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.129:*:*:*:*:*:*:*", "cpeNameId": "DEE1AE91-0A90-461F-962A-F92EDA0DEA6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.130:*:*:*:*:*:*:*", "cpeNameId": "60B9BFCA-ADCF-466E-B401-8BE4E2D4F6A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.131:*:*:*:*:*:*:*", "cpeNameId": "246A3AC9-CCED-4A3B-B82F-F26E6A79E3F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.132:*:*:*:*:*:*:*", "cpeNameId": "EBDB64FC-B4F1-4680-B1B0-1C848129B1B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.133:*:*:*:*:*:*:*", "cpeNameId": "246F341D-A30B-4398-9F47-E6007ADD9411"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.134:*:*:*:*:*:*:*", "cpeNameId": "7AA07554-42F7-481E-849B-AEA632431934"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.135:*:*:*:*:*:*:*", "cpeNameId": "90C944B1-DB85-4B52-BD32-DDEB7A2A549E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.136:*:*:*:*:*:*:*", "cpeNameId": "7B06530D-A42B-4037-9FDB-7193ADC8697B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.137:*:*:*:*:*:*:*", "cpeNameId": "2329C964-A06C-46AB-A09B-16FCD04225BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.138:*:*:*:*:*:*:*", "cpeNameId": "C459456B-DAC6-4628-AD4D-07FEC30EDC0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.139:*:*:*:*:*:*:*", "cpeNameId": "E896A785-A21A-4E37-8FD7-6F648D85C73D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.140:*:*:*:*:*:*:*", "cpeNameId": "5B870D55-093B-4A4E-A4BA-92ADF186D4AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.141:*:*:*:*:*:*:*", "cpeNameId": "EAF9150A-686D-46A2-9388-47A1A60D263D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.142:*:*:*:*:*:*:*", "cpeNameId": "2AAE9D72-ECB4-4C43-BE20-5AC5FAAAD7EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.143:*:*:*:*:*:*:*", "cpeNameId": "A929B4C2-CED9-48D3-BE7A-A06751C50A82"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.144:*:*:*:*:*:*:*", "cpeNameId": "D52CB870-E71C-4ED1-9575-89C55E22371F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.145:*:*:*:*:*:*:*", "cpeNameId": "07CAE2BD-3C40-4DB7-B7F4-7F3F188C288B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.146:*:*:*:*:*:*:*", "cpeNameId": "F66FDF27-78C6-4AE8-BFFF-74FD08E25D2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.147:*:*:*:*:*:*:*", "cpeNameId": "6EF3FCC0-FBD5-4575-ACDC-14A6CBD4C33C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.148:*:*:*:*:*:*:*", "cpeNameId": "5E07F013-A8BD-4FAC-93E4-99A687FAC737"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.149:*:*:*:*:*:*:*", "cpeNameId": "A304D006-C083-43DB-814C-92AD93A16406"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.150:*:*:*:*:*:*:*", "cpeNameId": "FE1937F5-7F68-4712-A42B-352F98DBCB73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.151:*:*:*:*:*:*:*", "cpeNameId": "302DB07A-BCEB-473E-B83D-7144D60975C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.152:*:*:*:*:*:*:*", "cpeNameId": "AF045BDA-D8EE-480F-B055-2C8F1F6BB441"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.153:*:*:*:*:*:*:*", "cpeNameId": "7E53F5F7-2160-4D23-A389-6C177EB97920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.154:*:*:*:*:*:*:*", "cpeNameId": "A352CE2F-3599-42AA-A999-8D2A8AE77385"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.155:*:*:*:*:*:*:*", "cpeNameId": "68E34650-597F-4BB5-B655-AAF63A824DFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.156:*:*:*:*:*:*:*", "cpeNameId": "A9B206FB-6ED1-43D6-93B6-E5D295B69BFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.157:*:*:*:*:*:*:*", "cpeNameId": "83CB40AA-9524-4C0B-BB83-7DDCCE05A165"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.158:*:*:*:*:*:*:*", "cpeNameId": "98E50A5B-D1F8-4A2E-BFFA-DFD9318A4C0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.159:*:*:*:*:*:*:*", "cpeNameId": "A68C2E01-EAD7-4504-AC51-B6895536A2A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.160:*:*:*:*:*:*:*", "cpeNameId": "265719AB-6D6A-4AE3-A264-8998A6B51417"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.161:*:*:*:*:*:*:*", "cpeNameId": "29283AA7-C999-41CF-B9EA-AF62EBAE25AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.162:*:*:*:*:*:*:*", "cpeNameId": "026D8844-B72E-449A-AD9D-6DA20D6B2461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.163:*:*:*:*:*:*:*", "cpeNameId": "CF2684AA-9D52-4D0C-B9C0-EA458DBA0275"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.164:*:*:*:*:*:*:*", "cpeNameId": "CF99A96E-B230-41AD-8BC4-5870661F4FE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.165:*:*:*:*:*:*:*", "cpeNameId": "382060D4-41AC-4E8F-B469-5012B74CA970"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.166:*:*:*:*:*:*:*", "cpeNameId": "7C529480-7A93-4F29-B9B6-DC8415C2C224"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.167:*:*:*:*:*:*:*", "cpeNameId": "DF37EDB8-03D5-48A1-825C-6AF1031DAADF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.168:*:*:*:*:*:*:*", "cpeNameId": "6D13EE22-1FB2-4497-BD34-EE71D20FB8BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.169:*:*:*:*:*:*:*", "cpeNameId": "BC302B8B-8B9A-4824-97CE-7E6433BF32B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.170:*:*:*:*:*:*:*", "cpeNameId": "7CFD9E7B-FE01-4B66-A9A6-1368D013765A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.171:*:*:*:*:*:*:*", "cpeNameId": "DED1A683-EBE7-497B-929A-313AB2AC0925"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.172:*:*:*:*:*:*:*", "cpeNameId": "A0C2E3CD-4225-4F59-9399-141ECB64DCCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.173:*:*:*:*:*:*:*", "cpeNameId": "64951069-6F32-4B2C-876D-F2768FAB072F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.174:*:*:*:*:*:*:*", "cpeNameId": "EBB28714-885F-44E1-A0F8-51679623F675"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.175:*:*:*:*:*:*:*", "cpeNameId": "1BA05B10-74CC-41CC-AC4B-5F983EB9EF6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.176:*:*:*:*:*:*:*", "cpeNameId": "207CE836-9B16-4D97-A92E-937EA92B2454"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.177:*:*:*:*:*:*:*", "cpeNameId": "900CD12E-534F-4104-9453-98073C4B9FE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.178:*:*:*:*:*:*:*", "cpeNameId": "662D17D5-0313-498C-BE52-48C9C2164929"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.179:*:*:*:*:*:*:*", "cpeNameId": "FDA8B29F-BFF6-4550-832D-9E76E48FA652"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.180:*:*:*:*:*:*:*", "cpeNameId": "0E55779B-C14D-49B2-AAD3-9E02A0612FA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.181:*:*:*:*:*:*:*", "cpeNameId": "08726DAC-BA17-4EC2-BADB-177D34704C1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.182:*:*:*:*:*:*:*", "cpeNameId": "00DADA74-AD7D-4030-81F7-B8024E9EDD39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.183:*:*:*:*:*:*:*", "cpeNameId": "41DA6AEA-5407-416C-8E04-738A6BFD2AFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.184:*:*:*:*:*:*:*", "cpeNameId": "CB0669FC-A028-4A45-873B-C1E5B60A153F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.185:*:*:*:*:*:*:*", "cpeNameId": "EA578486-31F1-4809-81A3-09B130EFF1EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.186:*:*:*:*:*:*:*", "cpeNameId": "5A48466E-5175-48F2-AB12-20FF8FD39A91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.187:*:*:*:*:*:*:*", "cpeNameId": "A0AF33BB-CCA4-4EF3-AD37-A6BDA592201E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.188:*:*:*:*:*:*:*", "cpeNameId": "C55F2CFE-9058-4F93-9D1A-9959655533E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.189:*:*:*:*:*:*:*", "cpeNameId": "1923663A-BA21-4246-9A05-53EEB987A59F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.190:*:*:*:*:*:*:*", "cpeNameId": "3D3E3AC9-B829-41A9-A4BF-E0D25EE83CB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.191:*:*:*:*:*:*:*", "cpeNameId": "0209D8A9-58CB-464D-98E9-C55849C5EFBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.192:*:*:*:*:*:*:*", "cpeNameId": "E5ADF739-9681-4488-91EF-1DEB057300AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.193:*:*:*:*:*:*:*", "cpeNameId": "7611677A-A4AF-496B-89BD-AD6FEE729557"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.194:*:*:*:*:*:*:*", "cpeNameId": "C4697BBB-B20E-4481-9CB1-47705D6B0A64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.195:*:*:*:*:*:*:*", "cpeNameId": "58471B55-C8F3-462E-A365-CDE52A6BCBA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.196:*:*:*:*:*:*:*", "cpeNameId": "7DE3F30B-22F8-4308-A4DD-69346EFAEC9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.197:*:*:*:*:*:*:*", "cpeNameId": "0D16F9C5-E2D5-4A37-904F-9B882AD86309"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.198:*:*:*:*:*:*:*", "cpeNameId": "91BB87DE-E086-4D53-AB3A-69224410D542"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.199:*:*:*:*:*:*:*", "cpeNameId": "281A834B-F437-4D42-A128-2F404AD98C03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.200:*:*:*:*:*:*:*", "cpeNameId": "CFDE6A44-7410-45AA-B03F-518BB2E3D029"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.201:*:*:*:*:*:*:*", "cpeNameId": "2F3696BC-9946-43EC-A5BE-FBF103B914C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.202:*:*:*:*:*:*:*", "cpeNameId": "49E286A6-8D86-4F0C-AE46-70CE364D4D34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.203:*:*:*:*:*:*:*", "cpeNameId": "F05F8B59-C598-4A9D-8598-95E486F03912"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.204:*:*:*:*:*:*:*", "cpeNameId": "9574762D-2B80-4DA6-B5C0-13BA8574BDF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.205:*:*:*:*:*:*:*", "cpeNameId": "E1592B19-0EBB-40A5-8E26-09D333620E42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.206:*:*:*:*:*:*:*", "cpeNameId": "7A00E289-C1AF-4892-888E-FE2B71F9192B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.207:*:*:*:*:*:*:*", "cpeNameId": "66F586E3-6EA7-427E-B2A1-04C72BB3C0F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.208:*:*:*:*:*:*:*", "cpeNameId": "35D69FF2-A15F-4DEF-9042-8068FB161134"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.209:*:*:*:*:*:*:*", "cpeNameId": "494CAA62-F904-40B5-B57F-DD740D2CA896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.210:*:*:*:*:*:*:*", "cpeNameId": "196CBDC8-9C64-42C8-ADA4-7D4BEA554878"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.211:*:*:*:*:*:*:*", "cpeNameId": "013EBDF8-3C0F-4215-931D-C3C29B435E0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.212:*:*:*:*:*:*:*", "cpeNameId": "7D6E2DB9-8680-4AEF-AD1A-3D69754035F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.213:*:*:*:*:*:*:*", "cpeNameId": "D49FC2AF-E5DA-418C-BE69-F7C7B25ECD30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.214:*:*:*:*:*:*:*", "cpeNameId": "630B3919-9504-4EA4-82BF-3352DAE4FFAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.215:*:*:*:*:*:*:*", "cpeNameId": "BFF8FD48-648F-4E98-BDDA-AF7832422E08"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.216:*:*:*:*:*:*:*", "cpeNameId": "44AD0235-927F-4286-AE7C-34E60481DCD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.217:*:*:*:*:*:*:*", "cpeNameId": "D726E465-CB14-4F50-A3A5-05F5BEB544FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.218:*:*:*:*:*:*:*", "cpeNameId": "3BEA4D9C-4899-4E3F-AA4F-86AC93C26841"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.219:*:*:*:*:*:*:*", "cpeNameId": "155548FF-67CC-4BA7-BE08-2810EA12A181"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.220:*:*:*:*:*:*:*", "cpeNameId": "20FB805F-D821-49EF-969C-21CD8232CC97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.221:*:*:*:*:*:*:*", "cpeNameId": "48B45DEA-86BB-4242-8F6E-CFF9BB37B19C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.222:*:*:*:*:*:*:*", "cpeNameId": "6C5D7A67-FB42-44EA-A569-7274E9F06E40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.223:*:*:*:*:*:*:*", "cpeNameId": "B91D2396-F745-44E4-9794-8A7B191D0EBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.224:*:*:*:*:*:*:*", "cpeNameId": "BFBEE827-A91F-455B-8C59-14CAF80BAC0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.225:*:*:*:*:*:*:*", "cpeNameId": "C905A295-285D-4D2C-A0F3-454FD5ED6071"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.226:*:*:*:*:*:*:*", "cpeNameId": "A9B06703-D925-4E2A-9FA0-2A6863A17CF0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.227:*:*:*:*:*:*:*", "cpeNameId": "6FAB2103-943D-4DA6-B967-00AEA85D70F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.228:*:*:*:*:*:*:*", "cpeNameId": "64D4B432-E3DD-4D99-85EE-7287EA5003D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.229:*:*:*:*:*:*:*", "cpeNameId": "94C0C578-4D2D-4BA0-9614-C5EFE5FAC97E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.230:*:*:*:*:*:*:*", "cpeNameId": "3C588990-79E8-4296-82F6-EECDADEC4FBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.231:*:*:*:*:*:*:*", "cpeNameId": "6CCFCFAC-B519-4B1C-BA37-C254526BFC5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.232:*:*:*:*:*:*:*", "cpeNameId": "852B8329-D924-4265-86D5-F92FDD268B05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.233:*:*:*:*:*:*:*", "cpeNameId": "0C14D107-1D46-490A-9C9C-973325B77873"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.234:*:*:*:*:*:*:*", "cpeNameId": "355C0CE7-0FD8-47FE-A7A3-D0B4487DF610"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.235:*:*:*:*:*:*:*", "cpeNameId": "B0CEDF08-FDE9-4A9F-84D5-C73C341FB515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.236:*:*:*:*:*:*:*", "cpeNameId": "0DCBF98D-881B-43B9-90C7-FCB4B493F70C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.237:*:*:*:*:*:*:*", "cpeNameId": "F97BF049-4C8A-4CBF-8848-6D8DDD81D75B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.238:*:*:*:*:*:*:*", "cpeNameId": "988EC493-0C82-46C8-8A4D-AF1501B35670"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.239:*:*:*:*:*:*:*", "cpeNameId": "4158AFE2-D4E1-4334-B313-F9CA5C7B0CB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.240:*:*:*:*:*:*:*", "cpeNameId": "8B1E737A-F8D6-4FCF-A8B2-D8B9F4EC07F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.241:*:*:*:*:*:*:*", "cpeNameId": "81BB3A2B-0C6A-47B9-AB54-3763CE6314B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.242:*:*:*:*:*:*:*", "cpeNameId": "21206177-2704-4E74-BDA1-1510124628DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.243:*:*:*:*:*:*:*", "cpeNameId": "10CD8A76-15D2-4B01-896E-086AB6DBB68F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.244:*:*:*:*:*:*:*", "cpeNameId": "1F928940-DFB6-4916-8382-A1C774194832"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.245:*:*:*:*:*:*:*", "cpeNameId": "0CC09134-0AD5-4091-BE00-0FDCE6C1B5AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.246:*:*:*:*:*:*:*", "cpeNameId": "7F445E26-C26F-4398-BA55-3903FC3AB3ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.247:*:*:*:*:*:*:*", "cpeNameId": "68E8E3E3-D2CB-4354-A0E4-AEE63E9AF94E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.248:*:*:*:*:*:*:*", "cpeNameId": "3949F9FD-1182-47FB-A635-AD39280555BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.249:*:*:*:*:*:*:*", "cpeNameId": "4C7951C3-5951-4525-99F1-483B3B397CE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.250:*:*:*:*:*:*:*", "cpeNameId": "7C354C5F-E5EF-4D0B-8854-3D5C163E59D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.251:*:*:*:*:*:*:*", "cpeNameId": "440E5A5E-E0D6-424A-A978-F34DEADDFA17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.252:*:*:*:*:*:*:*", "cpeNameId": "551FE389-86EA-492D-A22F-C6D2C6BCDB2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.253:*:*:*:*:*:*:*", "cpeNameId": "BB12F4A9-AE2A-4CDB-958F-5AF3C262067E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.254:*:*:*:*:*:*:*", "cpeNameId": "007D7060-D12B-46BD-B005-897B3E5290CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.255:*:*:*:*:*:*:*", "cpeNameId": "2FB1583A-1D2E-4B82-AFA4-81D623D681D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.256:*:*:*:*:*:*:*", "cpeNameId": "450021EA-3409-4C4F-9B49-97579C89E534"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.257:*:*:*:*:*:*:*", "cpeNameId": "28876801-3DD9-4992-B0CF-3160C9822D9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.258:*:*:*:*:*:*:*", "cpeNameId": "133ED5C3-38BC-47CA-97C9-ACC9D33D93C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.259:*:*:*:*:*:*:*", "cpeNameId": "2FC947E5-32F4-413E-864D-1F7BEE684504"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.260:*:*:*:*:*:*:*", "cpeNameId": "3727E506-D975-46B1-BA82-9E9DBF60864D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.261:*:*:*:*:*:*:*", "cpeNameId": "B7D5C3F2-7F88-4FF7-9D56-EBB35C7FA687"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.262:*:*:*:*:*:*:*", "cpeNameId": "FA3F037B-3AA8-4DC7-ABF8-37D4E7F72987"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.263:*:*:*:*:*:*:*", "cpeNameId": "B629674A-274B-4A00-B972-8E6AC7A125C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.264:*:*:*:*:*:*:*", "cpeNameId": "CCE21890-0782-4EA7-8C50-C16BA210EBEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.265:*:*:*:*:*:*:*", "cpeNameId": "61DC4A5D-8023-4703-9B5F-CF38623D5F4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.266:*:*:*:*:*:*:*", "cpeNameId": "E7953AF3-4293-4FDC-9E2A-791F15CDBC96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.267:*:*:*:*:*:*:*", "cpeNameId": "A0A7C20B-1669-492F-8E45-B94457D9BA5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.268:*:*:*:*:*:*:*", "cpeNameId": "74A43E1F-F22F-421F-BB43-6D313E186447"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.269:*:*:*:*:*:*:*", "cpeNameId": "F87C845A-E4F5-48C5-8BE7-A32DC9765770"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.270:*:*:*:*:*:*:*", "cpeNameId": "C9E3E563-0877-41A4-B911-9C1D96FC083D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.271:*:*:*:*:*:*:*", "cpeNameId": "AF7989DF-3745-43BE-BE62-C89975857EC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.272:*:*:*:*:*:*:*", "cpeNameId": "9BEE5DF7-1F70-4B14-91E8-A6C4C75A6A15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.273:*:*:*:*:*:*:*", "cpeNameId": "D33F4F6B-4412-41B0-A647-71C2F3DEA100"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.274:*:*:*:*:*:*:*", "cpeNameId": "E414EB92-7254-44A9-A831-3739EC2C0339"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.275:*:*:*:*:*:*:*", "cpeNameId": "2E6BFFD9-5144-428A-B3B4-9D39DC57928F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.276:*:*:*:*:*:*:*", "cpeNameId": "8BB682EF-48EA-4014-8C3A-372DBBEDBDDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.277:*:*:*:*:*:*:*", "cpeNameId": "57B18195-1374-4A01-A7BC-62CAB96836BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.278:*:*:*:*:*:*:*", "cpeNameId": "B3439ABE-6A03-4C6E-8C65-5F340D3408CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.279:*:*:*:*:*:*:*", "cpeNameId": "3E65E40A-EBF1-4E15-BB6E-3F33C0607213"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.280:*:*:*:*:*:*:*", "cpeNameId": "158B02C6-BE88-4AAA-8D98-A2928FF494E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.281:*:*:*:*:*:*:*", "cpeNameId": "46960B28-AA2F-49A0-BD2A-B70031BAFE17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.282:*:*:*:*:*:*:*", "cpeNameId": "6C488375-5CBF-4B6A-B5DE-4EE9D0D78D6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.283:*:*:*:*:*:*:*", "cpeNameId": "89C004F6-5808-4140-8CA9-94B1BDFFFC08"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.284:*:*:*:*:*:*:*", "cpeNameId": "87E0D14B-2305-46E4-A1FF-56DF608C1795"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.285:*:*:*:*:*:*:*", "cpeNameId": "44F8F5F9-4842-4765-A551-2D2078DFC684"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.286:*:*:*:*:*:*:*", "cpeNameId": "1E4F8F79-CF58-424B-8884-424A00B283C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.287:*:*:*:*:*:*:*", "cpeNameId": "AFEC2AD9-E3ED-4ECE-BA80-1FD76248D514"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.288:*:*:*:*:*:*:*", "cpeNameId": "EEDEF216-9D62-4DF6-BD89-3EED6906292F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.289:*:*:*:*:*:*:*", "cpeNameId": "A02EA509-DF45-4CE8-90B1-C8BD7B8BAFD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.290:*:*:*:*:*:*:*", "cpeNameId": "A2C66CF4-D5D7-4897-8E3F-5E47FED898A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.291:*:*:*:*:*:*:*", "cpeNameId": "9C4FE524-6E1E-4FB5-BC3C-9731F9F78E6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.292:*:*:*:*:*:*:*", "cpeNameId": "35C28419-F80A-4875-88CE-4D4B6F00C8DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.293:*:*:*:*:*:*:*", "cpeNameId": "58BE8244-391B-4CF2-A805-E299B82C61D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.294:*:*:*:*:*:*:*", "cpeNameId": "3B2A2979-293A-4DE2-8EEC-030AB3096C30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.295:*:*:*:*:*:*:*", "cpeNameId": "15FA5BB0-94CE-4689-B8A6-EB344F983EC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.296:*:*:*:*:*:*:*", "cpeNameId": "5DA05C25-355D-4C96-8D88-1E207C726AAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.297:*:*:*:*:*:*:*", "cpeNameId": "36F176DB-DCF3-4FC2-88DD-A94222633A21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.298:*:*:*:*:*:*:*", "cpeNameId": "459887C6-2292-4B2A-87AD-DD7714A00949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.299:*:*:*:*:*:*:*", "cpeNameId": "181DBB6F-D9C2-4189-9F54-7B9CDDB80BD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.300:*:*:*:*:*:*:*", "cpeNameId": "8BB51592-1D30-4CD6-863D-818A48FF2AE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.301:*:*:*:*:*:*:*", "cpeNameId": "48216E63-EB92-4B3B-9CBD-E2A1D46EC013"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.302:*:*:*:*:*:*:*", "cpeNameId": "C5FA6C11-FE27-44EC-A4A6-25120C4848CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:*:*:*:*:*:*:*", "cpeNameId": "6752716B-480D-47F4-B011-9496A572E34A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:-:*:*:*:*:*:*", "cpeNameId": "64E8469C-7D92-46CE-953D-C228C6751E3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc1:*:*:*:*:*:*", "cpeNameId": "2CCF74F9-BC2F-461A-98E6-DC98E271FCEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc2:*:*:*:*:*:*", "cpeNameId": "55517ACC-4334-44E0-AD3D-0E1FF4E013DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc3:*:*:*:*:*:*", "cpeNameId": "BC105030-814B-4359-85B8-AB322E105737"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc4:*:*:*:*:*:*", "cpeNameId": "DD78112E-F11E-46C2-AE52-9B48C7F0B03D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc5:*:*:*:*:*:*", "cpeNameId": "599B6EE9-2C07-43A2-BC41-C96DE7502A8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc6:*:*:*:*:*:*", "cpeNameId": "884AB775-5BA8-47A6-8556-CA9FBD4B3366"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc7:*:*:*:*:*:*", "cpeNameId": "0C4F78B2-4531-4480-A171-1BAF9C8ED2FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:*:*:*:*:*:*:*", "cpeNameId": "89D51C4A-2038-4CC3-BC96-B4B99709BB84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:rc1:*:*:*:*:*:*", "cpeNameId": "9479CFA4-0CFC-4DB3-9EFF-EAEA98B51CA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:rc2:*:*:*:*:*:*", "cpeNameId": "482E248D-31FE-428A-A427-D0E6692D0D6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:rc3:*:*:*:*:*:*", "cpeNameId": "BA2A8624-AAF8-4BFF-9B51-9E2B21104D1F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:rc7:*:*:*:*:*:*", "cpeNameId": "A24295A6-C621-4249-B273-4EE57AD074BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.1:*:*:*:*:*:*:*", "cpeNameId": "4F48C1CE-B56D-4E32-8D36-CFA5CE37F833"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.2:*:*:*:*:*:*:*", "cpeNameId": "3090C977-4C87-4DE7-B635-65DE0C95F1AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.3:*:*:*:*:*:*:*", "cpeNameId": "E78188B1-4DD4-40F0-82A8-66F5CAB33C6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.4:*:*:*:*:*:*:*", "cpeNameId": "0D1A4F8C-D753-40D8-9EF6-E7D9E95E0CC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.5:*:*:*:*:*:*:*", "cpeNameId": "450C515D-9EB0-4F37-B3C1-EE55E128466E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.6:*:*:*:*:*:*:*", "cpeNameId": "D171B92A-B9F2-4CF4-A51D-25DE12B1DAB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.7:*:*:*:*:*:*:*", "cpeNameId": "DDB68C52-02FF-4514-A37A-FAE660ECFAEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6:*:*:*:*:*:*:*", "cpeNameId": "513E9C7E-9CD0-453D-8044-1DCF043ABFC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.1:*:*:*:*:*:*:*", "cpeNameId": "4282AD9E-F4CF-406C-82C6-E9C9C374341F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.2:*:*:*:*:*:*:*", "cpeNameId": "79BFAA05-E0AE-4B27-ADD2-043A5F1765DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.3:*:*:*:*:*:*:*", "cpeNameId": "3E22E014-6635-4FF5-AA51-0DFED4F7E4CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.4:*:*:*:*:*:*:*", "cpeNameId": "8D6F4072-8DBE-4637-AEBD-4E9123A6C9FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.5:*:*:*:*:*:*:*", "cpeNameId": "FCCB037F-6B5B-4B3D-AB98-DBD4A72D60B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.6:*:*:*:*:*:*:*", "cpeNameId": "8D7C846C-1336-4777-8B52-9F75E281AFA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.7:*:*:*:*:*:*:*", "cpeNameId": "55DA9CF3-9708-4520-AAA8-49B56B5BE4EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:*:*:*:*:*:*:*", "cpeNameId": "496F7DCA-CD17-40FF-A146-993EACB85937"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:-:*:*:*:*:*:*", "cpeNameId": "7071E45E-8875-403E-900D-B18B78B2CFEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc1:*:*:*:*:*:*", "cpeNameId": "8C21D0B7-9E71-4213-9146-7A85711840A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc2:*:*:*:*:*:*", "cpeNameId": "1FD38972-2F84-4D2B-9C4D-B2A9B6F87BD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc3:*:*:*:*:*:*", "cpeNameId": "CED8F0FE-B0EC-4F8C-B1B3-9690A5B2C427"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc4:*:*:*:*:*:*", "cpeNameId": "805AF26E-C23B-45A2-8D72-F90A1FA0EC45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc5:*:*:*:*:*:*", "cpeNameId": "FD8D5C3C-1EB6-454A-9CE8-51593EFE60B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc6:*:*:*:*:*:*", "cpeNameId": "BF98A71F-D556-470F-9ECA-BA0D03919E44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc7:*:*:*:*:*:*", "cpeNameId": "3EA4A517-42BA-47DE-9435-3B2EE041B824"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.1:*:*:*:*:*:*:*", "cpeNameId": "CB86EA69-EE70-45B2-B01F-5C3056895ADA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.2:*:*:*:*:*:*:*", "cpeNameId": "85FB5454-E1F2-46B8-9CC7-ED28B950CC79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.3:*:*:*:*:*:*:*", "cpeNameId": "700591B1-5F5E-406D-AFD2-C171814E1762"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.4:*:*:*:*:*:*:*", "cpeNameId": "5BCFD5D4-7494-49AA-B48C-E7C0B8D1881E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.5:*:*:*:*:*:*:*", "cpeNameId": "446BC346-E811-407B-A029-1E5B1D6AF131"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.6:*:*:*:*:*:*:*", "cpeNameId": "27FBC7AE-CBC8-417E-87F2-1FCBA47FFED2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.7:*:*:*:*:*:*:*", "cpeNameId": "A9D96B8D-35D8-4E1E-A12B-EBDC81FF5F3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.8:*:*:*:*:*:*:*", "cpeNameId": "9CB7C2A8-EF23-4612-94CE-F37623A35CE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.9:*:*:*:*:*:*:*", "cpeNameId": "C38910BF-3CEA-4EAD-B391-942E990DB44D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.10:*:*:*:*:*:*:*", "cpeNameId": "CD211D99-AE1B-4259-9D88-978BF4BBE266"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:*:*:*:*:*:*:*", "cpeNameId": "7FCAC593-0734-4D3F-AD38-55AA21A05DD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:-:*:*:*:*:*:*", "cpeNameId": "A4B6A9C4-8211-4E88-A2C7-C36BBBE48E24"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc1:*:*:*:*:*:*", "cpeNameId": "AEC7ED2E-5B13-4144-9ED7-A60EDE512955"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc2:*:*:*:*:*:*", "cpeNameId": "7463D464-9817-44F7-BCCA-16947B5F7348"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc3:*:*:*:*:*:*", "cpeNameId": "75C6B48C-182A-42B6-8BA1-53057660DA89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc4:*:*:*:*:*:*", "cpeNameId": "958A88C5-9246-464A-9E6E-4340B03A6C1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc5:*:*:*:*:*:*", "cpeNameId": "3412A731-F526-44FA-9E1C-42A77C9B1E29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc6:*:*:*:*:*:*", "cpeNameId": "293C40EC-887D-42A6-92E8-CDF12F0E0BAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.1:*:*:*:*:*:*:*", "cpeNameId": "C08959E8-EC01-42E8-AA0C-9BD6621B5FE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.2:*:*:*:*:*:*:*", "cpeNameId": "FCCE5C13-84F1-456D-8172-79A4B66D4563"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.3:*:*:*:*:*:*:*", "cpeNameId": "8DD556A5-950A-4386-B290-3BA23F8FAE74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.4:*:*:*:*:*:*:*", "cpeNameId": "11C5676D-8CC7-4CD7-B0DA-E6266DD066AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.5:*:*:*:*:*:*:*", "cpeNameId": "F2B231B1-804A-4ADF-A8A6-9A2DB05DDF48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.6:*:*:*:*:*:*:*", "cpeNameId": "2DCDBE9F-80D3-4A9A-8ABD-89872C2BF47F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.7:*:*:*:*:*:*:*", "cpeNameId": "C673A048-7856-4547-8E56-BC3557D9FD38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.8:*:*:*:*:*:*:*", "cpeNameId": "398EDB8C-C735-4B41-994E-C207F198D072"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.9:*:*:*:*:*:*:*", "cpeNameId": "8256347C-D1FF-4A19-BD31-F78F0085A475"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.10:*:*:*:*:*:*:*", "cpeNameId": "A63AAEE8-FEEB-4399-8FD5-F0A90A5C4363"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.11:*:*:*:*:*:*:*", "cpeNameId": "0F6E054C-2FB7-4F32-A653-87E436E30BFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.12:*:*:*:*:*:*:*", "cpeNameId": "7CE8E210-4DFE-4E5D-A6D9-BD991AC6F8BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.13:*:*:*:*:*:*:*", "cpeNameId": "744AC014-50ED-4FB4-B8AD-D5C7CF3C7CC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.14:*:*:*:*:*:*:*", "cpeNameId": "498DABA6-7087-4364-8C81-5346BE483975"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.15:*:*:*:*:*:*:*", "cpeNameId": "37255C42-4B93-475E-9935-1F0446011768"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.16:*:*:*:*:*:*:*", "cpeNameId": "A8695620-4D6E-44B4-9FE8-95C9960C240E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.17:*:*:*:*:*:*:*", "cpeNameId": "96D4758C-FE52-4DA8-87E1-577A3FCEF236"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*", "cpeNameId": "72D7C54B-6ED2-4DCE-A67F-C71FB93A5823"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:-:*:*:*:*:*:*", "cpeNameId": "12D10173-3DCE-40E4-9B99-B6C7A7454106"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc1:*:*:*:*:*:*", "cpeNameId": "DBD96821-B70D-475C-A38B-8416AC3576D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc2:*:*:*:*:*:*", "cpeNameId": "221A17CE-03D4-4662-924E-23E6426BB693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc3:*:*:*:*:*:*", "cpeNameId": "5B3F2BE9-697B-4E5D-93D6-2127CE19550C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc4:*:*:*:*:*:*", "cpeNameId": "AD35E83C-A016-47F3-8D62-9C4A0306FAD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc5:*:*:*:*:*:*", "cpeNameId": "E166DE00-D241-44A0-B75B-F067310B6FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc6:*:*:*:*:*:*", "cpeNameId": "65CAACB6-7E01-48F5-98DF-E1923A3F01C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc7:*:*:*:*:*:*", "cpeNameId": "F12E246D-AC32-42AB-A20F-5B54C2FFC059"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc8:*:*:*:*:*:*", "cpeNameId": "9896B1C6-0127-4248-A9D1-ABB07588F87A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.0:*:*:*:*:*:*:*", "cpeNameId": "C477CC26-17BE-46DA-8B9D-218D8AA51AD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*", "cpeNameId": "8AF8815B-4FEF-483D-9CF9-C8BDDD29308D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*", "cpeNameId": "A36A1BD4-0C74-4284-99A4-A53FEE3C8D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*", "cpeNameId": "AF59D9D7-96F7-41F7-8125-50592CE96BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.4:*:*:*:*:*:*:*", "cpeNameId": "CDB03998-BA6F-4F00-83F7-B54515BA4725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.5:*:*:*:*:*:*:*", "cpeNameId": "0F83014C-CE37-47EA-9906-94AA2FED7DD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.6:*:*:*:*:*:*:*", "cpeNameId": "2DACA082-8E91-493D-890B-FF9A78EEBC9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.7:*:*:*:*:*:*:*", "cpeNameId": "8823DC1A-2E25-4E13-9F8F-E347154A7F72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.8:*:*:*:*:*:*:*", "cpeNameId": "60679951-3906-4497-8CBC-8891BEE953B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.9:*:*:*:*:*:*:*", "cpeNameId": "76030A2F-567A-493B-BD6C-09DB84455253"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.10:*:*:*:*:*:*:*", "cpeNameId": "527F6E5F-FDE0-4BEF-AB6F-9EAC1F6F6978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.11:*:*:*:*:*:*:*", "cpeNameId": "CE3D179E-83C1-4BAE-8CB1-DE413B7901D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.12:*:*:*:*:*:*:*", "cpeNameId": "BD502B1D-8E7D-4AD4-9011-E616315740C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.13:*:*:*:*:*:*:*", "cpeNameId": "4A96891C-E4D8-4BBD-8C3A-8BEC1EDD6DF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.14:*:*:*:*:*:*:*", "cpeNameId": "049B9559-3317-43D0-BB9E-2008182328D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.15:*:*:*:*:*:*:*", "cpeNameId": "3BAD5668-2640-4602-9837-07D764990011"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.16:*:*:*:*:*:*:*", "cpeNameId": "B76E758C-F23C-4E81-8D89-6B3C331DF70A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.17:*:*:*:*:*:*:*", "cpeNameId": "558B0C0A-04D6-41D1-AED9-4D16159FAA64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.18:*:*:*:*:*:*:*", "cpeNameId": "BC3F9201-BBD4-48C1-9254-14DDCC7A6B7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.19:*:*:*:*:*:*:*", "cpeNameId": "E8A01AF1-8E23-40E5-A956-AF00A7A47BA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.20:*:*:*:*:*:*:*", "cpeNameId": "2CAF46F1-2D12-41FC-ABF2-C6F56A9CE410"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.21:*:*:*:*:*:*:*", "cpeNameId": "7A2DC702-A782-4D15-9435-ACC0778F3FB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.22:*:*:*:*:*:*:*", "cpeNameId": "D2916473-F575-4728-B2EC-60EE62AB8BF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.23:*:*:*:*:*:*:*", "cpeNameId": "B6409273-5794-4B9E-BDD5-7FCFCF339511"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.24:*:*:*:*:*:*:*", "cpeNameId": "2893EFED-04F5-42B0-96B4-FB29EEFAA9EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.25:*:*:*:*:*:*:*", "cpeNameId": "F1EC5B2F-8765-464D-A5A2-DEF282D3576A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.26:*:*:*:*:*:*:*", "cpeNameId": "CE231956-F740-4AA4-9750-A9F1E16C7429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.27:*:*:*:*:*:*:*", "cpeNameId": "B08B4A4D-A673-49B9-9809-6C8EB2D8CCFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.28:*:*:*:*:*:*:*", "cpeNameId": "25127A10-99C3-4B29-9037-752644FEDAA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.29:*:*:*:*:*:*:*", "cpeNameId": "7C9B9FDE-13EC-442C-A753-05D753AF7F2F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.30:*:*:*:*:*:*:*", "cpeNameId": "60DFABB9-1C9B-4A43-8A5D-4B51C46D6CF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.31:*:*:*:*:*:*:*", "cpeNameId": "55547C90-57BE-4B48-80BC-5248CF85A54D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.32:*:*:*:*:*:*:*", "cpeNameId": "4FEC2A07-6C9E-4B57-9F1D-A8C7A2531042"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.33:*:*:*:*:*:*:*", "cpeNameId": "3A3CC360-6DB0-4058-A637-BEA9F10F3ECC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.34:*:*:*:*:*:*:*", "cpeNameId": "74A4841B-22B2-45B0-A608-52579D2983E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.35:*:*:*:*:*:*:*", "cpeNameId": "F5D48DE7-BCE0-4195-B8E2-E3A8C9884647"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.36:*:*:*:*:*:*:*", "cpeNameId": "15A99A35-647E-4AFF-B6E2-0652FE1F9FFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.37:*:*:*:*:*:*:*", "cpeNameId": "51FDBF94-6126-4C97-9650-6902E77C1811"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.38:*:*:*:*:*:*:*", "cpeNameId": "9A7EA0F2-DFB9-4CF2-82D8-F5C569BA5CD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.39:*:*:*:*:*:*:*", "cpeNameId": "6C245624-3821-4A71-8682-AB66074B82B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.40:*:*:*:*:*:*:*", "cpeNameId": "DD0E98E7-27A5-4BDD-8907-53DA5C31F7A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.41:*:*:*:*:*:*:*", "cpeNameId": "C879D912-54D4-4C73-91B2-500D49230B7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.42:*:*:*:*:*:*:*", "cpeNameId": "85E02B17-E410-42FE-A83B-B8B4E7EBB532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.43:*:*:*:*:*:*:*", "cpeNameId": "56E7B421-D6F4-45BB-A4A7-37AA444554F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.44:*:*:*:*:*:*:*", "cpeNameId": "146F13C7-D0C9-4829-99CB-36C12B673BF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.45:*:*:*:*:*:*:*", "cpeNameId": "1BC5E0A8-84C0-44E1-9DFD-5C633FD66E42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.46:*:*:*:*:*:*:*", "cpeNameId": "965C07B8-7491-41D5-BFFF-C2DC61675475"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.47:*:*:*:*:*:*:*", "cpeNameId": "6F99B518-6BC7-4B89-8C2F-2A61C8F1A66C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.48:*:*:*:*:*:*:*", "cpeNameId": "1654578E-2D00-498E-9EF1-D64BBBBA7070"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.49:*:*:*:*:*:*:*", "cpeNameId": "BC5CCADF-5DEA-4540-8D2F-478F3175DA62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.50:*:*:*:*:*:*:*", "cpeNameId": "67B5EA2D-9D68-4247-8C79-6F92FD8D39F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.51:*:*:*:*:*:*:*", "cpeNameId": "62B20DEB-030A-4CED-93BC-3F6F4D5AD54B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.52:*:*:*:*:*:*:*", "cpeNameId": "66BDA9E0-B507-4116-9FFC-6DBFE79A3CD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.53:*:*:*:*:*:*:*", "cpeNameId": "76AB10DC-B6FD-4E05-A1E6-09C04A8A1B13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.54:*:*:*:*:*:*:*", "cpeNameId": "6461BBE3-2AAA-4975-A75F-F561D3C1B753"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.55:*:*:*:*:*:*:*", "cpeNameId": "957D4BA7-C0CC-482D-8844-03AEBFE9F966"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.56:*:*:*:*:*:*:*", "cpeNameId": "4B6981FD-9D76-418C-BC72-EC1900EA9C04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.57:*:*:*:*:*:*:*", "cpeNameId": "22E939B7-D460-4BE9-9529-0E26B53304B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.58:*:*:*:*:*:*:*", "cpeNameId": "CC981857-5731-4095-92A2-D10F6F27F85E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.59:*:*:*:*:*:*:*", "cpeNameId": "EB3A0428-3B0E-4608-9D96-AC0687921B92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.60:*:*:*:*:*:*:*", "cpeNameId": "F1134646-1E83-459B-9E11-B1893162D4B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.61:*:*:*:*:*:*:*", "cpeNameId": "01F91BC8-9830-49E4-AFCA-5910983AFA96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.62:*:*:*:*:*:*:*", "cpeNameId": "C5611992-8FA6-489D-B4C7-9871472702C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.63:*:*:*:*:*:*:*", "cpeNameId": "B7E52E14-5B55-4458-9BB8-5A1718BAD459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.64:*:*:*:*:*:*:*", "cpeNameId": "8407449D-67A3-4594-9340-03C4A009828C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.65:*:*:*:*:*:*:*", "cpeNameId": "0B393B17-93FA-4A1F-AF33-86AFA723BC6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.66:*:*:*:*:*:*:*", "cpeNameId": "3F002BC4-16F2-44FB-842E-7F1CDBA7D2D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.67:*:*:*:*:*:*:*", "cpeNameId": "AD88F263-F5B8-4027-A433-B33EB293F8C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.68:*:*:*:*:*:*:*", "cpeNameId": "998A1D28-491B-49AF-BEBA-0B7C55016EDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.69:*:*:*:*:*:*:*", "cpeNameId": "C00A621D-4F1D-4AD8-BE42-3E584F545757"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.70:*:*:*:*:*:*:*", "cpeNameId": "4A8C8214-FDDA-4A1B-9520-756DE05E1C8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.71:*:*:*:*:*:*:*", "cpeNameId": "69E6FBB1-D0B6-486C-B905-54D292ED0BBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.72:*:*:*:*:*:*:*", "cpeNameId": "04D7688B-E9C8-4CA0-9564-06136BD00399"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.73:*:*:*:*:*:*:*", "cpeNameId": "A11B2E7E-F239-49F6-9B0A-EB897B935734"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.74:*:*:*:*:*:*:*", "cpeNameId": "09B990BA-BB96-40E6-936B-A42138DA410E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.75:*:*:*:*:*:*:*", "cpeNameId": "EE93F1AB-E1B2-4D42-8482-FC0D5232EDCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.76:*:*:*:*:*:*:*", "cpeNameId": "E094CC04-C34E-45D2-B7BD-8344494F2AF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.77:*:*:*:*:*:*:*", "cpeNameId": "A7AD03A1-2D39-498C-B6FC-6288DFE6A0B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.78:*:*:*:*:*:*:*", "cpeNameId": "C7332F79-76CA-466E-974C-6D94B2028E83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.79:*:*:*:*:*:*:*", "cpeNameId": "4C7E0132-E639-4C9E-ACD4-E68A1D16EE27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.80:*:*:*:*:*:*:*", "cpeNameId": "0BA2A075-D652-4220-80D3-765F2E0F1248"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.81:*:*:*:*:*:*:*", "cpeNameId": "6D6C7CFE-7944-44FE-B8D0-13A87E781C59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.82:*:*:*:*:*:*:*", "cpeNameId": "BD198E06-E1B2-48AD-8236-1026D62FF668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.83:*:*:*:*:*:*:*", "cpeNameId": "9E1B704D-FA55-4EE9-93AE-345D9CEC178C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.84:*:*:*:*:*:*:*", "cpeNameId": "2AD133E5-08E3-4456-9D3E-E2E42247222A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.85:*:*:*:*:*:*:*", "cpeNameId": "A038FF7C-6591-418B-89B7-AA36E91E4693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.86:*:*:*:*:*:*:*", "cpeNameId": "17A55453-113E-4F83-9477-C3B94C21751D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.87:*:*:*:*:*:*:*", "cpeNameId": "64DA4194-F0DF-4AC6-A84F-00718C1D262B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.88:*:*:*:*:*:*:*", "cpeNameId": "19541D86-197B-4F32-9541-1ED6128DD8D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.89:*:*:*:*:*:*:*", "cpeNameId": "08118401-AEBB-4CE7-B76D-3017139D0153"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.90:*:*:*:*:*:*:*", "cpeNameId": "DEC38CAA-D49A-4D73-9E8B-92DD13268405"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.91:*:*:*:*:*:*:*", "cpeNameId": "B8923DAF-E99E-4721-B537-489F9195A78E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.92:*:*:*:*:*:*:*", "cpeNameId": "6979C8A1-9270-4687-9A67-0EDF32FB5003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.93:*:*:*:*:*:*:*", "cpeNameId": "B30A094A-C263-431D-89B2-B54478A622BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.94:*:*:*:*:*:*:*", "cpeNameId": "DC1C8AC1-972B-4950-AFAE-B2D68A94E1B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.95:*:*:*:*:*:*:*", "cpeNameId": "62FF165D-2752-4AB8-B3B9-CD8FBFABD3DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.96:*:*:*:*:*:*:*", "cpeNameId": "A0B93A29-FEE2-4EA3-87E8-DF6419F51030"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.97:*:*:*:*:*:*:*", "cpeNameId": "3C34F07E-8DBA-4D82-B8FE-1AFEEF9B2BF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.98:*:*:*:*:*:*:*", "cpeNameId": "AAB29E6F-C210-4EA2-B2F8-5E1B2041B0B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.99:*:*:*:*:*:*:*", "cpeNameId": "75652929-F44D-4DF1-8757-F7A8C10D9793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.100:*:*:*:*:*:*:*", "cpeNameId": "C1AB8FB2-09C2-4A4F-B4EE-E581035E270E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.101:*:*:*:*:*:*:*", "cpeNameId": "0FCB52E4-4EA8-4555-B9A1-EEB1056DC5B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.102:*:*:*:*:*:*:*", "cpeNameId": "57C00F3F-2CEE-4A7F-947F-7A53CA00E52A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.103:*:*:*:*:*:*:*", "cpeNameId": "16CB7735-79B7-4335-8184-6D29A5C85840"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.104:*:*:*:*:*:*:*", "cpeNameId": "8ED9B3BD-8DDA-4465-BF33-9291986917AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.105:*:*:*:*:*:*:*", "cpeNameId": "3400C155-68D5-4DD8-807C-1EF4A4E1BB32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.106:*:*:*:*:*:*:*", "cpeNameId": "A8B564E7-8A6F-466F-BC53-1B839D9FD3DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.107:*:*:*:*:*:*:*", "cpeNameId": "F648ABD4-CD53-42CE-9C51-DFBD245FACB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.108:*:*:*:*:*:*:*", "cpeNameId": "23D39FA8-42FB-43B7-92C7-D831548A0935"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.109:*:*:*:*:*:*:*", "cpeNameId": "5B96FEF9-EE49-4B1F-A218-B141E954CFD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.110:*:*:*:*:*:*:*", "cpeNameId": "5A3CA9E6-CACE-4937-96F4-B8D45D43AAD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.111:*:*:*:*:*:*:*", "cpeNameId": "B7084F8D-AD91-4EF1-9901-21AB7E8239CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.112:*:*:*:*:*:*:*", "cpeNameId": "3E544363-B63B-44C1-9F2E-597BE9EF2E65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.113:*:*:*:*:*:*:*", "cpeNameId": "B1C84F8A-2DA9-41BE-872B-B00A297AEA2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.114:*:*:*:*:*:*:*", "cpeNameId": "6F69AA79-57C2-4B8E-9F8D-5AAFACAD0248"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.115:*:*:*:*:*:*:*", "cpeNameId": "FD6D4727-C95F-4515-8D4A-9D6FDC28C793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.116:*:*:*:*:*:*:*", "cpeNameId": "01BC52F7-3028-480F-8E37-52A7715AC90A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.117:*:*:*:*:*:*:*", "cpeNameId": "60A7B794-E16E-477D-A4C1-ECA62111DC18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.118:*:*:*:*:*:*:*", "cpeNameId": "F663FEC6-B040-4A0E-A396-83008CF0ABAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.119:*:*:*:*:*:*:*", "cpeNameId": "BEFDB30B-BCC5-47F0-B733-2E581725D18A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.120:*:*:*:*:*:*:*", "cpeNameId": "4C86DF14-070B-4C3D-A141-31F7FCA61C34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.121:*:*:*:*:*:*:*", "cpeNameId": "E3406F7B-D836-49DD-8EFE-AE315BBB19FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.122:*:*:*:*:*:*:*", "cpeNameId": "DB62435E-44D2-471D-BA63-8E6FAE8D278F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.123:*:*:*:*:*:*:*", "cpeNameId": "C28E5075-1E51-43C2-BC69-1E248F152A9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.124:*:*:*:*:*:*:*", "cpeNameId": "76B2228F-19B1-4B9B-9F0F-9DC7CE0DDEFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.125:*:*:*:*:*:*:*", "cpeNameId": "0B3C0A1E-4727-4E70-8AB9-240A38FA2C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.126:*:*:*:*:*:*:*", "cpeNameId": "78A85D5F-28F1-456B-A1F2-F73FCDCD8442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.127:*:*:*:*:*:*:*", "cpeNameId": "07FFD4BD-5B60-41C7-818B-C3AB067ABCF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.128:*:*:*:*:*:*:*", "cpeNameId": "B2882FB9-CA5D-4C93-BB74-931D3EC95036"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.129:*:*:*:*:*:*:*", "cpeNameId": "1CBF16B6-7148-41A0-8BDF-BAD70ECB2360"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.130:*:*:*:*:*:*:*", "cpeNameId": "F106F4F0-7318-4685-A521-D45D280E0BF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.131:*:*:*:*:*:*:*", "cpeNameId": "81304DDD-B706-4473-9635-1659080883DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.132:*:*:*:*:*:*:*", "cpeNameId": "EB41A9BB-D88D-49F1-83CD-523699801BF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.133:*:*:*:*:*:*:*", "cpeNameId": "F8E3204C-6023-4133-9A7F-43F9D2AB144D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.134:*:*:*:*:*:*:*", "cpeNameId": "2A36AD35-A964-4C7A-B1D8-0F78188EE2DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.135:*:*:*:*:*:*:*", "cpeNameId": "8FAABE9A-8B07-4930-85A9-6616D502F568"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.136:*:*:*:*:*:*:*", "cpeNameId": "9D0664AA-A1FB-4ED3-913B-8390C5192A5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.137:*:*:*:*:*:*:*", "cpeNameId": "668A5320-81CD-4C09-AE34-9EAAB732DBBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.138:*:*:*:*:*:*:*", "cpeNameId": "3FB2B6F3-F840-47ED-A6BD-2BCA441B6108"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.139:*:*:*:*:*:*:*", "cpeNameId": "9F422368-B0CB-4DD5-BC42-60E4BECD4404"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.140:*:*:*:*:*:*:*", "cpeNameId": "3D3E1A1F-0BED-4FE6-9E2F-745C782AFCB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.141:*:*:*:*:*:*:*", "cpeNameId": "DACB210F-4E23-4FFE-B706-5889289531D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.142:*:*:*:*:*:*:*", "cpeNameId": "781F8D80-4176-4FC3-9B77-A1BB0C88AC65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.143:*:*:*:*:*:*:*", "cpeNameId": "1F4415C4-3002-4A32-A992-54DC73CAF533"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.144:*:*:*:*:*:*:*", "cpeNameId": "7089C196-FD3C-4675-9BE6-2666C406C5D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.145:*:*:*:*:*:*:*", "cpeNameId": "9590F0EF-8260-4B9F-B66C-3E184AC93E63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.146:*:*:*:*:*:*:*", "cpeNameId": "4FA1CA12-EB95-48B5-98F3-953859E43ED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.147:*:*:*:*:*:*:*", "cpeNameId": "ED73D0A6-55DA-4D5B-BA38-9BCD74613827"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.148:*:*:*:*:*:*:*", "cpeNameId": "BD154522-4E63-4FB9-ABC2-77F7850B502B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.149:*:*:*:*:*:*:*", "cpeNameId": "E765B3E4-E2B5-42A5-94AD-5E3D3283B7B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.150:*:*:*:*:*:*:*", "cpeNameId": "AAC26F5B-06AE-49E2-8FE8-17D01ABD1BEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.151:*:*:*:*:*:*:*", "cpeNameId": "91B291A8-CD84-4201-93AD-4B7981CEBDBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.152:*:*:*:*:*:*:*", "cpeNameId": "A13E73C3-8219-4909-B7FB-312605EFE682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.153:*:*:*:*:*:*:*", "cpeNameId": "3439519B-F130-44DB-8EF6-C65A2EF5AF5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.154:*:*:*:*:*:*:*", "cpeNameId": "B93C5FAB-C686-4B8C-B0D5-20C03F3847DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.155:*:*:*:*:*:*:*", "cpeNameId": "F241AC0B-B446-45F4-9A2E-B4B259F4F173"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.156:*:*:*:*:*:*:*", "cpeNameId": "93A18F08-8AD4-4FD2-9A02-E58939D514FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.157:*:*:*:*:*:*:*", "cpeNameId": "334BC1BD-BCDE-4017-930B-8E2E3685773A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.158:*:*:*:*:*:*:*", "cpeNameId": "27100D3E-E3D1-4917-959E-CF6C9CB4838A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.159:*:*:*:*:*:*:*", "cpeNameId": "E9B9F90B-EDBF-452D-9EED-5906465EC142"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.160:*:*:*:*:*:*:*", "cpeNameId": "4B9782F4-75EF-407A-A270-6B9F10B3AB61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.161:*:*:*:*:*:*:*", "cpeNameId": "4E536BAB-E89A-4298-A620-65E2EA131D54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.162:*:*:*:*:*:*:*", "cpeNameId": "0234E459-D46E-4FF6-97A0-78C8D0C1413F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.163:*:*:*:*:*:*:*", "cpeNameId": "5672A718-38DA-42BD-8D94-C44CB7EB5B0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.164:*:*:*:*:*:*:*", "cpeNameId": "7F359B5A-FC0F-4AC9-B676-EE99B7ACF987"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.165:*:*:*:*:*:*:*", "cpeNameId": "C12A4D9B-491F-4FCD-8F98-ACE8680C3DB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.166:*:*:*:*:*:*:*", "cpeNameId": "A616B27B-8D52-4876-B9DA-49AE47E47B14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.167:*:*:*:*:*:*:*", "cpeNameId": "A9FB1FBC-3EAC-4068-95C6-A8449AA30236"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.168:*:*:*:*:*:*:*", "cpeNameId": "56F2978B-DD10-4874-9226-22B3EF53C34A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.169:*:*:*:*:*:*:*", "cpeNameId": "77DCE15B-B6AA-4BFA-9B0E-2A4AA9751AA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.170:*:*:*:*:*:*:*", "cpeNameId": "5B59BFDD-BD40-46BB-BA2E-0AAD30C6906C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.171:*:*:*:*:*:*:*", "cpeNameId": "2BE79BFF-5683-4CA6-B2C9-6001FD77BC99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.172:*:*:*:*:*:*:*", "cpeNameId": "50BE4FDF-F0EE-4CC4-837F-576E3E212A2F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.173:*:*:*:*:*:*:*", "cpeNameId": "96A6E180-7005-48FA-A98B-DC22F7815B81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.174:*:*:*:*:*:*:*", "cpeNameId": "F6CD2092-770F-4F3E-9661-06699D965D76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.175:*:*:*:*:*:*:*", "cpeNameId": "EBF1E1E4-AD08-4B18-9F12-B4EEE194638D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.176:*:*:*:*:*:*:*", "cpeNameId": "6A0486A1-F99F-4E4B-AC39-C12F5D674339"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.177:*:*:*:*:*:*:*", "cpeNameId": "DF9B41BC-B6C2-48AC-9AEE-67A846D344A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.178:*:*:*:*:*:*:*", "cpeNameId": "C2E8FEC6-59E1-4AF4-94EE-7A676B5A2C82"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.179:*:*:*:*:*:*:*", "cpeNameId": "60FF0BF4-4505-484E-8152-B3514FCF95F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.180:*:*:*:*:*:*:*", "cpeNameId": "5DAFDB50-AB4D-4F94-B465-07D40DA4AFE9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.181:*:*:*:*:*:*:*", "cpeNameId": "4CBFF0C0-9773-47CF-AD66-EE00279272C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.182:*:*:*:*:*:*:*", "cpeNameId": "BB407A40-747A-4CF3-8A14-8296DBB7BF38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.183:*:*:*:*:*:*:*", "cpeNameId": "1386612C-94AB-4DD6-90F9-23D697BD76FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.184:*:*:*:*:*:*:*", "cpeNameId": "0476CD76-2D3E-45FA-88DB-83DA9330CD85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.185:*:*:*:*:*:*:*", "cpeNameId": "5964859C-6BA3-4286-B050-83960EF7EF71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.186:*:*:*:*:*:*:*", "cpeNameId": "CC9E8E7E-93FE-4DB7-AF1B-8F7E63CBA37F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.187:*:*:*:*:*:*:*", "cpeNameId": "223FEF84-695D-44FF-9C33-47F8CBFDD953"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.188:*:*:*:*:*:*:*", "cpeNameId": "0CE412FB-E60A-4DFB-8094-EFBE693FF4A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.189:*:*:*:*:*:*:*", "cpeNameId": "501D8AD1-97D7-49C1-B512-061538B8F73F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.190:*:*:*:*:*:*:*", "cpeNameId": "0A2332E6-CC09-486E-A662-9766D623BF34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.191:*:*:*:*:*:*:*", "cpeNameId": "EDEFF704-F4A6-4282-9428-DEFEFEB4A93A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.192:*:*:*:*:*:*:*", "cpeNameId": "1181DE8F-7EE2-4EC3-8F84-8B313F65047A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.193:*:*:*:*:*:*:*", "cpeNameId": "78EF3A83-66F1-40F3-9C3C-25AFF40BE88C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.194:*:*:*:*:*:*:*", "cpeNameId": "8D611766-BB3A-4528-B1CE-74CB0EAE4467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.195:*:*:*:*:*:*:*", "cpeNameId": "0C729423-E12A-4F19-9753-94CE465C6283"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.196:*:*:*:*:*:*:*", "cpeNameId": "8F11E143-CE43-4B63-BE73-0A33CD99110D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.197:*:*:*:*:*:*:*", "cpeNameId": "FEB027DD-E13F-4A38-876F-9AFB1E0BE409"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.198:*:*:*:*:*:*:*", "cpeNameId": "6737850B-DE08-4472-B2C7-F60DCDB95CBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.199:*:*:*:*:*:*:*", "cpeNameId": "C6EA9B80-7284-47CF-954F-EEA349A002FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.200:*:*:*:*:*:*:*", "cpeNameId": "C33F1CE0-023E-4BD6-A32C-2AD5847A9797"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.201:*:*:*:*:*:*:*", "cpeNameId": "FE090B8A-1060-42D0-BB85-D17C7A299D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.202:*:*:*:*:*:*:*", "cpeNameId": "7F50D385-2E96-471F-B48A-36C222DED1F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.203:*:*:*:*:*:*:*", "cpeNameId": "243CF5E0-1BA3-4C09-830B-F3E5CAE77985"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.204:*:*:*:*:*:*:*", "cpeNameId": "571B9EE4-5DD5-4B3C-842F-B230D4577C98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.205:*:*:*:*:*:*:*", "cpeNameId": "55A5490D-D0D4-4F11-80E6-6CF300B18FF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.206:*:*:*:*:*:*:*", "cpeNameId": "97286FA5-0BCE-42D1-A0D7-1B4AD3F78A31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.207:*:*:*:*:*:*:*", "cpeNameId": "C54631BB-ABC0-4711-A5EE-CCFA9870260F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.208:*:*:*:*:*:*:*", "cpeNameId": "0939F707-4609-42F2-B906-3FC03BBAC7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.209:*:*:*:*:*:*:*", "cpeNameId": "257E4F1B-512E-4A55-9819-3A0A0EFC431F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.210:*:*:*:*:*:*:*", "cpeNameId": "6214CC75-234D-4219-9F50-28E5D54F6661"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.210-1:*:*:*:*:*:*:*", "cpeNameId": "11E87954-7E16-41C9-A673-08D5FD40B194"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.211:*:*:*:*:*:*:*", "cpeNameId": "F95B5FE1-6964-4158-9066-9B148AA7C8AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.212:*:*:*:*:*:*:*", "cpeNameId": "E0268D70-A7DC-4B52-AE6F-C459A59F0CF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.213:*:*:*:*:*:*:*", "cpeNameId": "51275AB0-D417-4CE6-8847-B338B340E913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.214:*:*:*:*:*:*:*", "cpeNameId": "50D2F1EA-0B29-4FDB-8221-BD3C1A800B1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.215:*:*:*:*:*:*:*", "cpeNameId": "12A80615-D31E-44C9-A367-355599328039"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.216:*:*:*:*:*:*:*", "cpeNameId": "A38157E4-F68B-4E60-AF7E-FD7BF9F0E6A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.217:*:*:*:*:*:*:*", "cpeNameId": "BC328F65-1554-4FF9-A440-C6A6DC08971F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.218:*:*:*:*:*:*:*", "cpeNameId": "E7E67420-ABB7-4AB3-8A93-EF6DEFFB08CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.219:*:*:*:*:*:*:*", "cpeNameId": "0176C290-5F23-4D25-90E0-CFC2FD39785E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.220:*:*:*:*:*:*:*", "cpeNameId": "D89672F3-3069-4FA7-876C-5486351A4210"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.221:*:*:*:*:*:*:*", "cpeNameId": "1C4FC865-E82F-4AAA-BDB2-48CBAF2CEDDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.222:*:*:*:*:*:*:*", "cpeNameId": "E9641D38-4E53-4C16-9DCB-1ABEAB859051"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.223:*:*:*:*:*:*:*", "cpeNameId": "7D0DB446-81CF-48A4-8FDF-82DB13F9EEFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.224:*:*:*:*:*:*:*", "cpeNameId": "A36C68E0-7DAF-47AE-84CE-355D19D2A184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.225:*:*:*:*:*:*:*", "cpeNameId": "1A4AF8D7-ABBC-406D-8A9B-6064D1C0FB3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.226:*:*:*:*:*:*:*", "cpeNameId": "DB3D137C-BAFE-4A08-A5F6-CF9CE3ECF4BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.227:*:*:*:*:*:*:*", "cpeNameId": "AE161CD5-8D27-4A12-B17B-D329F43349D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.228:*:*:*:*:*:*:*", "cpeNameId": "0723CFAE-5DBC-4043-AF8F-0C597B0CEAB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.229:*:*:*:*:*:*:*", "cpeNameId": "D47DB171-26CB-4971-9D2A-7E6B574DCB33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.230:*:*:*:*:*:*:*", "cpeNameId": "5FFE79E1-68FA-45D6-81A7-DC9AEA1554EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.231:*:*:*:*:*:*:*", "cpeNameId": "2CF57430-4909-48C5-967D-3DB6853FAAFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.232:*:*:*:*:*:*:*", "cpeNameId": "6BFB7AAB-A1B4-403E-A26B-F14B8FD509C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.233:*:*:*:*:*:*:*", "cpeNameId": "31E31C3B-F769-4B65-AC62-A281A99ECA2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.234:*:*:*:*:*:*:*", "cpeNameId": "6CFE18B9-2BF3-4BDA-9A19-9A8F945F039F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.235:*:*:*:*:*:*:*", "cpeNameId": "3EF2F123-9B38-401A-81CD-DCDF786F1FBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.236:*:*:*:*:*:*:*", "cpeNameId": "0B4E0DD4-C051-4F64-B333-B896B86813D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.237:*:*:*:*:*:*:*", "cpeNameId": "57C1E65F-0E87-4296-B131-25A82A0A9667"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.238:*:*:*:*:*:*:*", "cpeNameId": "2BD9177D-1F32-4B5A-A11F-F779CC665C49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.239:*:*:*:*:*:*:*", "cpeNameId": "737F1344-63A8-42A5-BD48-891A8E17769A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.240:*:*:*:*:*:*:*", "cpeNameId": "E1BAD9D3-D0F2-42CC-93A3-F5B6A1CEC9D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.241:*:*:*:*:*:*:*", "cpeNameId": "CA99B95F-7BBC-40BE-AA68-6A10CE2C8D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.242:*:*:*:*:*:*:*", "cpeNameId": "A93EB856-783D-4DF9-8387-0BD4C09F9AD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.243:*:*:*:*:*:*:*", "cpeNameId": "48503212-F9A6-4AB5-8DE9-374622582C15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.244:*:*:*:*:*:*:*", "cpeNameId": "C8F1F3B2-9299-403A-8118-461511F3F50B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.245:*:*:*:*:*:*:*", "cpeNameId": "197B1275-A4E8-4582-ACE2-4C5C5C8C5474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.246:*:*:*:*:*:*:*", "cpeNameId": "9B64D972-8C44-4B79-9E76-8ECDEBCEBC0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.247:*:*:*:*:*:*:*", "cpeNameId": "5754042A-B1DB-4AD4-B388-76DE9263DC67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.248:*:*:*:*:*:*:*", "cpeNameId": "2E8BDAA4-D539-42BA-B41E-4EF7C8979B48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.249:*:*:*:*:*:*:*", "cpeNameId": "03C647CD-10CD-446B-BE6E-3D76C120F364"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.250:*:*:*:*:*:*:*", "cpeNameId": "2F217035-1A6D-43B9-A24D-6F8990190B31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.251:*:*:*:*:*:*:*", "cpeNameId": "4B197B49-5F9B-4B96-B12A-2B471778F13C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.252:*:*:*:*:*:*:*", "cpeNameId": "2481C266-83AA-4815-8405-7C2734A77FB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.253:*:*:*:*:*:*:*", "cpeNameId": "93A07E06-FA31-4E3F-9DAB-CB3846386198"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.254:*:*:*:*:*:*:*", "cpeNameId": "A1AF307F-312C-4040-8F95-9ED0230288F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.255:*:*:*:*:*:*:*", "cpeNameId": "38C39A6F-9AE7-4CB6-B524-1E1F10665007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.256:*:*:*:*:*:*:*", "cpeNameId": "97AFE000-934E-495E-90DA-C6B13B3C2585"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.257:*:*:*:*:*:*:*", "cpeNameId": "9A1B0076-9309-4165-84AB-3C627316F802"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.258:*:*:*:*:*:*:*", "cpeNameId": "02108CDE-7848-47AA-AC02-43FF6B596975"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.259:*:*:*:*:*:*:*", "cpeNameId": "1C0EC444-2A66-4716-AC4A-4660ECFC5619"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.260:*:*:*:*:*:*:*", "cpeNameId": "FEE507B5-A54C-4EBD-BD63-4CC37CE9C472"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.261:*:*:*:*:*:*:*", "cpeNameId": "D30AE27B-C292-40B5-9296-B58140B669F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.262:*:*:*:*:*:*:*", "cpeNameId": "381C2F4E-4F46-4C12-9112-0A0F60A2F50E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.263:*:*:*:*:*:*:*", "cpeNameId": "D3492ED4-57AE-495F-9627-20898D0BB155"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.264:*:*:*:*:*:*:*", "cpeNameId": "BC81C283-32BE-483A-8017-C90388AE2515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.265:*:*:*:*:*:*:*", "cpeNameId": "47C4B68F-6562-41A2-B6BA-1E3C60FA2FA1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.266:*:*:*:*:*:*:*", "cpeNameId": "7DE0121E-5AD4-4D6C-8406-2FB7D997F256"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.267:*:*:*:*:*:*:*", "cpeNameId": "6A265E87-7736-450B-8A3C-93FC8AA776C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.268:*:*:*:*:*:*:*", "cpeNameId": "2640A395-FEBD-4AD6-9FC8-4D8D1A906F80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.269:*:*:*:*:*:*:*", "cpeNameId": "64CF3CC1-31A9-467A-847E-F03C704256C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.270:*:*:*:*:*:*:*", "cpeNameId": "6030D6B8-14B2-476D-9275-AF6F52DD4DD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.271:*:*:*:*:*:*:*", "cpeNameId": "BD41D072-F5AF-42E0-9922-B331CB051449"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.272:*:*:*:*:*:*:*", "cpeNameId": "E0212CDC-E613-4B2A-9B60-16D962136AFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.273:*:*:*:*:*:*:*", "cpeNameId": "452DD917-1B22-4F9B-A9AA-5FD1F9F2C442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.274:*:*:*:*:*:*:*", "cpeNameId": "6AD4B227-D8D4-42C9-B310-ADA3F37B72BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.275:*:*:*:*:*:*:*", "cpeNameId": "EFE5E55E-9BCB-44E1-BC58-3DF14B515429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.276:*:*:*:*:*:*:*", "cpeNameId": "10D3145D-E10C-4590-833C-0AE554FF7897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.277:*:*:*:*:*:*:*", "cpeNameId": "B01C199E-6C8B-4BFA-9DA9-7B1905680626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.278:*:*:*:*:*:*:*", "cpeNameId": "762C856E-6757-4DFB-A512-B6F03DDC8929"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.279:*:*:*:*:*:*:*", "cpeNameId": "169A9512-5C6F-478E-B16E-82D181C58A97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.280:*:*:*:*:*:*:*", "cpeNameId": "F8BC9746-521D-4801-AC1D-66A84A780A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.281:*:*:*:*:*:*:*", "cpeNameId": "1B8D8A00-4E6C-4CD0-8BC5-6EB8BE73B529"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.282:*:*:*:*:*:*:*", "cpeNameId": "5B93AA93-ABD4-45F5-B571-4CAE3CEC6AF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.283:*:*:*:*:*:*:*", "cpeNameId": "E46991B0-6A28-4411-AF4A-EAF75291B8A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.284:*:*:*:*:*:*:*", "cpeNameId": "21984D32-DD5B-488B-83DB-77BD0A122405"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.285:*:*:*:*:*:*:*", "cpeNameId": "D0B6234C-571C-42EE-8FD1-334921F4F502"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.286:*:*:*:*:*:*:*", "cpeNameId": "C969671F-1264-4233-B73B-570A481B64CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.287:*:*:*:*:*:*:*", "cpeNameId": "2053D2FF-B750-4B7E-BDFA-2A0F276F15C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.288:*:*:*:*:*:*:*", "cpeNameId": "B221B69F-8204-49BA-8AF4-AFF146D46FB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.289:*:*:*:*:*:*:*", "cpeNameId": "C8142E09-6E61-4652-A9DA-38072F891A96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.290:*:*:*:*:*:*:*", "cpeNameId": "A534AF2A-A909-45A6-B7E3-A4B2F782CC92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.291:*:*:*:*:*:*:*", "cpeNameId": "53B57317-723A-4E6B-AAB3-71676106E4CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.292:*:*:*:*:*:*:*", "cpeNameId": "15CCD6EA-C7F2-47C2-82F4-52F075759660"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.293:*:*:*:*:*:*:*", "cpeNameId": "F1E6DE51-B3AA-4790-A531-9AE7F458DEB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.294:*:*:*:*:*:*:*", "cpeNameId": "DAEAC0AB-0B68-4970-987B-C7670A6BD22E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.295:*:*:*:*:*:*:*", "cpeNameId": "3187B482-8D58-434C-8E34-EF7AF68AB006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.296:*:*:*:*:*:*:*", "cpeNameId": "FDE4B426-ED64-449F-9B09-0CD8EA2FFD26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.297:*:*:*:*:*:*:*", "cpeNameId": "998E67F4-C650-4407-9C7C-339B164FCD92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.298:*:*:*:*:*:*:*", "cpeNameId": "60CE826D-94F2-441E-A37E-85C4FCD86554"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.299:*:*:*:*:*:*:*", "cpeNameId": "3D327ABE-B8D3-4496-9A9C-62C030CC90D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.300:*:*:*:*:*:*:*", "cpeNameId": "51E9D896-6DD7-4163-81B4-3F44CAD9A2C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.301:*:*:*:*:*:*:*", "cpeNameId": "D1D112AB-4F07-4CD9-94D4-185B7830316F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.302:*:*:*:*:*:*:*", "cpeNameId": "9BBA920A-1DC4-48A6-B0B6-E31D342537FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.303:*:*:*:*:*:*:*", "cpeNameId": "B039FA99-E67A-409B-A18E-E6BD888E7439"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.304:*:*:*:*:*:*:*", "cpeNameId": "55859E55-03E7-4B8A-BDF6-31710F02863F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.305:*:*:*:*:*:*:*", "cpeNameId": "5ECFC1EA-4DCB-4381-8066-52D9EF210ED7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.306:*:*:*:*:*:*:*", "cpeNameId": "F85A14FE-ADE4-44AB-9DB7-E2D9BE784326"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.307:*:*:*:*:*:*:*", "cpeNameId": "31BE7E06-85C8-422D-945A-0699DDCDD577"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.308:*:*:*:*:*:*:*", "cpeNameId": "394979DD-B2FE-4F43-A635-4BA1953944CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.309:*:*:*:*:*:*:*", "cpeNameId": "079C35C6-0C73-475F-B35D-BAA4318FAB25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.310:*:*:*:*:*:*:*", "cpeNameId": "85C1B276-0232-4F9E-BCB1-271209082177"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.311:*:*:*:*:*:*:*", "cpeNameId": "5DE9B94E-2F63-48F3-9EE3-29F97357808B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.312:*:*:*:*:*:*:*", "cpeNameId": "472662F2-3E14-450F-A806-E44B1B6C57C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.313:*:*:*:*:*:*:*", "cpeNameId": "4151B004-BFC1-434B-8DD7-7D6857831591"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.314:*:*:*:*:*:*:*", "cpeNameId": "5EB1843D-66B2-4766-B25D-291A2DD4B43F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.315:*:*:*:*:*:*:*", "cpeNameId": "5AC67AE7-DE1E-4329-9E98-1266CDFDCD3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.316:*:*:*:*:*:*:*", "cpeNameId": "665EDCA8-FBE2-48C3-B2A2-E44620F9321A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.317:*:*:*:*:*:*:*", "cpeNameId": "53E4605F-2DAF-436F-9B66-5C9483E4B0F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.318:*:*:*:*:*:*:*", "cpeNameId": "19FF749F-D1B2-4608-A238-B6FD9202A31E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.319:*:*:*:*:*:*:*", "cpeNameId": "D160B5B1-B754-4FD1-ABBE-5CF8AC941935"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.320:*:*:*:*:*:*:*", "cpeNameId": "442FB5A9-9102-48F4-B63A-684FAFCEEF6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.321:*:*:*:*:*:*:*", "cpeNameId": "34EB7DA8-8A3B-4710-B39F-268F72709105"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.322:*:*:*:*:*:*:*", "cpeNameId": "EC519279-B76A-42BE-B6CB-8C0418032372"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.323:*:*:*:*:*:*:*", "cpeNameId": "3F56BE42-4A5B-4EED-B538-EB93D1692BD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.324:*:*:*:*:*:*:*", "cpeNameId": "CD51D183-BC77-4CA5-B961-ED0F3C008967"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.325:*:*:*:*:*:*:*", "cpeNameId": "F160C172-25E9-49B4-A253-58D8E6AE0914"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.326:*:*:*:*:*:*:*", "cpeNameId": "7B3900FD-154B-4A5B-9A6B-5609E9113274"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.327:*:*:*:*:*:*:*", "cpeNameId": "EA753912-D612-4583-9A1A-3DAA2466D1D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.328:*:*:*:*:*:*:*", "cpeNameId": "8F78B7BB-07DA-4FD5-97CB-2A1C3B38ADA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.329:*:*:*:*:*:*:*", "cpeNameId": "5D01F5BD-260A-45C9-A220-1B1F1ED05BAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.330:*:*:*:*:*:*:*", "cpeNameId": "4757B741-0579-4F0D-93B6-4152C0ACEDE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.331:*:*:*:*:*:*:*", "cpeNameId": "49CB08ED-A588-4C13-AF4E-B76BA560B121"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.332:*:*:*:*:*:*:*", "cpeNameId": "B235999E-D6AC-40F3-84C5-8CB6F78213C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.333:*:*:*:*:*:*:*", "cpeNameId": "A1FD2FA3-E019-47DA-B601-7CF78944A798"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.334:*:*:*:*:*:*:*", "cpeNameId": "EB3381CD-67DB-4D53-BDEE-811E30F95A1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.335:*:*:*:*:*:*:*", "cpeNameId": "4E77A679-0C67-4691-B514-917657B01A5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.336:*:*:*:*:*:*:*", "cpeNameId": "16E4641A-47F6-442F-AE88-17E4B987E3CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.337:*:*:*:*:*:*:*", "cpeNameId": "641CDB5F-54CC-425A-B656-9A9B58A08FBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:*:*:*:*:*:*:*", "cpeNameId": "801F7D56-009B-4A66-A380-891D1C09EC0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:-:*:*:*:*:*:*", "cpeNameId": "737F8B22-35BD-4355-8726-CAB10284B0F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc1:*:*:*:*:*:*", "cpeNameId": "378C4500-0CC7-4110-8E02-B8B89064CB59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc2:*:*:*:*:*:*", "cpeNameId": "C3B39C83-E8E1-4DA7-8251-F2092C6B05D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc3:*:*:*:*:*:*", "cpeNameId": "78D16190-2359-4F43-9816-2080B1827AC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc4:*:*:*:*:*:*", "cpeNameId": "B8C99710-34D3-4AB2-B2D2-09F4B84AE4E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc5:*:*:*:*:*:*", "cpeNameId": "4322E527-2823-41C7-85A2-7B41C74EAC58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.1:*:*:*:*:*:*:*", "cpeNameId": "9C33CAE9-C906-493D-AE83-630F775358ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.2:*:*:*:*:*:*:*", "cpeNameId": "8F61A3BF-4522-4622-947D-00D359B55176"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.3:*:*:*:*:*:*:*", "cpeNameId": "1EB67AD1-84CA-4A13-838D-BCCA096F8A43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.4:*:*:*:*:*:*:*", "cpeNameId": "F0EF9085-D82D-451F-B3AF-70E38633405F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.5:*:*:*:*:*:*:*", "cpeNameId": "13FE2FB3-6377-4579-8372-ED7D7601F139"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.6:*:*:*:*:*:*:*", "cpeNameId": "CAD06591-0516-4D81-B575-F6C582AFFDEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.7:*:*:*:*:*:*:*", "cpeNameId": "02EB240A-C24B-44BD-86EA-60D23F353699"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.8:*:*:*:*:*:*:*", "cpeNameId": "7F10C5D0-46D5-462D-8ADC-2E4E5916E34D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.9:*:*:*:*:*:*:*", "cpeNameId": "2FAAEF0C-02F6-4CB5-8452-2ADB5F96602C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.10:*:*:*:*:*:*:*", "cpeNameId": "597FA1BA-E530-477E-8B32-7A767ABD9779"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.11:*:*:*:*:*:*:*", "cpeNameId": "BB2F91B5-234B-4006-B083-4DCB240C7735"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.12:*:*:*:*:*:*:*", "cpeNameId": "86A9E5EB-A7B2-4551-96C3-D2F96B8807EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.13:*:*:*:*:*:*:*", "cpeNameId": "07E25F8D-B2C9-4E32-8DB7-B0B700EF87B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.14:*:*:*:*:*:*:*", "cpeNameId": "B72B8BC5-A491-423C-B3B3-49C3878062F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.15:*:*:*:*:*:*:*", "cpeNameId": "92F730C1-4118-47C8-8077-34E9367D198C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.16:*:*:*:*:*:*:*", "cpeNameId": "340A6F80-AECA-45F2-A8C0-E75A51ADEB17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.17:*:*:*:*:*:*:*", "cpeNameId": "5245DF5B-3563-44B6-B5AD-9E7AC85D8CE9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:*:*:*:*:*:*:*", "cpeNameId": "7DAEC1AA-D9DB-4969-8835-19DE5562750C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:-:*:*:*:*:*:*", "cpeNameId": "53233DB2-D8A4-4392-B5B9-43F109778BC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc1:*:*:*:*:*:*", "cpeNameId": "F67207B1-581C-4560-A1BA-FBCC51A59367"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc2:*:*:*:*:*:*", "cpeNameId": "FBAE195B-6447-49D4-AAAA-D595A811677F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc3:*:*:*:*:*:*", "cpeNameId": "0491309A-660F-444C-89A9-FFE1FA1A9B79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*", "cpeNameId": "35274394-863C-4A7D-9EFB-B49A5900A33C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*", "cpeNameId": "5779025A-A7C7-40BE-840B-EE69D3D1BE62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*", "cpeNameId": "0E052BC2-1D38-4E80-9D23-889E827E597C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*", "cpeNameId": "DF4B5805-B18E-4733-9A8B-135508008D0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.1:*:*:*:*:*:*:*", "cpeNameId": "0A040921-C942-4FE5-A49A-A55F24A8D54C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.2:*:*:*:*:*:*:*", "cpeNameId": "97AF733F-A86E-41A1-832C-CC20306F11FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.3:*:*:*:*:*:*:*", "cpeNameId": "5CC1CF35-345D-45F8-BF5C-6B9C6B9696B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.4:*:*:*:*:*:*:*", "cpeNameId": "137C1EF2-A31B-431E-8F29-546D88139D13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.5:*:*:*:*:*:*:*", "cpeNameId": "BD008082-6870-4CE0-BC04-1001F619E011"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.6:*:*:*:*:*:*:*", "cpeNameId": "E4F8E539-321B-4263-BB4B-20AAF31088D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.7:*:*:*:*:*:*:*", "cpeNameId": "A93CF5C7-A951-446B-ADFD-4A099F87A003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.8:*:*:*:*:*:*:*", "cpeNameId": "32373BAD-CD72-44AE-883B-2AAD48A81497"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.9:*:*:*:*:*:*:*", "cpeNameId": "D22968FC-60EE-4D07-B61E-8216515FDA3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.10:*:*:*:*:*:*:*", "cpeNameId": "278604F1-EE00-4BCD-8B4F-D52B1E83CC03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.11:*:*:*:*:*:*:*", "cpeNameId": "C182B41E-1285-49CD-8537-F2B2BE11E5A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.12:*:*:*:*:*:*:*", "cpeNameId": "AEDE877D-D8A5-4365-9354-355C5BDBF8D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:*:*:*:*:*:*:*", "cpeNameId": "0975E1F0-0E5F-445B-BBAC-66294DC99443"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:-:*:*:*:*:*:*", "cpeNameId": "DF7473CD-B405-4E90-9185-B9E682AB2EA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc1:*:*:*:*:*:*", "cpeNameId": "3704C17E-765C-494D-ABF4-6687AD9DCA2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc2:*:*:*:*:*:*", "cpeNameId": "576FB04F-8AE6-459C-B9B7-4B161AA533C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc3:*:*:*:*:*:*", "cpeNameId": "D1CC9AD0-BCFB-47FF-A991-F2D8D4241D7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc4:*:*:*:*:*:*", "cpeNameId": "5B131271-8353-4F4D-A802-6231F77D62F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc5:*:*:*:*:*:*", "cpeNameId": "3871B8EE-EE4B-43DD-9B39-DAE15494AEF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc6:*:*:*:*:*:*", "cpeNameId": "2F22DBF5-138B-4E06-97A9-D48EE51DAD9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.1:*:*:*:*:*:*:*", "cpeNameId": "69B0A1AF-BDD2-4852-B63D-E4BF55573CAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.2:*:*:*:*:*:*:*", "cpeNameId": "654BD99C-D40D-4573-A72F-D135048F0BD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.3:*:*:*:*:*:*:*", "cpeNameId": "2DFD73EB-B731-43EF-A6D9-0777823AA9ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.4:*:*:*:*:*:*:*", "cpeNameId": "50296B03-0A9B-497E-85CE-EDBABB8603B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.5:*:*:*:*:*:*:*", "cpeNameId": "184D3B86-723B-43AE-9B33-91CAD47275F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.6:*:*:*:*:*:*:*", "cpeNameId": "2538F421-8C36-4DA8-8D4A-20811D6843BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.7:*:*:*:*:*:*:*", "cpeNameId": "E8D1E4A0-A0B2-4B0B-988F-984BF74D3B99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.8:*:*:*:*:*:*:*", "cpeNameId": "43B25D3D-1D5D-4E14-A5CE-69FB57B0230D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.9:*:*:*:*:*:*:*", "cpeNameId": "BD4E83AA-561D-49FA-9703-CFF03AA235A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.10:*:*:*:*:*:*:*", "cpeNameId": "109315CC-209F-40BF-A5E1-C307A1F780DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.11:*:*:*:*:*:*:*", "cpeNameId": "69494478-22B3-4371-B7C7-0558CDD786C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.12:*:*:*:*:*:*:*", "cpeNameId": "56632064-D578-4D87-9DF8-C06F096ABDFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.13:*:*:*:*:*:*:*", "cpeNameId": "97C936CC-FC5C-4A0B-9F4A-BC253561E90D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.14:*:*:*:*:*:*:*", "cpeNameId": "0C13DFDE-0149-4EB6-9BA0-F62AC6FE5586"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:*:*:*:*:*:*:*", "cpeNameId": "63D7AE43-6B91-47A7-9E3E-58B08ACEE5CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:-:*:*:*:*:*:*", "cpeNameId": "94A3FF49-65AE-46A5-AF47-00094F5AF3E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc1:*:*:*:*:*:*", "cpeNameId": "C5C9AA2D-4C67-496E-AE87-863FA0E9B8CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc2:*:*:*:*:*:*", "cpeNameId": "25E5D931-E147-4A6A-AD81-9AF12D4DCAB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc3:*:*:*:*:*:*", "cpeNameId": "853B280B-EC80-4D50-8494-0D3FBEF98F78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc4:*:*:*:*:*:*", "cpeNameId": "823B55ED-26FF-4111-A479-E477AAE70FF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc5:*:*:*:*:*:*", "cpeNameId": "8B7F3844-CA39-422C-8449-06CF8AD6672B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc6:*:*:*:*:*:*", "cpeNameId": "9ECB08C7-B61F-415B-8091-4F5B47F8085F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.1:*:*:*:*:*:*:*", "cpeNameId": "226B0AC1-B943-40C0-8426-4BB9B25A2FBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.2:*:*:*:*:*:*:*", "cpeNameId": "101CC84F-1E9F-4945-AC58-F1A89AC868FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.3:*:*:*:*:*:*:*", "cpeNameId": "943EB2FE-E2B5-4056-8432-2E21A07AAE5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.4:*:*:*:*:*:*:*", "cpeNameId": "30F2FA91-0299-4CF0-904F-CEB63D8421F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.5:*:*:*:*:*:*:*", "cpeNameId": "8A5862FC-697A-49B3-B018-683F56E40C33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.6:*:*:*:*:*:*:*", "cpeNameId": "9907DA49-FBB8-4EA6-A3D3-D395343A6635"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.7:*:*:*:*:*:*:*", "cpeNameId": "2928EAC1-58D0-4D06-9080-D744192ED843"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.8:*:*:*:*:*:*:*", "cpeNameId": "69790995-A09C-4859-B6AF-6FD626D2F615"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.9:*:*:*:*:*:*:*", "cpeNameId": "AD833379-4556-4DFD-A670-98EE76636A5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.10:*:*:*:*:*:*:*", "cpeNameId": "1D010FB8-D849-4388-8D10-74F4D6F59D3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.11:*:*:*:*:*:*:*", "cpeNameId": "F659B20D-E773-4DEA-86E5-9914230B1A15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.12:*:*:*:*:*:*:*", "cpeNameId": "B779CDC3-8957-4B5C-8D66-00A277A1B3F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.13:*:*:*:*:*:*:*", "cpeNameId": "EAC315D4-E0E0-41C8-A95B-AB5E895BFBBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.14:*:*:*:*:*:*:*", "cpeNameId": "1819E47A-069B-419A-8EF6-C9313A397178"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.15:*:*:*:*:*:*:*", "cpeNameId": "027145FE-2731-49DA-86A8-1D2FBC9FB086"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.16:*:*:*:*:*:*:*", "cpeNameId": "ECD3B257-E717-4928-B0C1-A784E553B3E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14:*:*:*:*:*:*:*", "cpeNameId": "A931E9A5-97C5-409C-A3BA-5FEC11A2C622"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.1:*:*:*:*:*:*:*", "cpeNameId": "C5A24D81-DC61-4E8E-A883-70A89D049530"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.2:*:*:*:*:*:*:*", "cpeNameId": "4E26113D-F6B7-453F-9387-E01F3FB22E21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.3:*:*:*:*:*:*:*", "cpeNameId": "814EF758-607B-40CC-BE23-CE70074F76CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.4:*:*:*:*:*:*:*", "cpeNameId": "6720BFE9-C0EE-48BF-9DF5-EF2216114FA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.5:*:*:*:*:*:*:*", "cpeNameId": "6AF9B2CB-A700-4D4B-99BD-68F8B1B60D27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.6:*:*:*:*:*:*:*", "cpeNameId": "9FB8CFED-3C93-41CD-AA03-2B6383630B83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.7:*:*:*:*:*:*:*", "cpeNameId": "2A024E18-8E2D-43F7-953C-15A11490F277"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.8:*:*:*:*:*:*:*", "cpeNameId": "B316EADE-3506-4B78-84D7-59222A7EA27C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.9:*:*:*:*:*:*:*", "cpeNameId": "22C19B12-730A-4C18-9414-277A199CDB44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.10:*:*:*:*:*:*:*", "cpeNameId": "1C9ACEF0-E248-4B66-AF0C-F323FF758671"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.11:*:*:*:*:*:*:*", "cpeNameId": "CFE32D5E-B63B-4BBD-AF35-835F694D1946"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.12:*:*:*:*:*:*:*", "cpeNameId": "51A5C92D-0CAD-4718-8BD9-70AD3BF3ED1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.13:*:*:*:*:*:*:*", "cpeNameId": "70614E00-337E-4E52-9FD8-20E1C106B5DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.14:*:*:*:*:*:*:*", "cpeNameId": "6930B9C7-4CC9-4DCA-B201-2D9E690BFE80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.15:*:*:*:*:*:*:*", "cpeNameId": "9B2631F3-F6FE-4791-823F-695BE2F12D47"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.16:*:*:*:*:*:*:*", "cpeNameId": "092E3E03-A335-4443-8BED-47DDB83C5FA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.17:*:*:*:*:*:*:*", "cpeNameId": "36D93C96-FC7E-4D4F-883E-3AF5A2FA3000"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.18:*:*:*:*:*:*:*", "cpeNameId": "7A290C14-ED57-4B9F-91FF-0FC4AAC9A1F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.19:*:*:*:*:*:*:*", "cpeNameId": "A8688970-830A-43D1-B07D-6013A971EC79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.20:*:*:*:*:*:*:*", "cpeNameId": "17B788D0-A567-43B8-82A9-8FF9366015A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.21:*:*:*:*:*:*:*", "cpeNameId": "78A2B7F8-B9DE-4C98-A44D-EF1B61256567"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.22:*:*:*:*:*:*:*", "cpeNameId": "72C09BB8-DCC8-45E8-B7B5-993CFE154338"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.23:*:*:*:*:*:*:*", "cpeNameId": "D4585EAB-400F-4EDF-9DED-1F8CBD5B744F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.24:*:*:*:*:*:*:*", "cpeNameId": "FEFD7885-1EE8-416D-B7FE-8E11083ED450"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.25:*:*:*:*:*:*:*", "cpeNameId": "62184EBD-8376-48E6-BDA6-33DA7DA4DE55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.26:*:*:*:*:*:*:*", "cpeNameId": "4E0A62E4-D6E6-472F-B7EB-0863D2CB2043"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.27:*:*:*:*:*:*:*", "cpeNameId": "B36914F3-9F0C-48F1-B721-8451FA606F40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.28:*:*:*:*:*:*:*", "cpeNameId": "5406494D-C3A0-424C-A739-DF138E8457FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.29:*:*:*:*:*:*:*", "cpeNameId": "2E069436-B02E-4F1D-BBFF-7C67DCBB1978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.30:*:*:*:*:*:*:*", "cpeNameId": "0C8564AC-CE4D-4B8F-8588-CB6F8162FC34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.31:*:*:*:*:*:*:*", "cpeNameId": "08176301-EEF5-439E-99BF-EB6055095F3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.32:*:*:*:*:*:*:*", "cpeNameId": "5050DE72-C59B-428C-B676-CD6A69950413"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.33:*:*:*:*:*:*:*", "cpeNameId": "6EF37D93-2185-4C48-932B-64AE54920BF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.34:*:*:*:*:*:*:*", "cpeNameId": "CD6EEA39-F27B-4E2F-ABF7-B979F9A60D16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.35:*:*:*:*:*:*:*", "cpeNameId": "9601934D-422D-478C-932B-0B723ECF1AC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.36:*:*:*:*:*:*:*", "cpeNameId": "117B9343-7A2A-4CF2-A3FC-5CF339397B49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.37:*:*:*:*:*:*:*", "cpeNameId": "3DAF6A51-D407-4CAF-A800-E8C601AF7A88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.38:*:*:*:*:*:*:*", "cpeNameId": "D818B0AA-263A-4AD4-8F30-D01F9F103771"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.39:*:*:*:*:*:*:*", "cpeNameId": "19410F95-E22A-4EA0-A64F-7334B338C559"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.40:*:*:*:*:*:*:*", "cpeNameId": "4C39B4AE-1893-4D41-A20B-E4DA4F05B12E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.41:*:*:*:*:*:*:*", "cpeNameId": "9E6243E5-7BAA-4061-BA98-AE3335BA90DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.42:*:*:*:*:*:*:*", "cpeNameId": "5289A6EE-1D01-4F96-806C-1843A14FDEF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.43:*:*:*:*:*:*:*", "cpeNameId": "9ABCDB72-25A8-46CD-A422-35ADA558EF68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.44:*:*:*:*:*:*:*", "cpeNameId": "574EC3B6-21A3-47E9-9858-3CA9EF533E67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.45:*:*:*:*:*:*:*", "cpeNameId": "38485FA4-4F72-4663-A066-8D01D3863321"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.46:*:*:*:*:*:*:*", "cpeNameId": "764D933F-58C1-48E3-9907-B0DDE1A4F8AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.47:*:*:*:*:*:*:*", "cpeNameId": "AE54A178-E51B-452A-9C64-DA3A3CC946AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.48:*:*:*:*:*:*:*", "cpeNameId": "B535E7F9-6273-497C-8D1E-27FC9FAECD72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.49:*:*:*:*:*:*:*", "cpeNameId": "83203827-63F4-47AE-A1CA-217858D53769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.50:*:*:*:*:*:*:*", "cpeNameId": "194931EE-DDB3-420C-9AF7-EC5AFD5D6E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.51:*:*:*:*:*:*:*", "cpeNameId": "6DBC9273-6F1D-497F-9664-184028BD6B4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.52:*:*:*:*:*:*:*", "cpeNameId": "214855D8-7634-45D4-B464-65EDD37AF850"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.53:*:*:*:*:*:*:*", "cpeNameId": "67B2569B-44C2-4049-BDA4-2E773A4E29F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.54:*:*:*:*:*:*:*", "cpeNameId": "9EBDE6FE-5FF2-4F2D-B58A-25094E85BFB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.55:*:*:*:*:*:*:*", "cpeNameId": "D0B5F04E-862B-490F-8305-60B811F4E6F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.56:*:*:*:*:*:*:*", "cpeNameId": "B668AD3F-F0E8-4A26-879B-046F18DD8A36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.57:*:*:*:*:*:*:*", "cpeNameId": "E16FC742-4DBD-4DB4-B969-9C064D464FE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.58:*:*:*:*:*:*:*", "cpeNameId": "8B062B81-0F55-4FF6-B94C-C877DFA0E50B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.59:*:*:*:*:*:*:*", "cpeNameId": "3CEEC1DF-CF5C-4C9D-ADB4-671659A81424"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.60:*:*:*:*:*:*:*", "cpeNameId": "25D77D6D-411A-415B-9B4C-71C7DA916873"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.61:*:*:*:*:*:*:*", "cpeNameId": "65E712DB-951C-492B-A315-827459B80E5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.62:*:*:*:*:*:*:*", "cpeNameId": "F11F0C93-C51B-4199-B8B7-D7B81A103E8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.63:*:*:*:*:*:*:*", "cpeNameId": "35923443-2E09-4624-9DEE-9ACF12EAB448"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.64:*:*:*:*:*:*:*", "cpeNameId": "205E064B-A0B3-4DC9-A4F9-FA48BB6D7666"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.65:*:*:*:*:*:*:*", "cpeNameId": "B0E66BBD-FF9B-4FE2-955E-363B2426AAA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.66:*:*:*:*:*:*:*", "cpeNameId": "65FADA8B-3BAE-4B74-805D-40121FF01EAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.67:*:*:*:*:*:*:*", "cpeNameId": "8796300B-8BBD-4767-B13C-A04AA0BB6FEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.68:*:*:*:*:*:*:*", "cpeNameId": "EA1F0EFF-1D54-4D41-8791-38459690E25B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.69:*:*:*:*:*:*:*", "cpeNameId": "609603AF-3EA9-4959-BF95-65681DD73429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.70:*:*:*:*:*:*:*", "cpeNameId": "626D150A-609E-46A3-9B99-2B5517D68FCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.71:*:*:*:*:*:*:*", "cpeNameId": "54045011-3CF7-4D72-B47A-67352BD27C9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.72:*:*:*:*:*:*:*", "cpeNameId": "A4A18A3C-C9E0-4640-A815-B4F19017E986"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.73:*:*:*:*:*:*:*", "cpeNameId": "101552E2-98D5-490C-8507-D8F3CD5E74CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.74:*:*:*:*:*:*:*", "cpeNameId": "306A3E6C-2907-416C-966D-810515DBCCCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.75:*:*:*:*:*:*:*", "cpeNameId": "BAAF7099-2145-41D0-8529-A6065254637F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.76:*:*:*:*:*:*:*", "cpeNameId": "DDCDF175-DC63-49EC-A7AD-9BFEFE5527E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.77:*:*:*:*:*:*:*", "cpeNameId": "38B40852-28A0-490F-B4DC-3980A9C5B421"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.78:*:*:*:*:*:*:*", "cpeNameId": "6E17FF7C-84D2-4931-992C-A5E7ED78834F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.79:*:*:*:*:*:*:*", "cpeNameId": "BB0E9999-4D82-493C-98BB-FE9D9A569DED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.80:*:*:*:*:*:*:*", "cpeNameId": "4AC211FC-04A6-4405-9635-D73ECD955418"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.81:*:*:*:*:*:*:*", "cpeNameId": "92E16615-DDD7-4E66-8BF6-BAA740D2F0C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.82:*:*:*:*:*:*:*", "cpeNameId": "F7A93940-0210-4AD1-B8DD-329E01CF07C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.83:*:*:*:*:*:*:*", "cpeNameId": "31B6D10B-87F4-4EDC-B7B1-FD01674BF26E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.84:*:*:*:*:*:*:*", "cpeNameId": "4275466A-03C1-421C-A4B0-21B518067550"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.85:*:*:*:*:*:*:*", "cpeNameId": "CA858139-E95A-4FEE-B89B-63F8951AC6C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.86:*:*:*:*:*:*:*", "cpeNameId": "E4F4C982-7F3B-45B2-84AB-3A0EA7B17608"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.87:*:*:*:*:*:*:*", "cpeNameId": "2343FBFC-440A-404C-BFBA-0C17D3A7A7DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.88:*:*:*:*:*:*:*", "cpeNameId": "D7E1A205-815C-4D28-8BA2-9BC9500AD4A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.89:*:*:*:*:*:*:*", "cpeNameId": "39F2F19A-FB5E-4866-BAE2-356D068B45BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.90:*:*:*:*:*:*:*", "cpeNameId": "50AD92DB-6E21-4AA8-9E00-052B90A9965E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.91:*:*:*:*:*:*:*", "cpeNameId": "F8DE7403-3DFA-4DEE-8780-A0DA10BF9528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.92:*:*:*:*:*:*:*", "cpeNameId": "39EF80A8-F19C-4BE8-8D66-7C5CD424B4D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.93:*:*:*:*:*:*:*", "cpeNameId": "E5500E0F-C99A-4502-99E6-7981CA795BF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.94:*:*:*:*:*:*:*", "cpeNameId": "74932CAC-8FBF-4367-9392-6D00F8FFFB99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.95:*:*:*:*:*:*:*", "cpeNameId": "8101D71E-8866-4E44-879C-0C5B12D7EBE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.96:*:*:*:*:*:*:*", "cpeNameId": "E3C79F48-C929-4535-A410-136A4CC98F26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.97:*:*:*:*:*:*:*", "cpeNameId": "1BD7D338-728B-43EB-91A4-6827CD29192C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.98:*:*:*:*:*:*:*", "cpeNameId": "86B2C93A-A003-4AAA-AE7C-CD209F2063B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.99:*:*:*:*:*:*:*", "cpeNameId": "6A43476F-D00F-4E25-8FAC-647EEE0EDFF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.100:*:*:*:*:*:*:*", "cpeNameId": "4E019C3A-D2DB-457F-A70E-5E03CCA91476"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.101:*:*:*:*:*:*:*", "cpeNameId": "A73A2FC0-DC50-499F-A148-78FA51F8D760"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.102:*:*:*:*:*:*:*", "cpeNameId": "127E7A89-5961-457D-8BF7-4164707E025E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.103:*:*:*:*:*:*:*", "cpeNameId": "388373C0-5D21-45F9-BF7E-5E60B4E7318F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.104:*:*:*:*:*:*:*", "cpeNameId": "3B19EA98-6B97-4A3A-B3B0-DC182A51617F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.105:*:*:*:*:*:*:*", "cpeNameId": "EAF98B09-69E7-48C1-8B69-3AD3E29E5A2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.106:*:*:*:*:*:*:*", "cpeNameId": "A2582828-CCCE-4D12-85D5-3A1F343C7E00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.107:*:*:*:*:*:*:*", "cpeNameId": "AD5EA444-4A0C-4A51-A8BE-F15FE36EE0C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.108:*:*:*:*:*:*:*", "cpeNameId": "F94B9FE0-697B-41B7-B791-B9A0C4D86168"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.109:*:*:*:*:*:*:*", "cpeNameId": "4F0FBDC5-4177-425F-ADF6-C57C3DCA5D4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.110:*:*:*:*:*:*:*", "cpeNameId": "2D6859E3-FCB4-477E-845A-80388AC62521"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.111:*:*:*:*:*:*:*", "cpeNameId": "E63E0425-D6C3-4773-A69C-D9033B050A0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.112:*:*:*:*:*:*:*", "cpeNameId": "B5B44EDD-66B1-47B4-BAAE-38DE4AECC0A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.113:*:*:*:*:*:*:*", "cpeNameId": "2F7F63C6-E1D8-40B9-A3BE-99A553814F5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.114:*:*:*:*:*:*:*", "cpeNameId": "A3653829-0B32-4838-90F0-B2CCC32580DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.115:*:*:*:*:*:*:*", "cpeNameId": "758316DC-FEB4-4F05-994B-AE0A555D7AEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.116:*:*:*:*:*:*:*", "cpeNameId": "CEA596C8-E6AD-4C8C-BF8F-FEBF1BF73E80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.117:*:*:*:*:*:*:*", "cpeNameId": "D09DC33D-889B-4BA3-8311-057DCB5EB7D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.118:*:*:*:*:*:*:*", "cpeNameId": "446206CE-87D2-402D-8451-4F63D75B6CB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.119:*:*:*:*:*:*:*", "cpeNameId": "CF788798-2DF1-4253-AA76-8B021DB84887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.120:*:*:*:*:*:*:*", "cpeNameId": "7A8CE9D2-54CD-4BDA-AF50-12C170DC6E2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.121:*:*:*:*:*:*:*", "cpeNameId": "08EAEBAF-0EC2-48A1-9B20-586269492003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.122:*:*:*:*:*:*:*", "cpeNameId": "7E12FC79-A932-4613-A0E6-6E78D0916FC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.123:*:*:*:*:*:*:*", "cpeNameId": "CEC4835E-515C-49EA-93A4-45ED21306EC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.124:*:*:*:*:*:*:*", "cpeNameId": "B8B08C25-A0CC-4BCB-BCC8-DF667EE56E09"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.125:*:*:*:*:*:*:*", "cpeNameId": "9FE63906-4FDE-46B8-A606-E814C0F6F44B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.126:*:*:*:*:*:*:*", "cpeNameId": "18D0E785-E281-4C1B-AAAB-1941B6652595"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.127:*:*:*:*:*:*:*", "cpeNameId": "F885AC80-EECE-4DD5-8FFB-6F71501CF7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.128:*:*:*:*:*:*:*", "cpeNameId": "E98D93BF-9F5C-4817-B9A4-1EC01D911361"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.129:*:*:*:*:*:*:*", "cpeNameId": "0381E0F9-379F-4991-8218-0D49695A485C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.130:*:*:*:*:*:*:*", "cpeNameId": "70367F10-ACD6-4508-ACB5-DAC961B2DAD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.131:*:*:*:*:*:*:*", "cpeNameId": "98C623C6-03CD-485B-BF39-D31296742AEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.132:*:*:*:*:*:*:*", "cpeNameId": "1E482272-30CF-4AC1-8D89-2594468F7D4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.133:*:*:*:*:*:*:*", "cpeNameId": "111B8E60-2201-4175-8DF6-9254703F20FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.134:*:*:*:*:*:*:*", "cpeNameId": "E359DA12-908D-4DCE-863E-3FF8641CC7C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.135:*:*:*:*:*:*:*", "cpeNameId": "27A8264E-B347-4F33-8DB6-D654A8DF7008"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.136:*:*:*:*:*:*:*", "cpeNameId": "DFC17EF5-FF88-4BBE-AD7A-B6EF53741144"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.137:*:*:*:*:*:*:*", "cpeNameId": "DE9E6429-1CD7-4FA0-A2BB-9F73CFFA4AE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.138:*:*:*:*:*:*:*", "cpeNameId": "3E2F69CE-601A-4558-820F-4D2101BC6DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.139:*:*:*:*:*:*:*", "cpeNameId": "AED13A18-393D-4413-80E6-5C8C1912C64C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.140:*:*:*:*:*:*:*", "cpeNameId": "DCCD3A03-0FA0-497E-938A-D4877C862C7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.141:*:*:*:*:*:*:*", "cpeNameId": "A984AB3D-A744-45E7-B863-AFCE9F3BCA8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.142:*:*:*:*:*:*:*", "cpeNameId": "8BA42A60-B968-4658-A593-5D6D1CDC2DD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.143:*:*:*:*:*:*:*", "cpeNameId": "F1883261-CF7A-4133-BA12-E5A3648FFCD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.144:*:*:*:*:*:*:*", "cpeNameId": "2ECB0A40-9134-477D-A33D-D1A21FD1D853"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.145:*:*:*:*:*:*:*", "cpeNameId": "37AD964D-982C-4491-9DD8-9BBEFB703649"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.146:*:*:*:*:*:*:*", "cpeNameId": "60D01110-32CE-4174-8305-9CC98A7954A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.147:*:*:*:*:*:*:*", "cpeNameId": "3C59A1B8-E591-4781-87FE-6652A4B865BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.148:*:*:*:*:*:*:*", "cpeNameId": "E3589E83-AB61-4638-83A5-4FCCDCF12939"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.149:*:*:*:*:*:*:*", "cpeNameId": "43561658-86C5-4F33-9BA9-959238156461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.150:*:*:*:*:*:*:*", "cpeNameId": "65A8F7B6-A62D-4F12-BE5C-81E2C46F2C39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.151:*:*:*:*:*:*:*", "cpeNameId": "359D1CB2-7092-4050-8BDE-EA9B90C2A4A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.152:*:*:*:*:*:*:*", "cpeNameId": "DCBA08B5-D75B-4EA4-8EB2-976C5EE5208C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.153:*:*:*:*:*:*:*", "cpeNameId": "AEF73713-2A2E-4202-9FAF-35F9007DC67F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.154:*:*:*:*:*:*:*", "cpeNameId": "F56CAAD2-0A98-4C49-948C-A58C81AF2136"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.155:*:*:*:*:*:*:*", "cpeNameId": "7293A6A3-0953-4BC3-8754-E3521CDDC181"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.156:*:*:*:*:*:*:*", "cpeNameId": "040458A8-9C8A-4F54-8667-DF55833A9D9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.157:*:*:*:*:*:*:*", "cpeNameId": "47EEEBD8-F966-4731-84CE-95B543D1E665"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.158:*:*:*:*:*:*:*", "cpeNameId": "D8DD8154-1F2C-4E1F-8425-674EA9F33061"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.159:*:*:*:*:*:*:*", "cpeNameId": "23573A67-0200-408D-A6D3-92BB482B239E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.160:*:*:*:*:*:*:*", "cpeNameId": "DB501200-6B09-4237-92DA-8410374E41AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.161:*:*:*:*:*:*:*", "cpeNameId": "1654CFEE-4797-444C-BF7B-36E36EEFB3FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.162:*:*:*:*:*:*:*", "cpeNameId": "F7A73AFA-30D2-4C43-9A25-E516BB6077BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.163:*:*:*:*:*:*:*", "cpeNameId": "152842F1-FD0B-41B7-8361-62DC24194B9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.164:*:*:*:*:*:*:*", "cpeNameId": "1FB6E4A7-E49F-4CB2-B797-CDA9A3EE41F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.165:*:*:*:*:*:*:*", "cpeNameId": "86C98595-98AD-4914-BA7E-7D2EEEBDEEEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.166:*:*:*:*:*:*:*", "cpeNameId": "3A749A85-B1AF-45E0-952F-F07A3315F2B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.167:*:*:*:*:*:*:*", "cpeNameId": "F739A8BA-2722-4D43-8EE3-F0940D5C9962"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.168:*:*:*:*:*:*:*", "cpeNameId": "BA729078-2FD8-494D-80A0-A21A9C8A780C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.169:*:*:*:*:*:*:*", "cpeNameId": "B09E3BA3-FAE1-417D-802E-9FF6A63314CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.170:*:*:*:*:*:*:*", "cpeNameId": "A6354C45-5002-4677-94F6-2585EA37B4A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.171:*:*:*:*:*:*:*", "cpeNameId": "E3DC59EC-5BDD-4E67-979E-ACF532D0AA0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.172:*:*:*:*:*:*:*", "cpeNameId": "2915DD1D-0036-4591-921F-4ED4D6E543BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.173:*:*:*:*:*:*:*", "cpeNameId": "6AAAB0B0-C78E-4876-9C2D-5CF3FC83C87B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.174:*:*:*:*:*:*:*", "cpeNameId": "7F586C21-5084-4F3B-A5E2-20ABD2E73301"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.175:*:*:*:*:*:*:*", "cpeNameId": "31C57C02-B17B-45AC-BD33-BA14F2D2F960"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.176:*:*:*:*:*:*:*", "cpeNameId": "495DC903-2104-4E7A-ABDD-044701BEC0AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.177:*:*:*:*:*:*:*", "cpeNameId": "54ECE57B-46D2-4B43-88BA-72DFCC784626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.178:*:*:*:*:*:*:*", "cpeNameId": "DF1994DB-64D8-449F-AB63-959905FDBED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.179:*:*:*:*:*:*:*", "cpeNameId": "E998A6CB-5B6B-4698-93F8-60ADA5915CED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.180:*:*:*:*:*:*:*", "cpeNameId": "5780A3A7-D6D2-4597-8E20-64CAEBB9BEC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.181:*:*:*:*:*:*:*", "cpeNameId": "943B03F2-38B3-48CF-AB60-B0CDCD3232D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.182:*:*:*:*:*:*:*", "cpeNameId": "DE1702E0-9C72-4E22-AD85-B4FF3F08BF12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.183:*:*:*:*:*:*:*", "cpeNameId": "B448350B-6E82-4C55-BF6C-3416AA6DD09D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.184:*:*:*:*:*:*:*", "cpeNameId": "93D45017-75AC-4F34-B44B-BD725073C783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.185:*:*:*:*:*:*:*", "cpeNameId": "17EE5023-DA86-42AA-80B8-0E03A8786DBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.186:*:*:*:*:*:*:*", "cpeNameId": "5083CC39-913E-47F4-8D17-DA2A4B3BDB38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.187:*:*:*:*:*:*:*", "cpeNameId": "A9B26E5E-5D06-4AEE-B95C-BCCCF71E3C2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.188:*:*:*:*:*:*:*", "cpeNameId": "F61DC571-CA27-43B5-B92E-FF49B2FA5128"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.189:*:*:*:*:*:*:*", "cpeNameId": "39A82CEC-EA57-4F55-AE22-EA9FF7F22411"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.190:*:*:*:*:*:*:*", "cpeNameId": "5C08BEA0-0968-4A2C-90A7-FBBC18870CB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.191:*:*:*:*:*:*:*", "cpeNameId": "27C0FEC1-829C-410C-B37C-44CBE22D2714"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.192:*:*:*:*:*:*:*", "cpeNameId": "AAE8B6F5-BBF2-4EE5-BFF8-D3E64F6C7544"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.193:*:*:*:*:*:*:*", "cpeNameId": "B75C3C61-1456-4A7E-8175-FEBFECBD8887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.194:*:*:*:*:*:*:*", "cpeNameId": "64CFCF85-0DB0-4BC3-9BAF-7752E969C6FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.195:*:*:*:*:*:*:*", "cpeNameId": "07D6C56C-CBC4-4E2B-BF3C-298D326A2515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.196:*:*:*:*:*:*:*", "cpeNameId": "617F7A9C-A4AF-46E1-9B60-654F691A1ACA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.197:*:*:*:*:*:*:*", "cpeNameId": "D1BB57B0-9ED1-49CA-BAF9-9F32E751C423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.198:*:*:*:*:*:*:*", "cpeNameId": "DFF76FFC-A6CE-4BCA-8BDA-A708D8CA524F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.199:*:*:*:*:*:*:*", "cpeNameId": "8D62E5E5-B08E-4B46-AFA9-9C11A8F2088C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.200:*:*:*:*:*:*:*", "cpeNameId": "4C6DC033-8105-45EB-8B7C-8AD380243F77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.201:*:*:*:*:*:*:*", "cpeNameId": "02618C38-B7E6-468C-A240-77183CD793ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.202:*:*:*:*:*:*:*", "cpeNameId": "B133CCC3-3525-44C9-9BA6-07731081AF3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.203:*:*:*:*:*:*:*", "cpeNameId": "2040E6FD-3C1D-4922-8A3E-D93B2024A64F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.204:*:*:*:*:*:*:*", "cpeNameId": "FC48B609-0A74-4ADF-BE7A-8E5A929FF9B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.205:*:*:*:*:*:*:*", "cpeNameId": "2D66C248-5CA3-46AF-819D-8EDC819E5DEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.206:*:*:*:*:*:*:*", "cpeNameId": "0EC2FE2D-3784-41D9-AD97-154F8E9D485A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.207:*:*:*:*:*:*:*", "cpeNameId": "890C3442-53E3-4F78-A62B-2A3DF161993D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.208:*:*:*:*:*:*:*", "cpeNameId": "3CFC3FF9-ABA7-4471-B42B-31B08DB57404"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.209:*:*:*:*:*:*:*", "cpeNameId": "62582930-FD26-41A5-A063-51CCE542611E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.210:*:*:*:*:*:*:*", "cpeNameId": "F0B251D3-1C8A-4EE4-BC8C-798633A46547"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.211:*:*:*:*:*:*:*", "cpeNameId": "6D317823-F155-4FD8-B745-D6A2CA0DCF4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.212:*:*:*:*:*:*:*", "cpeNameId": "93A1BCA4-151B-4C62-9321-C36060232635"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.213:*:*:*:*:*:*:*", "cpeNameId": "2A1F44F0-ED1D-4627-AFDD-52246F44FCA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.214:*:*:*:*:*:*:*", "cpeNameId": "630134DA-8836-4D64-A8DB-C952FD0879B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.215:*:*:*:*:*:*:*", "cpeNameId": "F647FD73-A1BD-4519-96EF-BC5962B49049"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.216:*:*:*:*:*:*:*", "cpeNameId": "84F052BA-7078-4E5C-AF40-2E298CEBAA0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.217:*:*:*:*:*:*:*", "cpeNameId": "8586BB5B-5356-497E-8039-D4718A8D233E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.218:*:*:*:*:*:*:*", "cpeNameId": "A7103A90-E7B5-46AC-B508-F3888B37524D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.219:*:*:*:*:*:*:*", "cpeNameId": "AAEF1C1C-6618-417A-A3EE-8BB6EB63F1C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.220:*:*:*:*:*:*:*", "cpeNameId": "00A3991D-98AC-4422-9B19-3B2515EF7B06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.221:*:*:*:*:*:*:*", "cpeNameId": "CC8EF11A-F131-442A-B0F4-0810D38EB89E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.222:*:*:*:*:*:*:*", "cpeNameId": "E9CDB672-F2E0-42B9-8F20-B3BCAF324A36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.223:*:*:*:*:*:*:*", "cpeNameId": "1AC50DA1-BA05-43A5-A50F-8EF350DD96D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.224:*:*:*:*:*:*:*", "cpeNameId": "42E73115-25A7-4EDF-9402-81BA0AC8B470"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.225:*:*:*:*:*:*:*", "cpeNameId": "85B8548F-576C-442E-A2EA-30CFF43407AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.226:*:*:*:*:*:*:*", "cpeNameId": "3794F34E-4B0D-487C-890D-884AA41EF6D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.227:*:*:*:*:*:*:*", "cpeNameId": "29337989-0DC4-4B35-BA5F-E157DAAD1557"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.228:*:*:*:*:*:*:*", "cpeNameId": "7F43F714-4550-416B-B228-EEF6FC8B1716"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.229:*:*:*:*:*:*:*", "cpeNameId": "9AC44F08-C276-4E15-811B-8CC5010672D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.230:*:*:*:*:*:*:*", "cpeNameId": "8EEDFC00-6778-4242-87AA-1BF8B788A7AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.231:*:*:*:*:*:*:*", "cpeNameId": "4F7C7BF1-9231-4FA0-A31F-A8A21DF8388E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.232:*:*:*:*:*:*:*", "cpeNameId": "B76B39F5-A59B-4C38-9381-5BCB6A78AC30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.233:*:*:*:*:*:*:*", "cpeNameId": "97DA7801-C4EB-49B8-BCB6-B53FB848E2A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.234:*:*:*:*:*:*:*", "cpeNameId": "B249D0C2-FF7F-48DC-AF81-4B69D6844B27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.235:*:*:*:*:*:*:*", "cpeNameId": "6B01EB29-4E04-41BD-BC2A-10619B7D39E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.236:*:*:*:*:*:*:*", "cpeNameId": "C81712BA-4FF9-4DD1-AD12-BABC49E8A004"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.237:*:*:*:*:*:*:*", "cpeNameId": "2EA256E4-3D89-4EEB-91B7-FFF529E84CAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.238:*:*:*:*:*:*:*", "cpeNameId": "A0E92899-D97F-498F-8124-94BF18838682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.239:*:*:*:*:*:*:*", "cpeNameId": "E4088748-A84D-4D3C-A8F9-479DB4DFEAAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.240:*:*:*:*:*:*:*", "cpeNameId": "EBEBA8E4-803E-4EF0-A3EA-295960568227"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.241:*:*:*:*:*:*:*", "cpeNameId": "07C3F8E4-4820-447B-8D85-5297B73BD561"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.242:*:*:*:*:*:*:*", "cpeNameId": "EE853DB7-F2DA-4461-926E-E8586C8B9769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.243:*:*:*:*:*:*:*", "cpeNameId": "EFB0DC56-2543-4A76-B959-03F1D12AFF46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.244:*:*:*:*:*:*:*", "cpeNameId": "F491B8F2-2AEC-4382-9095-6C6C933316B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.245:*:*:*:*:*:*:*", "cpeNameId": "EA198FA8-3EC5-458B-8210-D4176F4D2991"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.246:*:*:*:*:*:*:*", "cpeNameId": "45949E40-A94B-4C31-8110-9EB5F16CFA74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.247:*:*:*:*:*:*:*", "cpeNameId": "D6CA348F-100D-4CB7-884C-05BCD92C93AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.248:*:*:*:*:*:*:*", "cpeNameId": "774EFE10-D2D0-4C23-ACFC-AD61E9765BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.249:*:*:*:*:*:*:*", "cpeNameId": "1B531DDE-03EC-4C95-B0DD-C316CE378AD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.250:*:*:*:*:*:*:*", "cpeNameId": "7105F9F5-3435-481E-B46A-BE6F3AA78446"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.251:*:*:*:*:*:*:*", "cpeNameId": "CCB75783-8321-4164-9877-0AF392D531FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.252:*:*:*:*:*:*:*", "cpeNameId": "14D27D39-5785-461D-A4F7-46F07A67342D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.253:*:*:*:*:*:*:*", "cpeNameId": "3F9F5FE6-B76D-4F70-9F2D-0C647C026561"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.254:*:*:*:*:*:*:*", "cpeNameId": "0C15C6BC-2A46-4556-B847-17B7CA0F4DE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.255:*:*:*:*:*:*:*", "cpeNameId": "F4FA95EA-4D16-4C6E-86D9-1D0E95E8AD42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.256:*:*:*:*:*:*:*", "cpeNameId": "41A5A246-0D51-4C1E-A781-DA73D49C53B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.257:*:*:*:*:*:*:*", "cpeNameId": "339FB596-B009-493F-8DA9-19A69E175ED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.258:*:*:*:*:*:*:*", "cpeNameId": "CCF5717D-F04D-4048-94EA-C4E7A4C45F95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.259:*:*:*:*:*:*:*", "cpeNameId": "2A03EFB0-FD68-478A-B718-5D411878D8BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.260:*:*:*:*:*:*:*", "cpeNameId": "DA6AC544-7494-4683-83E9-D59AF89B5401"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.261:*:*:*:*:*:*:*", "cpeNameId": "5C4BFBA7-A9B0-425B-AE4F-0C6ED6E21759"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.262:*:*:*:*:*:*:*", "cpeNameId": "345ED523-FD6D-489D-ADBE-FC738A8816C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.263:*:*:*:*:*:*:*", "cpeNameId": "99653F61-52E2-4A51-80F3-C48F7059918B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.264:*:*:*:*:*:*:*", "cpeNameId": "424A4C5C-FB0F-4FCD-8D64-4EF4B44C04DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.265:*:*:*:*:*:*:*", "cpeNameId": "8C58D077-E378-4DA8-8AEA-9B41A26CCF78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.266:*:*:*:*:*:*:*", "cpeNameId": "FF1979DA-6280-4D83-87A2-76F9B51A484B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.267:*:*:*:*:*:*:*", "cpeNameId": "9316876F-BD99-4370-B45A-622A21A1C234"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.268:*:*:*:*:*:*:*", "cpeNameId": "7364C13D-4E86-45D4-93CE-F8A77D11245E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.269:*:*:*:*:*:*:*", "cpeNameId": "A91EF74E-716D-4D53-B818-CE1FFA90561B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.270:*:*:*:*:*:*:*", "cpeNameId": "9F8B9A50-D4BF-455B-ACAE-9773F80690D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.271:*:*:*:*:*:*:*", "cpeNameId": "14B3F541-9955-4712-A8B1-4394A3D11DAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.272:*:*:*:*:*:*:*", "cpeNameId": "994323DF-37C1-48B8-BF6D-CF726E6ADED2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.273:*:*:*:*:*:*:*", "cpeNameId": "5794FF97-3D47-47A1-9934-DF5587AD915B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.274:*:*:*:*:*:*:*", "cpeNameId": "C853072E-5EC8-483D-A2CA-4AD2297E51FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.275:*:*:*:*:*:*:*", "cpeNameId": "98009745-52F2-4846-B454-E90321008CFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.276:*:*:*:*:*:*:*", "cpeNameId": "9A192DE3-8954-4CE7-A200-FBCAE1BFF0D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.277:*:*:*:*:*:*:*", "cpeNameId": "651E5F82-D722-4636-B41C-17ECB9F614AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.278:*:*:*:*:*:*:*", "cpeNameId": "8A8873EE-B55C-4EFF-8885-329450882E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.279:*:*:*:*:*:*:*", "cpeNameId": "CEC23D4D-DCBC-4269-904F-EB1829C48B4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.280:*:*:*:*:*:*:*", "cpeNameId": "6670595A-51D0-4860-A97D-CEF230135DCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.281:*:*:*:*:*:*:*", "cpeNameId": "C6198A8B-6286-4E96-8629-D7C35E60DB89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.282:*:*:*:*:*:*:*", "cpeNameId": "E3D67109-1796-404D-8308-A39BF1338C3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.283:*:*:*:*:*:*:*", "cpeNameId": "D630C6EC-A2AB-480D-AA68-544966BFD6AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.284:*:*:*:*:*:*:*", "cpeNameId": "6BD57B4C-7ECD-41B1-9631-C1BFBBD6B049"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.285:*:*:*:*:*:*:*", "cpeNameId": "C8FCDB6A-75F8-4B62-A698-D9943A805CBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.286:*:*:*:*:*:*:*", "cpeNameId": "BA369E82-203F-4291-9419-56F1E4A53D15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.287:*:*:*:*:*:*:*", "cpeNameId": "A544C41E-F4FC-4293-A3D6-B5F91E5EF1A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.288:*:*:*:*:*:*:*", "cpeNameId": "A0BDF59E-7C92-443B-B035-B250F80E4DC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.289:*:*:*:*:*:*:*", "cpeNameId": "73D2125C-A474-417B-B135-1903D427F538"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.290:*:*:*:*:*:*:*", "cpeNameId": "477BA94B-EB37-4234-BA72-469682042745"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.291:*:*:*:*:*:*:*", "cpeNameId": "F1E29F38-68F3-4CEE-8AD5-828E7C63ED7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.292:*:*:*:*:*:*:*", "cpeNameId": "6829F830-B295-4BEA-9037-EAE6C6D83D45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.293:*:*:*:*:*:*:*", "cpeNameId": "22CF6A05-5745-4A7F-8559-702E9C3C8830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.294:*:*:*:*:*:*:*", "cpeNameId": "A36397CA-8253-443A-BEB3-EB7F21F084D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.295:*:*:*:*:*:*:*", "cpeNameId": "9597112C-DEE5-4DE7-A87B-A8CA716B2212"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.296:*:*:*:*:*:*:*", "cpeNameId": "98F92400-37C0-40CA-A0A7-AE36BA845F6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.297:*:*:*:*:*:*:*", "cpeNameId": "48BF44DC-C00D-4964-B152-341BACB0F556"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.298:*:*:*:*:*:*:*", "cpeNameId": "0E913D3C-18EF-4895-98ED-42C69A1C76B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.299:*:*:*:*:*:*:*", "cpeNameId": "B8D13EF3-4ECA-4429-8BE2-175CA0247B11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.300:*:*:*:*:*:*:*", "cpeNameId": "4D091AD8-D0D7-4EBA-814C-88E1BA8374F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.301:*:*:*:*:*:*:*", "cpeNameId": "B1830564-E39A-448F-950A-1B20281BB3B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.302:*:*:*:*:*:*:*", "cpeNameId": "8EA0AAA8-D9AB-47A4-84B1-733B8A5685BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.303:*:*:*:*:*:*:*", "cpeNameId": "8271E5F1-FC03-47FC-9102-A0491D04E4A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.304:*:*:*:*:*:*:*", "cpeNameId": "8A6B6167-7ED8-4001-BBE1-60520A1507D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.305:*:*:*:*:*:*:*", "cpeNameId": "D314E91D-4DB8-4F05-A3E9-D0AD324F2B40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.306:*:*:*:*:*:*:*", "cpeNameId": "5DE889B3-0BAD-4FA8-9450-7ADAEA53BCB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.307:*:*:*:*:*:*:*", "cpeNameId": "0A1ACC8A-123F-4239-8F9D-9DBB85D19A60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.308:*:*:*:*:*:*:*", "cpeNameId": "2C104BF2-78BD-46F5-A42B-8A7737F08831"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.309:*:*:*:*:*:*:*", "cpeNameId": "3AB452D7-1B5C-4AEC-BA48-88EAE679521A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.310:*:*:*:*:*:*:*", "cpeNameId": "A2B6D891-8756-47AC-BB50-74EED68F5348"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.311:*:*:*:*:*:*:*", "cpeNameId": "CD98624C-BF2D-4AD5-8DC6-23C0376ADEDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.312:*:*:*:*:*:*:*", "cpeNameId": "A353C4E5-BCD5-404E-BA32-E44D42939E26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.313:*:*:*:*:*:*:*", "cpeNameId": "EA493CF9-9392-46DA-B897-F85D4EF3B00E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.314:*:*:*:*:*:*:*", "cpeNameId": "50DDF9BB-6311-4505-AA6A-6240E950DD68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.315:*:*:*:*:*:*:*", "cpeNameId": "6929ED83-8C13-41A6-9C4A-CA1F36116442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.316:*:*:*:*:*:*:*", "cpeNameId": "41B4751B-1E9E-493B-AE0D-BF29E6317911"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.317:*:*:*:*:*:*:*", "cpeNameId": "8DAAD8CA-4620-48BE-95E9-9623F7AACD63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.318:*:*:*:*:*:*:*", "cpeNameId": "2C0D3085-6703-41F9-81D9-28EA3A593F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.319:*:*:*:*:*:*:*", "cpeNameId": "A439957C-0CFF-4BDF-A644-00A2602DF673"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.320:*:*:*:*:*:*:*", "cpeNameId": "3EDC01DA-28BA-4672-A0BE-8B3346F51F19"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.321:*:*:*:*:*:*:*", "cpeNameId": "77BA70B4-3A94-4325-BDC1-22564AF064F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.322:*:*:*:*:*:*:*", "cpeNameId": "0743F164-F7F4-485E-AFB7-35D7DC7455E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.323:*:*:*:*:*:*:*", "cpeNameId": "5FDB4BD5-157B-43B7-BA06-8C5FF941542F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.324:*:*:*:*:*:*:*", "cpeNameId": "DE4432A7-318F-4B7B-8CEB-9FA31468CC36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.325:*:*:*:*:*:*:*", "cpeNameId": "80F87AA1-DAEE-4931-ADF7-4183B893D8F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.326:*:*:*:*:*:*:*", "cpeNameId": "5C25C636-C95F-4E94-AC85-5E684E14069F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.327:*:*:*:*:*:*:*", "cpeNameId": "ED6E0851-1828-44F8-BF12-233B8E28DBC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.328:*:*:*:*:*:*:*", "cpeNameId": "976DF29A-943C-4C28-A071-DA2911DEDECE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.329:*:*:*:*:*:*:*", "cpeNameId": "3EE5D34F-9BBA-4FBA-9157-A4A9FA953C68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:*:*:*:*:*:*:*", "cpeNameId": "D44D12DF-CC78-4ADD-AA64-D1FF33FCFC11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:-:*:*:*:*:*:*", "cpeNameId": "82324BC8-B6FA-4FD7-B301-3CAA806DF77D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*", "cpeNameId": "710D7761-A5EC-4338-BBC6-1EA829347DD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*", "cpeNameId": "A9B4765F-04DB-41A9-9BDC-D9EBC8A916CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc3:*:*:*:*:*:*", "cpeNameId": "6D023E11-92E4-4DC4-A704-A653569DEF7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc4:*:*:*:*:*:*", "cpeNameId": "BE180D29-2D25-4945-85F5-4FF1B61A755F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc5:*:*:*:*:*:*", "cpeNameId": "B550A739-A864-4C04-8B4F-DB875CCE5876"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc6:*:*:*:*:*:*", "cpeNameId": "EE7802F2-4421-4A8F-A5E7-10ABA30BB95D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc7:*:*:*:*:*:*", "cpeNameId": "913B33F6-C76A-415E-978B-DFE69DD12443"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.1:*:*:*:*:*:*:*", "cpeNameId": "885FF46B-AF78-41E0-9992-134FC5483062"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.2:*:*:*:*:*:*:*", "cpeNameId": "417EF125-85BE-4436-8270-385A03FBF5DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.3:*:*:*:*:*:*:*", "cpeNameId": "A60F0159-BE82-4549-A156-D0C420BCD669"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.4:*:*:*:*:*:*:*", "cpeNameId": "205719B0-36E0-490F-A726-DBF0A18C7B6D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.5:*:*:*:*:*:*:*", "cpeNameId": "F6FC9B68-7A46-413B-B2F2-B96FC679293B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.6:*:*:*:*:*:*:*", "cpeNameId": "860DB2BE-F0BD-4E93-ACAF-73AB5A4287EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.7:*:*:*:*:*:*:*", "cpeNameId": "72F15093-84F6-4F64-AD90-9C0B8534002F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.8:*:*:*:*:*:*:*", "cpeNameId": "1241D778-09B7-41CF-A7F0-3F33365EAEEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.9:*:*:*:*:*:*:*", "cpeNameId": "85AF8455-0705-4C7B-A8D7-C827098D3CBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.10:*:*:*:*:*:*:*", "cpeNameId": "59B6BDD9-9094-469D-B556-347EAFFAC84A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.11:*:*:*:*:*:*:*", "cpeNameId": "195BB390-1666-4C78-8E5E-E8BB8F7CD6C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.12:*:*:*:*:*:*:*", "cpeNameId": "4611F4AE-C544-40B2-BAB0-4D75918253B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.13:*:*:*:*:*:*:*", "cpeNameId": "174828D2-1D1F-4A0F-9D4A-3D6CEEB670A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.14:*:*:*:*:*:*:*", "cpeNameId": "4A9AF5EF-2143-422E-9406-12394AE6F056"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.15:*:*:*:*:*:*:*", "cpeNameId": "0ED2B63D-794A-436E-98B2-8BB1746F8E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.16:*:*:*:*:*:*:*", "cpeNameId": "A3EE611D-A161-44D4-B8BC-3D77C35AC1DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.17:*:*:*:*:*:*:*", "cpeNameId": "77C22DEA-C18D-4F57-A5B2-D9432480F6F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.18:*:*:*:*:*:*:*", "cpeNameId": "98BC40B2-34EE-44D0-AD07-D41DA8D98FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*", "cpeNameId": "CE47DAE6-002F-46BE-8496-FC478C0B0928"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:-:*:*:*:*:*:*", "cpeNameId": "96F106B5-E746-4DE6-BCEB-07F1F572960D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc:*:*:*:*:*:*", "cpeNameId": "C0F0B475-896B-4239-8475-5B90B74BE05E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*", "cpeNameId": "206EC973-ED2E-49E1-A4AC-54F7D30DD628"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*", "cpeNameId": "AAD4C356-7CE1-4A45-96FE-6D75643AB293"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*", "cpeNameId": "4BFA1B60-7E55-4547-8B4B-AFC1256015D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*", "cpeNameId": "78E3876E-D2C3-49BA-BE26-2066849638AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*", "cpeNameId": "B9536FB8-C7B1-4C28-82CD-8D8150E7BCCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*", "cpeNameId": "BEC1B244-1D7B-47BC-A1BB-6F95945EA2C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc7:*:*:*:*:*:*", "cpeNameId": "1D3A9DBB-AF78-4A75-A55E-C851D1277498"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.1:*:*:*:*:*:*:*", "cpeNameId": "C1BE1F09-D07F-4AE4-9764-73721620F745"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.2:*:*:*:*:*:*:*", "cpeNameId": "563DD6A5-BEDD-437A-BAD5-981FD66FAA1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.3:*:*:*:*:*:*:*", "cpeNameId": "6DC9ED49-7975-48B1-B630-06680709899F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.4:*:*:*:*:*:*:*", "cpeNameId": "39F925A0-630B-4CBF-9BFC-C40C0E81BFA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.5:*:*:*:*:*:*:*", "cpeNameId": "A0E5D15C-E27F-4B55-9668-078BA5CCD7AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.6:*:*:*:*:*:*:*", "cpeNameId": "6DE6DECA-3142-43DA-B930-A48EAFF9CED3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.7:*:*:*:*:*:*:*", "cpeNameId": "0438E224-2F8A-4089-BF5E-D7763A431E39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.8:*:*:*:*:*:*:*", "cpeNameId": "0814DBD3-2193-40B5-8CE1-5C992D4C59C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.9:*:*:*:*:*:*:*", "cpeNameId": "C75890A0-5944-4BB6-B44B-83FDDA55308A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.10:*:*:*:*:*:*:*", "cpeNameId": "50932CE7-4BA6-4944-839E-800831391197"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.11:*:*:*:*:*:*:*", "cpeNameId": "21B4D5C0-665E-4B96-8A71-F84E2731725A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.12:*:*:*:*:*:*:*", "cpeNameId": "26861D80-6855-42B4-A2C5-5A5314C63454"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.13:*:*:*:*:*:*:*", "cpeNameId": "161AE6FB-AF4F-4A02-A235-9BA4D3A8BFE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.14:*:*:*:*:*:*:*", "cpeNameId": "04DDF552-0DBA-4D2D-97A9-05F348E45E2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.15:*:*:*:*:*:*:*", "cpeNameId": "8D8D509C-F3B3-4D99-AE7B-85ACE6CDCE9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.16:*:*:*:*:*:*:*", "cpeNameId": "F62EAE49-6093-4A2A-AEDC-DB4D450BCDCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.17:*:*:*:*:*:*:*", "cpeNameId": "D4A046F1-9970-4BC2-A4F8-E58871919793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.18:*:*:*:*:*:*:*", "cpeNameId": "9A7D44E8-1ABB-4FCA-900F-63CF5B432394"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:*:*:*:*:*:*:*", "cpeNameId": "3F9A62D1-EC46-4586-BF5B-075E503B34AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:-:*:*:*:*:*:*", "cpeNameId": "1355298F-E180-4ACE-BE37-E4671C6D87FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc1:*:*:*:*:*:*", "cpeNameId": "869F2A88-8ECA-4277-8EF8-04722B6397F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc2:*:*:*:*:*:*", "cpeNameId": "E213D2C7-56A5-4CDB-9FFA-D562EBE66B32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc3:*:*:*:*:*:*", "cpeNameId": "23DCE750-11FB-46DF-B936-8AEAE54EDCF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc4:*:*:*:*:*:*", "cpeNameId": "95518E21-4F70-4E7F-8A5E-41A71733B838"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc5:*:*:*:*:*:*", "cpeNameId": "86A613D5-2EDD-46C6-BD54-6EE7E0BD677F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc6:*:*:*:*:*:*", "cpeNameId": "7ACCD69E-0ADE-4675-919A-6ADCADB4E243"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc7:*:*:*:*:*:*", "cpeNameId": "0CDA0188-9155-4355-B8E0-EC98BCA4D106"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.1:*:*:*:*:*:*:*", "cpeNameId": "8AFFDBAA-464C-4017-8E0B-80E70560BD9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.2:*:*:*:*:*:*:*", "cpeNameId": "A00BC577-2BDB-4CB9-A918-5EFA87297409"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.3:*:*:*:*:*:*:*", "cpeNameId": "D03EB1B1-6645-4442-9A5B-084C2C086199"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.4:*:*:*:*:*:*:*", "cpeNameId": "4321A1DC-4069-4924-ADAF-060727BD410C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.5:*:*:*:*:*:*:*", "cpeNameId": "6E0A1034-4FFA-4B8B-BA2F-DDDF74911FD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.6:*:*:*:*:*:*:*", "cpeNameId": "0DA7186B-D3B7-4E95-B66E-8FF81C72BC75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.7:*:*:*:*:*:*:*", "cpeNameId": "2F936CBB-766A-4DFB-A60A-72F1A37577EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.8:*:*:*:*:*:*:*", "cpeNameId": "CB3F392D-0A8A-4D3E-8E62-9E7FD830F988"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.9:*:*:*:*:*:*:*", "cpeNameId": "D1A962D5-849E-4799-B4E2-58BF062A8E35"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.10:*:*:*:*:*:*:*", "cpeNameId": "358D2C77-1EDB-44D7-914F-C1B93B184AE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.11:*:*:*:*:*:*:*", "cpeNameId": "1B36CCD2-6734-4F62-887B-0B29DEAB8948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.12:*:*:*:*:*:*:*", "cpeNameId": "939C2382-3F25-4D16-B047-662EF7362D14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.13:*:*:*:*:*:*:*", "cpeNameId": "4787E970-6703-4A4A-8A25-2A6DF37E9115"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.14:*:*:*:*:*:*:*", "cpeNameId": "D9DE2C08-37BB-4B4E-9CC9-257FB5D0CC55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.15:*:*:*:*:*:*:*", "cpeNameId": "56CA0D63-01A8-4C7D-9285-0FE01EE5A4CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.16:*:*:*:*:*:*:*", "cpeNameId": "0EB823BC-6F14-4123-AFE3-5BD35C06053B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.17:*:*:*:*:*:*:*", "cpeNameId": "8DB0A362-21DC-463F-8741-7983D7091926"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.18:*:*:*:*:*:*:*", "cpeNameId": "D52B62A2-3084-4DC4-A603-BCAC0CE52FEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.19:*:*:*:*:*:*:*", "cpeNameId": "A5AE9508-CB21-4232-B63E-532C504349B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:*:*:*:*:*:*:*", "cpeNameId": "817415B8-9A60-4887-9222-0D9F02CFB071"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:-:*:*:*:*:*:*", "cpeNameId": "8835D366-AAEA-40BE-A53D-C0C034420403"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc1:*:*:*:*:*:*", "cpeNameId": "2213E83B-F249-4DA4-A296-9AE97B5995D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc2:*:*:*:*:*:*", "cpeNameId": "48BFC151-DD12-4AA8-860C-CC88EC732BFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc3:*:*:*:*:*:*", "cpeNameId": "9FA2195C-1574-4F87-9EBF-C6C98F88BAFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc4:*:*:*:*:*:*", "cpeNameId": "67BF2AB1-0C74-4B1F-8E1C-B1D82E89DDB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*", "cpeNameId": "AE91D0F4-8012-4BAC-A0C6-BB99AD9D2E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*", "cpeNameId": "1766D430-184A-4072-B189-A1497C75D6BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc7:*:*:*:*:*:*", "cpeNameId": "CAA30654-34CD-4B4F-B233-29B87ED2FBB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc8:*:*:*:*:*:*", "cpeNameId": "00096540-8FA8-46CA-BB68-93B1C5272D2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.0:*:*:*:*:*:*:*", "cpeNameId": "A009147C-ACF6-4854-AAE6-3A23AE21C4CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.0-193.el8:*:*:*:*:*:*:*", "cpeNameId": "FCA98709-2F68-4E1B-9430-7D7166871698"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.1:*:*:*:*:*:*:*", "cpeNameId": "13793707-6FDB-4423-A8E6-2ADC8BD61C3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.2:*:*:*:*:*:*:*", "cpeNameId": "EAB280BE-E42E-47BD-BC9B-9EE32D6C2A40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.3:*:*:*:*:*:*:*", "cpeNameId": "587AE0EF-5106-4CEA-9358-2D066510D151"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.4:*:*:*:*:*:*:*", "cpeNameId": "A3318DEA-3BE2-4302-BC9B-A034934F9D1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.5:*:*:*:*:*:*:*", "cpeNameId": "6DFCE771-61CC-4086-9ABA-D355FF8F3148"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.6:*:*:*:*:*:*:*", "cpeNameId": "445E159B-AA55-48BD-93C7-2B930AD4EB83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.7:*:*:*:*:*:*:*", "cpeNameId": "B27A8950-AB89-4120-80DA-B349652A523D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.8:*:*:*:*:*:*:*", "cpeNameId": "8E631816-CFC2-4D77-AE17-D796C455F715"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.9:*:*:*:*:*:*:*", "cpeNameId": "8FD85D0C-385D-488A-A090-32B066B8C2EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.10:*:*:*:*:*:*:*", "cpeNameId": "FEEDBD99-9EB3-41AF-815C-571AF46B5D85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.11:*:*:*:*:*:*:*", "cpeNameId": "7E7CBF51-E6C8-46E1-8DD3-CFBAB87EA47B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.12:*:*:*:*:*:*:*", "cpeNameId": "F965D923-D9D7-4EF1-B1FB-07EA2FEEBE31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.13:*:*:*:*:*:*:*", "cpeNameId": "E5834B3F-3734-4FEB-9440-7AE8BE96EBB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.14:*:*:*:*:*:*:*", "cpeNameId": "09696490-5ABF-48D2-823F-C1822003B392"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.15:*:*:*:*:*:*:*", "cpeNameId": "E6911EAC-4DB4-41E9-9401-B4226373EE5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.16:*:*:*:*:*:*:*", "cpeNameId": "AC125B64-72FD-4946-B3A7-663299025809"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.17:*:*:*:*:*:*:*", "cpeNameId": "EF3569D5-2C62-4458-974E-918A784BD62A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.18:*:*:*:*:*:*:*", "cpeNameId": "1FA907F8-0BCB-4507-8714-DC1D5781D42D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.19:*:*:*:*:*:*:*", "cpeNameId": "942860D3-A3FF-4932-A6FB-9459A59644BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.20:*:*:*:*:*:*:*", "cpeNameId": "EC116A00-67FF-4F9B-9B3B-EFB39878E41F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*", "cpeNameId": "A3163086-ED2B-4462-9265-6F1DCEAB4D54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:-:*:*:*:*:*:*", "cpeNameId": "057CC752-CE29-466B-827D-3930C41F1C3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc1:*:*:*:*:*:*", "cpeNameId": "AFC357CC-56A5-4555-959A-34F88351D81B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc2:*:*:*:*:*:*", "cpeNameId": "ED61D354-4BB9-4D66-87FB-86662D7B6B12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc3:*:*:*:*:*:*", "cpeNameId": "A84469B4-B1DD-4DED-AC99-EA9C2CA93CF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc4:*:*:*:*:*:*", "cpeNameId": "EE659E91-B594-49B5-BC25-C4BAB3BE192E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc5:*:*:*:*:*:*", "cpeNameId": "2B7349C1-F08A-44E5-8FB8-3F2804E5A07F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc6:*:*:*:*:*:*", "cpeNameId": "EB37BD16-E204-41BE-ADE4-01B875CBE896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc7:*:*:*:*:*:*", "cpeNameId": "745C3308-0D37-4503-B9FD-1C7A675E7C3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc8:*:*:*:*:*:*", "cpeNameId": "C09DBABE-8232-4196-8C42-2D4509AD02FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.1:*:*:*:*:*:*:*", "cpeNameId": "CBFE536A-5936-4037-A140-B381A09E0313"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.2:*:*:*:*:*:*:*", "cpeNameId": "E7375DDA-E673-4CB3-9A7A-751E0A34FC42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.3:*:*:*:*:*:*:*", "cpeNameId": "99F55D5C-293A-4F8A-8C8C-D324BECF805D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.4:*:*:*:*:*:*:*", "cpeNameId": "C61FC074-FB83-48ED-8299-CF0565B28BF0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.5:*:*:*:*:*:*:*", "cpeNameId": "813A19FD-6C0F-442D-BD13-D924AAB177A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.6:*:*:*:*:*:*:*", "cpeNameId": "5387070B-08B1-4B14-ABD0-845D0DD8F84B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.7:*:*:*:*:*:*:*", "cpeNameId": "E39CE6E9-2A15-486F-881E-000CEB221CFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.8:*:*:*:*:*:*:*", "cpeNameId": "3951D003-9ACB-4530-AD87-BA6495862F19"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.9:*:*:*:*:*:*:*", "cpeNameId": "16722D4A-04DC-40F0-B6BE-19B503E6F896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.10:*:*:*:*:*:*:*", "cpeNameId": "1F88CB52-D7B5-4946-A367-45DE35034F51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.11:*:*:*:*:*:*:*", "cpeNameId": "77B502BA-B846-4C9C-A8CE-3EF988CECC92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.12:*:*:*:*:*:*:*", "cpeNameId": "23451725-61D8-4924-88FD-F296F0BB0BDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.13:*:*:*:*:*:*:*", "cpeNameId": "2647DBE8-332D-4420-A7FE-971F97D450E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.14:*:*:*:*:*:*:*", "cpeNameId": "EC80AF58-D2F3-439F-8A3D-0333C832805C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.15:*:*:*:*:*:*:*", "cpeNameId": "5FF48FD7-42B6-446C-9142-C46F87307A23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.16:*:*:*:*:*:*:*", "cpeNameId": "27DD882E-6137-45D8-95CA-46E0A0E9D546"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.17:*:*:*:*:*:*:*", "cpeNameId": "3D79ECA3-B493-4422-B61B-F9D8725540BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.18:*:*:*:*:*:*:*", "cpeNameId": "D815E2B8-DD92-47E3-A1C3-E9B7859ED848"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.19:*:*:*:*:*:*:*", "cpeNameId": "3ED97E59-18F8-4970-8DCF-108DB66C0B64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.20:*:*:*:*:*:*:*", "cpeNameId": "F5B56565-8277-4435-81A3-14A07CD1CFB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.21:*:*:*:*:*:*:*", "cpeNameId": "08DEF207-BE10-4D38-B198-E0E81A7D8DD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.22:*:*:*:*:*:*:*", "cpeNameId": "6406E989-2DA9-4473-8A19-F34C0AA0A101"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.23:*:*:*:*:*:*:*", "cpeNameId": "BAB4A7B7-201A-49DD-8CEA-C8276A386DB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.24:*:*:*:*:*:*:*", "cpeNameId": "C1807F8B-4224-4C20-A7E6-A1A37CFE804C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.25:*:*:*:*:*:*:*", "cpeNameId": "BC055247-93EC-4557-97C5-3F2476EE0F15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.26:*:*:*:*:*:*:*", "cpeNameId": "7D6369DC-902C-4BC1-A26D-C5C913143EB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.26.1:*:*:*:*:*:*:*", "cpeNameId": "8C01371D-728D-41FF-8EDB-479FFEB181A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.27:*:*:*:*:*:*:*", "cpeNameId": "A32084B7-D6A4-4F74-B282-DDB6DEF0C5AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.28:*:*:*:*:*:*:*", "cpeNameId": "E0A0C51F-ED33-48CF-927D-0CA8970B6D1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.29:*:*:*:*:*:*:*", "cpeNameId": "21FF2212-87CD-409F-8FA3-A36D8AA94607"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.30:*:*:*:*:*:*:*", "cpeNameId": "429E0577-DB63-4580-8B2F-9F00743EB4B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.31:*:*:*:*:*:*:*", "cpeNameId": "3371D4B5-E4D9-483E-AA24-B99A03C20991"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.32:*:*:*:*:*:*:*", "cpeNameId": "316A0495-6409-4E82-A2FF-2A3158DF6020"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.33:*:*:*:*:*:*:*", "cpeNameId": "2ADFFFEE-80CB-4EF8-8893-D1D2CDBF2687"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.34:*:*:*:*:*:*:*", "cpeNameId": "D3C47B41-3976-412A-877C-08C558B67F17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.35:*:*:*:*:*:*:*", "cpeNameId": "C12B86A6-026B-4109-9E3B-5A334A73871F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.36:*:*:*:*:*:*:*", "cpeNameId": "855C5C5D-CC69-4629-9D55-4E25F1346965"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.37:*:*:*:*:*:*:*", "cpeNameId": "35B14A6C-CDA5-4E1F-B6C6-4E8305D32DFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.38:*:*:*:*:*:*:*", "cpeNameId": "9CB2A48B-F8FC-47BE-9DF4-2B95585425F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.39:*:*:*:*:*:*:*", "cpeNameId": "E6A1D1E0-0373-4295-897D-C7E699C018E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.40:*:*:*:*:*:*:*", "cpeNameId": "970D15E0-EE86-4AAB-9840-3CD713AEF03B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.41:*:*:*:*:*:*:*", "cpeNameId": "0B47B7E6-5110-44D8-BDEA-4080A6A28FCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.42:*:*:*:*:*:*:*", "cpeNameId": "2FF8D63B-85F6-43EC-B69F-231ECF7D0312"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.43:*:*:*:*:*:*:*", "cpeNameId": "935B8487-6BDD-4FFF-9F7E-00A86BB69CDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.44:*:*:*:*:*:*:*", "cpeNameId": "48F99607-CA4F-4629-A68D-4349153DF423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.45:*:*:*:*:*:*:*", "cpeNameId": "1CFB073B-B310-49DC-893B-B46DE6336F4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.46:*:*:*:*:*:*:*", "cpeNameId": "8F2CA065-9492-44F8-9C69-B151B71803CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.47:*:*:*:*:*:*:*", "cpeNameId": "65D05643-4760-4FC5-97A3-BC5CCCA46CE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.48:*:*:*:*:*:*:*", "cpeNameId": "805F2CFA-C623-43A6-BA75-8A677011B7C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.49:*:*:*:*:*:*:*", "cpeNameId": "E9B45E20-6F1C-4909-95E4-17956AB05513"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.50:*:*:*:*:*:*:*", "cpeNameId": "02565DD0-1F69-44F5-9710-F4559686BCB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.51:*:*:*:*:*:*:*", "cpeNameId": "4A2A0E35-E26F-470C-8293-E71B0D280E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.52:*:*:*:*:*:*:*", "cpeNameId": "E4259B27-55AA-4906-A88E-2F156833874F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.53:*:*:*:*:*:*:*", "cpeNameId": "2399AB59-0AAB-45C3-9359-778E0CEF66FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.54:*:*:*:*:*:*:*", "cpeNameId": "46C3AEDA-6F26-4416-BF76-1FEBBD354F3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.55:*:*:*:*:*:*:*", "cpeNameId": "10F1A367-B071-4F9A-A2CB-0C7FF216A216"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.56:*:*:*:*:*:*:*", "cpeNameId": "DF3D3A29-EB49-483C-9737-67E18806F753"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.57:*:*:*:*:*:*:*", "cpeNameId": "D79FAF76-5403-4082-95B6-702810120DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.58:*:*:*:*:*:*:*", "cpeNameId": "93DF7061-A282-4290-9D97-63ACC7575826"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.59:*:*:*:*:*:*:*", "cpeNameId": "88CB7AC8-7CAA-4947-8578-AB8B5A9C7D8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.60:*:*:*:*:*:*:*", "cpeNameId": "8B9A9641-54E1-40FE-AD41-551002220084"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.61:*:*:*:*:*:*:*", "cpeNameId": "04A60F34-73F7-49AB-AB09-1083721DE784"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.62:*:*:*:*:*:*:*", "cpeNameId": "D4A637B9-0057-4393-A19F-69879DA1CA8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.63:*:*:*:*:*:*:*", "cpeNameId": "AF1FE2CD-7236-4965-952B-6F172159373C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.64:*:*:*:*:*:*:*", "cpeNameId": "7D1F715A-1A92-4ECE-85BB-0CC907BEDD91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.65:*:*:*:*:*:*:*", "cpeNameId": "4116C6D8-AF20-48AF-8ADA-0506911A3459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.66:*:*:*:*:*:*:*", "cpeNameId": "4388B248-80C6-4086-B1E6-4CEE1BF7602F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.67:*:*:*:*:*:*:*", "cpeNameId": "50EF8BC5-16C3-4AD8-A2D1-1A2608CD7374"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.68:*:*:*:*:*:*:*", "cpeNameId": "5D10408F-E5C0-40B2-A497-3E71FB6DD431"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.69:*:*:*:*:*:*:*", "cpeNameId": "10504EA1-D9B1-44C8-A9EC-B8D32AAFCF5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.70:*:*:*:*:*:*:*", "cpeNameId": "AA9003D3-8912-4A70-8B69-3F2F345FFD89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.71:*:*:*:*:*:*:*", "cpeNameId": "233CCC29-E4BB-4DAD-9F45-CEC77425C279"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.72:*:*:*:*:*:*:*", "cpeNameId": "B3336506-E63D-491E-B756-15C59D0B0EAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.73:*:*:*:*:*:*:*", "cpeNameId": "57449032-831C-45A0-9FE9-E630FB005BEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.74:*:*:*:*:*:*:*", "cpeNameId": "27086504-19AA-48F8-AAC3-FE71072F4AC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.75:*:*:*:*:*:*:*", "cpeNameId": "858F7980-5197-42DE-B55C-CA706999F200"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.76:*:*:*:*:*:*:*", "cpeNameId": "31423569-8FBC-411E-9F95-9820746128BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.77:*:*:*:*:*:*:*", "cpeNameId": "D3EB9447-CCF7-4803-ABBB-15477850C76B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.78:*:*:*:*:*:*:*", "cpeNameId": "68BD1635-2CE6-464F-B32D-D0AE25DEB9E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.79:*:*:*:*:*:*:*", "cpeNameId": "8FFF3C74-22E6-4418-AD93-AA773E549428"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.80:*:*:*:*:*:*:*", "cpeNameId": "721DC148-9BCB-4B12-88AA-0BAF3A380C77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.81:*:*:*:*:*:*:*", "cpeNameId": "9D3ED37A-08C8-4430-BB0A-EFA6D1AF1D5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.82:*:*:*:*:*:*:*", "cpeNameId": "00536E1F-7C8D-4DDC-8629-ABE2B4EDA61B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.83:*:*:*:*:*:*:*", "cpeNameId": "6877CB77-34C0-4B45-BED7-7966B69D89F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.84:*:*:*:*:*:*:*", "cpeNameId": "614F4D67-484D-488A-8DB5-9FF8F939927B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.85:*:*:*:*:*:*:*", "cpeNameId": "C3D19825-51CE-43E1-904C-1344DB3775A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.86:*:*:*:*:*:*:*", "cpeNameId": "2C509040-DF4B-4BD3-8428-4BB9ED4D3BEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.87:*:*:*:*:*:*:*", "cpeNameId": "4455DE42-A354-4EF5-A49A-345954CD65EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.88:*:*:*:*:*:*:*", "cpeNameId": "0F57DC5F-F143-44EE-9037-3BBF9BF3A1E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.89:*:*:*:*:*:*:*", "cpeNameId": "D4475A2E-E667-4618-A347-10EC5EA6657D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.90:*:*:*:*:*:*:*", "cpeNameId": "2C94A5E1-6EC8-4F69-8C81-18BA6B3E22CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.91:*:*:*:*:*:*:*", "cpeNameId": "31EE797A-51CC-46B2-B768-1FA25A37706D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.92:*:*:*:*:*:*:*", "cpeNameId": "4748A9ED-7812-4451-81CD-B75547B3C532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.93:*:*:*:*:*:*:*", "cpeNameId": "119FC260-DEC1-4E63-AF81-2F3360E78EB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.94:*:*:*:*:*:*:*", "cpeNameId": "25A22D4C-1973-4287-B791-87F903F64B97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.95:*:*:*:*:*:*:*", "cpeNameId": "ACD2D3C9-BA85-4EEE-9A65-FE83E3495315"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.96:*:*:*:*:*:*:*", "cpeNameId": "3B169D06-CA15-4A4A-980A-A056E6C81881"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.97:*:*:*:*:*:*:*", "cpeNameId": "A18ABB80-25F6-4328-B68F-A3B4B23763E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.98:*:*:*:*:*:*:*", "cpeNameId": "F8BEC111-87BF-4B6C-BBF6-62EE9A763119"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.99:*:*:*:*:*:*:*", "cpeNameId": "2CE59324-24EA-46B0-939D-BA1815313EA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.100:*:*:*:*:*:*:*", "cpeNameId": "86C29F08-DF43-426C-9E23-1E3416463DBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.101:*:*:*:*:*:*:*", "cpeNameId": "81DE128C-6A1B-4676-A99B-58B77482593A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.102:*:*:*:*:*:*:*", "cpeNameId": "FDA36DFA-EE0A-4DEE-B7C2-A2AF9F84E0CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.103:*:*:*:*:*:*:*", "cpeNameId": "FE71C8C4-8159-49DC-87F0-4A98BEA448C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.104:*:*:*:*:*:*:*", "cpeNameId": "35D6D06A-7705-4EA0-9209-55B7ED61E83A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.105:*:*:*:*:*:*:*", "cpeNameId": "B2DA3294-00F2-4509-A8B2-0F53D69F2B36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.106:*:*:*:*:*:*:*", "cpeNameId": "D337E554-D6A9-4CFC-9985-F670B7654434"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.107:*:*:*:*:*:*:*", "cpeNameId": "FE52DA4B-3ACB-4510-AA7A-9CCFE25E5B87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.108:*:*:*:*:*:*:*", "cpeNameId": "82BED585-BBDF-41AE-B925-D4CA36F697BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.109:*:*:*:*:*:*:*", "cpeNameId": "C1526792-F597-4674-B998-9A4FF075956E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.110:*:*:*:*:*:*:*", "cpeNameId": "B48E2837-F8E0-42BA-A7D2-B9EA5A770E1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.111:*:*:*:*:*:*:*", "cpeNameId": "B52E1607-47C2-4AD5-95D0-F35A901E5D3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.112:*:*:*:*:*:*:*", "cpeNameId": "0CDD6E73-775F-49CF-A3D6-E9054EB43D36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.113:*:*:*:*:*:*:*", "cpeNameId": "8A144377-4D4C-48F7-80AB-A8B50F86D132"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.114:*:*:*:*:*:*:*", "cpeNameId": "4B6DF9A7-218F-435C-A5AB-61A5575D9DBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.115:*:*:*:*:*:*:*", "cpeNameId": "8D64C2A7-DF73-481A-8A55-790CD5DABBC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.116:*:*:*:*:*:*:*", "cpeNameId": "36E4D70D-9E0D-44AC-9CE9-168111BE078D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.117:*:*:*:*:*:*:*", "cpeNameId": "BFF2F68A-DA2E-4118-A4CB-E7FA7C719C97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.118:*:*:*:*:*:*:*", "cpeNameId": "B8DEB967-1BA5-43BA-B659-5AC369F5527B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.118-2:*:*:*:*:*:*:*", "cpeNameId": "8BDE7B9C-7D49-4FB9-9095-89B0FD601AC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.119:*:*:*:*:*:*:*", "cpeNameId": "1EBD0B5F-457A-4365-B3B0-45E4C0B21B93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.120:*:*:*:*:*:*:*", "cpeNameId": "0C712977-921D-4FD3-BCBB-6F4A86AA7594"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.121:*:*:*:*:*:*:*", "cpeNameId": "0D8947E0-FBE1-424F-BA96-F5A83CF87A3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.122:*:*:*:*:*:*:*", "cpeNameId": "A79D9A4E-58CD-4825-9EC3-0B0499C90BF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.123:*:*:*:*:*:*:*", "cpeNameId": "A61315CE-EC4F-4734-8B07-9670C7DAF959"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.124:*:*:*:*:*:*:*", "cpeNameId": "8B2AB2CC-ED8F-40C0-A027-7A93B70D0ABF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.125:*:*:*:*:*:*:*", "cpeNameId": "DF0EBF12-4078-42F7-A92B-5D54056AE5EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.126:*:*:*:*:*:*:*", "cpeNameId": "A2A07202-24D9-4929-93CE-AD808F353C60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.127:*:*:*:*:*:*:*", "cpeNameId": "1AB674F5-1B69-4DE7-AF61-50787A69A5D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.128:*:*:*:*:*:*:*", "cpeNameId": "3D2F68B8-736E-4899-9B1B-ED6E8DE6CF3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.129:*:*:*:*:*:*:*", "cpeNameId": "76CD5FC7-448D-4F20-864B-3567B07D1B56"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.130:*:*:*:*:*:*:*", "cpeNameId": "C61BEEDC-1AA7-4453-9C1F-1B61D1EA024F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.131:*:*:*:*:*:*:*", "cpeNameId": "418276D9-F035-4B0B-BCCB-D5FB488D5B31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.132:*:*:*:*:*:*:*", "cpeNameId": "C5D35F68-0A1C-44A4-952A-DDDF21BC09EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.133:*:*:*:*:*:*:*", "cpeNameId": "1F548D92-C48B-4886-A2B3-6E74E8E0F55B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.134:*:*:*:*:*:*:*", "cpeNameId": "F20B9429-FA58-466C-9DFA-9E806AF804B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.135:*:*:*:*:*:*:*", "cpeNameId": "36A1C0D1-63B5-4817-8BA5-C60D3D6B6B38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.136:*:*:*:*:*:*:*", "cpeNameId": "33C1E0F9-16D2-4829-A3BE-88C14FF70938"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.137:*:*:*:*:*:*:*", "cpeNameId": "C7C55512-FBE6-47D5-8A7A-BBD5577D17E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.138:*:*:*:*:*:*:*", "cpeNameId": "769005B9-5005-411C-B4EE-CF0C62490EF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.139:*:*:*:*:*:*:*", "cpeNameId": "06D197F7-661E-4C49-B099-4545C422C7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.140:*:*:*:*:*:*:*", "cpeNameId": "776A104E-F94D-406D-BF76-9B11C3365D7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.141:*:*:*:*:*:*:*", "cpeNameId": "5035E747-DEF4-4DA3-83CF-5BD2A6A9A54A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.142:*:*:*:*:*:*:*", "cpeNameId": "D4080EBB-DEB7-4E16-BE55-BEFAFB7E93E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.143:*:*:*:*:*:*:*", "cpeNameId": "853BB9C3-4467-4FD8-9A46-E2009C5F4357"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.144:*:*:*:*:*:*:*", "cpeNameId": "2AEB23BA-8389-4940-B626-9E7DAF29822D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.145:*:*:*:*:*:*:*", "cpeNameId": "84991F4A-4107-48A6-8D6E-D85F2EF55EBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.146:*:*:*:*:*:*:*", "cpeNameId": "7A9370E6-CF76-4989-9368-76B2E434A857"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.147:*:*:*:*:*:*:*", "cpeNameId": "DEE46645-5E8C-4F37-BCD0-322E77397F59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.148:*:*:*:*:*:*:*", "cpeNameId": "2093C809-0485-44CC-B0ED-5C2B7DBFEA99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.149:*:*:*:*:*:*:*", "cpeNameId": "98DAC7B2-8F21-49EF-B53B-23B8A22A8975"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.150:*:*:*:*:*:*:*", "cpeNameId": "E28A93DC-B824-4692-A0F3-B5CAB77B3A48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.151:*:*:*:*:*:*:*", "cpeNameId": "365D8293-E1BC-4F24-A5FF-B7E12943EE70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.152:*:*:*:*:*:*:*", "cpeNameId": "FFEFA6D6-3D07-4911-A0D8-3C7A27A95143"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.153:*:*:*:*:*:*:*", "cpeNameId": "051C7A5C-25A0-408C-AFFA-19DB17B0DFE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.154:*:*:*:*:*:*:*", "cpeNameId": "34798860-1C32-431D-8095-4D25E900D047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.155:*:*:*:*:*:*:*", "cpeNameId": "BCB220C7-6880-4054-B512-91A8A5F683CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.156:*:*:*:*:*:*:*", "cpeNameId": "3DDC9F23-49BA-42AE-9251-D0DE0DEF8DD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.157:*:*:*:*:*:*:*", "cpeNameId": "B65EAD3A-8DA1-40A2-B14F-C3D61E19D592"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.158:*:*:*:*:*:*:*", "cpeNameId": "D8A0F47B-9F15-4DC9-9134-C2410BF8E55E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.159:*:*:*:*:*:*:*", "cpeNameId": "FD07FFAC-9B06-43E9-A1AE-F085B99D2A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.160:*:*:*:*:*:*:*", "cpeNameId": "B6133234-102E-4B8C-A0F0-E9E1538BD098"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.161:*:*:*:*:*:*:*", "cpeNameId": "E03ADD0A-1D87-4772-BE21-A5ED5FC96BE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.162:*:*:*:*:*:*:*", "cpeNameId": "39EDA362-7B7A-4D97-B8FB-B7B9696B05E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.163:*:*:*:*:*:*:*", "cpeNameId": "6D54CD36-C5A1-437B-85B6-B59A45D1E007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.164:*:*:*:*:*:*:*", "cpeNameId": "00F1FD43-244A-4CC2-B16C-BC98C99FBB27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.165:*:*:*:*:*:*:*", "cpeNameId": "D34CA2D9-09FB-473B-9C0F-0C392B3132F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.166:*:*:*:*:*:*:*", "cpeNameId": "4AE874DA-0375-4E7E-84DC-BCAB385B5C30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.167:*:*:*:*:*:*:*", "cpeNameId": "DD93F0EB-9B9D-4F5B-BDE0-F0F251381EB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.168:*:*:*:*:*:*:*", "cpeNameId": "D28DA286-D5D2-40D2-82CA-FC8C79CC5F23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.169:*:*:*:*:*:*:*", "cpeNameId": "8A84A955-ECC0-4B19-B09D-5BB422561099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.170:*:*:*:*:*:*:*", "cpeNameId": "79343991-197E-4074-A17D-DA9A050EED4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.171:*:*:*:*:*:*:*", "cpeNameId": "BD8EBDB7-7226-4A65-8E8E-74D5A3F671B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.172:*:*:*:*:*:*:*", "cpeNameId": "0CA2E704-2400-4391-9D42-637DC8C25BED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.173:*:*:*:*:*:*:*", "cpeNameId": "8A6A2923-E6F6-4B77-9F0E-BA6FD58DE8D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.174:*:*:*:*:*:*:*", "cpeNameId": "18805724-EB20-4960-8D96-D7D17DDBDE30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.175:*:*:*:*:*:*:*", "cpeNameId": "5BD11FEB-E163-4734-823A-A784C4C6FE9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.176:*:*:*:*:*:*:*", "cpeNameId": "960EB99C-0D42-4892-9989-4473683490E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.177:*:*:*:*:*:*:*", "cpeNameId": "5A04EB31-D67D-4DF0-81D6-D2EB42FCDCD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.178:*:*:*:*:*:*:*", "cpeNameId": "B2F1908E-4EA9-490A-A154-8B4621189CAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.179:*:*:*:*:*:*:*", "cpeNameId": "66E97557-5D46-4DEB-B1DE-C668E5B8B3FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.180:*:*:*:*:*:*:*", "cpeNameId": "9979A105-8BA0-4AE2-BDFB-7D79DE2FBBFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.181:*:*:*:*:*:*:*", "cpeNameId": "90E6E2D5-7A6D-4E95-9A52-FF7B9A8A2441"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.182:*:*:*:*:*:*:*", "cpeNameId": "69A2955B-EC3D-41AF-978F-CBFBC556F92D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.183:*:*:*:*:*:*:*", "cpeNameId": "D3F33DDF-A839-49B6-B3B8-EEACA952A9E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.184:*:*:*:*:*:*:*", "cpeNameId": "19F1F05C-A087-44E8-983E-2EB143DC1D8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.185:*:*:*:*:*:*:*", "cpeNameId": "F145BE0F-E7F0-442E-BDA7-C63C7E168E2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.186:*:*:*:*:*:*:*", "cpeNameId": "B4D0C3FD-6476-413B-BF42-8C2641E289AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.187:*:*:*:*:*:*:*", "cpeNameId": "8D0F70F4-570E-4C9E-B51B-42BB544A72EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.188:*:*:*:*:*:*:*", "cpeNameId": "780D6AF4-4E15-4413-832E-0F50248A4B0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.189:*:*:*:*:*:*:*", "cpeNameId": "20F1C4AC-ECCF-4001-8CEA-457D8E6BDE3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.190:*:*:*:*:*:*:*", "cpeNameId": "2CCC5886-AA10-470F-B2E9-B38438848CD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.191:*:*:*:*:*:*:*", "cpeNameId": "0E0DFF46-8703-4A82-B4CB-DD923D09ACA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.192:*:*:*:*:*:*:*", "cpeNameId": "3456DA2C-41BD-4021-B3F4-C0C7EFBA35B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.193:*:*:*:*:*:*:*", "cpeNameId": "44D8482E-577B-4B3E-A84D-A1FA11CE744D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.194:*:*:*:*:*:*:*", "cpeNameId": "278C5BBE-D4E2-43AC-B338-0B4C819B16FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.195:*:*:*:*:*:*:*", "cpeNameId": "30A50973-7C58-419D-8FED-111FD1615CD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.196:*:*:*:*:*:*:*", "cpeNameId": "68839FE1-F3CD-49BF-902D-28A47A024FC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.197:*:*:*:*:*:*:*", "cpeNameId": "8C685C52-5BE6-4D58-BBE3-AE69FF1B758C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.198:*:*:*:*:*:*:*", "cpeNameId": "2F461C57-E447-4647-BFFC-C44767B5CDEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.199:*:*:*:*:*:*:*", "cpeNameId": "65EF0724-0838-446F-85BC-A51CDD060978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.200:*:*:*:*:*:*:*", "cpeNameId": "16752BB9-187D-48B0-8E87-D676FF91C631"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.201:*:*:*:*:*:*:*", "cpeNameId": "2BDCFC6A-E39A-4AD7-ABFA-5F15BDB22286"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.202:*:*:*:*:*:*:*", "cpeNameId": "CD1E47CB-CE3F-4154-8131-133CE38302D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.203:*:*:*:*:*:*:*", "cpeNameId": "73D48406-40CE-4D07-B08C-6C6ED58D13A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.204:*:*:*:*:*:*:*", "cpeNameId": "6231157D-84BB-46D9-B0CF-AAF2FD31D3C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.205:*:*:*:*:*:*:*", "cpeNameId": "253E528A-1462-4B93-9978-C23C7DD14FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.206:*:*:*:*:*:*:*", "cpeNameId": "2233D818-CCDB-4166-901F-29D032F730AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.207:*:*:*:*:*:*:*", "cpeNameId": "25D133DF-5D1B-46EA-9019-C81A1623C74D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.208:*:*:*:*:*:*:*", "cpeNameId": "1172736D-6A80-4AD1-B861-43797791A6F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.209:*:*:*:*:*:*:*", "cpeNameId": "FD71CF2C-F734-4E31-AAB7-41AC133EBFDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.210:*:*:*:*:*:*:*", "cpeNameId": "2BA3CAE2-A53E-4516-9E32-DCF40D28A710"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.211:*:*:*:*:*:*:*", "cpeNameId": "50B9C1D0-7B42-43CC-9103-A96EA1B8D3B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.212:*:*:*:*:*:*:*", "cpeNameId": "D12B8C79-B286-47EA-86E0-4C415154600F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.213:*:*:*:*:*:*:*", "cpeNameId": "C90B250E-D388-459F-91FF-19CF7A6292AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.214:*:*:*:*:*:*:*", "cpeNameId": "EE578B4A-6420-46EA-8C33-994379131EB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.215:*:*:*:*:*:*:*", "cpeNameId": "5581DCBE-D268-477A-AA1F-B4204F1CE309"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.216:*:*:*:*:*:*:*", "cpeNameId": "4633CDC1-D620-43BD-A59B-1CCE17C70740"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.217:*:*:*:*:*:*:*", "cpeNameId": "62DDB6C3-A7A1-466E-A101-6FE1AA552C94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.218:*:*:*:*:*:*:*", "cpeNameId": "F6798282-7FF8-43E0-8B9D-1A9BDB0E3E48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.219:*:*:*:*:*:*:*", "cpeNameId": "57D287C6-0EF3-4B47-A893-F3712CC12478"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.220:*:*:*:*:*:*:*", "cpeNameId": "A0B09A4E-2318-48CE-810F-84F2E721D722"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.221:*:*:*:*:*:*:*", "cpeNameId": "0F3D6297-A92E-479B-91F3-4162BFDC9184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.222:*:*:*:*:*:*:*", "cpeNameId": "14FFED1D-629A-428E-A473-8327DB224D64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.223:*:*:*:*:*:*:*", "cpeNameId": "9625BCC9-FBBE-42C7-82C2-F7D75F866E53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.224:*:*:*:*:*:*:*", "cpeNameId": "D5BC9FF8-1337-4A3B-A66C-CC31C701B22C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.225:*:*:*:*:*:*:*", "cpeNameId": "2ED5BE75-F496-47BA-B521-36F6844FFE01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.226:*:*:*:*:*:*:*", "cpeNameId": "02E6B2D5-DA63-4574-90D7-15F7EAA70DA1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.227:*:*:*:*:*:*:*", "cpeNameId": "EB84BCF0-8987-46AC-9E6F-D9E17DEFD1D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.228:*:*:*:*:*:*:*", "cpeNameId": "7ACE67A9-9EAD-4AB0-A99D-F37993392E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.229:*:*:*:*:*:*:*", "cpeNameId": "ED71AA15-673C-416E-9CAF-3440D41A1E22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.230:*:*:*:*:*:*:*", "cpeNameId": "CB9E000D-CEAE-488E-B9F7-756EF13ECBE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.231:*:*:*:*:*:*:*", "cpeNameId": "F79CB637-6B2C-46DC-BD81-8B0583AAC33C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.232:*:*:*:*:*:*:*", "cpeNameId": "6CDDD19B-7E18-4A0E-AC09-B86E9401F516"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.233:*:*:*:*:*:*:*", "cpeNameId": "3EF64EBF-557B-4AB2-B2E5-0D03035197DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.234:*:*:*:*:*:*:*", "cpeNameId": "9E2D001E-2282-4A78-AB00-B37189C8CD59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.235:*:*:*:*:*:*:*", "cpeNameId": "31A795CF-5B8E-4B6C-94DC-3B37A8423823"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.236:*:*:*:*:*:*:*", "cpeNameId": "813866EF-11A3-41D9-9735-ECFEFCDBA1AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.237:*:*:*:*:*:*:*", "cpeNameId": "C0F81506-A565-4F17-BEC9-1B54FAD059CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.238:*:*:*:*:*:*:*", "cpeNameId": "1509FEA6-FA47-46C8-A117-8913CCFDB5AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.239:*:*:*:*:*:*:*", "cpeNameId": "C05A4F03-15E3-4C08-8958-6A057F7911B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.240:*:*:*:*:*:*:*", "cpeNameId": "4EAF2417-3F1E-446A-AD33-77B21AE04E06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.241:*:*:*:*:*:*:*", "cpeNameId": "8FFB9F0D-3B6F-494F-89AC-EAC4438C0B1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.242:*:*:*:*:*:*:*", "cpeNameId": "A27EEF03-9001-4C7D-B063-C1FE8FC05EE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.243:*:*:*:*:*:*:*", "cpeNameId": "529CAB2E-5F5C-4699-BC48-E93341EE6B67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.244:*:*:*:*:*:*:*", "cpeNameId": "9FF0D590-EAB2-4B36-BBE2-008A4E800722"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.245:*:*:*:*:*:*:*", "cpeNameId": "590BFECB-A2B4-4C3F-9017-6D565899E1F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.246:*:*:*:*:*:*:*", "cpeNameId": "CB0BB20C-811F-4B9B-B827-3A42CA5539D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.247:*:*:*:*:*:*:*", "cpeNameId": "B532E91C-FEBE-4C29-B9C7-E899AF134D48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.248:*:*:*:*:*:*:*", "cpeNameId": "8222442A-C4EC-45CD-9A4C-76E562756CBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.249:*:*:*:*:*:*:*", "cpeNameId": "444D84A8-CE8F-4BE2-A463-B4E693104BA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.250:*:*:*:*:*:*:*", "cpeNameId": "7243A073-0900-4470-98B8-FE5839442E3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.251:*:*:*:*:*:*:*", "cpeNameId": "B4EAB6D9-28E2-45CD-BE10-5EF905373AF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.252:*:*:*:*:*:*:*", "cpeNameId": "CF09CCB5-9276-41A3-8330-8037A633B793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.253:*:*:*:*:*:*:*", "cpeNameId": "9BB592D7-81CC-4DE7-9256-FAE66467FFD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.254:*:*:*:*:*:*:*", "cpeNameId": "C78BD176-2DFC-4BAE-95C1-3A495252A65A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.255:*:*:*:*:*:*:*", "cpeNameId": "2AF01112-197B-43DE-9BF8-940F1114DC73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.256:*:*:*:*:*:*:*", "cpeNameId": "220C4EBF-9B86-4AB1-AD37-100994B4606D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.257:*:*:*:*:*:*:*", "cpeNameId": "34F7CCEF-8221-4005-A144-93D314E39C81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.258:*:*:*:*:*:*:*", "cpeNameId": "19A0EB8D-1846-4C52-BEEA-F6CC1691C50C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.259:*:*:*:*:*:*:*", "cpeNameId": "B6F4132F-B9B0-4168-98D7-23FCCBDD4034"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.260:*:*:*:*:*:*:*", "cpeNameId": "E7F6FAE1-DF95-48E5-94D9-C505AF592766"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.261:*:*:*:*:*:*:*", "cpeNameId": "3BCD7AF9-57AB-41EC-99D4-59DD6DCA3703"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.262:*:*:*:*:*:*:*", "cpeNameId": "64A647E0-3291-4C17-9D9A-2BC6DDF24E90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.263:*:*:*:*:*:*:*", "cpeNameId": "1BCAE71C-8745-49B7-BE6F-5CB2A8D517AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.264:*:*:*:*:*:*:*", "cpeNameId": "7C4D53E7-3844-4706-815D-BD08282AF4B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.265:*:*:*:*:*:*:*", "cpeNameId": "F18EF476-4996-436A-B878-1F7704C4BA6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.266:*:*:*:*:*:*:*", "cpeNameId": "6318BBB0-A46C-48AE-9E42-7F578BCE43DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.267:*:*:*:*:*:*:*", "cpeNameId": "70B14EE0-CF5D-4C62-9890-766155C47DAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.268:*:*:*:*:*:*:*", "cpeNameId": "ABF8E5BF-203F-406C-9375-6A59B113BBD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.269:*:*:*:*:*:*:*", "cpeNameId": "B09A3D45-168E-4202-99BC-79DFB2B525C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.270:*:*:*:*:*:*:*", "cpeNameId": "145FF0A9-3D06-4565-8889-49C01832E864"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.271:*:*:*:*:*:*:*", "cpeNameId": "5433BF7F-2B40-4A88-BD8A-74EBE7EAE74C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.272:*:*:*:*:*:*:*", "cpeNameId": "28BF7326-B002-4098-96DB-D8FADE599CA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.273:*:*:*:*:*:*:*", "cpeNameId": "94E36506-E573-4DEA-888B-744D1C8405D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.274:*:*:*:*:*:*:*", "cpeNameId": "2A72354A-578E-4F14-93EB-43F27D1576A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.275:*:*:*:*:*:*:*", "cpeNameId": "426D0CBB-8FB3-41BC-A8A9-A736E70DAC53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.276:*:*:*:*:*:*:*", "cpeNameId": "25BF6B74-B708-44E5-9B77-A5D761C23F46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.277:*:*:*:*:*:*:*", "cpeNameId": "DAAAE94E-0CB1-45F6-B0C3-F635B18E632E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.278:*:*:*:*:*:*:*", "cpeNameId": "7B05EE50-A29E-4B6E-A5EE-9BCAA71189B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.279:*:*:*:*:*:*:*", "cpeNameId": "499DEB1C-5D4D-4BE5-8C11-6FD0625F2C36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.280:*:*:*:*:*:*:*", "cpeNameId": "82BC603A-39C9-4AF9-825C-D60073FD89E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.281:*:*:*:*:*:*:*", "cpeNameId": "AA26E4CE-A2EC-4364-B383-EE0D9C01E0FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.282:*:*:*:*:*:*:*", "cpeNameId": "A71BD6DD-9C99-4280-9CE6-2317277093B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.283:*:*:*:*:*:*:*", "cpeNameId": "96B8EF49-D308-498E-9453-CCDEDFD6F1CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.284:*:*:*:*:*:*:*", "cpeNameId": "635FD61D-F2A4-4489-AD75-12D1139945DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.285:*:*:*:*:*:*:*", "cpeNameId": "8211CA20-56DB-414D-A7EB-61321EA0634F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.286:*:*:*:*:*:*:*", "cpeNameId": "186F5E6F-D0A3-4136-9F39-956426280FC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.287:*:*:*:*:*:*:*", "cpeNameId": "236744C4-C218-40C5-8C9E-9072697D85E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.288:*:*:*:*:*:*:*", "cpeNameId": "971D0042-FFBE-4691-ABAD-B3165231CA50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.289:*:*:*:*:*:*:*", "cpeNameId": "6FAF8454-2869-4D87-979E-9A4D4DD049B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.290:*:*:*:*:*:*:*", "cpeNameId": "5EEE72A7-AE8B-416E-86F4-C879A022DD84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.291:*:*:*:*:*:*:*", "cpeNameId": "178F9E75-B366-4C4F-9935-07403284159E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.292:*:*:*:*:*:*:*", "cpeNameId": "BFB882D2-DC9B-4211-9265-594F1FEE3D8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.293:*:*:*:*:*:*:*", "cpeNameId": "F181ED04-D2A3-4E9C-B80D-F57C0617297B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.294:*:*:*:*:*:*:*", "cpeNameId": "8AFA87B0-C839-4A7F-961B-ABE5CA349819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.295:*:*:*:*:*:*:*", "cpeNameId": "9BFFCA5D-A751-449A-B8AB-2D26A90AFBE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.296:*:*:*:*:*:*:*", "cpeNameId": "7247CC3C-3671-4C0D-AD87-559BEDAAEBC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.297:*:*:*:*:*:*:*", "cpeNameId": "498B3288-2A00-4DB0-8426-A5FD866506EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.298:*:*:*:*:*:*:*", "cpeNameId": "D6251071-E7F2-4748-9DF7-27FCA27BD552"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.299:*:*:*:*:*:*:*", "cpeNameId": "03440F15-FEB8-42BC-BD63-6E954F0750DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.300:*:*:*:*:*:*:*", "cpeNameId": "E4568623-9282-496E-AA3F-E3E790BDFC1F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.301:*:*:*:*:*:*:*", "cpeNameId": "7CB5DA04-B4B0-4349-85B2-1342A953EED9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.302:*:*:*:*:*:*:*", "cpeNameId": "A3F297C6-A6AB-4C5F-9821-76E8E3411796"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.303:*:*:*:*:*:*:*", "cpeNameId": "8B892759-81F1-45AE-A7F5-2D0641A039E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.304:*:*:*:*:*:*:*", "cpeNameId": "0936A133-FA0A-44C7-AE7F-5C4C1B16DDD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.305:*:*:*:*:*:*:*", "cpeNameId": "FC874434-AC4D-41A1-8B43-757808B2C957"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.306:*:*:*:*:*:*:*", "cpeNameId": "49CE5CB3-4BA8-41AF-B5EB-9C17E66E0423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.307:*:*:*:*:*:*:*", "cpeNameId": "A8607B67-F6D3-4684-ADDC-CBACCC6DA92C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.308:*:*:*:*:*:*:*", "cpeNameId": "A4130D9C-E192-4437-A85F-6D04F21F2922"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.309:*:*:*:*:*:*:*", "cpeNameId": "B5E4DA49-77F3-4693-90B0-FC8C2C38F402"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.310:*:*:*:*:*:*:*", "cpeNameId": "2E6D4833-8E6A-45E4-A620-2BE985362CF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.311:*:*:*:*:*:*:*", "cpeNameId": "79DA4B1F-6BE0-40B0-8496-6499C590D8F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.312:*:*:*:*:*:*:*", "cpeNameId": "0268D7D3-1545-4DC8-A418-AA77BC04C9E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.313:*:*:*:*:*:*:*", "cpeNameId": "3B30BB14-4B29-4EC6-A810-DC776B5C6E34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.314:*:*:*:*:*:*:*", "cpeNameId": "369CEBAF-43F1-4E56-B6B9-C0057CF18CB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.315:*:*:*:*:*:*:*", "cpeNameId": "D1C8EC15-FFB1-440F-9EEA-2F306393A1EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.316:*:*:*:*:*:*:*", "cpeNameId": "7D65AEC1-209F-4CE2-A5FA-4D3FB56FD265"}]}} \ No newline at end of file diff --git a/cpematch/58/58C777F7-983D-4207-A5C8-0BAC3F79ECCC.json b/cpematch/58/58C777F7-983D-4207-A5C8-0BAC3F79ECCC.json new file mode 100644 index 00000000000..62041aecd8f --- /dev/null +++ b/cpematch/58/58C777F7-983D-4207-A5C8-0BAC3F79ECCC.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "58C777F7-983D-4207-A5C8-0BAC3F79ECCC", "criteria": "cpe:2.3:h:realtek:rtsper.sys:-:*:*:*:*:*:*:*", "lastModified": "2024-08-14T15:45:35.400", "cpeLastModified": "2024-08-14T15:45:35.400", "created": "2024-08-14T15:45:35.400", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/66/661F6328-0605-4612-B12A-9B1B49595943.json b/cpematch/66/661F6328-0605-4612-B12A-9B1B49595943.json new file mode 100644 index 00000000000..d295e5d7981 --- /dev/null +++ b/cpematch/66/661F6328-0605-4612-B12A-9B1B49595943.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "661F6328-0605-4612-B12A-9B1B49595943", "criteria": "cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.35.0", "lastModified": "2024-08-14T15:23:31.030", "cpeLastModified": "2024-08-14T15:23:31.030", "created": "2024-08-14T15:23:31.030", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:-:*:*:*:*:*:*:*", "cpeNameId": "DB393EB2-184F-438F-8DF4-871F62347CD5"}, {"cpeName": "cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:1.7.3:*:*:*:*:*:*:*", "cpeNameId": "B255FF07-E7AD-4709-8AF2-DD6172C1791C"}, {"cpeName": "cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:1.28.0:*:*:*:*:*:*:*", "cpeNameId": "59709BBF-4D33-4774-8E96-8AE0565C4BBA"}, {"cpeName": "cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:1.33.0:*:*:*:*:*:*:*", "cpeNameId": "3D043AAB-557B-4A73-9396-A34FCA0D0969"}]}} \ No newline at end of file diff --git a/cpematch/6B/6BFB68AD-DB7E-4C4C-B598-274D83D12C4B.json b/cpematch/6B/6BFB68AD-DB7E-4C4C-B598-274D83D12C4B.json new file mode 100644 index 00000000000..dc9fd8e45c0 --- /dev/null +++ b/cpematch/6B/6BFB68AD-DB7E-4C4C-B598-274D83D12C4B.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "6BFB68AD-DB7E-4C4C-B598-274D83D12C4B", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.1.76", "versionEndExcluding": "6.1.100", "lastModified": "2024-08-14T15:37:41.880", "cpeLastModified": "2024-08-14T15:37:41.880", "created": "2024-08-14T15:37:41.880", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.76:*:*:*:*:*:*:*", "cpeNameId": "4F7988C5-FA25-4C7C-B0DC-5C084A8CA6DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.77:*:*:*:*:*:*:*", "cpeNameId": "9F7ABB2D-A627-40C5-BC86-9BC9BBBEDBB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.78:*:*:*:*:*:*:*", "cpeNameId": "71DE43EB-3996-47C3-963A-B93C9E6C6142"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.79:*:*:*:*:*:*:*", "cpeNameId": "191F54D4-44BC-49D5-8FB9-5DFFD648B9F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.80:*:*:*:*:*:*:*", "cpeNameId": "14B574EE-69F8-4E87-9017-91CBFDAEC743"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.84:*:*:*:*:*:*:*", "cpeNameId": "61BB8657-3718-4355-BAA8-92F84B14D1A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.89:*:*:*:*:*:*:*", "cpeNameId": "2DCEF9A6-CB07-404E-ADCC-E2BD0F69354D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.90:*:*:*:*:*:*:*", "cpeNameId": "CD2E5E6E-F436-4447-BB45-4CA1EBCC1F0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.92:*:*:*:*:*:*:*", "cpeNameId": "825880D5-240B-4E5E-88D7-9FBE9377D725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.93:*:*:*:*:*:*:*", "cpeNameId": "C34961F8-366C-44F9-884F-D95ED75D74E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.94:*:*:*:*:*:*:*", "cpeNameId": "49338264-F467-4F72-851C-41E72F2E8849"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.95:*:*:*:*:*:*:*", "cpeNameId": "D583DD92-8DB8-4D08-8F84-FEACBF885E5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.96:*:*:*:*:*:*:*", "cpeNameId": "ABD92EA7-61F0-4324-AD60-18A4A9E0345B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.97:*:*:*:*:*:*:*", "cpeNameId": "9CA68F01-482D-4C81-9FAF-8FCB3F4EB631"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.98:*:*:*:*:*:*:*", "cpeNameId": "DB87B10B-0B00-43E6-9712-B7749C08C5B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.99:*:*:*:*:*:*:*", "cpeNameId": "FA3EF181-E416-4607-B59D-A6CEA2D95875"}]}} \ No newline at end of file diff --git a/cpematch/6D/6D4811C1-BE73-4A45-9A5F-725A064020E0.json b/cpematch/6D/6D4811C1-BE73-4A45-9A5F-725A064020E0.json new file mode 100644 index 00000000000..09f6ae76cf8 --- /dev/null +++ b/cpematch/6D/6D4811C1-BE73-4A45-9A5F-725A064020E0.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "6D4811C1-BE73-4A45-9A5F-725A064020E0", "criteria": "cpe:2.3:o:enphase:iq_gateway_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4", "versionEndExcluding": "8.4.4225", "lastModified": "2024-08-14T14:52:28.100", "cpeLastModified": "2024-08-14T14:52:28.100", "created": "2024-08-14T14:52:28.100", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/77/77939C6B-1EF5-4B34-9133-931067B96F97.json b/cpematch/77/77939C6B-1EF5-4B34-9133-931067B96F97.json new file mode 100644 index 00000000000..3a9647e1c50 --- /dev/null +++ b/cpematch/77/77939C6B-1EF5-4B34-9133-931067B96F97.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "77939C6B-1EF5-4B34-9133-931067B96F97", "criteria": "cpe:2.3:o:realtek:rtsper.sys_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.22000.21355", "lastModified": "2024-08-14T15:45:35.400", "cpeLastModified": "2024-08-14T15:45:35.400", "created": "2024-08-14T15:45:35.400", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/78/78CEEA24-E86D-4BF9-9325-38611B5DE120.json b/cpematch/78/78CEEA24-E86D-4BF9-9325-38611B5DE120.json new file mode 100644 index 00000000000..e75c305e1f4 --- /dev/null +++ b/cpematch/78/78CEEA24-E86D-4BF9-9325-38611B5DE120.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "78CEEA24-E86D-4BF9-9325-38611B5DE120", "criteria": "cpe:2.3:a:ltcms:ltcms:1.0.20:*:*:*:*:*:*:*", "lastModified": "2024-08-14T16:01:51.787", "cpeLastModified": "2024-08-14T16:01:51.787", "created": "2024-08-14T16:01:51.787", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/82/820ACE51-CA57-4D5E-8E80-08EC48BAC7C0.json b/cpematch/82/820ACE51-CA57-4D5E-8E80-08EC48BAC7C0.json new file mode 100644 index 00000000000..67f0928f8f2 --- /dev/null +++ b/cpematch/82/820ACE51-CA57-4D5E-8E80-08EC48BAC7C0.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "820ACE51-CA57-4D5E-8E80-08EC48BAC7C0", "criteria": "cpe:2.3:h:kiloview:p2:*:*:*:*:*:*:*:*", "versionEndIncluding": "4.8.2605", "lastModified": "2024-08-14T15:55:28.233", "cpeLastModified": "2024-08-14T15:55:28.233", "created": "2024-08-14T15:55:28.233", "status": "Active", "matches": [{"cpeName": "cpe:2.3:h:kiloview:p2:-:*:*:*:*:*:*:*", "cpeNameId": "8D54465C-88A8-4C9A-9E17-981804465E63"}]}} \ No newline at end of file diff --git a/cpematch/82/82B85217-BCB4-4004-BED8-5DBC467D872A.json b/cpematch/82/82B85217-BCB4-4004-BED8-5DBC467D872A.json new file mode 100644 index 00000000000..ed53b8405ee --- /dev/null +++ b/cpematch/82/82B85217-BCB4-4004-BED8-5DBC467D872A.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "82B85217-BCB4-4004-BED8-5DBC467D872A", "criteria": "cpe:2.3:o:realtek:rtsuer.sys_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.22000.31274", "lastModified": "2024-08-14T15:45:35.400", "cpeLastModified": "2024-08-14T15:45:35.400", "created": "2024-08-14T15:45:35.400", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/94/947F2995-C201-4F06-BC13-C290473D9C17.json b/cpematch/94/947F2995-C201-4F06-BC13-C290473D9C17.json new file mode 100644 index 00000000000..5398c2deb02 --- /dev/null +++ b/cpematch/94/947F2995-C201-4F06-BC13-C290473D9C17.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "947F2995-C201-4F06-BC13-C290473D9C17", "criteria": "cpe:2.3:o:dell:precision_3620_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.32.0", "lastModified": "2024-08-14T15:23:31.030", "cpeLastModified": "2024-08-14T15:23:31.030", "created": "2024-08-14T15:23:31.030", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:dell:precision_3620_firmware:-:*:*:*:*:*:*:*", "cpeNameId": "83B158B3-E504-4BA8-BB7C-F031D5A33596"}, {"cpeName": "cpe:2.3:o:dell:precision_3620_firmware:2.12.0:*:*:*:*:*:*:*", "cpeNameId": "F0A7ACDC-4AAA-4A20-AEC0-C7A1494AA606"}, {"cpeName": "cpe:2.3:o:dell:precision_3620_firmware:2.13.1:*:*:*:*:*:*:*", "cpeNameId": "BE655E91-6644-4F3B-B361-4238DB591C8C"}]}} \ No newline at end of file diff --git a/cpematch/9B/9B129476-8F48-47B8-9EF8-830715631720.json b/cpematch/9B/9B129476-8F48-47B8-9EF8-830715631720.json new file mode 100644 index 00000000000..7fcbe3a2572 --- /dev/null +++ b/cpematch/9B/9B129476-8F48-47B8-9EF8-830715631720.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "9B129476-8F48-47B8-9EF8-830715631720", "criteria": "cpe:2.3:h:kiloview:p1:*:*:*:*:*:*:*:*", "versionEndIncluding": "4.8.2605", "lastModified": "2024-08-14T15:55:28.233", "cpeLastModified": "2024-08-14T15:55:28.233", "created": "2024-08-14T15:55:28.233", "status": "Active", "matches": [{"cpeName": "cpe:2.3:h:kiloview:p1:-:*:*:*:*:*:*:*", "cpeNameId": "0D0350DA-FB20-46CA-93CC-5D14D49A5644"}]}} \ No newline at end of file diff --git a/cpematch/9D/9D8E9231-015C-48A6-BBDD-9DCEA3145858.json b/cpematch/9D/9D8E9231-015C-48A6-BBDD-9DCEA3145858.json new file mode 100644 index 00000000000..fc466ae9be3 --- /dev/null +++ b/cpematch/9D/9D8E9231-015C-48A6-BBDD-9DCEA3145858.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "9D8E9231-015C-48A6-BBDD-9DCEA3145858", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.6.15", "versionEndExcluding": "6.6.41", "lastModified": "2024-08-14T15:37:41.880", "cpeLastModified": "2024-08-14T15:37:41.880", "created": "2024-08-14T15:37:41.880", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.15:*:*:*:*:*:*:*", "cpeNameId": "321D7187-47FD-4AC9-8402-50C55A769462"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.16:*:*:*:*:*:*:*", "cpeNameId": "02B3F009-31A0-4E53-8A89-D2851F60161D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.17:*:*:*:*:*:*:*", "cpeNameId": "7964199C-934F-4EFC-8E10-769866A1CEF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.18:*:*:*:*:*:*:*", "cpeNameId": "662DDE22-7180-40FE-AF01-F1D279B03479"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.19:*:*:*:*:*:*:*", "cpeNameId": "9EC8C911-B236-4DBC-AA91-7C5575FEA941"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.20:*:*:*:*:*:*:*", "cpeNameId": "E176BD49-D984-4DFD-BF94-B377343221D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.29:*:*:*:*:*:*:*", "cpeNameId": "EFDBB2F8-FA58-4E00-98F6-8885EE1E41D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.30:*:*:*:*:*:*:*", "cpeNameId": "7F77386F-180B-4457-9655-FD2A67C4F65A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.32:*:*:*:*:*:*:*", "cpeNameId": "7243F9D6-586E-4EEC-8B9E-A249EFB7B4D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.33:*:*:*:*:*:*:*", "cpeNameId": "E3D20161-DD78-402C-BD1D-02769B6A6C5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.34:*:*:*:*:*:*:*", "cpeNameId": "AD267688-519F-4863-9379-8CB50DD27AE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.35:*:*:*:*:*:*:*", "cpeNameId": "1E4CA740-CB8A-4FB5-99CB-DA8DCF35DA02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.36:*:*:*:*:*:*:*", "cpeNameId": "96AA1D16-A016-43DB-B0AB-FED45308D249"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.37:*:*:*:*:*:*:*", "cpeNameId": "D0A60FC5-E516-4560-B201-E9E7A3723645"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.38:*:*:*:*:*:*:*", "cpeNameId": "48C3A765-D278-4115-A7F8-0EAFE267BE54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.39:*:*:*:*:*:*:*", "cpeNameId": "0F797385-0498-4377-B7F8-80FD439BFE3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.40:*:*:*:*:*:*:*", "cpeNameId": "3F5097D6-6C8D-42A1-960B-CBA03E28B27F"}]}} \ No newline at end of file diff --git a/cpematch/9D/9DE6F57D-3CD4-4D8C-BF80-7F84ECD77723.json b/cpematch/9D/9DE6F57D-3CD4-4D8C-BF80-7F84ECD77723.json new file mode 100644 index 00000000000..695d51988dd --- /dev/null +++ b/cpematch/9D/9DE6F57D-3CD4-4D8C-BF80-7F84ECD77723.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "9DE6F57D-3CD4-4D8C-BF80-7F84ECD77723", "criteria": "cpe:2.3:h:realtek:rtsuer.sys:-:*:*:*:*:*:*:*", "lastModified": "2024-08-14T15:45:35.400", "cpeLastModified": "2024-08-14T15:45:35.400", "created": "2024-08-14T15:45:35.400", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/A8/A85D5CC0-9FE9-4580-BB89-9BAEDD80CC75.json b/cpematch/A8/A85D5CC0-9FE9-4580-BB89-9BAEDD80CC75.json new file mode 100644 index 00000000000..812eb9079be --- /dev/null +++ b/cpematch/A8/A85D5CC0-9FE9-4580-BB89-9BAEDD80CC75.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "A85D5CC0-9FE9-4580-BB89-9BAEDD80CC75", "criteria": "cpe:2.3:a:enphase:iq_gateway:*:*:*:*:*:*:*:*", "versionStartIncluding": "4", "versionEndIncluding": "7", "lastModified": "2024-08-14T15:58:01.240", "cpeLastModified": "2024-08-14T15:58:01.240", "created": "2024-08-14T15:58:01.240", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/A9/A9455FD0-C674-4865-A9CD-23F5D6913452.json b/cpematch/A9/A9455FD0-C674-4865-A9CD-23F5D6913452.json new file mode 100644 index 00000000000..639c0390b3e --- /dev/null +++ b/cpematch/A9/A9455FD0-C674-4865-A9CD-23F5D6913452.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "A9455FD0-C674-4865-A9CD-23F5D6913452", "criteria": "cpe:2.3:a:microsoft:app_installer:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.22.11261.0", "lastModified": "2024-08-14T15:52:17.440", "cpeLastModified": "2024-08-14T15:52:17.440", "created": "2024-08-14T15:52:17.440", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/B4/B44E6F98-ADC6-4CC9-9DC7-7241AA68A8BC.json b/cpematch/B4/B44E6F98-ADC6-4CC9-9DC7-7241AA68A8BC.json new file mode 100644 index 00000000000..c94f9f2e939 --- /dev/null +++ b/cpematch/B4/B44E6F98-ADC6-4CC9-9DC7-7241AA68A8BC.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "B44E6F98-ADC6-4CC9-9DC7-7241AA68A8BC", "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.6.0", "versionEndExcluding": "17.6.18", "lastModified": "2024-08-14T15:43:15.770", "cpeLastModified": "2024-08-14T15:43:15.770", "created": "2024-08-14T15:43:15.770", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:microsoft:visual_studio_2022:17.6.0:*:*:*:*:*:*:*", "cpeNameId": "4518DED2-D47A-4377-8BD4-36D9BFFDFC2B"}, {"cpeName": "cpe:2.3:a:microsoft:visual_studio_2022:17.6.0:*:*:*:*:-:*:*", "cpeNameId": "3513B0AF-8851-4A2A-AA69-D2D7D004D9C0"}, {"cpeName": "cpe:2.3:a:microsoft:visual_studio_2022:17.6.3:*:*:*:*:*:*:*", "cpeNameId": "B10E83B0-CBF8-40B9-BB15-8CDDAD993EFB"}, {"cpeName": "cpe:2.3:a:microsoft:visual_studio_2022:17.6.5:*:*:*:*:*:*:*", "cpeNameId": "9930DB8E-A52D-41F0-AD46-F4E533CF589D"}, {"cpeName": "cpe:2.3:a:microsoft:visual_studio_2022:17.6.6:*:*:*:*:-:*:*", "cpeNameId": "EFCE5AA7-468C-421E-BB74-889F35BB7A7F"}, {"cpeName": "cpe:2.3:a:microsoft:visual_studio_2022:17.6.7:*:*:*:*:*:*:*", "cpeNameId": "14CAAD1C-7102-486D-9978-D35B9B1316F7"}, {"cpeName": "cpe:2.3:a:microsoft:visual_studio_2022:17.6.8:*:*:*:*:*:*:*", "cpeNameId": "1D3C7D31-63D1-4668-B8CC-C76FD3EBE29B"}, {"cpeName": "cpe:2.3:a:microsoft:visual_studio_2022:17.6.10:*:*:*:*:*:*:*", "cpeNameId": "B635ACDB-10A6-48AC-B461-64E8E9C65725"}, {"cpeName": "cpe:2.3:a:microsoft:visual_studio_2022:17.6.11:*:*:*:*:*:*:*", "cpeNameId": "711D8F42-5B2B-4570-8E25-3E3650835A48"}]}} \ No newline at end of file diff --git a/cpematch/BD/BDD9C1E0-276A-4A51-8950-6F67C00A2FDE.json b/cpematch/BD/BDD9C1E0-276A-4A51-8950-6F67C00A2FDE.json new file mode 100644 index 00000000000..f23e8332e7a --- /dev/null +++ b/cpematch/BD/BDD9C1E0-276A-4A51-8950-6F67C00A2FDE.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "BDD9C1E0-276A-4A51-8950-6F67C00A2FDE", "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.0.0", "versionEndExcluding": "8.0.8", "lastModified": "2024-08-14T15:43:15.770", "cpeLastModified": "2024-08-14T15:43:15.770", "created": "2024-08-14T15:43:15.770", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:microsoft:.net:8.0.0:-:*:*:*:*:*:*", "cpeNameId": "8B277968-7163-4ACE-A90D-DF8C60216E7C"}, {"cpeName": "cpe:2.3:a:microsoft:.net:8.0.0:preview.1:*:*:*:*:*:*", "cpeNameId": "E0191E3E-8476-426C-96D5-E5D78542C4FE"}, {"cpeName": "cpe:2.3:a:microsoft:.net:8.0.0:preview.2:*:*:*:*:*:*", "cpeNameId": "16D701A3-FF2E-4E30-A192-B2DB94C18AD0"}, {"cpeName": "cpe:2.3:a:microsoft:.net:8.0.0:preview.3:*:*:*:*:*:*", "cpeNameId": "F88386AD-A761-43DF-8FA8-52581383CB0E"}, {"cpeName": "cpe:2.3:a:microsoft:.net:8.0.0:preview.4:*:*:*:*:*:*", "cpeNameId": "26998DA4-5300-4E10-99DE-85619E05B2F6"}, {"cpeName": "cpe:2.3:a:microsoft:.net:8.0.0:preview.5:*:*:*:*:*:*", "cpeNameId": "520638BD-8659-4A94-8CEF-DE4EBA1032EB"}, {"cpeName": "cpe:2.3:a:microsoft:.net:8.0.0:preview.6:*:*:*:*:*:*", "cpeNameId": "5E1EB5CD-7219-4CD1-AB56-5A76217283A1"}, {"cpeName": "cpe:2.3:a:microsoft:.net:8.0.0:preview.7:*:*:*:*:*:*", "cpeNameId": "18344C57-0DF6-45A3-9F03-56CEF1D63952"}, {"cpeName": "cpe:2.3:a:microsoft:.net:8.0.0:rc1:*:*:*:*:*:*", "cpeNameId": "A566CBBB-0B3D-4A66-A319-A339C868F0E4"}, {"cpeName": "cpe:2.3:a:microsoft:.net:8.0.0:rc2:*:*:*:*:*:*", "cpeNameId": "CC70D095-60F1-4763-A867-6EEF38119C89"}, {"cpeName": "cpe:2.3:a:microsoft:.net:8.0.1:*:*:*:*:*:*:*", "cpeNameId": "AC3E137B-5E9B-4AE0-B81A-2C5933731DDA"}, {"cpeName": "cpe:2.3:a:microsoft:.net:8.0.2:*:*:*:*:*:*:*", "cpeNameId": "FF97BBBB-9F07-4FAC-A318-AEBABEE82B74"}, {"cpeName": "cpe:2.3:a:microsoft:.net:8.0.3:*:*:*:*:*:*:*", "cpeNameId": "9DE25769-56E3-466E-B2E0-A41ABEA4CE09"}, {"cpeName": "cpe:2.3:a:microsoft:.net:8.0.4:*:*:*:*:*:*:*", "cpeNameId": "D13CCA73-3AD9-47D0-98E5-6F62E71D7B98"}, {"cpeName": "cpe:2.3:a:microsoft:.net:8.0.5:*:*:*:*:*:*:*", "cpeNameId": "4F8C9EF0-C1EA-486B-9A38-D1D96AF0F261"}, {"cpeName": "cpe:2.3:a:microsoft:.net:8.0.6:*:*:*:*:*:*:*", "cpeNameId": "B27A2BD0-EB22-4237-9F84-03BC7B583D67"}, {"cpeName": "cpe:2.3:a:microsoft:.net:8.0.7:*:*:*:*:*:*:*", "cpeNameId": "4F586115-C9C0-4556-9EC0-EDEFA66CAC2E"}]}} \ No newline at end of file diff --git a/cpematch/C0/C049E2AD-2A83-4CAB-BBB3-83ADDFF2DDC1.json b/cpematch/C0/C049E2AD-2A83-4CAB-BBB3-83ADDFF2DDC1.json new file mode 100644 index 00000000000..333df0fae0d --- /dev/null +++ b/cpematch/C0/C049E2AD-2A83-4CAB-BBB3-83ADDFF2DDC1.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "C049E2AD-2A83-4CAB-BBB3-83ADDFF2DDC1", "criteria": "cpe:2.3:h:enphase:iq_gateway:*:*:*:*:*:*:*:*", "versionStartIncluding": "4", "versionEndIncluding": "7", "lastModified": "2024-08-14T15:59:20.203", "cpeLastModified": "2024-08-14T15:59:20.203", "created": "2024-08-14T15:59:20.203", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/DB/DBF30545-99A1-457E-AEB5-BABD0F01942A.json b/cpematch/DB/DBF30545-99A1-457E-AEB5-BABD0F01942A.json new file mode 100644 index 00000000000..8a476877bee --- /dev/null +++ b/cpematch/DB/DBF30545-99A1-457E-AEB5-BABD0F01942A.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "DBF30545-99A1-457E-AEB5-BABD0F01942A", "criteria": "cpe:2.3:a:microsoft:azure_iot_hub_device_client_sdk:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.12.1", "lastModified": "2024-08-14T15:11:47.093", "cpeLastModified": "2024-08-14T15:11:47.093", "created": "2024-08-14T15:11:47.093", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/E7/E79823D1-656B-47ED-B919-817CF98B423B.json b/cpematch/E7/E79823D1-656B-47ED-B919-817CF98B423B.json index 00a476574c9..e9c1394e7ac 100644 --- a/cpematch/E7/E79823D1-656B-47ED-B919-817CF98B423B.json +++ b/cpematch/E7/E79823D1-656B-47ED-B919-817CF98B423B.json @@ -1 +1 @@ -{"matchString": {"matchCriteriaId": "E79823D1-656B-47ED-B919-817CF98B423B", "criteria": "cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*", "lastModified": "2024-08-13T18:36:18.277", "cpeLastModified": "2024-08-13T18:36:18.277", "created": "2024-08-13T18:36:18.277", "status": "Active"}} \ No newline at end of file +{"matchString": {"matchCriteriaId": "E79823D1-656B-47ED-B919-817CF98B423B", "criteria": "cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*", "lastModified": "2024-08-14T15:12:13.967", "cpeLastModified": "2024-08-13T18:36:18.277", "created": "2024-08-13T18:36:18.277", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/F3/F3A29B28-4959-4156-B77A-5D38B896029B.json b/cpematch/F3/F3A29B28-4959-4156-B77A-5D38B896029B.json new file mode 100644 index 00000000000..1c66891d53d --- /dev/null +++ b/cpematch/F3/F3A29B28-4959-4156-B77A-5D38B896029B.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "F3A29B28-4959-4156-B77A-5D38B896029B", "criteria": "cpe:2.3:o:schneider-electric:sage_rtu_firmware:*:*:*:*:*:*:*:*", "versionEndIncluding": "c3414-500-s02k5_p8", "lastModified": "2024-08-14T14:08:14.320", "cpeLastModified": "2024-08-14T14:08:14.320", "created": "2024-08-14T14:08:14.320", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/F6/F65CA56D-7F34-4030-BC82-5BA0BDEE86C8.json b/cpematch/F6/F65CA56D-7F34-4030-BC82-5BA0BDEE86C8.json new file mode 100644 index 00000000000..4bb77d32730 --- /dev/null +++ b/cpematch/F6/F65CA56D-7F34-4030-BC82-5BA0BDEE86C8.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "F65CA56D-7F34-4030-BC82-5BA0BDEE86C8", "criteria": "cpe:2.3:a:oretnom23t:student_study_center_desk_management_system:1.0:*:*:*:*:*:*:*", "lastModified": "2024-08-14T15:29:16.570", "cpeLastModified": "2024-08-14T15:29:16.570", "created": "2024-08-14T15:29:16.570", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/FC/FCD55BE5-59AF-4C75-9187-A90F23262716.json b/cpematch/FC/FCD55BE5-59AF-4C75-9187-A90F23262716.json new file mode 100644 index 00000000000..f8983eabeae --- /dev/null +++ b/cpematch/FC/FCD55BE5-59AF-4C75-9187-A90F23262716.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716", "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "lastModified": "2024-08-14T14:22:58.470", "cpeLastModified": "2024-08-14T14:22:58.470", "created": "2024-08-14T14:22:58.470", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*", "cpeNameId": "98258456-A941-42ED-9795-00616CA455B2"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*", "cpeNameId": "F37893BF-34E4-4BA1-A255-A81B0756657C"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*", "cpeNameId": "35819FCD-F152-4301-BDBF-858079EF4021"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*", "cpeNameId": "A27CFFE1-1687-4CFD-B278-D08BBECE8969"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*", "cpeNameId": "D8F5DADA-F28B-4661-98AF-7449B5C94484"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*", "cpeNameId": "38860960-2547-4F94-B052-9A6E3F7D58B7"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*", "cpeNameId": "384BFA57-16CB-43FF-AECF-94BCCC46DCE9"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*", "cpeNameId": "31EAC820-3064-4572-9E6E-0A2B3E99DF90"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*", "cpeNameId": "46B211A6-6EBD-4262-BD68-B39C633B36A5"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.0:*:*:*:*:*:*:*", "cpeNameId": "C1C9C0DF-FFAE-4711-9AD5-17FA7DBCED7D"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*", "cpeNameId": "EC36D942-3470-44D4-9D94-E8CD664A7CB5"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*", "cpeNameId": "E86D0AFF-CDDF-4BE7-BC2B-B6361855579B"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*", "cpeNameId": "E5043692-DFD6-4010-97A8-F1DA011EA641"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*", "cpeNameId": "4702280F-74CF-45F7-8A8A-1811D5A49681"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*", "cpeNameId": "6BA3361E-986F-4C67-8830-6ADDE207D93F"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.1:*:*:*:*:*:*:*", "cpeNameId": "F8F4E6AB-4A1C-4CEF-8DFC-CE14A26F1606"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*", "cpeNameId": "A3FF0075-C851-4CC4-A05C-FFEF4AAEDF53"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*", "cpeNameId": "368218D7-E919-4AC3-9589-C3C048F084D0"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*", "cpeNameId": "5D06723B-97B2-49E7-8F64-B6FC1BAF05F3"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*", "cpeNameId": "AD592A4B-B606-47DE-9598-0A8FB4C70783"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*", "cpeNameId": "5A838747-3F43-4EA4-8162-F7EA92DA6DFF"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.2:*:*:*:*:*:*:*", "cpeNameId": "03326EC7-55F5-4310-AED2-0DDC9863C444"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*", "cpeNameId": "BC305D3C-4A15-40B8-B390-3C4A6F706238"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*", "cpeNameId": "8C302050-0783-40CF-B64C-AD3FD1A4B68D"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*", "cpeNameId": "233A07CE-5F99-4CB9-A0B2-56A8FFDCEBDB"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*", "cpeNameId": "317010B7-D428-4A0D-A25D-E82FEC9467A9"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*", "cpeNameId": "D4282C4A-5F5D-41AB-AE01-36445C937A63"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.2:p1:*:*:*:*:*:*", "cpeNameId": "0BB9BDDC-1182-435D-8F44-511A808C46BB"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.2:p2:*:*:*:*:*:*", "cpeNameId": "A548CD66-255E-43FE-B472-59B7214D2776"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.3:*:*:*:*:*:*:*", "cpeNameId": "6B118CE4-7351-4EF5-8CC5-78CB6D9D1977"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*", "cpeNameId": "8BFB9C47-5203-496E-AE74-2BBAA631CFF2"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*", "cpeNameId": "52E7BF9D-5E3C-44C3-9F5D-CD72391FC726"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*", "cpeNameId": "8E3D654A-1E79-4D6E-9D93-D30CA2689CEC"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*", "cpeNameId": "15BA09ED-058C-42BF-A8D9-2BEB6DEC10F7"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*", "cpeNameId": "11F95777-3B44-45B5-AE02-9E786EAB471B"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:*", "cpeNameId": "49986D58-B1AC-4125-87CB-BDB151F5D4B5"}, {"cpeName": "cpe:2.3:a:adobe:commerce:2.4.3:p2:*:*:*:*:*:*", "cpeNameId": "2FF5630A-5FFB-459E-8514-19DD294CBDE7"}]}} \ No newline at end of file diff --git a/cve/2012/CVE-2012-4792.json b/cve/2012/CVE-2012-4792.json index 65fe0dc2b1c..1fc3eb7445e 100644 --- a/cve/2012/CVE-2012-4792.json +++ b/cve/2012/CVE-2012-4792.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2012-4792", "sourceIdentifier": "secure@microsoft.com", "published": "2012-12-30T18:55:01.477", "lastModified": "2024-08-01T13:41:23.967", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2024-07-23", "cisaActionDue": "2024-08-13", "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", "cisaVulnerabilityName": "Microsoft Internet Explorer Use-After-Free Vulnerability", "descriptions": [{"lang": "en", "value": "Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012."}, {"lang": "es", "value": "Una vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n en Microsoft Internet Explorer v6 a v8 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un sitio web dise\u00f1ado para tal fin que desencadena el acceso a un objeto que (1) no se asign\u00f3 correctamente o (2) se elimina, tal y como se demuestra con un objeto CDwnBindInfo y es explotado en Diciembre de 2012.\r\n"}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}], "cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 9.3}, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-399"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-416"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "matchCriteriaId": "693D3C1C-E3E4-49DB-9A13-44ADDFF82507"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*", "matchCriteriaId": "FFAC3F90-77BF-4F56-A89B-8A3D2D1FC6D6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "matchCriteriaId": "1A33FA7F-BB2A-4C66-B608-72997A2BD1DB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "FFF81F4B-7D92-4398-8658-84530FB8F518"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*", "matchCriteriaId": "32C28EC2-8A34-4E30-A76A-86921D7332C1"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*", "matchCriteriaId": "7AE15F6C-80F6-43A6-86DA-B92116A697A0"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "0A0D2704-C058-420B-B368-372D1129E914"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*", "matchCriteriaId": "FFAC3F90-77BF-4F56-A89B-8A3D2D1FC6D6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "matchCriteriaId": "A52E757F-9B41-43B4-9D67-3FEDACA71283"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*", "matchCriteriaId": "F282E5E8-A5C9-4092-B0BF-07A5A2CAA6F4"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*", "matchCriteriaId": "D16A8D29-57BF-4B74-85F2-24DBD8B52BBF"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*", "matchCriteriaId": "B2B19826-5516-4899-9599-F95D0A03FBCD"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*", "matchCriteriaId": "4945F25F-2828-4D03-930B-A109BA73E00C"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "matchCriteriaId": "FFF81F4B-7D92-4398-8658-84530FB8F518"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*", "matchCriteriaId": "32C28EC2-8A34-4E30-A76A-86921D7332C1"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "0A0D2704-C058-420B-B368-372D1129E914"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*", "matchCriteriaId": "FFAC3F90-77BF-4F56-A89B-8A3D2D1FC6D6"}]}]}], "references": [{"url": "http://blog.fireeye.com/research/2012/12/council-foreign-relations-water-hole-attack-details.html", "source": "secure@microsoft.com"}, {"url": "http://blogs.technet.com/b/srd/archive/2012/12/29/new-vulnerability-affecting-internet-explorer-8-users.aspx", "source": "secure@microsoft.com"}, {"url": "http://blogs.technet.com/b/srd/archive/2012/12/31/microsoft-quot-fix-it-quot-available-for-internet-explorer-6-7-and-8.aspx", "source": "secure@microsoft.com"}, {"url": "http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/", "source": "secure@microsoft.com"}, {"url": "http://labs.alienvault.com/labs/index.php/2012/just-another-water-hole-campaign-using-an-internet-explorer-0day/", "source": "secure@microsoft.com"}, {"url": "http://packetstormsecurity.com/files/119168/Microsoft-Internet-Explorer-CDwnBindInfo-Object-Use-After-Free.html", "source": "secure@microsoft.com"}, {"url": "http://technet.microsoft.com/security/advisory/2794220", "source": "secure@microsoft.com", "tags": ["Vendor Advisory"]}, {"url": "http://www.kb.cert.org/vuls/id/154201", "source": "secure@microsoft.com", "tags": ["US Government Resource"]}, {"url": "http://www.us-cert.gov/cas/techalerts/TA13-008A.html", "source": "secure@microsoft.com", "tags": ["US Government Resource"]}, {"url": "http://www.us-cert.gov/cas/techalerts/TA13-015A.html", "source": "secure@microsoft.com", "tags": ["US Government Resource"]}, {"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-008", "source": "secure@microsoft.com"}, {"url": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ie_cbutton_uaf.rb", "source": "secure@microsoft.com"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16361", "source": "secure@microsoft.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2012-4792", "sourceIdentifier": "secure@microsoft.com", "published": "2012-12-30T18:55:01.477", "lastModified": "2024-08-14T15:02:30.113", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-07-23", "cisaActionDue": "2024-08-13", "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", "cisaVulnerabilityName": "Microsoft Internet Explorer Use-After-Free Vulnerability", "descriptions": [{"lang": "en", "value": "Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012."}, {"lang": "es", "value": "Una vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n en Microsoft Internet Explorer v6 a v8 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un sitio web dise\u00f1ado para tal fin que desencadena el acceso a un objeto que (1) no se asign\u00f3 correctamente o (2) se elimina, tal y como se demuestra con un objeto CDwnBindInfo y es explotado en Diciembre de 2012.\r\n"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}], "cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 9.3}, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-416"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-416"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "matchCriteriaId": "693D3C1C-E3E4-49DB-9A13-44ADDFF82507"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*", "matchCriteriaId": "BADB0479-3E0E-4326-B568-9DBDCACF0B5E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "matchCriteriaId": "1A33FA7F-BB2A-4C66-B608-72997A2BD1DB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:*", "matchCriteriaId": "F8216946-5F76-48B9-91CC-207F657D7D3C"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x86:*", "matchCriteriaId": "B36BFDA7-596B-45EA-AACE-F8A796CECDBB"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*", "matchCriteriaId": "FFFD8C6B-7A46-484C-8701-81D58AB1C2CF"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "0A0D2704-C058-420B-B368-372D1129E914"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*", "matchCriteriaId": "BADB0479-3E0E-4326-B568-9DBDCACF0B5E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "matchCriteriaId": "A52E757F-9B41-43B4-9D67-3FEDACA71283"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "matchCriteriaId": "7FE8B00B-4F39-4755-A323-8AD71F5E3EBE"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", "matchCriteriaId": "06BBFA69-94E2-4BAB-AFD3-BC434B11D106"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:r2:*:*:*:*:itanium:*", "matchCriteriaId": "C6012A8B-D154-42F1-BE7A-828D344487FB"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:r2:*:*:*:*:x64:*", "matchCriteriaId": "E33988B9-543E-4340-AD84-FE23250F2D98"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "0A0D2704-C058-420B-B368-372D1129E914"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656"}, {"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", "matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79"}]}]}], "references": [{"url": "http://blog.fireeye.com/research/2012/12/council-foreign-relations-water-hole-attack-details.html", "source": "secure@microsoft.com", "tags": ["Broken Link"]}, {"url": "http://blogs.technet.com/b/srd/archive/2012/12/29/new-vulnerability-affecting-internet-explorer-8-users.aspx", "source": "secure@microsoft.com", "tags": ["Broken Link"]}, {"url": "http://blogs.technet.com/b/srd/archive/2012/12/31/microsoft-quot-fix-it-quot-available-for-internet-explorer-6-7-and-8.aspx", "source": "secure@microsoft.com", "tags": ["Broken Link"]}, {"url": "http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/", "source": "secure@microsoft.com", "tags": ["Third Party Advisory"]}, {"url": "http://labs.alienvault.com/labs/index.php/2012/just-another-water-hole-campaign-using-an-internet-explorer-0day/", "source": "secure@microsoft.com", "tags": ["Broken Link"]}, {"url": "http://packetstormsecurity.com/files/119168/Microsoft-Internet-Explorer-CDwnBindInfo-Object-Use-After-Free.html", "source": "secure@microsoft.com", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "http://technet.microsoft.com/security/advisory/2794220", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}, {"url": "http://www.kb.cert.org/vuls/id/154201", "source": "secure@microsoft.com", "tags": ["Third Party Advisory", "US Government Resource"]}, {"url": "http://www.us-cert.gov/cas/techalerts/TA13-008A.html", "source": "secure@microsoft.com", "tags": ["Third Party Advisory", "US Government Resource"]}, {"url": "http://www.us-cert.gov/cas/techalerts/TA13-015A.html", "source": "secure@microsoft.com", "tags": ["Third Party Advisory", "US Government Resource"]}, {"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-008", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}, {"url": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ie_cbutton_uaf.rb", "source": "secure@microsoft.com", "tags": ["Third Party Advisory"]}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16361", "source": "secure@microsoft.com", "tags": ["Broken Link"]}]}} \ No newline at end of file diff --git a/cve/2020/CVE-2020-9377.json b/cve/2020/CVE-2020-9377.json index 6766d7bf5e9..2e0330d55d6 100644 --- a/cve/2020/CVE-2020-9377.json +++ b/cve/2020/CVE-2020-9377.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2020-9377", "sourceIdentifier": "cve@mitre.org", "published": "2020-07-09T13:15:10.653", "lastModified": "2024-08-04T11:15:44.400", "vulnStatus": "Modified", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["unsupported-when-assigned"]}], "cisaExploitAdd": "2022-03-25", "cisaActionDue": "2022-04-15", "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", "cisaVulnerabilityName": "D-Link DIR-610 Devices Remote Command Execution", "descriptions": [{"lang": "en", "value": "D-Link DIR-610 devices allow Remote Command Execution via the cmd parameter to command.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer"}, {"lang": "es", "value": "** NO COMPATIBLE CUANDO SE ASIGN\u00d3 ** Los dispositivos D-Link DIR-610 permiten una Ejecuci\u00f3n de Comandos Remota por medio del par\u00e1metro cmd en el archivo command.php. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el mantenedor"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}], "cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.5}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-78"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:dlink:dir-610_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "29CE8C74-E403-4700-A099-992E3AF3171E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:dlink:dir-610:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9791464-912F-45F0-8A6C-A2BEDB7B59BF"}]}]}], "references": [{"url": "https://gist.github.com/GouveaHeitor/131557f9de7d571f118f59805df852dc", "source": "cve@mitre.org", "tags": ["Broken Link", "Exploit", "Patch", "Third Party Advisory"]}, {"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10182", "source": "cve@mitre.org", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://www.dlink.com.br/produto/dir-610/", "source": "cve@mitre.org", "tags": ["Product", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2020-9377", "sourceIdentifier": "cve@mitre.org", "published": "2020-07-09T13:15:10.653", "lastModified": "2024-08-14T15:04:22.463", "vulnStatus": "Analyzed", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["unsupported-when-assigned"]}], "cisaExploitAdd": "2022-03-25", "cisaActionDue": "2022-04-15", "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", "cisaVulnerabilityName": "D-Link DIR-610 Devices Remote Command Execution", "descriptions": [{"lang": "en", "value": "D-Link DIR-610 devices allow Remote Command Execution via the cmd parameter to command.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer"}, {"lang": "es", "value": "** NO COMPATIBLE CUANDO SE ASIGN\u00d3 ** Los dispositivos D-Link DIR-610 permiten una Ejecuci\u00f3n de Comandos Remota por medio del par\u00e1metro cmd en el archivo command.php. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el mantenedor"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}], "cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.5}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-78"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:dlink:dir-610_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "29CE8C74-E403-4700-A099-992E3AF3171E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:dlink:dir-610:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9791464-912F-45F0-8A6C-A2BEDB7B59BF"}]}]}], "references": [{"url": "https://gist.github.com/GouveaHeitor/131557f9de7d571f118f59805df852dc", "source": "cve@mitre.org", "tags": ["Broken Link", "Exploit", "Patch", "Third Party Advisory"]}, {"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10182", "source": "cve@mitre.org", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://www.dlink.com.br/produto/dir-610/", "source": "cve@mitre.org", "tags": ["Product", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2021/CVE-2021-36741.json b/cve/2021/CVE-2021-36741.json index 034b4bb2f52..6ed433a2819 100644 --- a/cve/2021/CVE-2021-36741.json +++ b/cve/2021/CVE-2021-36741.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2021-36741", "sourceIdentifier": "security@trendmicro.com", "published": "2021-07-29T20:15:07.620", "lastModified": "2024-08-04T01:15:46.910", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Trend Micro Multiple Products Improper Input Validation Vulnerability", "descriptions": [{"lang": "en", "value": "An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product\ufffds management console in order to exploit this vulnerability."}, {"lang": "es", "value": " Una vulnerabilidad de validaci\u00f3n de entrada incorrecta en Trend Micro Apex One, Apex One as a Service, OfficeScan XG y Worry-Free Business Security 10.0 SP1 permite que un control remoto conectado cargue archivos arbitrarios en las instalaciones afectadas. Tenga en cuenta: un atacante primero debe obtener la capacidad de iniciar sesi\u00f3n en la consola de administraci\u00f3n del producto para poder aprovechar esta vulnerabilidad."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}], "cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.5}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-20"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:trendmicro:officescan:xg:sp1:*:*:*:*:*:*", "matchCriteriaId": "64600B42-4884-41F2-A683-AE1EDB79372E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:trendmicro:officescan_business_security:10.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "762313F8-2BA6-4ED7-A977-56C962D5B27F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AF019D2D-C426-4D2D-A254-442CE777B41E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:trendmicro:worry-free_business_security:10.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "FFCE8717-85D2-4F4F-91DF-C6DA341C4E19"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}], "references": [{"url": "https://success.trendmicro.com/jp/solution/000287796", "source": "security@trendmicro.com", "tags": ["Broken Link", "Vendor Advisory"]}, {"url": "https://success.trendmicro.com/jp/solution/000287815", "source": "security@trendmicro.com", "tags": ["Broken Link", "Vendor Advisory"]}, {"url": "https://success.trendmicro.com/solution/000287819", "source": "security@trendmicro.com", "tags": ["Broken Link", "Vendor Advisory"]}, {"url": "https://success.trendmicro.com/solution/000287820", "source": "security@trendmicro.com", "tags": ["Broken Link", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2021-36741", "sourceIdentifier": "security@trendmicro.com", "published": "2021-07-29T20:15:07.620", "lastModified": "2024-08-14T15:14:27.097", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Trend Micro Multiple Products Improper Input Validation Vulnerability", "descriptions": [{"lang": "en", "value": "An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product?s management console in order to exploit this vulnerability."}, {"lang": "es", "value": " Una vulnerabilidad de validaci\u00f3n de entrada incorrecta en Trend Micro Apex One, Apex One as a Service, OfficeScan XG y Worry-Free Business Security 10.0 SP1 permite que un control remoto conectado cargue archivos arbitrarios en las instalaciones afectadas. Tenga en cuenta: un atacante primero debe obtener la capacidad de iniciar sesi\u00f3n en la consola de administraci\u00f3n del producto para poder aprovechar esta vulnerabilidad."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}], "cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.5}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-434"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:trendmicro:officescan:xg:sp1:*:*:*:*:*:*", "matchCriteriaId": "64600B42-4884-41F2-A683-AE1EDB79372E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:trendmicro:officescan_business_security:10.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "762313F8-2BA6-4ED7-A977-56C962D5B27F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AF019D2D-C426-4D2D-A254-442CE777B41E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:trendmicro:worry-free_business_security:10.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "FFCE8717-85D2-4F4F-91DF-C6DA341C4E19"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}], "references": [{"url": "https://success.trendmicro.com/jp/solution/000287796", "source": "security@trendmicro.com", "tags": ["Broken Link", "Vendor Advisory"]}, {"url": "https://success.trendmicro.com/jp/solution/000287815", "source": "security@trendmicro.com", "tags": ["Broken Link", "Vendor Advisory"]}, {"url": "https://success.trendmicro.com/solution/000287819", "source": "security@trendmicro.com", "tags": ["Broken Link", "Vendor Advisory"]}, {"url": "https://success.trendmicro.com/solution/000287820", "source": "security@trendmicro.com", "tags": ["Broken Link", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2021/CVE-2021-44529.json b/cve/2021/CVE-2021-44529.json index 83e03a70fbf..61d0abf207c 100644 --- a/cve/2021/CVE-2021-44529.json +++ b/cve/2021/CVE-2021-44529.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2021-44529", "sourceIdentifier": "support@hackerone.com", "published": "2021-12-08T22:15:10.163", "lastModified": "2024-07-03T01:37:04.553", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2024-03-25", "cisaActionDue": "2024-04-15", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) Code Injection Vulnerability ", "descriptions": [{"lang": "en", "value": "A code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA) allows an unauthenticated user to execute arbitrary code with limited permissions (nobody)."}, {"lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n de c\u00f3digo en Ivanti EPM Cloud Services Appliance (CSA) permite a un usuario no autenticado ejecutar c\u00f3digo arbitrario con permisos limitados (nobody)"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}], "cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5}, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-94"}]}, {"source": "support@hackerone.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:*:*:*:*:*:*:*:*", "versionEndIncluding": "4.5", "matchCriteriaId": "425B8308-51F5-4759-8F8E-04C1BD4F4645"}, {"vulnerable": true, "criteria": "cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:4.6:-:*:*:*:*:*:*", "matchCriteriaId": "4F3651A6-CE83-4DB9-984E-5BFD6AF7F42D"}]}]}], "references": [{"url": "http://packetstormsecurity.com/files/166383/Ivanti-Endpoint-Manager-CSA-4.5-4.6-Remote-Code-Execution.html", "source": "support@hackerone.com", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}, {"url": "http://packetstormsecurity.com/files/170590/Ivanti-Cloud-Services-Appliance-CSA-Command-Injection.html", "source": "support@hackerone.com", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}, {"url": "https://forums.ivanti.com/s/article/SA-2021-12-02", "source": "support@hackerone.com", "tags": ["Mitigation", "Patch", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2021-44529", "sourceIdentifier": "support@hackerone.com", "published": "2021-12-08T22:15:10.163", "lastModified": "2024-08-14T15:11:49.873", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-03-25", "cisaActionDue": "2024-04-15", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) Code Injection Vulnerability ", "descriptions": [{"lang": "en", "value": "A code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA) allows an unauthenticated user to execute arbitrary code with limited permissions (nobody)."}, {"lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n de c\u00f3digo en Ivanti EPM Cloud Services Appliance (CSA) permite a un usuario no autenticado ejecutar c\u00f3digo arbitrario con permisos limitados (nobody)"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}], "cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5}, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-94"}]}, {"source": "support@hackerone.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:*:*:*:*:*:*:*:*", "versionEndIncluding": "4.5", "matchCriteriaId": "425B8308-51F5-4759-8F8E-04C1BD4F4645"}, {"vulnerable": true, "criteria": "cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:4.6:-:*:*:*:*:*:*", "matchCriteriaId": "4F3651A6-CE83-4DB9-984E-5BFD6AF7F42D"}]}]}], "references": [{"url": "http://packetstormsecurity.com/files/166383/Ivanti-Endpoint-Manager-CSA-4.5-4.6-Remote-Code-Execution.html", "source": "support@hackerone.com", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}, {"url": "http://packetstormsecurity.com/files/170590/Ivanti-Cloud-Services-Appliance-CSA-Command-Injection.html", "source": "support@hackerone.com", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}, {"url": "https://forums.ivanti.com/s/article/SA-2021-12-02", "source": "support@hackerone.com", "tags": ["Mitigation", "Patch", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2022/CVE-2022-22948.json b/cve/2022/CVE-2022-22948.json index 43fc5c4e9d3..b72f445c218 100644 --- a/cve/2022/CVE-2022-22948.json +++ b/cve/2022/CVE-2022-22948.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2022-22948", "sourceIdentifier": "security@vmware.com", "published": "2022-03-29T18:15:08.040", "lastModified": "2024-08-01T13:42:35.333", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2024-07-17", "cisaActionDue": "2024-08-07", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "VMware vCenter Server Incorrect Default File Permissions Vulnerability ", "descriptions": [{"lang": "en", "value": "The vCenter Server contains an information disclosure vulnerability due to improper permission of files. A malicious actor with non-administrative access to the vCenter Server may exploit this issue to gain access to sensitive information."}, {"lang": "es", "value": "vCenter Server contiene una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n debido a un permiso inapropiado de los archivos. Un actor malicioso con acceso no administrativo al vCenter Server puede explotar este problema para conseguir acceso a informaci\u00f3n confidencial"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.6}], "cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-276"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-276"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.11", "matchCriteriaId": "28769D3C-0C46-4E6B-A8E2-75A7B64B1D47"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:cloud_foundation:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "42DF0955-2FDD-46BF-9932-AF2C8F8A7599"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "23CFE5A5-A166-4FD5-BE97-5F16DAB1EAE0"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*", "matchCriteriaId": "CF7DDB0C-3C07-4B5E-8B8A-0542FEE72877"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*", "matchCriteriaId": "1DD16169-A7DF-4604-888C-156A60018E32"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*", "matchCriteriaId": "46FC9F34-C8FA-4AFE-9F4A-7CF9516BD4D9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*", "matchCriteriaId": "D26534EB-327B-4ED6-A3E1-005552CB1F9D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:e:*:*:*:*:*:*", "matchCriteriaId": "786CDD50-7E18-4437-8DB9-2D0ADECD436E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:f:*:*:*:*:*:*", "matchCriteriaId": "B2CE8DAE-0E78-4004-983D-1ECD8855EC33"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:*", "matchCriteriaId": "7E51F433-1152-4E94-AF77-970230B1A574"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:*", "matchCriteriaId": "0064D104-E0D8-481A-9029-D3726A1A9CF4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1c:*:*:*:*:*:*", "matchCriteriaId": "9B4D3F61-6CD9-411F-A205-EB06A57EBB4E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*", "matchCriteriaId": "F72A1E9C-F960-4E8C-A46C-B38209E6349E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*", "matchCriteriaId": "2C33CE46-F529-4EA9-9344-6ED3BFA7019D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*", "matchCriteriaId": "9F1D8161-0E02-45C9-BF61-14799AB65E03"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*", "matchCriteriaId": "1F2CB1FF-6118-4875-945D-07BAA3A21FFA"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*", "matchCriteriaId": "1AEDA28A-5C8E-4E95-A377-3BE530DBEAB5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*", "matchCriteriaId": "BDDC6510-3116-4578-80C8-8EF044A8370A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*", "matchCriteriaId": "8678DB48-CB98-4E4C-ADE6-CABA73265FEC"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*", "matchCriteriaId": "DBD9A341-1FBF-4E04-848B-550DEB27261A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update3:*:*:*:*:*:*", "matchCriteriaId": "4955663C-1BB6-4F3E-9D4B-362DF144B7F1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update3d:*:*:*:*:*:*", "matchCriteriaId": "CE0F8453-3D6C-4F1C-9167-3F02E3D905DC"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update3f:*:*:*:*:*:*", "matchCriteriaId": "0EAD4045-A7F9-464F-ABB9-3782941162CC"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update3k:*:*:*:*:*:*", "matchCriteriaId": "2F0A79C2-33AE-40C5-A853-770A4C691F29"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update3n:*:*:*:*:*:*", "matchCriteriaId": "D8BB6CBC-11D6-40A4-ABAF-53AB9BED5A73"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update3p:*:*:*:*:*:*", "matchCriteriaId": "26A3EC15-8C04-49AD-9045-4D9FADBD50CD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update3q:*:*:*:*:*:*", "matchCriteriaId": "AF7E87BB-1B5B-4F13-A70C-B3C6716E7919"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "E456F84C-A86E-4EA9-9A3E-BEEA662136E6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:*", "matchCriteriaId": "5241C282-A02B-44B2-B6CA-BA3A99F9737C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:*", "matchCriteriaId": "04A60AC7-C2EA-4DBF-9743-54D708584AFA"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:*", "matchCriteriaId": "8A91B0C4-F184-459E-AFD3-DE0E351CC964"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*", "matchCriteriaId": "23253631-2655-48A8-9B00-CB984232329C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*", "matchCriteriaId": "50C2A9A8-0E66-4702-BCD4-74622108E7A6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*", "matchCriteriaId": "EE4D3E2A-C32D-408F-B811-EF8BC86F0D34"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:*", "matchCriteriaId": "31CA7802-D78D-4BAD-A45A-68B601C010C6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:*", "matchCriteriaId": "3B98981B-4721-4752-BAB4-361DB5AEB86F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3:*:*:*:*:*:*", "matchCriteriaId": "04487105-980A-4943-9360-4442BF0411E6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3a:*:*:*:*:*:*", "matchCriteriaId": "24D24E06-EB3F-4F11-849B-E66757B01466"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3b:*:*:*:*:*:*", "matchCriteriaId": "8AF12716-88E2-44B5-ACD7-BCBECA130FB8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3f:*:*:*:*:*:*", "matchCriteriaId": "3352212C-E820-47B3-BDF5-57018F5B9E81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3g:*:*:*:*:*:*", "matchCriteriaId": "6436ADFD-6B94-4D2A-B09B-CED4EC6CA276"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3j:*:*:*:*:*:*", "matchCriteriaId": "D06832CE-F946-469D-B495-6735F18D02A0"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3l:*:*:*:*:*:*", "matchCriteriaId": "726AC46D-9EA8-4FE8-94B8-0562935458F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3m:*:*:*:*:*:*", "matchCriteriaId": "0243D22F-1591-4A95-A7FE-2658CEE0C08F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3n:*:*:*:*:*:*", "matchCriteriaId": "02AE5983-CD14-4EAF-9F5C-1281E3DE7F46"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3o:*:*:*:*:*:*", "matchCriteriaId": "EFDDF4CA-1C20-430E-A17C-CC2998F8BDDF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "5FA81CCD-A05E-498C-820E-21980E92132F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*", "matchCriteriaId": "0EE83406-A3D9-4F75-A1A6-63831CEBEEC1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*", "matchCriteriaId": "FB563627-C9CF-4D8A-B882-9AB65EAE9E15"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*", "matchCriteriaId": "DCA03B2A-48B2-48AD-B8EB-9D7BB2016819"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*", "matchCriteriaId": "A2392D0F-D7A2-4E01-9212-1BA6C895AEBF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*", "matchCriteriaId": "6D731C1A-9FE5-461C-97E2-6F45E4CBABE1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*", "matchCriteriaId": "8725E544-2A94-4829-A683-1ECCE57A74A6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*", "matchCriteriaId": "0FC6765A-6584-45A8-9B21-4951D2EA8939"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*", "matchCriteriaId": "85DD238C-EF73-44F0-928E-A94FF5C4B378"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*", "matchCriteriaId": "F4CA36C1-732E-41AE-B847-F7411B753F3D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*", "matchCriteriaId": "0DA882B6-D811-4E4B-B614-2D48F0B9036E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*", "matchCriteriaId": "8D30A78E-16D0-4A2E-A2F8-F6073698243E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*", "matchCriteriaId": "188E103E-9568-4CE0-A984-141B2A9E82D2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*", "matchCriteriaId": "B266439F-E911-4C95-9D27-88DF96DDCCD5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*", "matchCriteriaId": "6508A908-EF14-4A72-AC75-5DA6F8B98A0E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*", "matchCriteriaId": "3BAD2012-5C82-4EA9-A780-9BF1DA5A18AB"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*", "matchCriteriaId": "58597F18-0B23-4D21-9ABA-D9773958F10E"}]}]}], "references": [{"url": "https://www.vmware.com/security/advisories/VMSA-2022-0009.html", "source": "security@vmware.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2022-22948", "sourceIdentifier": "security@vmware.com", "published": "2022-03-29T18:15:08.040", "lastModified": "2024-08-14T15:11:33.877", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-07-17", "cisaActionDue": "2024-08-07", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "VMware vCenter Server Incorrect Default File Permissions Vulnerability ", "descriptions": [{"lang": "en", "value": "The vCenter Server contains an information disclosure vulnerability due to improper permission of files. A malicious actor with non-administrative access to the vCenter Server may exploit this issue to gain access to sensitive information."}, {"lang": "es", "value": "vCenter Server contiene una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n debido a un permiso inapropiado de los archivos. Un actor malicioso con acceso no administrativo al vCenter Server puede explotar este problema para conseguir acceso a informaci\u00f3n confidencial"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.6}], "cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-276"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-276"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0", "versionEndExcluding": "3.11", "matchCriteriaId": "28769D3C-0C46-4E6B-A8E2-75A7B64B1D47"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:cloud_foundation:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "42DF0955-2FDD-46BF-9932-AF2C8F8A7599"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "23CFE5A5-A166-4FD5-BE97-5F16DAB1EAE0"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*", "matchCriteriaId": "CF7DDB0C-3C07-4B5E-8B8A-0542FEE72877"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*", "matchCriteriaId": "1DD16169-A7DF-4604-888C-156A60018E32"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*", "matchCriteriaId": "46FC9F34-C8FA-4AFE-9F4A-7CF9516BD4D9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*", "matchCriteriaId": "D26534EB-327B-4ED6-A3E1-005552CB1F9D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:e:*:*:*:*:*:*", "matchCriteriaId": "786CDD50-7E18-4437-8DB9-2D0ADECD436E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:f:*:*:*:*:*:*", "matchCriteriaId": "B2CE8DAE-0E78-4004-983D-1ECD8855EC33"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:*", "matchCriteriaId": "7E51F433-1152-4E94-AF77-970230B1A574"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:*", "matchCriteriaId": "0064D104-E0D8-481A-9029-D3726A1A9CF4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1c:*:*:*:*:*:*", "matchCriteriaId": "9B4D3F61-6CD9-411F-A205-EB06A57EBB4E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*", "matchCriteriaId": "F72A1E9C-F960-4E8C-A46C-B38209E6349E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*", "matchCriteriaId": "2C33CE46-F529-4EA9-9344-6ED3BFA7019D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*", "matchCriteriaId": "9F1D8161-0E02-45C9-BF61-14799AB65E03"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*", "matchCriteriaId": "1F2CB1FF-6118-4875-945D-07BAA3A21FFA"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*", "matchCriteriaId": "1AEDA28A-5C8E-4E95-A377-3BE530DBEAB5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*", "matchCriteriaId": "BDDC6510-3116-4578-80C8-8EF044A8370A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*", "matchCriteriaId": "8678DB48-CB98-4E4C-ADE6-CABA73265FEC"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*", "matchCriteriaId": "DBD9A341-1FBF-4E04-848B-550DEB27261A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update3:*:*:*:*:*:*", "matchCriteriaId": "4955663C-1BB6-4F3E-9D4B-362DF144B7F1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update3d:*:*:*:*:*:*", "matchCriteriaId": "CE0F8453-3D6C-4F1C-9167-3F02E3D905DC"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update3f:*:*:*:*:*:*", "matchCriteriaId": "0EAD4045-A7F9-464F-ABB9-3782941162CC"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update3k:*:*:*:*:*:*", "matchCriteriaId": "2F0A79C2-33AE-40C5-A853-770A4C691F29"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update3n:*:*:*:*:*:*", "matchCriteriaId": "D8BB6CBC-11D6-40A4-ABAF-53AB9BED5A73"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update3p:*:*:*:*:*:*", "matchCriteriaId": "26A3EC15-8C04-49AD-9045-4D9FADBD50CD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update3q:*:*:*:*:*:*", "matchCriteriaId": "AF7E87BB-1B5B-4F13-A70C-B3C6716E7919"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "E456F84C-A86E-4EA9-9A3E-BEEA662136E6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:*", "matchCriteriaId": "5241C282-A02B-44B2-B6CA-BA3A99F9737C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:*", "matchCriteriaId": "04A60AC7-C2EA-4DBF-9743-54D708584AFA"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:*", "matchCriteriaId": "8A91B0C4-F184-459E-AFD3-DE0E351CC964"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*", "matchCriteriaId": "23253631-2655-48A8-9B00-CB984232329C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*", "matchCriteriaId": "50C2A9A8-0E66-4702-BCD4-74622108E7A6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*", "matchCriteriaId": "EE4D3E2A-C32D-408F-B811-EF8BC86F0D34"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:*", "matchCriteriaId": "31CA7802-D78D-4BAD-A45A-68B601C010C6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:*", "matchCriteriaId": "3B98981B-4721-4752-BAB4-361DB5AEB86F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3:*:*:*:*:*:*", "matchCriteriaId": "04487105-980A-4943-9360-4442BF0411E6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3a:*:*:*:*:*:*", "matchCriteriaId": "24D24E06-EB3F-4F11-849B-E66757B01466"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3b:*:*:*:*:*:*", "matchCriteriaId": "8AF12716-88E2-44B5-ACD7-BCBECA130FB8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3f:*:*:*:*:*:*", "matchCriteriaId": "3352212C-E820-47B3-BDF5-57018F5B9E81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3g:*:*:*:*:*:*", "matchCriteriaId": "6436ADFD-6B94-4D2A-B09B-CED4EC6CA276"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3j:*:*:*:*:*:*", "matchCriteriaId": "D06832CE-F946-469D-B495-6735F18D02A0"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3l:*:*:*:*:*:*", "matchCriteriaId": "726AC46D-9EA8-4FE8-94B8-0562935458F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3m:*:*:*:*:*:*", "matchCriteriaId": "0243D22F-1591-4A95-A7FE-2658CEE0C08F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3n:*:*:*:*:*:*", "matchCriteriaId": "02AE5983-CD14-4EAF-9F5C-1281E3DE7F46"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update3o:*:*:*:*:*:*", "matchCriteriaId": "EFDDF4CA-1C20-430E-A17C-CC2998F8BDDF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "5FA81CCD-A05E-498C-820E-21980E92132F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*", "matchCriteriaId": "0EE83406-A3D9-4F75-A1A6-63831CEBEEC1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*", "matchCriteriaId": "FB563627-C9CF-4D8A-B882-9AB65EAE9E15"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*", "matchCriteriaId": "DCA03B2A-48B2-48AD-B8EB-9D7BB2016819"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*", "matchCriteriaId": "A2392D0F-D7A2-4E01-9212-1BA6C895AEBF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*", "matchCriteriaId": "6D731C1A-9FE5-461C-97E2-6F45E4CBABE1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*", "matchCriteriaId": "8725E544-2A94-4829-A683-1ECCE57A74A6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*", "matchCriteriaId": "0FC6765A-6584-45A8-9B21-4951D2EA8939"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*", "matchCriteriaId": "85DD238C-EF73-44F0-928E-A94FF5C4B378"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*", "matchCriteriaId": "F4CA36C1-732E-41AE-B847-F7411B753F3D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*", "matchCriteriaId": "0DA882B6-D811-4E4B-B614-2D48F0B9036E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*", "matchCriteriaId": "8D30A78E-16D0-4A2E-A2F8-F6073698243E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*", "matchCriteriaId": "188E103E-9568-4CE0-A984-141B2A9E82D2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*", "matchCriteriaId": "B266439F-E911-4C95-9D27-88DF96DDCCD5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*", "matchCriteriaId": "6508A908-EF14-4A72-AC75-5DA6F8B98A0E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*", "matchCriteriaId": "3BAD2012-5C82-4EA9-A780-9BF1DA5A18AB"}, {"vulnerable": true, "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*", "matchCriteriaId": "58597F18-0B23-4D21-9ABA-D9773958F10E"}]}]}], "references": [{"url": "https://www.vmware.com/security/advisories/VMSA-2022-0009.html", "source": "security@vmware.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2022/CVE-2022-2856.json b/cve/2022/CVE-2022-2856.json index 7f89c39a4e7..8876cb5fd34 100644 --- a/cve/2022/CVE-2022-2856.json +++ b/cve/2022/CVE-2022-2856.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2022-2856", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-09-26T16:15:11.207", "lastModified": "2024-07-08T14:16:18.783", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2022-08-18", "cisaActionDue": "2022-09-08", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Google Chromium Intents Insufficient Input Validation Vulnerability", "descriptions": [{"lang": "en", "value": "Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 104.0.5112.101 allowed a remote attacker to arbitrarily browse to a malicious website via a crafted HTML page."}, {"lang": "es", "value": "Una comprobaci\u00f3n insuficiente de entradas no confiables en Intents en Google Chrome en Android versiones anteriores a 104.0.5112.101, permit\u00eda a un atacante remoto navegar arbitrariamente a un sitio web malicioso por medio de una p\u00e1gina HTML dise\u00f1ada."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-20"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-20"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "versionEndExcluding": "104.0.5112.101", "matchCriteriaId": "E7C72EBC-6FE9-4A2D-BEF3-91F5E5ED020A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "versionEndExcluding": "104.0.5112.102", "matchCriteriaId": "EB0FE056-8166-4C5C-A267-1C0A039ADE02"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}], "references": [{"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html", "source": "chrome-cve-admin@google.com", "tags": ["Patch", "Release Notes", "Vendor Advisory"]}, {"url": "https://crbug.com/1345630", "source": "chrome-cve-admin@google.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/", "source": "chrome-cve-admin@google.com", "tags": ["Broken Link"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2022-2856", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-09-26T16:15:11.207", "lastModified": "2024-08-14T15:11:01.740", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2022-08-18", "cisaActionDue": "2022-09-08", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Google Chromium Intents Insufficient Input Validation Vulnerability", "descriptions": [{"lang": "en", "value": "Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 104.0.5112.101 allowed a remote attacker to arbitrarily browse to a malicious website via a crafted HTML page."}, {"lang": "es", "value": "Una comprobaci\u00f3n insuficiente de entradas no confiables en Intents en Google Chrome en Android versiones anteriores a 104.0.5112.101, permit\u00eda a un atacante remoto navegar arbitrariamente a un sitio web malicioso por medio de una p\u00e1gina HTML dise\u00f1ada."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-20"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-20"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "versionEndExcluding": "104.0.5112.101", "matchCriteriaId": "E7C72EBC-6FE9-4A2D-BEF3-91F5E5ED020A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"}, {"vulnerable": false, "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"}, {"vulnerable": false, "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "versionEndExcluding": "104.0.5112.102", "matchCriteriaId": "EB0FE056-8166-4C5C-A267-1C0A039ADE02"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}], "references": [{"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html", "source": "chrome-cve-admin@google.com", "tags": ["Patch", "Release Notes", "Vendor Advisory"]}, {"url": "https://crbug.com/1345630", "source": "chrome-cve-admin@google.com", "tags": ["Exploit", "Issue Tracking", "Mailing List", "Vendor Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/", "source": "chrome-cve-admin@google.com", "tags": ["Mailing List"]}]}} \ No newline at end of file diff --git a/cve/2022/CVE-2022-48618.json b/cve/2022/CVE-2022-48618.json index 4a59282788e..43980711345 100644 --- a/cve/2022/CVE-2022-48618.json +++ b/cve/2022/CVE-2022-48618.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2022-48618", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-09T18:15:45.120", "lastModified": "2024-07-03T01:38:59.610", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2024-01-31", "cisaActionDue": "2024-02-21", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Apple Multiple Products Memory Corruption Vulnerability", "descriptions": [{"lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited against versions of iOS released before iOS 15.7.1."}, {"lang": "es", "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Ventura 13.1, watchOS 9.2, iOS 16.2 y iPadOS 16.2, tvOS 16.2. Un atacante con capacidad de lectura y escritura arbitraria puede eludir la autenticaci\u00f3n de puntero. Apple tiene conocimiento de un informe que indica que este problema puede haber sido aprovechado en versiones de iOS lanzadas antes de iOS 15.7.1."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.0, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.0, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-367"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-367"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.2", "matchCriteriaId": "89495791-675B-413C-A86D-ECBADF4EDC4E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.2", "matchCriteriaId": "6B1B6657-43F5-4F0E-BE5C-5D828DEE066F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.0", "versionEndExcluding": "13.1", "matchCriteriaId": "454702CC-FB2E-4D17-AEAF-A428925B44A4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.2", "matchCriteriaId": "400AD564-BDEC-4C81-B650-56357BEBF0C7"}, {"vulnerable": true, "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.2", "matchCriteriaId": "7A9F3F63-6BF8-4DD5-97FD-D9C90A62ECB0"}]}]}], "references": [{"url": "https://support.apple.com/en-us/HT213530", "source": "product-security@apple.com", "tags": ["Release Notes", "Vendor Advisory"]}, {"url": "https://support.apple.com/en-us/HT213532", "source": "product-security@apple.com", "tags": ["Release Notes", "Vendor Advisory"]}, {"url": "https://support.apple.com/en-us/HT213535", "source": "product-security@apple.com", "tags": ["Release Notes", "Vendor Advisory"]}, {"url": "https://support.apple.com/en-us/HT213536", "source": "product-security@apple.com", "tags": ["Release Notes", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2022-48618", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-09T18:15:45.120", "lastModified": "2024-08-14T15:22:47.173", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-01-31", "cisaActionDue": "2024-02-21", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Apple Multiple Products Memory Corruption Vulnerability", "descriptions": [{"lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited against versions of iOS released before iOS 15.7.1."}, {"lang": "es", "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Ventura 13.1, watchOS 9.2, iOS 16.2 y iPadOS 16.2, tvOS 16.2. Un atacante con capacidad de lectura y escritura arbitraria puede eludir la autenticaci\u00f3n de puntero. Apple tiene conocimiento de un informe que indica que este problema puede haber sido aprovechado en versiones de iOS lanzadas antes de iOS 15.7.1."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.0, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.0, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-367"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-367"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.2", "matchCriteriaId": "89495791-675B-413C-A86D-ECBADF4EDC4E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.2", "matchCriteriaId": "6B1B6657-43F5-4F0E-BE5C-5D828DEE066F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.0", "versionEndExcluding": "13.1", "matchCriteriaId": "454702CC-FB2E-4D17-AEAF-A428925B44A4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.2", "matchCriteriaId": "400AD564-BDEC-4C81-B650-56357BEBF0C7"}, {"vulnerable": true, "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.2", "matchCriteriaId": "7A9F3F63-6BF8-4DD5-97FD-D9C90A62ECB0"}]}]}], "references": [{"url": "https://support.apple.com/en-us/HT213530", "source": "product-security@apple.com", "tags": ["Release Notes", "Vendor Advisory"]}, {"url": "https://support.apple.com/en-us/HT213532", "source": "product-security@apple.com", "tags": ["Release Notes", "Vendor Advisory"]}, {"url": "https://support.apple.com/en-us/HT213535", "source": "product-security@apple.com", "tags": ["Release Notes", "Vendor Advisory"]}, {"url": "https://support.apple.com/en-us/HT213536", "source": "product-security@apple.com", "tags": ["Release Notes", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-21237.json b/cve/2023/CVE-2023-21237.json index 9b53ccc4f96..53a658f3a08 100644 --- a/cve/2023/CVE-2023-21237.json +++ b/cve/2023/CVE-2023-21237.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-21237", "sourceIdentifier": "security@android.com", "published": "2023-06-28T18:15:16.560", "lastModified": "2024-07-08T14:16:24.090", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2024-03-05", "cisaActionDue": "2024-03-26", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Android Pixel Information Disclosure Vulnerability ", "descriptions": [{"lang": "en", "value": "In applyRemoteView of NotificationContentInflater.java, there is a possible way to hide foreground service notification due to misleading or insufficient UI. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-251586912"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.5, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-200"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"}]}]}], "references": [{"url": "https://source.android.com/security/bulletin/pixel/2023-06-01", "source": "security@android.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-21237", "sourceIdentifier": "security@android.com", "published": "2023-06-28T18:15:16.560", "lastModified": "2024-08-14T15:23:35.867", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-03-05", "cisaActionDue": "2024-03-26", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Android Pixel Information Disclosure Vulnerability ", "descriptions": [{"lang": "en", "value": "In applyRemoteView of NotificationContentInflater.java, there is a possible way to hide foreground service notification due to misleading or insufficient UI. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-251586912"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.5, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-200"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"}]}]}], "references": [{"url": "https://source.android.com/security/bulletin/pixel/2023-06-01", "source": "security@android.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-21823.json b/cve/2023/CVE-2023-21823.json index 3e44bdc1d69..32a8fecc5f5 100644 --- a/cve/2023/CVE-2023-21823.json +++ b/cve/2023/CVE-2023-21823.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-21823", "sourceIdentifier": "secure@microsoft.com", "published": "2023-02-14T21:15:12.297", "lastModified": "2024-05-29T03:15:37.863", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-02-14", "cisaActionDue": "2023-03-07", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Microsoft Windows Graphic Component Privilege Escalation Vulnerability", "descriptions": [{"lang": "en", "value": "Windows Graphics Component Remote Code Execution Vulnerability"}], "metrics": {"cvssMetricV31": [{"source": "secure@microsoft.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-190"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.10240.19747", "matchCriteriaId": "C1BEE482-6A48-4238-B435-5F9EEC091ADA"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.10240.19747", "matchCriteriaId": "30E6D6EE-A33D-4E8E-8C18-F161BEA396E3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.14393.5717", "matchCriteriaId": "A4F0F6D2-7E7B-4E3E-B160-65038A850B34"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.14393.5717", "matchCriteriaId": "8C826787-EBA0-4087-9F36-30B8192B2056"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.17763.4010", "matchCriteriaId": "E65DF61A-C497-4545-B95E-11E2FAFE1F2D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.17763.4010", "matchCriteriaId": "3658090D-8E87-4CE4-BAE5-A7ADED6DC296"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.17763.4010", "matchCriteriaId": "5ED13E1D-FE5F-4DC1-B08D-04BB875A8C71"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.19042.2604", "matchCriteriaId": "FC73806E-125C-470E-8123-945B9366BB24"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.19042.2604", "matchCriteriaId": "7DFC40C1-A4B9-4363-8ED2-4C4D2684C8B2"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19042.2604", "matchCriteriaId": "0E2F1775-DB07-47B8-95B7-B3F5A1797DC8"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.19044.2604", "matchCriteriaId": "9F74B22E-55BC-4646-95D5-049099ED1DEC"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.19044.2604", "matchCriteriaId": "0721D979-707D-4EE6-ABC7-5957D8F50391"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19044.2604", "matchCriteriaId": "EB662E36-78A1-4004-AE03-F5693C1BED2A"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.19045.2604", "matchCriteriaId": "39A4A18D-2EA3-40D2-BBF7-4D560E4ED208"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.19045.2604", "matchCriteriaId": "8FD8C3D8-808A-4A01-921D-243F8317F694"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19045.2604", "matchCriteriaId": "84EBF8C0-ACA5-47E2-A67D-B65A84E19A36"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22000.1574", "matchCriteriaId": "8E0C624C-A725-425E-BE3C-43CA28379263"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22000.1574", "matchCriteriaId": "D39AA669-F9A5-4678-AE40-F6362BA95C71"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22621.1265", "matchCriteriaId": "9689E7AA-B2EA-428C-945F-54935922861D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22621.1265", "matchCriteriaId": "C819525C-9D6E-4097-9D48-6E2131B3FD90"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21823", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-21823", "sourceIdentifier": "secure@microsoft.com", "published": "2023-02-14T21:15:12.297", "lastModified": "2024-08-14T15:23:26.127", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2023-02-14", "cisaActionDue": "2023-03-07", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Microsoft Windows Graphic Component Privilege Escalation Vulnerability", "descriptions": [{"lang": "en", "value": "Windows Graphics Component Remote Code Execution Vulnerability"}], "metrics": {"cvssMetricV31": [{"source": "secure@microsoft.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-190"}]}, {"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-190"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.10240.19747", "matchCriteriaId": "C1BEE482-6A48-4238-B435-5F9EEC091ADA"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.10240.19747", "matchCriteriaId": "30E6D6EE-A33D-4E8E-8C18-F161BEA396E3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.14393.5717", "matchCriteriaId": "A4F0F6D2-7E7B-4E3E-B160-65038A850B34"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.14393.5717", "matchCriteriaId": "8C826787-EBA0-4087-9F36-30B8192B2056"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.17763.4010", "matchCriteriaId": "E65DF61A-C497-4545-B95E-11E2FAFE1F2D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.17763.4010", "matchCriteriaId": "3658090D-8E87-4CE4-BAE5-A7ADED6DC296"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.17763.4010", "matchCriteriaId": "5ED13E1D-FE5F-4DC1-B08D-04BB875A8C71"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.19042.2604", "matchCriteriaId": "FC73806E-125C-470E-8123-945B9366BB24"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.19042.2604", "matchCriteriaId": "7DFC40C1-A4B9-4363-8ED2-4C4D2684C8B2"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19042.2604", "matchCriteriaId": "0E2F1775-DB07-47B8-95B7-B3F5A1797DC8"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.19044.2604", "matchCriteriaId": "9F74B22E-55BC-4646-95D5-049099ED1DEC"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.19044.2604", "matchCriteriaId": "0721D979-707D-4EE6-ABC7-5957D8F50391"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19044.2604", "matchCriteriaId": "EB662E36-78A1-4004-AE03-F5693C1BED2A"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.19045.2604", "matchCriteriaId": "39A4A18D-2EA3-40D2-BBF7-4D560E4ED208"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.19045.2604", "matchCriteriaId": "8FD8C3D8-808A-4A01-921D-243F8317F694"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19045.2604", "matchCriteriaId": "84EBF8C0-ACA5-47E2-A67D-B65A84E19A36"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22000.1574", "matchCriteriaId": "8E0C624C-A725-425E-BE3C-43CA28379263"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22000.1574", "matchCriteriaId": "D39AA669-F9A5-4678-AE40-F6362BA95C71"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22621.1265", "matchCriteriaId": "9689E7AA-B2EA-428C-945F-54935922861D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22621.1265", "matchCriteriaId": "C819525C-9D6E-4097-9D48-6E2131B3FD90"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21823", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-22527.json b/cve/2023/CVE-2023-22527.json index 99e0f5bf79e..1c5ccec2655 100644 --- a/cve/2023/CVE-2023-22527.json +++ b/cve/2023/CVE-2023-22527.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-22527", "sourceIdentifier": "security@atlassian.com", "published": "2024-01-16T05:15:08.290", "lastModified": "2024-07-03T01:39:25.327", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2024-01-24", "cisaActionDue": "2024-02-14", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Atlassian Confluence Data Center and Server Template Injection Vulnerability", "descriptions": [{"lang": "en", "value": "A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.\n\nMost recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian\u2019s January Security Bulletin."}, {"lang": "es", "value": "Resumen de vulnerabilidad. Una vulnerabilidad de inyecci\u00f3n de plantilla en versiones anteriores de Confluence Data Center y Server permite que un atacante no autenticado logre RCE en una instancia afectada. Los clientes que utilicen una versi\u00f3n afectada deben tomar medidas inmediatas. Las versiones compatibles m\u00e1s recientes de Confluence Data Center y Server no se ven afectadas por esta vulnerabilidad, ya que finalmente se mitig\u00f3 durante las actualizaciones peri\u00f3dicas de la versi\u00f3n. Sin embargo, Atlassian recomienda que los clientes tengan cuidado de instalar la \u00faltima versi\u00f3n para proteger sus instancias de vulnerabilidades no cr\u00edticas descritas en el Bolet\u00edn de seguridad de enero de Atlassian. Consulte \u201cWhat You Need to Do\u201d para obtener instrucciones detalladas. {panel:bgColor=#deebff} Los sitios de Atlassian Cloud no se ven afectados por esta vulnerabilidad. Si se accede a su sitio de Confluence a trav\u00e9s de un dominio atlassian.net, est\u00e1 alojado en Atlassian y no es vulnerable a este problema. {panel} Versiones afectadas ||Producto||Versiones afectadas|| |Centro de datos y servidor de Confluence| 8.0.x 8.1.x 8.2.x 8.3.x 8.4.x 8.5.0 8.5.1 8.5.2 8.5.3| Versiones fijas ||Producto||Versiones fijas|| |Centro de datos y servidor de Confluence|8.5.4 (LTS)| |Centro de datos de Confluence| 8.6.0 o posterior (solo centro de datos) 8.7.1 o posterior (solo centro de datos)| Qu\u00e9 debe hacer inmediatamente parchear a una versi\u00f3n fija Atlassian recomienda parchear cada una de sus instalaciones afectadas a la \u00faltima versi\u00f3n. Las versiones fijas enumeradas ya no son las versiones m\u00e1s actualizadas y no protegen su instancia de otras vulnerabilidades no cr\u00edticas, como se describe en el Bolet\u00edn de seguridad de enero de Atlassian. ||Producto||Versiones fijas||\u00daltimas versiones|| |Centro de datos y servidor de Confluence| 8.5.4 (LTS)| 8.5.5 (LTS) |Centro de datos de Confluence| 8.6.0 o posterior (solo centro de datos) 8.7.1 o posterior (solo centro de datos)| 8.6.3 o posterior (solo centro de datos) 8.7.2 o posterior (solo centro de datos) Para obtener detalles adicionales, consulte el aviso completo."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}], "cvssMetricV30": [{"source": "security@atlassian.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 6.0}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-74"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-74"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.0.0", "versionEndExcluding": "8.5.4", "matchCriteriaId": "98686E6C-5D52-4EDB-A580-CE01009BADBA"}, {"vulnerable": true, "criteria": "cpe:2.3:a:atlassian:confluence_data_center:8.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "FED19C83-6D8B-45B1-AAC3-F4C6B12C0E4D"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.0.0", "versionEndExcluding": "8.5.4", "matchCriteriaId": "82C2F4B6-A251-4D8B-8624-99079E50E331"}]}]}], "references": [{"url": "http://packetstormsecurity.com/files/176789/Atlassian-Confluence-SSTI-Injection.html", "source": "security@atlassian.com", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}, {"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1333335615", "source": "security@atlassian.com", "tags": ["Vendor Advisory"]}, {"url": "https://jira.atlassian.com/browse/CONFSERVER-93833", "source": "security@atlassian.com", "tags": ["Issue Tracking", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-22527", "sourceIdentifier": "security@atlassian.com", "published": "2024-01-16T05:15:08.290", "lastModified": "2024-08-14T15:23:20.770", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-01-24", "cisaActionDue": "2024-02-14", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Atlassian Confluence Data Center and Server Template Injection Vulnerability", "descriptions": [{"lang": "en", "value": "A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.\n\nMost recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian\u2019s January Security Bulletin."}, {"lang": "es", "value": "Resumen de vulnerabilidad. Una vulnerabilidad de inyecci\u00f3n de plantilla en versiones anteriores de Confluence Data Center y Server permite que un atacante no autenticado logre RCE en una instancia afectada. Los clientes que utilicen una versi\u00f3n afectada deben tomar medidas inmediatas. Las versiones compatibles m\u00e1s recientes de Confluence Data Center y Server no se ven afectadas por esta vulnerabilidad, ya que finalmente se mitig\u00f3 durante las actualizaciones peri\u00f3dicas de la versi\u00f3n. Sin embargo, Atlassian recomienda que los clientes tengan cuidado de instalar la \u00faltima versi\u00f3n para proteger sus instancias de vulnerabilidades no cr\u00edticas descritas en el Bolet\u00edn de seguridad de enero de Atlassian. Consulte \u201cWhat You Need to Do\u201d para obtener instrucciones detalladas. {panel:bgColor=#deebff} Los sitios de Atlassian Cloud no se ven afectados por esta vulnerabilidad. Si se accede a su sitio de Confluence a trav\u00e9s de un dominio atlassian.net, est\u00e1 alojado en Atlassian y no es vulnerable a este problema. {panel} Versiones afectadas ||Producto||Versiones afectadas|| |Centro de datos y servidor de Confluence| 8.0.x 8.1.x 8.2.x 8.3.x 8.4.x 8.5.0 8.5.1 8.5.2 8.5.3| Versiones fijas ||Producto||Versiones fijas|| |Centro de datos y servidor de Confluence|8.5.4 (LTS)| |Centro de datos de Confluence| 8.6.0 o posterior (solo centro de datos) 8.7.1 o posterior (solo centro de datos)| Qu\u00e9 debe hacer inmediatamente parchear a una versi\u00f3n fija Atlassian recomienda parchear cada una de sus instalaciones afectadas a la \u00faltima versi\u00f3n. Las versiones fijas enumeradas ya no son las versiones m\u00e1s actualizadas y no protegen su instancia de otras vulnerabilidades no cr\u00edticas, como se describe en el Bolet\u00edn de seguridad de enero de Atlassian. ||Producto||Versiones fijas||\u00daltimas versiones|| |Centro de datos y servidor de Confluence| 8.5.4 (LTS)| 8.5.5 (LTS) |Centro de datos de Confluence| 8.6.0 o posterior (solo centro de datos) 8.7.1 o posterior (solo centro de datos)| 8.6.3 o posterior (solo centro de datos) 8.7.2 o posterior (solo centro de datos) Para obtener detalles adicionales, consulte el aviso completo."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}], "cvssMetricV30": [{"source": "security@atlassian.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 6.0}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-74"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-74"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.0.0", "versionEndExcluding": "8.5.4", "matchCriteriaId": "98686E6C-5D52-4EDB-A580-CE01009BADBA"}, {"vulnerable": true, "criteria": "cpe:2.3:a:atlassian:confluence_data_center:8.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "FED19C83-6D8B-45B1-AAC3-F4C6B12C0E4D"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.0.0", "versionEndExcluding": "8.5.4", "matchCriteriaId": "82C2F4B6-A251-4D8B-8624-99079E50E331"}]}]}], "references": [{"url": "http://packetstormsecurity.com/files/176789/Atlassian-Confluence-SSTI-Injection.html", "source": "security@atlassian.com", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}, {"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1333335615", "source": "security@atlassian.com", "tags": ["Vendor Advisory"]}, {"url": "https://jira.atlassian.com/browse/CONFSERVER-93833", "source": "security@atlassian.com", "tags": ["Issue Tracking", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-23752.json b/cve/2023/CVE-2023-23752.json index e3ae0110b68..547b05bbd81 100644 --- a/cve/2023/CVE-2023-23752.json +++ b/cve/2023/CVE-2023-23752.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-23752", "sourceIdentifier": "security@joomla.org", "published": "2023-02-16T17:15:10.603", "lastModified": "2024-08-01T13:43:17.320", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2024-01-08", "cisaActionDue": "2024-01-29", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Joomla! Improper Access Control Vulnerability", "descriptions": [{"lang": "en", "value": "An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 3.9, "impactScore": 1.4}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 3.9, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-284"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndIncluding": "4.2.7", "matchCriteriaId": "C376A148-A449-43FD-A4A3-860DD5765740"}]}]}], "references": [{"url": "https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html", "source": "security@joomla.org", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-23752", "sourceIdentifier": "security@joomla.org", "published": "2023-02-16T17:15:10.603", "lastModified": "2024-08-14T15:23:06.437", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-01-08", "cisaActionDue": "2024-01-29", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Joomla! Improper Access Control Vulnerability", "descriptions": [{"lang": "en", "value": "An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 3.9, "impactScore": 1.4}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 3.9, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-284"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.8", "matchCriteriaId": "C6F63041-8035-4313-8636-4170A131A2C3"}]}]}], "references": [{"url": "https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html", "source": "security@joomla.org", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-24332.json b/cve/2023/CVE-2023-24332.json index bf5d0b9b71b..9e23f397471 100644 --- a/cve/2023/CVE-2023-24332.json +++ b/cve/2023/CVE-2023-24332.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-24332", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T21:15:08.617", "lastModified": "2024-02-22T19:07:27.197", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A stack overflow vulnerability in Tenda AC6 with firmware version US_AC6V5.0re_V03.03.02.01_cn_TDC01 allows attackers to run arbitrary commands via crafted POST request to /goform/PowerSaveSet."}, {"lang": "es", "value": "Una vulnerabilidad de desbordamiento en la regi\u00f3n stack de la memoria en Tenda AC6 con la versi\u00f3n de firmware US_AC6V5.0re_V03.03.02.01_cn_TDC01 permite a los atacantes ejecutar comandos arbitrarios a trav\u00e9s de una solicitud POST manipulada para /goform/PowerSaveSet."}], "metrics": {}, "references": [{"url": "https://github.com/caoyebo/CVE/tree/main/Tenda%20AC6%20-%20CVE-2023-24332", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-24332", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T21:15:08.617", "lastModified": "2024-08-14T15:35:01.550", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A stack overflow vulnerability in Tenda AC6 with firmware version US_AC6V5.0re_V03.03.02.01_cn_TDC01 allows attackers to run arbitrary commands via crafted POST request to /goform/PowerSaveSet."}, {"lang": "es", "value": "Una vulnerabilidad de desbordamiento en la regi\u00f3n stack de la memoria en Tenda AC6 con la versi\u00f3n de firmware US_AC6V5.0re_V03.03.02.01_cn_TDC01 permite a los atacantes ejecutar comandos arbitrarios a trav\u00e9s de una solicitud POST manipulada para /goform/PowerSaveSet."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.2}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-121"}]}], "references": [{"url": "https://github.com/caoyebo/CVE/tree/main/Tenda%20AC6%20-%20CVE-2023-24332", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-28229.json b/cve/2023/CVE-2023-28229.json index 8a675560df4..2cb0d94a6b1 100644 --- a/cve/2023/CVE-2023-28229.json +++ b/cve/2023/CVE-2023-28229.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-28229", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-11T21:15:23.387", "lastModified": "2024-05-29T02:15:28.323", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-10-04", "cisaActionDue": "2023-10-25", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability", "descriptions": [{"lang": "en", "value": "Windows CNG Key Isolation Service Elevation of Privilege Vulnerability"}], "metrics": {"cvssMetricV31": [{"source": "secure@microsoft.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.0, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-591"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.10240.19869", "matchCriteriaId": "F7AA917B-149D-4462-85A6-E1E8D4AF7836"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.14393.5850", "matchCriteriaId": "D3845BA8-1885-4B32-A069-9CD95E9895A6"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.17763.4252", "matchCriteriaId": "CC646C31-F80E-4BED-B15F-671250530066"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.19042.2846", "matchCriteriaId": "77610DFA-2CAF-4B06-AAA8-2387233A35FA"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.19044.2846", "matchCriteriaId": "28B6B095-4CE2-4612-A977-072C464D7157"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.19045.2846", "matchCriteriaId": "D8D3C91C-C19E-49D4-91DC-6C59086DE344"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.22000.1817", "matchCriteriaId": "672CF584-309F-4F28-9E3A-545C0138F5EA"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.22621.1555", "matchCriteriaId": "F47239E8-AEB6-4E79-91DB-51238D4368B2"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28229", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-28229", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-11T21:15:23.387", "lastModified": "2024-08-14T15:22:53.603", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2023-10-04", "cisaActionDue": "2023-10-25", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability", "descriptions": [{"lang": "en", "value": "Windows CNG Key Isolation Service Elevation of Privilege Vulnerability"}], "metrics": {"cvssMetricV31": [{"source": "secure@microsoft.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.0, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-662"}]}, {"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-591"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.10240.19869", "matchCriteriaId": "F7AA917B-149D-4462-85A6-E1E8D4AF7836"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.14393.5850", "matchCriteriaId": "D3845BA8-1885-4B32-A069-9CD95E9895A6"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.17763.4252", "matchCriteriaId": "CC646C31-F80E-4BED-B15F-671250530066"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.19042.2846", "matchCriteriaId": "77610DFA-2CAF-4B06-AAA8-2387233A35FA"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.19044.2846", "matchCriteriaId": "28B6B095-4CE2-4612-A977-072C464D7157"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.19045.2846", "matchCriteriaId": "D8D3C91C-C19E-49D4-91DC-6C59086DE344"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.22000.1817", "matchCriteriaId": "672CF584-309F-4F28-9E3A-545C0138F5EA"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.22621.1555", "matchCriteriaId": "F47239E8-AEB6-4E79-91DB-51238D4368B2"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28229", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-29336.json b/cve/2023/CVE-2023-29336.json index 0fcdebb5033..5b83dbefd2d 100644 --- a/cve/2023/CVE-2023-29336.json +++ b/cve/2023/CVE-2023-29336.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-29336", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:13.840", "lastModified": "2024-05-29T02:15:39.453", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-05-09", "cisaActionDue": "2023-05-30", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Microsoft Win32K Privilege Escalation Vulnerability", "descriptions": [{"lang": "en", "value": "Win32k Elevation of Privilege Vulnerability"}], "metrics": {"cvssMetricV31": [{"source": "secure@microsoft.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-416"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.10240.19926", "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.14393.5921", "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29336", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-29336", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:13.840", "lastModified": "2024-08-14T15:22:08.487", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2023-05-09", "cisaActionDue": "2023-05-30", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Microsoft Win32K Privilege Escalation Vulnerability", "descriptions": [{"lang": "en", "value": "Win32k Elevation of Privilege Vulnerability"}], "metrics": {"cvssMetricV31": [{"source": "secure@microsoft.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-416"}]}, {"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-416"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.10240.19926", "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.14393.5921", "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29336", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-31348.json b/cve/2023/CVE-2023-31348.json index 1910b247776..3996adda771 100644 --- a/cve/2023/CVE-2023-31348.json +++ b/cve/2023/CVE-2023-31348.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-31348", "sourceIdentifier": "psirt@amd.com", "published": "2024-08-13T17:15:21.307", "lastModified": "2024-08-14T02:07:05.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A DLL hijacking vulnerability in AMD ?Prof could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution."}], "metrics": {"cvssMetricV31": [{"source": "psirt@amd.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.3, "impactScore": 5.9}]}, "references": [{"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-9001", "source": "psirt@amd.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-31348", "sourceIdentifier": "psirt@amd.com", "published": "2024-08-13T17:15:21.307", "lastModified": "2024-08-14T15:35:02.560", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A DLL hijacking vulnerability in AMD \u03bcProf could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution."}, {"lang": "es", "value": "Una vulnerabilidad de secuestro de DLL en AMD ?Prof podr\u00eda permitir a un atacante lograr una escalada de privilegios, lo que potencialmente podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario."}], "metrics": {"cvssMetricV31": [{"source": "psirt@amd.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.3, "impactScore": 5.9}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-400"}]}], "references": [{"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-9001", "source": "psirt@amd.com"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-34362.json b/cve/2023/CVE-2023-34362.json index 85031b294a6..3149c21b555 100644 --- a/cve/2023/CVE-2023-34362.json +++ b/cve/2023/CVE-2023-34362.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-34362", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-02T14:15:09.487", "lastModified": "2024-07-03T01:40:13.847", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-06-02", "cisaActionDue": "2023-06-23", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Progress MOVEit Transfer SQL Injection Vulnerability", "descriptions": [{"lang": "en", "value": "In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:progress:moveit_cloud:*:*:*:*:*:*:*:*", "versionEndExcluding": "14.0.5.45", "matchCriteriaId": "D85743D1-EE56-41E4-8896-A5DC28401E2E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:progress:moveit_cloud:*:*:*:*:*:*:*:*", "versionStartIncluding": "14.1.0.0", "versionEndExcluding": "14.1.6.97", "matchCriteriaId": "62ED1272-C70C-44D1-83B6-E17DBAEA9726"}, {"vulnerable": true, "criteria": "cpe:2.3:a:progress:moveit_cloud:*:*:*:*:*:*:*:*", "versionStartIncluding": "15.0.0.0", "versionEndExcluding": "15.0.2.39", "matchCriteriaId": "068258A3-1310-41B7-8754-C3503961151F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*", "versionEndExcluding": "2021.0.7", "matchCriteriaId": "B1B9DBBF-87E1-4FAF-93C7-6F5D779850C3"}, {"vulnerable": true, "criteria": "cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*", "versionStartIncluding": "2021.1.0", "versionEndExcluding": "2021.1.5", "matchCriteriaId": "F3B434F7-78C3-4B03-8E85-9E6E86007135"}, {"vulnerable": true, "criteria": "cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*", "versionStartIncluding": "2022.0.0", "versionEndExcluding": "2022.0.5", "matchCriteriaId": "82CDAEC0-D7A8-4271-8C5F-84555B36F8A4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*", "versionStartIncluding": "2022.1.0", "versionEndExcluding": "2022.1.6", "matchCriteriaId": "305DD3BE-0D3B-4298-ADCC-B41D48153106"}, {"vulnerable": true, "criteria": "cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*", "versionStartIncluding": "2023.0.0", "versionEndExcluding": "2023.0.2", "matchCriteriaId": "AFC2755D-6FBB-4B43-8A34-55327DCA7FAB"}]}]}], "references": [{"url": "http://packetstormsecurity.com/files/172883/MOVEit-Transfer-SQL-Injection-Remote-Code-Execution.html", "source": "cve@mitre.org", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "http://packetstormsecurity.com/files/173110/MOVEit-SQL-Injection.html", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}, {"url": "https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023", "source": "cve@mitre.org", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-34362", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-02T14:15:09.487", "lastModified": "2024-08-14T15:37:26.403", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2023-06-02", "cisaActionDue": "2023-06-23", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Progress MOVEit Transfer SQL Injection Vulnerability", "descriptions": [{"lang": "en", "value": "In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:progress:moveit_cloud:*:*:*:*:*:*:*:*", "versionEndExcluding": "14.0.5.45", "matchCriteriaId": "D85743D1-EE56-41E4-8896-A5DC28401E2E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:progress:moveit_cloud:*:*:*:*:*:*:*:*", "versionStartIncluding": "14.1.0.0", "versionEndExcluding": "14.1.6.97", "matchCriteriaId": "62ED1272-C70C-44D1-83B6-E17DBAEA9726"}, {"vulnerable": true, "criteria": "cpe:2.3:a:progress:moveit_cloud:*:*:*:*:*:*:*:*", "versionStartIncluding": "15.0.0.0", "versionEndExcluding": "15.0.2.39", "matchCriteriaId": "068258A3-1310-41B7-8754-C3503961151F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*", "versionEndExcluding": "2021.0.7", "matchCriteriaId": "B1B9DBBF-87E1-4FAF-93C7-6F5D779850C3"}, {"vulnerable": true, "criteria": "cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*", "versionStartIncluding": "2021.1.0", "versionEndExcluding": "2021.1.5", "matchCriteriaId": "F3B434F7-78C3-4B03-8E85-9E6E86007135"}, {"vulnerable": true, "criteria": "cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*", "versionStartIncluding": "2022.0.0", "versionEndExcluding": "2022.0.5", "matchCriteriaId": "82CDAEC0-D7A8-4271-8C5F-84555B36F8A4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*", "versionStartIncluding": "2022.1.0", "versionEndExcluding": "2022.1.6", "matchCriteriaId": "305DD3BE-0D3B-4298-ADCC-B41D48153106"}, {"vulnerable": true, "criteria": "cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*", "versionStartIncluding": "2023.0.0", "versionEndExcluding": "2023.0.2", "matchCriteriaId": "AFC2755D-6FBB-4B43-8A34-55327DCA7FAB"}]}]}], "references": [{"url": "http://packetstormsecurity.com/files/172883/MOVEit-Transfer-SQL-Injection-Remote-Code-Execution.html", "source": "cve@mitre.org", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "http://packetstormsecurity.com/files/173110/MOVEit-SQL-Injection.html", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}, {"url": "https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023", "source": "cve@mitre.org", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-34424.json b/cve/2023/CVE-2023-34424.json new file mode 100644 index 00000000000..fd91ce4ab51 --- /dev/null +++ b/cve/2023/CVE-2023-34424.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2023-34424", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:12.763", "lastModified": "2024-08-14T14:15:12.763", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper input validation in firmware for some Intel(R) CSME may allow a privileged user to potentially enable denial of service via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 6.7, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-20"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00999.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-35061.json b/cve/2023/CVE-2023-35061.json index 3529a1bb3dc..cf7765d3792 100644 --- a/cve/2023/CVE-2023-35061.json +++ b/cve/2023/CVE-2023-35061.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-35061", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:59.263", "lastModified": "2024-02-14T15:01:51.137", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable information disclosure via adjacent access."}, {"lang": "es", "value": "La inicializaci\u00f3n incorrecta de algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s de un acceso adyacente."}], "metrics": {"cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-665"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", "source": "secure@intel.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-35061", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:59.263", "lastModified": "2024-08-14T14:15:13.110", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper initialization for the Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable information disclosure via adjacent access."}, {"lang": "es", "value": "La inicializaci\u00f3n incorrecta de algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s de un acceso adyacente."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "ADJACENT", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 2.3, "baseSeverity": "LOW"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-665"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00999.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-35123.json b/cve/2023/CVE-2023-35123.json new file mode 100644 index 00000000000..da23ffcdab7 --- /dev/null +++ b/cve/2023/CVE-2023-35123.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2023-35123", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:13.273", "lastModified": "2024-08-14T14:15:13.273", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncaught exception in OpenBMC Firmware for some Intel(R) Server Platforms before versions egs-1.14-0, bhs-0.27 may allow an authenticated user to potentially enable denial of service via network access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "PASSIVE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.9, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-600"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01078.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-35311.json b/cve/2023/CVE-2023-35311.json index afd27cfd037..68211c95acb 100644 --- a/cve/2023/CVE-2023-35311.json +++ b/cve/2023/CVE-2023-35311.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-35311", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:17.177", "lastModified": "2024-05-29T03:15:50.527", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-07-11", "cisaActionDue": "2023-08-01", "cisaRequiredAction": "Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.", "cisaVulnerabilityName": "Microsoft Outlook Security Feature Bypass Vulnerability", "descriptions": [{"lang": "en", "value": "Microsoft Outlook Security Feature Bypass Vulnerability"}], "metrics": {"cvssMetricV31": [{"source": "secure@microsoft.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-367"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*", "matchCriteriaId": "0B3EF1E5-4757-4CFA-AE72-6BA876D3C9FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:outlook:2013:-:-:*:-:-:*:*", "matchCriteriaId": "77F369D5-6771-4141-A116-50FB275A937A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:rt:*:*:*", "matchCriteriaId": "DDA98A76-D0D1-4BFA-BEAC-1C2313F7B859"}, {"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:*:*:*", "matchCriteriaId": "E2B1657C-0FF4-461A-BE2A-641275C4B0A0"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35311", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-35311", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:17.177", "lastModified": "2024-08-14T15:37:15.503", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2023-07-11", "cisaActionDue": "2023-08-01", "cisaRequiredAction": "Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.", "cisaVulnerabilityName": "Microsoft Outlook Security Feature Bypass Vulnerability", "descriptions": [{"lang": "en", "value": "Microsoft Outlook Security Feature Bypass Vulnerability"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.6, "impactScore": 5.9}, {"source": "secure@microsoft.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-367"}]}, {"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-367"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:*:*", "matchCriteriaId": "25D63F31-2978-4C24-B7CA-6A0398012700"}, {"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:outlook:2013:-:-:*:-:-:*:*", "matchCriteriaId": "77F369D5-6771-4141-A116-50FB275A937A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:rt:*:*:*", "matchCriteriaId": "DDA98A76-D0D1-4BFA-BEAC-1C2313F7B859"}, {"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:*:*:*", "matchCriteriaId": "E2B1657C-0FF4-461A-BE2A-641275C4B0A0"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35311", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-36033.json b/cve/2023/CVE-2023-36033.json index 5b350372a1d..b1cbd04b212 100644 --- a/cve/2023/CVE-2023-36033.json +++ b/cve/2023/CVE-2023-36033.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-36033", "sourceIdentifier": "secure@microsoft.com", "published": "2023-11-14T18:15:32.677", "lastModified": "2024-05-29T02:15:59.153", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-11-14", "cisaActionDue": "2023-12-05", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability", "descriptions": [{"lang": "en", "value": "Windows DWM Core Library Elevation of Privilege Vulnerability"}, {"lang": "es", "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de la biblioteca principal de Windows DWM."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, {"source": "secure@microsoft.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-822"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.17763.5122", "matchCriteriaId": "4F018A9A-D2BC-4EB0-BC64-B92DC4EF68DF"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.17763.5122", "matchCriteriaId": "455A430D-8451-4B60-8496-E0A0CE27EDE3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.17763.5122", "matchCriteriaId": "395069C3-88A4-493F-9437-23BFC54EA6EE"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.19041.3693", "matchCriteriaId": "0968B391-593B-41A0-92BF-5ADA3A420AEA"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.19041.3693", "matchCriteriaId": "058883C8-393C-4B21-860B-A49BAB8E56B6"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19041.3693", "matchCriteriaId": "BC4D8D03-F568-47C0-8DDF-C5004AC81402"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.19045.3693", "matchCriteriaId": "F71725C1-4E22-4FD8-9A38-39522AB2F8CF"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.19045.3693", "matchCriteriaId": "F72FEE7B-4D80-41C7-A23F-065BE8B58013"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19045.3693", "matchCriteriaId": "6FABED21-4A49-4D73-AA4D-37A785CC400C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22000.2600", "matchCriteriaId": "890C6D87-B036-4F68-9BED-0B7783C522BC"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22000.2600", "matchCriteriaId": "B4201E00-C986-4591-8ADA-46BD71980C1C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22621.2715", "matchCriteriaId": "973233D7-396D-4C4F-A276-5D857496CC2D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22621.2715", "matchCriteriaId": "A3EDFF9F-3C99-47BC-BAB6-A0E68495C469"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22621.2715", "matchCriteriaId": "33C8F7A9-A4A9-4DEF-9AA9-B5CF830DF15B"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22621.2715", "matchCriteriaId": "CEAD5D1A-6484-438F-8852-DC583D4AA5D0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36033", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-36033", "sourceIdentifier": "secure@microsoft.com", "published": "2023-11-14T18:15:32.677", "lastModified": "2024-08-14T15:30:53.867", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2023-11-14", "cisaActionDue": "2023-12-05", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability", "descriptions": [{"lang": "en", "value": "Windows DWM Core Library Elevation of Privilege Vulnerability"}, {"lang": "es", "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de la biblioteca principal de Windows DWM."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, {"source": "secure@microsoft.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-119"}]}, {"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-822"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.17763.5122", "matchCriteriaId": "4F018A9A-D2BC-4EB0-BC64-B92DC4EF68DF"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.17763.5122", "matchCriteriaId": "455A430D-8451-4B60-8496-E0A0CE27EDE3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.17763.5122", "matchCriteriaId": "395069C3-88A4-493F-9437-23BFC54EA6EE"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.19041.3693", "matchCriteriaId": "0968B391-593B-41A0-92BF-5ADA3A420AEA"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.19041.3693", "matchCriteriaId": "058883C8-393C-4B21-860B-A49BAB8E56B6"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19041.3693", "matchCriteriaId": "BC4D8D03-F568-47C0-8DDF-C5004AC81402"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.19045.3693", "matchCriteriaId": "F71725C1-4E22-4FD8-9A38-39522AB2F8CF"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.19045.3693", "matchCriteriaId": "F72FEE7B-4D80-41C7-A23F-065BE8B58013"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19045.3693", "matchCriteriaId": "6FABED21-4A49-4D73-AA4D-37A785CC400C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22000.2600", "matchCriteriaId": "890C6D87-B036-4F68-9BED-0B7783C522BC"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22000.2600", "matchCriteriaId": "B4201E00-C986-4591-8ADA-46BD71980C1C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22621.2715", "matchCriteriaId": "973233D7-396D-4C4F-A276-5D857496CC2D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22621.2715", "matchCriteriaId": "A3EDFF9F-3C99-47BC-BAB6-A0E68495C469"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22621.2715", "matchCriteriaId": "33C8F7A9-A4A9-4DEF-9AA9-B5CF830DF15B"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22621.2715", "matchCriteriaId": "CEAD5D1A-6484-438F-8852-DC583D4AA5D0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36033", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-36036.json b/cve/2023/CVE-2023-36036.json index 775ef1ace6b..2c543d77068 100644 --- a/cve/2023/CVE-2023-36036.json +++ b/cve/2023/CVE-2023-36036.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-36036", "sourceIdentifier": "secure@microsoft.com", "published": "2023-11-14T18:15:33.033", "lastModified": "2024-05-29T02:15:59.610", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-11-14", "cisaActionDue": "2023-12-05", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability", "descriptions": [{"lang": "en", "value": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability"}, {"lang": "es", "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del controlador del minifiltro de archivos en Windows Cloud."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, {"source": "secure@microsoft.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-122"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.10240.20308", "matchCriteriaId": "81F826F9-C8B6-4D68-8936-96D2B4AC253F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.10240.20308", "matchCriteriaId": "4BE302B4-747A-457D-B0EE-357CC3191C1B"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.14393.6452", "matchCriteriaId": "4C3EB2B6-8A7D-48D0-8FBD-EDD32A02B0A8"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.14393.6452", "matchCriteriaId": "1A36FFD9-2FFD-491F-9CB6-80DE6544A735"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.17763.5122", "matchCriteriaId": "4F018A9A-D2BC-4EB0-BC64-B92DC4EF68DF"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.17763.5122", "matchCriteriaId": "455A430D-8451-4B60-8496-E0A0CE27EDE3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.17763.5122", "matchCriteriaId": "395069C3-88A4-493F-9437-23BFC54EA6EE"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.19041.3693", "matchCriteriaId": "0968B391-593B-41A0-92BF-5ADA3A420AEA"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.19041.3693", "matchCriteriaId": "058883C8-393C-4B21-860B-A49BAB8E56B6"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19041.3693", "matchCriteriaId": "BC4D8D03-F568-47C0-8DDF-C5004AC81402"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.19045.3693", "matchCriteriaId": "F71725C1-4E22-4FD8-9A38-39522AB2F8CF"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.19045.3693", "matchCriteriaId": "F72FEE7B-4D80-41C7-A23F-065BE8B58013"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19045.3693", "matchCriteriaId": "6FABED21-4A49-4D73-AA4D-37A785CC400C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22000.2600", "matchCriteriaId": "890C6D87-B036-4F68-9BED-0B7783C522BC"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22000.2600", "matchCriteriaId": "B4201E00-C986-4591-8ADA-46BD71980C1C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22621.2715", "matchCriteriaId": "973233D7-396D-4C4F-A276-5D857496CC2D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22621.2715", "matchCriteriaId": "A3EDFF9F-3C99-47BC-BAB6-A0E68495C469"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22621.2715", "matchCriteriaId": "33C8F7A9-A4A9-4DEF-9AA9-B5CF830DF15B"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22621.2715", "matchCriteriaId": "CEAD5D1A-6484-438F-8852-DC583D4AA5D0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36036", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-36036", "sourceIdentifier": "secure@microsoft.com", "published": "2023-11-14T18:15:33.033", "lastModified": "2024-08-14T15:30:10.160", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2023-11-14", "cisaActionDue": "2023-12-05", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability", "descriptions": [{"lang": "en", "value": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability"}, {"lang": "es", "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del controlador del minifiltro de archivos en Windows Cloud."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, {"source": "secure@microsoft.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}, {"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-122"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.10240.20308", "matchCriteriaId": "81F826F9-C8B6-4D68-8936-96D2B4AC253F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.10240.20308", "matchCriteriaId": "4BE302B4-747A-457D-B0EE-357CC3191C1B"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.14393.6452", "matchCriteriaId": "4C3EB2B6-8A7D-48D0-8FBD-EDD32A02B0A8"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.14393.6452", "matchCriteriaId": "1A36FFD9-2FFD-491F-9CB6-80DE6544A735"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.17763.5122", "matchCriteriaId": "4F018A9A-D2BC-4EB0-BC64-B92DC4EF68DF"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.17763.5122", "matchCriteriaId": "455A430D-8451-4B60-8496-E0A0CE27EDE3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.17763.5122", "matchCriteriaId": "395069C3-88A4-493F-9437-23BFC54EA6EE"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.19041.3693", "matchCriteriaId": "0968B391-593B-41A0-92BF-5ADA3A420AEA"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.19041.3693", "matchCriteriaId": "058883C8-393C-4B21-860B-A49BAB8E56B6"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19041.3693", "matchCriteriaId": "BC4D8D03-F568-47C0-8DDF-C5004AC81402"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.19045.3693", "matchCriteriaId": "F71725C1-4E22-4FD8-9A38-39522AB2F8CF"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.19045.3693", "matchCriteriaId": "F72FEE7B-4D80-41C7-A23F-065BE8B58013"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19045.3693", "matchCriteriaId": "6FABED21-4A49-4D73-AA4D-37A785CC400C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22000.2600", "matchCriteriaId": "890C6D87-B036-4F68-9BED-0B7783C522BC"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22000.2600", "matchCriteriaId": "B4201E00-C986-4591-8ADA-46BD71980C1C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22621.2715", "matchCriteriaId": "973233D7-396D-4C4F-A276-5D857496CC2D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22621.2715", "matchCriteriaId": "A3EDFF9F-3C99-47BC-BAB6-A0E68495C469"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22621.2715", "matchCriteriaId": "33C8F7A9-A4A9-4DEF-9AA9-B5CF830DF15B"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22621.2715", "matchCriteriaId": "CEAD5D1A-6484-438F-8852-DC583D4AA5D0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36036", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-36563.json b/cve/2023/CVE-2023-36563.json index 4cff8bf291d..ca6a96f67b9 100644 --- a/cve/2023/CVE-2023-36563.json +++ b/cve/2023/CVE-2023-36563.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-36563", "sourceIdentifier": "secure@microsoft.com", "published": "2023-10-10T18:15:13.003", "lastModified": "2024-05-29T02:16:07.933", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-10-10", "cisaActionDue": "2023-10-31", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Microsoft WordPad Information Disclosure Vulnerability", "descriptions": [{"lang": "en", "value": "Microsoft WordPad Information Disclosure Vulnerability"}, {"lang": "es", "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en Microsoft WordPad"}], "metrics": {"cvssMetricV31": [{"source": "secure@microsoft.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-20"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.10240.20232", "matchCriteriaId": "656B3DC8-9A4A-4386-A1F0-367E6B05C728"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.14393.6351", "matchCriteriaId": "2D523568-3488-439B-B008-025E99213147"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.17763.4974", "matchCriteriaId": "E500D59C-6597-45E9-A57B-BE26C0C231D3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.19041.3570", "matchCriteriaId": "80F408E5-E550-44B4-88E3-BE11359C07CD"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.19045.3570", "matchCriteriaId": "1814619C-ED07-49E0-A50A-E28D824D43BC"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.22000.2538", "matchCriteriaId": "100A27D3-87B0-4E72-83F6-7605E3F35E63"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.22621.2428", "matchCriteriaId": "C6A36795-0238-45C9-ABE6-3DCCF751915B"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36563", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-36563", "sourceIdentifier": "secure@microsoft.com", "published": "2023-10-10T18:15:13.003", "lastModified": "2024-08-14T15:29:50.927", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2023-10-10", "cisaActionDue": "2023-10-31", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Microsoft WordPad Information Disclosure Vulnerability", "descriptions": [{"lang": "en", "value": "Microsoft WordPad Information Disclosure Vulnerability"}, {"lang": "es", "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en Microsoft WordPad"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}, {"source": "secure@microsoft.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-20"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.10240.20232", "matchCriteriaId": "656B3DC8-9A4A-4386-A1F0-367E6B05C728"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.14393.6351", "matchCriteriaId": "2D523568-3488-439B-B008-025E99213147"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.17763.4974", "matchCriteriaId": "E500D59C-6597-45E9-A57B-BE26C0C231D3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.19041.3570", "matchCriteriaId": "80F408E5-E550-44B4-88E3-BE11359C07CD"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.19045.3570", "matchCriteriaId": "1814619C-ED07-49E0-A50A-E28D824D43BC"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.22000.2538", "matchCriteriaId": "100A27D3-87B0-4E72-83F6-7605E3F35E63"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.22621.2428", "matchCriteriaId": "C6A36795-0238-45C9-ABE6-3DCCF751915B"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36563", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-36802.json b/cve/2023/CVE-2023-36802.json index 4a8b79c3e86..13737ec5ad7 100644 --- a/cve/2023/CVE-2023-36802.json +++ b/cve/2023/CVE-2023-36802.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-36802", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:15.487", "lastModified": "2024-05-29T03:16:03.173", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-09-12", "cisaActionDue": "2023-10-03", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Microsoft Streaming Service Proxy Privilege Escalation Vulnerability", "descriptions": [{"lang": "en", "value": "Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability"}, {"lang": "es", "value": "Vulnerabilidad de Elevaci\u00f3n de Privilegios del Proxy del Servicio de Microsoft Streaming"}], "metrics": {"cvssMetricV31": [{"source": "secure@microsoft.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-416"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.17763.4851", "matchCriteriaId": "405C3661-5BC3-4EFC-9FF0-4C05D6F42A04"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.19044.3448", "matchCriteriaId": "139662E6-EF56-4398-AEE8-406B8D4F1BC4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.19045.3448", "matchCriteriaId": "36C0F053-7225-4428-A7D5-7FE2E5036E79"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.22000.2416", "matchCriteriaId": "42BAE974-E011-42BC-BE68-E394DFF2F92D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.22621.2275", "matchCriteriaId": "E1128C36-7004-461A-AF79-A530709E8B45"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36802", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-36802", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:15.487", "lastModified": "2024-08-14T15:29:33.430", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2023-09-12", "cisaActionDue": "2023-10-03", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Microsoft Streaming Service Proxy Privilege Escalation Vulnerability", "descriptions": [{"lang": "en", "value": "Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability"}, {"lang": "es", "value": "Vulnerabilidad de Elevaci\u00f3n de Privilegios del Proxy del Servicio de Microsoft Streaming"}], "metrics": {"cvssMetricV31": [{"source": "secure@microsoft.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-416"}]}, {"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-416"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.17763.4851", "matchCriteriaId": "405C3661-5BC3-4EFC-9FF0-4C05D6F42A04"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.19044.3448", "matchCriteriaId": "139662E6-EF56-4398-AEE8-406B8D4F1BC4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.19045.3448", "matchCriteriaId": "36C0F053-7225-4428-A7D5-7FE2E5036E79"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.22000.2416", "matchCriteriaId": "42BAE974-E011-42BC-BE68-E394DFF2F92D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.22621.2275", "matchCriteriaId": "E1128C36-7004-461A-AF79-A530709E8B45"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36802", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-38035.json b/cve/2023/CVE-2023-38035.json index 6a1b669578b..45a9eeb76f3 100644 --- a/cve/2023/CVE-2023-38035.json +++ b/cve/2023/CVE-2023-38035.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-38035", "sourceIdentifier": "support@hackerone.com", "published": "2023-08-21T17:15:47.457", "lastModified": "2024-08-01T13:44:12.457", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-08-22", "cisaActionDue": "2023-09-12", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Ivanti Sentry Authentication Bypass Vulnerability", "descriptions": [{"lang": "en", "value": "A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration. "}, {"lang": "es", "value": "Una vulnerabilidad de seguridad en MICS Admin Portal en Ivanti MobileIron Sentry versiones 9.18.0 y anteriores, que puede permitir a un atacante eludir los controles de autenticaci\u00f3n en la interfaz administrativa debido a una configuraci\u00f3n insuficientemente restrictiva de Apache HTTPD ."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-863"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-863"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:ivanti:mobileiron_sentry:*:*:*:*:*:*:*:*", "versionEndIncluding": "9.18.0", "matchCriteriaId": "D4028148-D123-4F9A-9785-8489CE5DBC8A"}]}]}], "references": [{"url": "http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html", "source": "support@hackerone.com", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}, {"url": "https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface", "source": "support@hackerone.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-38035", "sourceIdentifier": "support@hackerone.com", "published": "2023-08-21T17:15:47.457", "lastModified": "2024-08-14T15:29:29.170", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2023-08-22", "cisaActionDue": "2023-09-12", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Ivanti Sentry Authentication Bypass Vulnerability", "descriptions": [{"lang": "en", "value": "A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration. "}, {"lang": "es", "value": "Una vulnerabilidad de seguridad en MICS Admin Portal en Ivanti MobileIron Sentry versiones 9.18.0 y anteriores, que puede permitir a un atacante eludir los controles de autenticaci\u00f3n en la interfaz administrativa debido a una configuraci\u00f3n insuficientemente restrictiva de Apache HTTPD ."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-863"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-863"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:ivanti:mobileiron_sentry:*:*:*:*:*:*:*:*", "versionEndIncluding": "9.18.0", "matchCriteriaId": "D4028148-D123-4F9A-9785-8489CE5DBC8A"}]}]}], "references": [{"url": "http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html", "source": "support@hackerone.com", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}, {"url": "https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface", "source": "support@hackerone.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-38655.json b/cve/2023/CVE-2023-38655.json new file mode 100644 index 00000000000..14d1aef9bc2 --- /dev/null +++ b/cve/2023/CVE-2023-38655.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2023-38655", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:13.523", "lastModified": "2024-08-14T14:15:13.523", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper buffer restrictions in firmware for some Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable denial of service via network access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "LOW", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.3, "impactScore": 4.0}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-92"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00999.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-38831.json b/cve/2023/CVE-2023-38831.json index 6de2f1d9aab..68d1721f93e 100644 --- a/cve/2023/CVE-2023-38831.json +++ b/cve/2023/CVE-2023-38831.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-38831", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-23T17:15:43.863", "lastModified": "2024-07-03T01:40:53.693", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-08-24", "cisaActionDue": "2023-09-14", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "RARLAB WinRAR Code Execution Vulnerability", "descriptions": [{"lang": "en", "value": "RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-351"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.23", "matchCriteriaId": "A586AE4C-6F08-4E96-B74C-AA0A7BF4F2DD"}]}]}], "references": [{"url": "http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}, {"url": "https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://news.ycombinator.com/item?id=37236100", "source": "cve@mitre.org", "tags": ["Issue Tracking", "Third Party Advisory"]}, {"url": "https://www.bleepingcomputer.com/news/security/winrar-zero-day-exploited-since-april-to-hack-trading-accounts/", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-38831", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-23T17:15:43.863", "lastModified": "2024-08-14T15:28:44.603", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2023-08-24", "cisaActionDue": "2023-09-14", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "RARLAB WinRAR Code Execution Vulnerability", "descriptions": [{"lang": "en", "value": "RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-345"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-351"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.23", "matchCriteriaId": "A586AE4C-6F08-4E96-B74C-AA0A7BF4F2DD"}]}]}], "references": [{"url": "http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}, {"url": "https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://news.ycombinator.com/item?id=37236100", "source": "cve@mitre.org", "tags": ["Issue Tracking", "Third Party Advisory"]}, {"url": "https://www.bleepingcomputer.com/news/security/winrar-zero-day-exploited-since-april-to-hack-trading-accounts/", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-40067.json b/cve/2023/CVE-2023-40067.json new file mode 100644 index 00000000000..9b5327a9e74 --- /dev/null +++ b/cve/2023/CVE-2023-40067.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2023-40067", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:13.770", "lastModified": "2024-08-14T14:15:13.770", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Unchecked return value in firmware for some Intel(R) CSME may allow an unauthenticated user to potentially enable escalation of privilege via physical access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:L/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "PHYSICAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "LOW", "subsequentSystemIntegrity": "HIGH", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.7, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N", "attackVector": "PHYSICAL", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.5, "impactScore": 4.7}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-252"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00999.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-41993.json b/cve/2023/CVE-2023-41993.json index 39d2d8dc4f3..ddff83213b5 100644 --- a/cve/2023/CVE-2023-41993.json +++ b/cve/2023/CVE-2023-41993.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-41993", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-21T19:15:11.660", "lastModified": "2024-07-03T01:41:20.690", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-09-25", "cisaActionDue": "2023-10-16", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Apple Multiple Products WebKit Code Execution Vulnerability", "descriptions": [{"lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7."}, {"lang": "es", "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en Safari 17, iOS 16.7 y iPadOS 16.7, macOS Sonoma 14. El procesamiento de contenido web puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Apple tiene conocimiento de un informe que indica que este problema puede haber sido explotado activamente en versiones de iOS anteriores a iOS 16.7."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-754"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.0.1", "matchCriteriaId": "4FE34465-0131-48BD-9BB6-47F83243BAE3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.0.1", "matchCriteriaId": "CB5FD4B4-540C-4068-90D2-BEC12CDF54D9"}, {"vulnerable": true, "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "versionEndExcluding": "14.0", "matchCriteriaId": "7A5DD3D5-FB4F-4313-B873-DCED87FC4605"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"}, {"vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"}, {"vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*", "matchCriteriaId": "00EDC8FF-13F2-4218-9EF4-B509364AE7B3"}, {"vulnerable": true, "criteria": "cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*", "matchCriteriaId": "938A32D1-FBAB-42AE-87A7-AB19402B561A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update401:*:*:*:*:*:*", "matchCriteriaId": "B9155227-6787-4FAA-BB2C-C99D77DD2111"}, {"vulnerable": true, "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update401:*:*:*:*:*:*", "matchCriteriaId": "FD4CDABD-BC1E-4A23-8022-D7A0E615C9F4"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCAA4004-9319-478C-9D55-0E8307F872F6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B199052-5732-4726-B06B-A12C70DFB891"}, {"vulnerable": true, "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"}]}]}], "references": [{"url": "https://security.gentoo.org/glsa/202401-33", "source": "product-security@apple.com", "tags": ["Third Party Advisory"]}, {"url": "https://security.netapp.com/advisory/ntap-20240426-0004/", "source": "product-security@apple.com", "tags": ["Third Party Advisory"]}, {"url": "https://support.apple.com/en-us/HT213940", "source": "product-security@apple.com", "tags": ["Release Notes", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-41993", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-21T19:15:11.660", "lastModified": "2024-08-14T15:28:26.430", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2023-09-25", "cisaActionDue": "2023-10-16", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Apple Multiple Products WebKit Code Execution Vulnerability", "descriptions": [{"lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7."}, {"lang": "es", "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en Safari 17, iOS 16.7 y iPadOS 16.7, macOS Sonoma 14. El procesamiento de contenido web puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Apple tiene conocimiento de un informe que indica que este problema puede haber sido explotado activamente en versiones de iOS anteriores a iOS 16.7."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-754"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.0.1", "matchCriteriaId": "4FE34465-0131-48BD-9BB6-47F83243BAE3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.0.1", "matchCriteriaId": "CB5FD4B4-540C-4068-90D2-BEC12CDF54D9"}, {"vulnerable": true, "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "versionEndExcluding": "14.0", "matchCriteriaId": "7A5DD3D5-FB4F-4313-B873-DCED87FC4605"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"}, {"vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"}, {"vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*", "matchCriteriaId": "00EDC8FF-13F2-4218-9EF4-B509364AE7B3"}, {"vulnerable": true, "criteria": "cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*", "matchCriteriaId": "938A32D1-FBAB-42AE-87A7-AB19402B561A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update401:*:*:*:*:*:*", "matchCriteriaId": "B9155227-6787-4FAA-BB2C-C99D77DD2111"}, {"vulnerable": true, "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update401:*:*:*:*:*:*", "matchCriteriaId": "FD4CDABD-BC1E-4A23-8022-D7A0E615C9F4"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCAA4004-9319-478C-9D55-0E8307F872F6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B199052-5732-4726-B06B-A12C70DFB891"}, {"vulnerable": true, "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"}]}]}], "references": [{"url": "https://security.gentoo.org/glsa/202401-33", "source": "product-security@apple.com", "tags": ["Third Party Advisory"]}, {"url": "https://security.netapp.com/advisory/ntap-20240426-0004/", "source": "product-security@apple.com", "tags": ["Third Party Advisory"]}, {"url": "https://support.apple.com/en-us/HT213940", "source": "product-security@apple.com", "tags": ["Release Notes", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-42667.json b/cve/2023/CVE-2023-42667.json new file mode 100644 index 00000000000..e63fe457fe6 --- /dev/null +++ b/cve/2023/CVE-2023-42667.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2023-42667", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:14.033", "lastModified": "2024-08-14T14:15:14.033", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 7.3, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.1, "impactScore": 6.0}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-1189"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-43489.json b/cve/2023/CVE-2023-43489.json new file mode 100644 index 00000000000..23a9bbd8369 --- /dev/null +++ b/cve/2023/CVE-2023-43489.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2023-43489", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:14.283", "lastModified": "2024-08-14T14:15:14.283", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper access control for some Intel(R) CIP software before version 2.4.10717 may allow an authenticated user to potentially enable denial of service via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 6.8, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-284"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01112.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-43747.json b/cve/2023/CVE-2023-43747.json new file mode 100644 index 00000000000..5ab1719b73a --- /dev/null +++ b/cve/2023/CVE-2023-43747.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2023-43747", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:14.513", "lastModified": "2024-08-14T14:15:14.513", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Incorrect default permissions for some Intel(R) Connectivity Performance Suite software installers before version 2.0 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-276"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01102.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-43770.json b/cve/2023/CVE-2023-43770.json index 26576b897ad..8c239cce11b 100644 --- a/cve/2023/CVE-2023-43770.json +++ b/cve/2023/CVE-2023-43770.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-43770", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-22T06:15:10.090", "lastModified": "2024-07-03T01:41:39.790", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2024-02-12", "cisaActionDue": "2024-03-04", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability", "descriptions": [{"lang": "en", "value": "Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior."}, {"lang": "es", "value": "Roundcube anterior a 1.4.14, 1.5.x anterior a 1.5.4 y 1.6.x anterior a 1.6.3 permiten XSS a trav\u00e9s de mensajes de texto/correo electr\u00f3nico plano con enlaces manipuados debido al comportamiento de program/lib/Roundcube/rcube_string_replacer.php."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 2.7}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.14", "matchCriteriaId": "98F5DF3C-3CA0-4E0F-9C8A-7B18F3AEDB77"}, {"vulnerable": true, "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.5.0", "versionEndExcluding": "1.5.4", "matchCriteriaId": "772EC31F-EAC3-455E-953F-8FC04EA2A186"}, {"vulnerable": true, "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.6.0", "versionEndExcluding": "1.6.3", "matchCriteriaId": "463446A7-DA28-41D3-B358-FA3BEBD6397E"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"}]}]}], "references": [{"url": "https://github.com/roundcube/roundcubemail/commit/e92ec206a886461245e1672d8530cc93c618a49b", "source": "cve@mitre.org", "tags": ["Patch"]}, {"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00024.html", "source": "cve@mitre.org", "tags": ["Mailing List", "Third Party Advisory"]}, {"url": "https://roundcube.net/news/2023/09/15/security-update-1.6.3-released", "source": "cve@mitre.org", "tags": ["Release Notes", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-43770", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-22T06:15:10.090", "lastModified": "2024-08-14T15:27:53.727", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-02-12", "cisaActionDue": "2024-03-04", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability", "descriptions": [{"lang": "en", "value": "Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior."}, {"lang": "es", "value": "Roundcube anterior a 1.4.14, 1.5.x anterior a 1.5.4 y 1.6.x anterior a 1.6.3 permiten XSS a trav\u00e9s de mensajes de texto/correo electr\u00f3nico plano con enlaces manipuados debido al comportamiento de program/lib/Roundcube/rcube_string_replacer.php."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 2.7}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.14", "matchCriteriaId": "98F5DF3C-3CA0-4E0F-9C8A-7B18F3AEDB77"}, {"vulnerable": true, "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.5.0", "versionEndExcluding": "1.5.4", "matchCriteriaId": "772EC31F-EAC3-455E-953F-8FC04EA2A186"}, {"vulnerable": true, "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.6.0", "versionEndExcluding": "1.6.3", "matchCriteriaId": "463446A7-DA28-41D3-B358-FA3BEBD6397E"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"}]}]}], "references": [{"url": "https://github.com/roundcube/roundcubemail/commit/e92ec206a886461245e1672d8530cc93c618a49b", "source": "cve@mitre.org", "tags": ["Patch"]}, {"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00024.html", "source": "cve@mitre.org", "tags": ["Mailing List", "Third Party Advisory"]}, {"url": "https://roundcube.net/news/2023/09/15/security-update-1.6.3-released", "source": "cve@mitre.org", "tags": ["Release Notes", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-48361.json b/cve/2023/CVE-2023-48361.json new file mode 100644 index 00000000000..4fcc1ea0082 --- /dev/null +++ b/cve/2023/CVE-2023-48361.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2023-48361", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:14.747", "lastModified": "2024-08-14T14:15:14.747", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper initialization in firmware for some Intel(R) CSME may allow a privileged user to potentially enable information disclosure via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 4.6, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 2.3, "baseSeverity": "LOW"}, "exploitabilityScore": 0.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-665"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00999.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-49114.json b/cve/2023/CVE-2023-49114.json index 81a0a0dc7cd..1b6bda1ccee 100644 --- a/cve/2023/CVE-2023-49114.json +++ b/cve/2023/CVE-2023-49114.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-49114", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2024-02-26T16:27:47.217", "lastModified": "2024-03-03T03:15:07.170", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A DLL hijacking vulnerability was identified in the Qognify VMS Client Viewer version 7.1 or higher, which allows local users to execute arbitrary code and obtain higher privileges via careful placement of a malicious DLL, if some\u00a0specific pre-conditions are met.\n\n"}, {"lang": "es", "value": "Se identific\u00f3 una vulnerabilidad de secuestro de DLL en Qognify VMS Client Viewer versi\u00f3n 7.1 o superior, que permite a los usuarios locales ejecutar c\u00f3digo arbitrario y obtener mayores privilegios mediante la colocaci\u00f3n cuidadosa de un DLL malicioso, si se cumplen algunas condiciones previas espec\u00edficas."}], "metrics": {}, "weaknesses": [{"source": "551230f0-3615-47bd-b7cc-93e92e730bbf", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "http://seclists.org/fulldisclosure/2024/Mar/10", "source": "551230f0-3615-47bd-b7cc-93e92e730bbf"}, {"url": "https://r.sec-consult.com/qognify", "source": "551230f0-3615-47bd-b7cc-93e92e730bbf"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-49114", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2024-02-26T16:27:47.217", "lastModified": "2024-08-14T15:35:03.470", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A DLL hijacking vulnerability was identified in the Qognify VMS Client Viewer version 7.1 or higher, which allows local users to execute arbitrary code and obtain higher privileges via careful placement of a malicious DLL, if some\u00a0specific pre-conditions are met.\n\n"}, {"lang": "es", "value": "Se identific\u00f3 una vulnerabilidad de secuestro de DLL en Qognify VMS Client Viewer versi\u00f3n 7.1 o superior, que permite a los usuarios locales ejecutar c\u00f3digo arbitrario y obtener mayores privilegios mediante la colocaci\u00f3n cuidadosa de un DLL malicioso, si se cumplen algunas condiciones previas espec\u00edficas."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "551230f0-3615-47bd-b7cc-93e92e730bbf", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "http://seclists.org/fulldisclosure/2024/Mar/10", "source": "551230f0-3615-47bd-b7cc-93e92e730bbf"}, {"url": "https://r.sec-consult.com/qognify", "source": "551230f0-3615-47bd-b7cc-93e92e730bbf"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-49141.json b/cve/2023/CVE-2023-49141.json new file mode 100644 index 00000000000..531aaa227f2 --- /dev/null +++ b/cve/2023/CVE-2023-49141.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2023-49141", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:14.990", "lastModified": "2024-08-14T14:15:14.990", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 7.3, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.1, "impactScore": 6.0}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-1189"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-49144.json b/cve/2023/CVE-2023-49144.json new file mode 100644 index 00000000000..73d8808adf2 --- /dev/null +++ b/cve/2023/CVE-2023-49144.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2023-49144", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:15.207", "lastModified": "2024-08-14T14:15:15.207", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Out of bounds read in OpenBMC Firmware for some Intel(R) Server Platforms before versions egs-1.15-0, bhs-0.27 may allow a privileged user to potentially enable information disclosure via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 8.1, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.5, "impactScore": 4.7}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01078.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-7245.json b/cve/2023/CVE-2023-7245.json index 7d7ce6ff11c..4134934eeb0 100644 --- a/cve/2023/CVE-2023-7245.json +++ b/cve/2023/CVE-2023-7245.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-7245", "sourceIdentifier": "security@openvpn.net", "published": "2024-02-20T11:15:07.750", "lastModified": "2024-02-20T19:50:53.960", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "The nodejs framework in OpenVPN Connect 3.0 through 3.4.3 (Windows)/3.4.7 (macOS) was not properly configured, which allows a local user to execute arbitrary code within the nodejs process context via the ELECTRON_RUN_AS_NODE environment variable\n"}, {"lang": "es", "value": "El framework nodejs en OpenVPN Connect 3.0 a 3.4.3 (Windows)/3.4.7 (macOS) no se configur\u00f3 correctamente, lo que permite a un usuario local ejecutar c\u00f3digo arbitrario dentro del contexto del proceso nodejs a trav\u00e9s de la variable de entorno ELECTRON_RUN_AS_NODE"}], "metrics": {}, "weaknesses": [{"source": "security@openvpn.net", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-95"}]}], "references": [{"url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/", "source": "security@openvpn.net"}, {"url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/", "source": "security@openvpn.net"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-7245", "sourceIdentifier": "security@openvpn.net", "published": "2024-02-20T11:15:07.750", "lastModified": "2024-08-14T15:35:03.783", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "The nodejs framework in OpenVPN Connect 3.0 through 3.4.3 (Windows)/3.4.7 (macOS) was not properly configured, which allows a local user to execute arbitrary code within the nodejs process context via the ELECTRON_RUN_AS_NODE environment variable\n"}, {"lang": "es", "value": "El framework nodejs en OpenVPN Connect 3.0 a 3.4.3 (Windows)/3.4.7 (macOS) no se configur\u00f3 correctamente, lo que permite a un usuario local ejecutar c\u00f3digo arbitrario dentro del contexto del proceso nodejs a trav\u00e9s de la variable de entorno ELECTRON_RUN_AS_NODE"}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "security@openvpn.net", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-95"}]}], "references": [{"url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/", "source": "security@openvpn.net"}, {"url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/", "source": "security@openvpn.net"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-20082.json b/cve/2024/CVE-2024-20082.json index 3ba0d0cd3b7..56deddffc81 100644 --- a/cve/2024/CVE-2024-20082.json +++ b/cve/2024/CVE-2024-20082.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-20082", "sourceIdentifier": "security@mediatek.com", "published": "2024-08-14T03:15:04.120", "lastModified": "2024-08-14T13:00:48.243", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In Modem, there is a possible memory corruption due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01182594; Issue ID: MSV-1529."}, {"lang": "es", "value": "En Modem, existe una posible corrupci\u00f3n de la memoria debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01182594; ID del problema: MSV-1529."}], "metrics": {}, "weaknesses": [{"source": "security@mediatek.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-119"}]}], "references": [{"url": "https://corp.mediatek.com/product-security-bulletin/August-2024", "source": "security@mediatek.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-20082", "sourceIdentifier": "security@mediatek.com", "published": "2024-08-14T03:15:04.120", "lastModified": "2024-08-14T15:35:04.003", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In Modem, there is a possible memory corruption due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01182594; Issue ID: MSV-1529."}, {"lang": "es", "value": "En Modem, existe una posible corrupci\u00f3n de la memoria debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01182594; ID del problema: MSV-1529."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "security@mediatek.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-119"}]}], "references": [{"url": "https://corp.mediatek.com/product-security-bulletin/August-2024", "source": "security@mediatek.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-20789.json b/cve/2024/CVE-2024-20789.json new file mode 100644 index 00000000000..dad9f7231b3 --- /dev/null +++ b/cve/2024/CVE-2024-20789.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-20789", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:17.263", "lastModified": "2024-08-14T15:15:17.263", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dimension versions 3.4.11 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-416"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/dimension/apsb24-47.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-20790.json b/cve/2024/CVE-2024-20790.json new file mode 100644 index 00000000000..210cc13d44f --- /dev/null +++ b/cve/2024/CVE-2024-20790.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-20790", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:17.580", "lastModified": "2024-08-14T15:15:17.580", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dimension versions 3.4.11 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/dimension/apsb24-47.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-21766.json b/cve/2024/CVE-2024-21766.json new file mode 100644 index 00000000000..c69649f7da5 --- /dev/null +++ b/cve/2024/CVE-2024-21766.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-21766", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:15.503", "lastModified": "2024-08-14T14:15:15.503", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path for some Intel(R) oneAPI Math Kernel Library software before version 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01072.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-21769.json b/cve/2024/CVE-2024-21769.json new file mode 100644 index 00000000000..cb39b16e2c1 --- /dev/null +++ b/cve/2024/CVE-2024-21769.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-21769", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:15.730", "lastModified": "2024-08-14T14:15:15.730", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path in some Intel(R) Ethernet Connection I219-LM install software may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00918.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-21784.json b/cve/2024/CVE-2024-21784.json new file mode 100644 index 00000000000..70a38962bed --- /dev/null +++ b/cve/2024/CVE-2024-21784.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-21784", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:15.977", "lastModified": "2024-08-14T14:15:15.977", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path for some Intel(R) IPP Cryptography software before version 2021.11 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01114.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-21787.json b/cve/2024/CVE-2024-21787.json new file mode 100644 index 00000000000..cd16b03c8c0 --- /dev/null +++ b/cve/2024/CVE-2024-21787.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-21787", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:16.203", "lastModified": "2024-08-14T14:15:16.203", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Inadequate encryption strength for some BMRA software before version 22.08 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 7.1, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.5, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-326"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00790.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-21801.json b/cve/2024/CVE-2024-21801.json new file mode 100644 index 00000000000..d613be91246 --- /dev/null +++ b/cve/2024/CVE-2024-21801.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-21801", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:16.447", "lastModified": "2024-08-14T14:15:16.447", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Insufficient control flow management in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable denial of service via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "HIGH", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 8.3, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.5, "impactScore": 4.0}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-691"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01070.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-21806.json b/cve/2024/CVE-2024-21806.json new file mode 100644 index 00000000000..13701f6747b --- /dev/null +++ b/cve/2024/CVE-2024-21806.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-21806", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:16.700", "lastModified": "2024-08-14T14:15:16.700", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper conditions check in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters E810 Series before version 28.3 may allow an authenticated user to potentially enable denial of service via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "HIGH", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 6.8, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-754"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00918.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-21807.json b/cve/2024/CVE-2024-21807.json new file mode 100644 index 00000000000..da4125417ec --- /dev/null +++ b/cve/2024/CVE-2024-21807.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-21807", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:16.937", "lastModified": "2024-08-14T14:15:16.937", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper initialization in the Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "HIGH", "subsequentSystemAvailability": "HIGH", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 9.3, "baseSeverity": "CRITICAL"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.0, "impactScore": 6.0}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-665"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00918.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-21810.json b/cve/2024/CVE-2024-21810.json new file mode 100644 index 00000000000..e18086fa9d9 --- /dev/null +++ b/cve/2024/CVE-2024-21810.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-21810", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:17.167", "lastModified": "2024-08-14T14:15:17.167", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper input validation in the Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "HIGH", "subsequentSystemAvailability": "HIGH", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 9.3, "baseSeverity": "CRITICAL"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.0, "impactScore": 6.0}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-20"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00918.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-21844.json b/cve/2024/CVE-2024-21844.json new file mode 100644 index 00000000000..ab5e522a6f6 --- /dev/null +++ b/cve/2024/CVE-2024-21844.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-21844", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:17.390", "lastModified": "2024-08-14T14:15:17.390", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Integer overflow in firmware for some Intel(R) CSME may allow an unauthenticated user to potentially enable denial of service via adjacent access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "ADJACENT", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-190"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00999.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-21857.json b/cve/2024/CVE-2024-21857.json new file mode 100644 index 00000000000..08def111626 --- /dev/null +++ b/cve/2024/CVE-2024-21857.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-21857", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:17.623", "lastModified": "2024-08-14T14:15:17.623", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path for some Intel(R) oneAPI Compiler software before version 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01057.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-22184.json b/cve/2024/CVE-2024-22184.json new file mode 100644 index 00000000000..5544e1902d2 --- /dev/null +++ b/cve/2024/CVE-2024-22184.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-22184", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:17.870", "lastModified": "2024-08-14T14:15:17.870", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path for some Intel(R) Quartus(R) Prime Pro Edition Design Software before version 24.1 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01127.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-22374.json b/cve/2024/CVE-2024-22374.json new file mode 100644 index 00000000000..2519f84dba1 --- /dev/null +++ b/cve/2024/CVE-2024-22374.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-22374", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:18.100", "lastModified": "2024-08-14T14:15:18.100", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Insufficient control flow management for some Intel(R) Xeon Processors may allow an authenticated user to potentially enable denial of service via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 6.8, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.0, "impactScore": 4.0}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-691"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01073.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-22376.json b/cve/2024/CVE-2024-22376.json new file mode 100644 index 00000000000..828d571a4aa --- /dev/null +++ b/cve/2024/CVE-2024-22376.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-22376", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:18.333", "lastModified": "2024-08-14T14:15:18.333", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path element in some installation software for Intel(R) Ethernet Adapter Driver Pack before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01106.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-22378.json b/cve/2024/CVE-2024-22378.json new file mode 100644 index 00000000000..72852aa7f2e --- /dev/null +++ b/cve/2024/CVE-2024-22378.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-22378", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:18.580", "lastModified": "2024-08-14T14:15:18.580", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Incorrect default permissions in some Intel Unite(R) Client Extended Display Plugin software installers before version 1.1.352.157 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-276"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01095.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-23489.json b/cve/2024/CVE-2024-23489.json new file mode 100644 index 00000000000..c0a2612c030 --- /dev/null +++ b/cve/2024/CVE-2024-23489.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-23489", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:18.817", "lastModified": "2024-08-14T14:15:18.817", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path for some Intel(R) VROC software before version 8.6.0.1191 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01128.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-23491.json b/cve/2024/CVE-2024-23491.json new file mode 100644 index 00000000000..3ad6c0f5be4 --- /dev/null +++ b/cve/2024/CVE-2024-23491.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-23491", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:19.047", "lastModified": "2024-08-14T14:15:19.047", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path in some Intel(R) Distribution for GDB software before version 2024.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01075.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-23495.json b/cve/2024/CVE-2024-23495.json new file mode 100644 index 00000000000..373f38ec832 --- /dev/null +++ b/cve/2024/CVE-2024-23495.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-23495", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:19.273", "lastModified": "2024-08-14T14:15:19.273", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Incorrect default permissions in some Intel(R) Distribution for GDB software before version 2024.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-276"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01075.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-23497.json b/cve/2024/CVE-2024-23497.json new file mode 100644 index 00000000000..bbf7b53fa6c --- /dev/null +++ b/cve/2024/CVE-2024-23497.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-23497", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:19.500", "lastModified": "2024-08-14T14:15:19.500", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Out-of-bounds write in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "HIGH", "subsequentSystemAvailability": "HIGH", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 9.3, "baseSeverity": "CRITICAL"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.0, "impactScore": 6.0}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-787"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00918.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-23499.json b/cve/2024/CVE-2024-23499.json new file mode 100644 index 00000000000..59ffd9ece6d --- /dev/null +++ b/cve/2024/CVE-2024-23499.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-23499", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:19.730", "lastModified": "2024-08-14T14:15:19.730", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Protection mechanism failure in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters E810 Series before version 28.3 may allow an unauthenticated user to potentially enable denial of service via network access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "HIGH", "subsequentSystemAvailability": "HIGH", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 7.0, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 3.9, "impactScore": 2.5}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-693"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00918.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-23907.json b/cve/2024/CVE-2024-23907.json new file mode 100644 index 00000000000..cd473a13d37 --- /dev/null +++ b/cve/2024/CVE-2024-23907.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-23907", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:19.967", "lastModified": "2024-08-14T14:15:19.967", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path in some Intel(R) High Level Synthesis Compiler software before version 23.4 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01113.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-23908.json b/cve/2024/CVE-2024-23908.json new file mode 100644 index 00000000000..8e381c018ca --- /dev/null +++ b/cve/2024/CVE-2024-23908.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-23908", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:20.210", "lastModified": "2024-08-14T14:15:20.210", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Insecure inherited permissions in some Flexlm License Daemons for Intel(R) FPGA software before version v11.19.5.0 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-277"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01107.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-23909.json b/cve/2024/CVE-2024-23909.json new file mode 100644 index 00000000000..787fd1d5085 --- /dev/null +++ b/cve/2024/CVE-2024-23909.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-23909", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:20.447", "lastModified": "2024-08-14T14:15:20.447", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path in some Intel(R) FPGA SDK for OpenCL(TM) software technology may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01104.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-23974.json b/cve/2024/CVE-2024-23974.json new file mode 100644 index 00000000000..b1feb1157dc --- /dev/null +++ b/cve/2024/CVE-2024-23974.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-23974", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:20.690", "lastModified": "2024-08-14T14:15:20.690", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Incorrect default permissions in some Intel(R) ISH software installers may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-276"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01088.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-23981.json b/cve/2024/CVE-2024-23981.json new file mode 100644 index 00000000000..6b432af0e57 --- /dev/null +++ b/cve/2024/CVE-2024-23981.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-23981", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:20.913", "lastModified": "2024-08-14T14:15:20.913", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Wrap-around error in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "HIGH", "subsequentSystemAvailability": "HIGH", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 9.3, "baseSeverity": "CRITICAL"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.0, "impactScore": 6.0}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-128"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00918.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-24580.json b/cve/2024/CVE-2024-24580.json new file mode 100644 index 00000000000..7896e3a09af --- /dev/null +++ b/cve/2024/CVE-2024-24580.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-24580", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:21.143", "lastModified": "2024-08-14T14:15:21.143", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper conditions check in some Intel(R) Data Center GPU Max Series 1100 and 1550 products may allow a privileged user to potentially enable denial of service via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "HIGH", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 6.8, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.0, "impactScore": 4.0}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-92"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01094.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-24720.json b/cve/2024/CVE-2024-24720.json index abe12dd3a5a..95ac5e70a83 100644 --- a/cve/2024/CVE-2024-24720.json +++ b/cve/2024/CVE-2024-24720.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-24720", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-27T01:15:07.090", "lastModified": "2024-05-02T17:15:15.020", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in the Forgot password function in Innovaphone PBX before 14r1 devices. It provides information about whether a user exists on a system."}, {"lang": "es", "value": "Se descubri\u00f3 un problema en PBX Innovaphone anteriores a dispositivos 14r1. Proporciona diferentes respuestas a las solicitudes entrantes de una manera que revela informaci\u00f3n a un atacante."}], "metrics": {}, "references": [{"url": "https://excellium-services.com/cert-xlm-advisory/CVE-2024-24720", "source": "cve@mitre.org"}, {"url": "https://wiki.innovaphone.com/index.php?title=Reference14r1:Release_Notes_Security#156999_-_App_Users:_Prevent_account_enumerate", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-24720", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-27T01:15:07.090", "lastModified": "2024-08-14T15:35:05.267", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in the Forgot password function in Innovaphone PBX before 14r1 devices. It provides information about whether a user exists on a system."}, {"lang": "es", "value": "Se descubri\u00f3 un problema en PBX Innovaphone anteriores a dispositivos 14r1. Proporciona diferentes respuestas a las solicitudes entrantes de una manera que revela informaci\u00f3n a un atacante."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 3.9, "impactScore": 1.4}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-200"}]}], "references": [{"url": "https://excellium-services.com/cert-xlm-advisory/CVE-2024-24720", "source": "cve@mitre.org"}, {"url": "https://wiki.innovaphone.com/index.php?title=Reference14r1:Release_Notes_Security#156999_-_App_Users:_Prevent_account_enumerate", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-24853.json b/cve/2024/CVE-2024-24853.json new file mode 100644 index 00000000000..78d53972eaf --- /dev/null +++ b/cve/2024/CVE-2024-24853.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-24853", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:21.380", "lastModified": "2024-08-14T14:15:21.380", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "HIGH", "userInteraction": "PASSIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "HIGH", "subsequentSystemAvailability": "HIGH", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 7.3, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH"}, "exploitabilityScore": 0.6, "impactScore": 6.0}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-696"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-24973.json b/cve/2024/CVE-2024-24973.json new file mode 100644 index 00000000000..18cb22b7c46 --- /dev/null +++ b/cve/2024/CVE-2024-24973.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-24973", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:21.637", "lastModified": "2024-08-14T14:15:21.637", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper input validation for some Intel(R) Distribution for GDB software before version 2024.0.1 may allow an authenticated user to potentially enable denial of service via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "PASSIVE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 1.0, "baseSeverity": "LOW"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "LOW", "baseScore": 2.2, "baseSeverity": "LOW"}, "exploitabilityScore": 0.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-20"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01075.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-24977.json b/cve/2024/CVE-2024-24977.json new file mode 100644 index 00000000000..0812d62f977 --- /dev/null +++ b/cve/2024/CVE-2024-24977.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-24977", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:21.887", "lastModified": "2024-08-14T14:15:21.887", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path for some Intel(R) License Manager for FLEXlm product software before version 11.19.5.0 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01126.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-24980.json b/cve/2024/CVE-2024-24980.json new file mode 100644 index 00000000000..c7ce7d1a2c0 --- /dev/null +++ b/cve/2024/CVE-2024-24980.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-24980", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:22.117", "lastModified": "2024-08-14T14:15:22.117", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:L/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "HIGH", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "LOW", "subsequentSystemIntegrity": "HIGH", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 4.7}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-693"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01100.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-24983.json b/cve/2024/CVE-2024-24983.json new file mode 100644 index 00000000000..b556c7283d4 --- /dev/null +++ b/cve/2024/CVE-2024-24983.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-24983", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:22.363", "lastModified": "2024-08-14T14:15:22.363", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Protection mechanism failure in firmware for some Intel(R) Ethernet Network Controllers and Adapters E810 Series before version 4.4 may allow an unauthenticated user to potentially enable denial of service via network access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "HIGH", "subsequentSystemAvailability": "HIGH", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 7.0, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 3.9, "impactScore": 2.5}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-693"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00918.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-24986.json b/cve/2024/CVE-2024-24986.json new file mode 100644 index 00000000000..46ba1847112 --- /dev/null +++ b/cve/2024/CVE-2024-24986.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-24986", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:22.593", "lastModified": "2024-08-14T14:15:22.593", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper access control in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "HIGH", "subsequentSystemAvailability": "HIGH", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 9.3, "baseSeverity": "CRITICAL"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.0, "impactScore": 6.0}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-284"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00918.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-25157.json b/cve/2024/CVE-2024-25157.json new file mode 100644 index 00000000000..60cd971a48a --- /dev/null +++ b/cve/2024/CVE-2024-25157.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-25157", "sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "published": "2024-08-14T15:15:18.023", "lastModified": "2024-08-14T15:15:18.023", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An authentication bypass vulnerability in GoAnywhere MFT prior to 7.6.0 allows Admin Users with access to the Agent Console to circumvent some permission checks when attempting to visit other pages. This could lead to unauthorized information disclosure or modification."}], "metrics": {"cvssMetricV31": [{"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.2, "impactScore": 5.2}]}, "weaknesses": [{"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-303"}]}], "references": [{"url": "https://www.fortra.com/security/advisories/product-security/fi-2024-009", "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-25561.json b/cve/2024/CVE-2024-25561.json new file mode 100644 index 00000000000..9b2a486c0a9 --- /dev/null +++ b/cve/2024/CVE-2024-25561.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-25561", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:22.827", "lastModified": "2024-08-14T14:15:22.827", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Insecure inherited permissions in some Intel(R) HID Event Filter software installers before version 2.2.2.1 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-277"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01089.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-25562.json b/cve/2024/CVE-2024-25562.json new file mode 100644 index 00000000000..ae5460659f6 --- /dev/null +++ b/cve/2024/CVE-2024-25562.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-25562", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:23.047", "lastModified": "2024-08-14T14:15:23.047", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper buffer restrictions in some Intel(R) Distribution for GDB software before version 2024.0.1 may allow an authenticated user to potentially enable denial of service via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.8, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "HIGH", "baseScore": 5.8, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.0, "impactScore": 4.7}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-92"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01075.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-25576.json b/cve/2024/CVE-2024-25576.json new file mode 100644 index 00000000000..2d6aa79d8cc --- /dev/null +++ b/cve/2024/CVE-2024-25576.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-25576", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:23.280", "lastModified": "2024-08-14T14:15:23.280", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "improper access control in firmware for some Intel(R) FPGA products before version 24.1 may allow a privileged user to enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "HIGH", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "HIGH", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 8.5, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 7.9, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.5, "impactScore": 5.8}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-284"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01087.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-25892.json b/cve/2024/CVE-2024-25892.json index 16c857a8f3a..389202e9126 100644 --- a/cve/2024/CVE-2024-25892.json +++ b/cve/2024/CVE-2024-25892.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-25892", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T18:15:51.540", "lastModified": "2024-02-22T19:07:27.197", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "ChurchCRM 5.5.0 ConfirmReport.php is vulnerable to Blind SQL Injection (Time-based) via the familyId GET parameter."}, {"lang": "es", "value": "ChurchCRM 5.5.0 ConfirmReport.php es vulnerable a la inyecci\u00f3n SQL ciega (basada en tiempo) a trav\u00e9s del par\u00e1metro GET familyId."}], "metrics": {}, "references": [{"url": "https://github.com/ChurchCRM/CRM/issues/6858", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-25892", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T18:15:51.540", "lastModified": "2024-08-14T15:35:06.250", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "ChurchCRM 5.5.0 ConfirmReport.php is vulnerable to Blind SQL Injection (Time-based) via the familyId GET parameter."}, {"lang": "es", "value": "ChurchCRM 5.5.0 ConfirmReport.php es vulnerable a la inyecci\u00f3n SQL ciega (basada en tiempo) a trav\u00e9s del par\u00e1metro GET familyId."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.2, "impactScore": 5.9}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://github.com/ChurchCRM/CRM/issues/6858", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-25939.json b/cve/2024/CVE-2024-25939.json new file mode 100644 index 00000000000..e02a6be66c1 --- /dev/null +++ b/cve/2024/CVE-2024-25939.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-25939", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:23.523", "lastModified": "2024-08-14T14:15:23.523", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Mirrored regions with different values in 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 6.7, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 6.0, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.5, "impactScore": 4.0}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-1251"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01118.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-26022.json b/cve/2024/CVE-2024-26022.json new file mode 100644 index 00000000000..368dd26685b --- /dev/null +++ b/cve/2024/CVE-2024-26022.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-26022", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:23.753", "lastModified": "2024-08-14T14:15:23.753", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper access control in some Intel(R) UEFI Integrator Tools on Aptio V for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 8.5, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-284"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01172.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-26025.json b/cve/2024/CVE-2024-26025.json new file mode 100644 index 00000000000..f2b6de845ef --- /dev/null +++ b/cve/2024/CVE-2024-26025.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-26025", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:23.983", "lastModified": "2024-08-14T14:15:23.983", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Incorrect default permissions for some Intel(R) Advisor software before version 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-276"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01110.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-26027.json b/cve/2024/CVE-2024-26027.json new file mode 100644 index 00000000000..9407ddab131 --- /dev/null +++ b/cve/2024/CVE-2024-26027.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-26027", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:24.197", "lastModified": "2024-08-14T14:15:24.197", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path for some Intel(R) Simics Package Manager software before version 1.8.3 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01116.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-26621.json b/cve/2024/CVE-2024-26621.json index 451c36fcc33..d775c2395ec 100644 --- a/cve/2024/CVE-2024-26621.json +++ b/cve/2024/CVE-2024-26621.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-26621", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:50.340", "lastModified": "2024-07-30T20:15:03.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: huge_memory: don't force huge page alignment on 32 bit\n\ncommit efa7df3e3bb5 (\"mm: align larger anonymous mappings on THP\nboundaries\") caused two issues [1] [2] reported on 32 bit system or compat\nuserspace.\n\nIt doesn't make too much sense to force huge page alignment on 32 bit\nsystem due to the constrained virtual address space.\n\n[1] https://lore.kernel.org/linux-mm/d0a136a0-4a31-46bc-adf4-2db109a61672@kernel.org/\n[2] https://lore.kernel.org/linux-mm/CAJuCfpHXLdQy1a2B6xN2d7quTYwg2OoZseYPZTRpU0eHHKD-sQ@mail.gmail.com/"}, {"lang": "es", "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mm: huge_memory: no forzar una alineaci\u00f3n de p\u00e1gina enorme en el commit de 32 bits efa7df3e3bb5 (\"mm: alinear asignaciones an\u00f3nimas m\u00e1s grandes en los l\u00edmites de THP\") caus\u00f3 dos problemas [1] [2] informado en un sistema de 32 bits o espacio de usuario compatible. No tiene mucho sentido forzar una gran alineaci\u00f3n de p\u00e1ginas en un sistema de 32 bits debido al espacio limitado de direcciones virtuales. [1] https://lore.kernel.org/linux-mm/d0a136a0-4a31-46bc-adf4-2db109a61672@kernel.org/ [2] https://lore.kernel.org/linux-mm/CAJuCfpHXLdQy1a2B6xN2d7quTYwg2OoZseYPZTRpU0eHHKD- sQ@mail.gmail.com/"}], "metrics": {}, "references": [{"url": "http://www.openwall.com/lists/oss-security/2024/07/08/3", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/08/4", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/08/5", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/08/6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/08/7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/08/8", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/09/1", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/10/5", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/10/7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/10/8", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/11/4", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/11/5", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/11/7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/12/3", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/13/2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/13/7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/15/1", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/15/2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/16/1", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/16/2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/29/2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/30/2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/4ef9ad19e17676b9ef071309bc62020e2373705d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/7432376c913381c5f24d373a87ff629bbde94b47", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/87632bc9ecff5ded93433bc0fca428019bdd1cfe", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://zolutal.github.io/aslrnt/", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-26621", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:50.340", "lastModified": "2024-08-14T14:15:24.450", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: huge_memory: don't force huge page alignment on 32 bit\n\ncommit efa7df3e3bb5 (\"mm: align larger anonymous mappings on THP\nboundaries\") caused two issues [1] [2] reported on 32 bit system or compat\nuserspace.\n\nIt doesn't make too much sense to force huge page alignment on 32 bit\nsystem due to the constrained virtual address space.\n\n[1] https://lore.kernel.org/linux-mm/d0a136a0-4a31-46bc-adf4-2db109a61672@kernel.org/\n[2] https://lore.kernel.org/linux-mm/CAJuCfpHXLdQy1a2B6xN2d7quTYwg2OoZseYPZTRpU0eHHKD-sQ@mail.gmail.com/"}, {"lang": "es", "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mm: huge_memory: no forzar una alineaci\u00f3n de p\u00e1gina enorme en el commit de 32 bits efa7df3e3bb5 (\"mm: alinear asignaciones an\u00f3nimas m\u00e1s grandes en los l\u00edmites de THP\") caus\u00f3 dos problemas [1] [2] informado en un sistema de 32 bits o espacio de usuario compatible. No tiene mucho sentido forzar una gran alineaci\u00f3n de p\u00e1ginas en un sistema de 32 bits debido al espacio limitado de direcciones virtuales. [1] https://lore.kernel.org/linux-mm/d0a136a0-4a31-46bc-adf4-2db109a61672@kernel.org/ [2] https://lore.kernel.org/linux-mm/CAJuCfpHXLdQy1a2B6xN2d7quTYwg2OoZseYPZTRpU0eHHKD- sQ@mail.gmail.com/"}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/4ef9ad19e17676b9ef071309bc62020e2373705d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/6ea9aa8d97e6563676094cb35755884173269555", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/7432376c913381c5f24d373a87ff629bbde94b47", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/87632bc9ecff5ded93433bc0fca428019bdd1cfe", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-27455.json b/cve/2024/CVE-2024-27455.json index 717c10959c9..0b2976fd12c 100644 --- a/cve/2024/CVE-2024-27455.json +++ b/cve/2024/CVE-2024-27455.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-27455", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T16:28:00.707", "lastModified": "2024-03-26T16:15:12.263", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Bentley ALIM Web application, certain configuration settings can cause exposure of a user's ALIM session token when the user attempts to download files. This is fixed in Assetwise ALIM Web 23.00.04.04 and Assetwise Information Integrity Server 23.00.02.03."}, {"lang": "es", "value": "En la aplicaci\u00f3n web Bentley ALIM, ciertos ajustes de configuraci\u00f3n pueden provocar la exposici\u00f3n del token de sesi\u00f3n ALIM de un usuario cuando el usuario intenta descargar archivos. Esto se solucion\u00f3 en Assetwise ALIM Web 23.00.02.03 y Assetwise Information Integrity Server 23.00.04.04."}], "metrics": {}, "references": [{"url": "https://www.bentley.com/advisories/be-2024-0001/", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-27455", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T16:28:00.707", "lastModified": "2024-08-14T15:35:07.223", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Bentley ALIM Web application, certain configuration settings can cause exposure of a user's ALIM session token when the user attempts to download files. This is fixed in Assetwise ALIM Web 23.00.04.04 and Assetwise Information Integrity Server 23.00.02.03."}, {"lang": "es", "value": "En la aplicaci\u00f3n web Bentley ALIM, ciertos ajustes de configuraci\u00f3n pueden provocar la exposici\u00f3n del token de sesi\u00f3n ALIM de un usuario cuando el usuario intenta descargar archivos. Esto se solucion\u00f3 en Assetwise ALIM Web 23.00.02.03 y Assetwise Information Integrity Server 23.00.04.04."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.2}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-488"}, {"lang": "en", "value": "CWE-613"}]}], "references": [{"url": "https://www.bentley.com/advisories/be-2024-0001/", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-27461.json b/cve/2024/CVE-2024-27461.json new file mode 100644 index 00000000000..2325068fd83 --- /dev/null +++ b/cve/2024/CVE-2024-27461.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-27461", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:24.603", "lastModified": "2024-08-14T14:15:24.603", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Incorrect default permissions in software installer for Intel(R) MAS (GUI) may allow an authenticated user to potentially enable denial of service via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:H/SC:N/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "PASSIVE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "LOW", "subsequentSystemAvailability": "LOW", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 4.3, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "HIGH", "baseScore": 5.6, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.3, "impactScore": 4.2}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-276"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01164.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-28046.json b/cve/2024/CVE-2024-28046.json new file mode 100644 index 00000000000..f59516ac942 --- /dev/null +++ b/cve/2024/CVE-2024-28046.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-28046", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:24.830", "lastModified": "2024-08-14T14:15:24.830", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path in some Intel(R) GPA software before version 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01105.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-28050.json b/cve/2024/CVE-2024-28050.json new file mode 100644 index 00000000000..21c03adfd50 --- /dev/null +++ b/cve/2024/CVE-2024-28050.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-28050", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:25.050", "lastModified": "2024-08-14T14:15:25.050", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper access control in some Intel(R) Arc(TM) & Iris(R) Xe Graphics software before version 31.0.101.4824 may allow an authenticated user to potentially enable denial of service via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "PASSIVE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.1, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.0, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.3, "impactScore": 3.6}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-284"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01130.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-28172.json b/cve/2024/CVE-2024-28172.json new file mode 100644 index 00000000000..cf4cba9403a --- /dev/null +++ b/cve/2024/CVE-2024-28172.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-28172", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:25.280", "lastModified": "2024-08-14T14:15:25.280", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path for some Intel(R) Trace Analyzer and Collector software before version 2022.1 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01117.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-28383.json b/cve/2024/CVE-2024-28383.json index 7593c9c7a44..acfea2a189c 100644 --- a/cve/2024/CVE-2024-28383.json +++ b/cve/2024/CVE-2024-28383.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-28383", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T13:15:53.740", "lastModified": "2024-03-14T14:21:20.217", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Tenda AX12 v1.0 v22.03.01.16 was discovered to contain a stack overflow via the ssid parameter in the sub_431CF0 function."}, {"lang": "es", "value": "Se descubri\u00f3 que Tenda AX12 v1.0 v22.03.01.16 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro ssid en la funci\u00f3n sub_431CF0."}], "metrics": {}, "references": [{"url": "https://github.com/cvdyfbwa/IoT-Tenda-Router/blob/main/sub_431CF0.md", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-28383", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T13:15:53.740", "lastModified": "2024-08-14T14:35:02.963", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Tenda AX12 v1.0 v22.03.01.16 was discovered to contain a stack overflow via the ssid parameter in the sub_431CF0 function."}, {"lang": "es", "value": "Se descubri\u00f3 que Tenda AX12 v1.0 v22.03.01.16 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro ssid en la funci\u00f3n sub_431CF0."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-121"}]}], "references": [{"url": "https://github.com/cvdyfbwa/IoT-Tenda-Router/blob/main/sub_431CF0.md", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-28876.json b/cve/2024/CVE-2024-28876.json new file mode 100644 index 00000000000..92126e14c19 --- /dev/null +++ b/cve/2024/CVE-2024-28876.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-28876", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:25.560", "lastModified": "2024-08-14T14:15:25.560", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path for some Intel(R) MPI Library software before version 2021.12 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01115.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-28887.json b/cve/2024/CVE-2024-28887.json new file mode 100644 index 00000000000..56807bafb1e --- /dev/null +++ b/cve/2024/CVE-2024-28887.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-28887", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:25.790", "lastModified": "2024-08-14T14:15:25.790", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path in some Intel(R) IPP software before version 2021.11 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01129.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-28947.json b/cve/2024/CVE-2024-28947.json new file mode 100644 index 00000000000..54f0d5ceb3e --- /dev/null +++ b/cve/2024/CVE-2024-28947.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-28947", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:26.017", "lastModified": "2024-08-14T14:15:26.017", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper input validation in kernel mode driver for some Intel(R) Server Board S2600ST Family firmware before version 02.01.0017 may allow a privileged user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "HIGH", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 7.1, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.5, "impactScore": 6.0}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-20"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01121.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-28953.json b/cve/2024/CVE-2024-28953.json new file mode 100644 index 00000000000..f64c3c5a5ba --- /dev/null +++ b/cve/2024/CVE-2024-28953.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-28953", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:26.237", "lastModified": "2024-08-14T14:15:26.237", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path in some EMON software before version 11.44 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01125.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-29015.json b/cve/2024/CVE-2024-29015.json new file mode 100644 index 00000000000..9b412cb034d --- /dev/null +++ b/cve/2024/CVE-2024-29015.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-29015", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:26.450", "lastModified": "2024-08-14T14:15:26.450", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Uncontrolled search path in some Intel(R) VTune(TM) Profiler software before versions 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.4, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01122.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-31816.json b/cve/2024/CVE-2024-31816.json index b32165bb202..1c0f552827f 100644 --- a/cve/2024/CVE-2024-31816.json +++ b/cve/2024/CVE-2024-31816.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-31816", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.987", "lastModified": "2024-04-08T18:48:40.217", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In TOTOLINK EX200 V4.0.3c.7646_B20201211, an attacker can obtain sensitive information without authorization through the function getEasyWizardCfg."}, {"lang": "es", "value": "En TOTOLINK EX200 V4.0.3c.7646_B20201211, un atacante puede obtener informaci\u00f3n confidencial sin autorizaci\u00f3n a trav\u00e9s de la funci\u00f3n getEasyWizardCfg."}], "metrics": {}, "references": [{"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Leak_getEasyWizardCfg/Leak.md", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-31816", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.987", "lastModified": "2024-08-14T14:35:18.370", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In TOTOLINK EX200 V4.0.3c.7646_B20201211, an attacker can obtain sensitive information without authorization through the function getEasyWizardCfg."}, {"lang": "es", "value": "En TOTOLINK EX200 V4.0.3c.7646_B20201211, un atacante puede obtener informaci\u00f3n confidencial sin autorizaci\u00f3n a trav\u00e9s de la funci\u00f3n getEasyWizardCfg."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-200"}]}], "references": [{"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Leak_getEasyWizardCfg/Leak.md", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-34117.json b/cve/2024/CVE-2024-34117.json new file mode 100644 index 00000000000..3b1122c57d5 --- /dev/null +++ b/cve/2024/CVE-2024-34117.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-34117", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:18.420", "lastModified": "2024-08-14T15:15:18.420", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Photoshop Desktop versions 24.7.3, 25.9.1 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-416"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/photoshop/apsb24-49.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-34118.json b/cve/2024/CVE-2024-34118.json new file mode 100644 index 00000000000..dc90bd48dec --- /dev/null +++ b/cve/2024/CVE-2024-34118.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-34118", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:18.657", "lastModified": "2024-08-14T15:15:18.657", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Illustrator versions 28.5, 27.9.4 and earlier are affected by an Improper Input Validation vulnerability that could lead to an application denial-of-service condition. An attacker could exploit this vulnerability to render the application unresponsive or terminate its execution. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-20"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/illustrator/apsb24-45.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-34124.json b/cve/2024/CVE-2024-34124.json new file mode 100644 index 00000000000..b6e0f653a1b --- /dev/null +++ b/cve/2024/CVE-2024-34124.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-34124", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:18.910", "lastModified": "2024-08-14T15:15:18.910", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dimension versions 3.4.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/dimension/apsb24-47.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-34125.json b/cve/2024/CVE-2024-34125.json new file mode 100644 index 00000000000..2e03717cec2 --- /dev/null +++ b/cve/2024/CVE-2024-34125.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-34125", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:19.163", "lastModified": "2024-08-14T15:15:19.163", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dimension versions 3.4.11 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/dimension/apsb24-47.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-34126.json b/cve/2024/CVE-2024-34126.json new file mode 100644 index 00000000000..5d29c60fb2c --- /dev/null +++ b/cve/2024/CVE-2024-34126.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-34126", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:19.397", "lastModified": "2024-08-14T15:15:19.397", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dimension versions 3.4.11 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/dimension/apsb24-47.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-34127.json b/cve/2024/CVE-2024-34127.json new file mode 100644 index 00000000000..6e86a6ed071 --- /dev/null +++ b/cve/2024/CVE-2024-34127.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-34127", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:19.623", "lastModified": "2024-08-14T15:15:19.623", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-34133.json b/cve/2024/CVE-2024-34133.json new file mode 100644 index 00000000000..eed5eb0e25f --- /dev/null +++ b/cve/2024/CVE-2024-34133.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-34133", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:19.867", "lastModified": "2024-08-14T15:15:19.867", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Illustrator versions 28.5, 27.9.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/illustrator/apsb24-45.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-34134.json b/cve/2024/CVE-2024-34134.json new file mode 100644 index 00000000000..7a5439f3010 --- /dev/null +++ b/cve/2024/CVE-2024-34134.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-34134", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:20.107", "lastModified": "2024-08-14T15:15:20.107", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Illustrator versions 28.5, 27.9.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 4.2}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/illustrator/apsb24-45.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-34135.json b/cve/2024/CVE-2024-34135.json new file mode 100644 index 00000000000..d818eb87d13 --- /dev/null +++ b/cve/2024/CVE-2024-34135.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-34135", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:20.347", "lastModified": "2024-08-14T15:15:20.347", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Illustrator versions 28.5, 27.9.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/illustrator/apsb24-45.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-34136.json b/cve/2024/CVE-2024-34136.json new file mode 100644 index 00000000000..c691a9c16d7 --- /dev/null +++ b/cve/2024/CVE-2024-34136.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-34136", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:20.570", "lastModified": "2024-08-14T15:15:20.570", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Illustrator versions 28.5, 27.9.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service (DoS). An attacker could exploit this vulnerability to crash the application, resulting in a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/illustrator/apsb24-45.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-34137.json b/cve/2024/CVE-2024-34137.json new file mode 100644 index 00000000000..b66059ad1d2 --- /dev/null +++ b/cve/2024/CVE-2024-34137.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-34137", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:20.793", "lastModified": "2024-08-14T15:15:20.793", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Illustrator versions 28.5, 27.9.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service (DoS) condition. An attacker could exploit this vulnerability to crash the application, resulting in a DoS. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/illustrator/apsb24-45.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-34138.json b/cve/2024/CVE-2024-34138.json new file mode 100644 index 00000000000..fc69fb567d5 --- /dev/null +++ b/cve/2024/CVE-2024-34138.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-34138", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:21.040", "lastModified": "2024-08-14T15:15:21.040", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Illustrator versions 28.5, 27.9.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service (DoS). An attacker could exploit this vulnerability to crash the application, resulting in a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/illustrator/apsb24-45.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-34163.json b/cve/2024/CVE-2024-34163.json new file mode 100644 index 00000000000..dfa4478887b --- /dev/null +++ b/cve/2024/CVE-2024-34163.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-34163", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:26.713", "lastModified": "2024-08-14T14:15:26.713", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper input validation in firmware for some Intel(R) NUC may allow a privileged user to potentially enableescalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "HIGH", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "HIGH", "subsequentSystemAvailability": "HIGH", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 8.7, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH"}, "exploitabilityScore": 0.8, "impactScore": 6.0}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-20"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01022.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-36136.json b/cve/2024/CVE-2024-36136.json index b75c60f0d30..4c9cbf393d9 100644 --- a/cve/2024/CVE-2024-36136.json +++ b/cve/2024/CVE-2024-36136.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-36136", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-14T03:15:04.390", "lastModified": "2024-08-14T13:00:48.243", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An off-by-one error in WLInfoRailService in Ivanti Avalanche 6.3.1 allows a remote unauthenticated attacker to crash the service, resulting in a DoS."}, {"lang": "es", "value": "Un error de uno en uno en WLInfoRailService en Ivanti Avalanche 6.3.1 permite que un atacante remoto no autenticado bloquee el servicio, lo que resulta en un DoS."}], "metrics": {"cvssMetricV30": [{"source": "support@hackerone.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "references": [{"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-4-CVE-2024-38652-CVE-2024-38653-CVE-2024-36136-CVE-2024-37399-CVE-2024-37373", "source": "support@hackerone.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-36136", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-14T03:15:04.390", "lastModified": "2024-08-14T14:35:25.547", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An off-by-one error in WLInfoRailService in Ivanti Avalanche 6.3.1 allows a remote unauthenticated attacker to crash the service, resulting in a DoS."}, {"lang": "es", "value": "Un error de uno en uno en WLInfoRailService en Ivanti Avalanche 6.3.1 permite que un atacante remoto no autenticado bloquee el servicio, lo que resulta en un DoS."}], "metrics": {"cvssMetricV30": [{"source": "support@hackerone.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-193"}]}], "references": [{"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-4-CVE-2024-38652-CVE-2024-38653-CVE-2024-36136-CVE-2024-37399-CVE-2024-37373", "source": "support@hackerone.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-37028.json b/cve/2024/CVE-2024-37028.json new file mode 100644 index 00000000000..27d102001f9 --- /dev/null +++ b/cve/2024/CVE-2024-37028.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-37028", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-08-14T15:15:21.257", "lastModified": "2024-08-14T15:15:21.257", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "BIG-IP Next Central Manager may allow an attacker to lock out an account that has never been logged in.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."}], "metrics": {"cvssMetricV40": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 6.3, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 3.9, "impactScore": 1.4}]}, "weaknesses": [{"source": "f5sirt@f5.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-645"}]}], "references": [{"url": "https://my.f5.com/manage/s/article/K000139938", "source": "f5sirt@f5.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-37036.json b/cve/2024/CVE-2024-37036.json index 5d0d636b093..715d42a583b 100644 --- a/cve/2024/CVE-2024-37036.json +++ b/cve/2024/CVE-2024-37036.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-37036", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-06-12T17:15:50.637", "lastModified": "2024-06-13T18:36:09.010", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "CWE-787: Out-of-bounds Write vulnerability exists that could result in an authentication bypass\nwhen sending a malformed POST request and particular configuration parameters are set."}, {"lang": "es", "value": "CWE-787: Existe una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar una omisi\u00f3n de autenticaci\u00f3n al enviar una solicitud POST con formato incorrecto y se establecen par\u00e1metros de configuraci\u00f3n particulares."}], "metrics": {"cvssMetricV31": [{"source": "cybersecurity@se.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "cybersecurity@se.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}], "references": [{"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-05.pdf", "source": "cybersecurity@se.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-37036", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-06-12T17:15:50.637", "lastModified": "2024-08-14T14:19:37.137", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "CWE-787: Out-of-bounds Write vulnerability exists that could result in an authentication bypass\nwhen sending a malformed POST request and particular configuration parameters are set."}, {"lang": "es", "value": "CWE-787: Existe una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar una omisi\u00f3n de autenticaci\u00f3n al enviar una solicitud POST con formato incorrecto y se establecen par\u00e1metros de configuraci\u00f3n particulares."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "cybersecurity@se.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "cybersecurity@se.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:schneider-electric:sage_rtu_firmware:*:*:*:*:*:*:*:*", "versionEndIncluding": "c3414-500-s02k5_p8", "matchCriteriaId": "F3A29B28-4959-4156-B77A-5D38B896029B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:schneider-electric:sage_1410:-:*:*:*:*:*:*:*", "matchCriteriaId": "02E606BD-92F8-4396-AD13-666D76E1E34D"}, {"vulnerable": false, "criteria": "cpe:2.3:h:schneider-electric:sage_1430:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E29CCC-4E21-411E-80DD-545A66E9B042"}, {"vulnerable": false, "criteria": "cpe:2.3:h:schneider-electric:sage_1450:-:*:*:*:*:*:*:*", "matchCriteriaId": "66759867-027F-4FA6-ABA6-BFDEE49E8F8D"}, {"vulnerable": false, "criteria": "cpe:2.3:h:schneider-electric:sage_2400:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA561E2A-4787-48D7-ABBB-26D0D7D24E6F"}, {"vulnerable": false, "criteria": "cpe:2.3:h:schneider-electric:sage_3030_magnum:-:*:*:*:*:*:*:*", "matchCriteriaId": "453696F2-0F4C-4000-A438-F814D0FC3504"}, {"vulnerable": false, "criteria": "cpe:2.3:h:schneider-electric:sage_4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "6462B366-8F9F-49D6-939A-E73C1D5A707C"}]}]}], "references": [{"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-05.pdf", "source": "cybersecurity@se.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-37373.json b/cve/2024/CVE-2024-37373.json index 8b7b9e42a13..6a158fe9670 100644 --- a/cve/2024/CVE-2024-37373.json +++ b/cve/2024/CVE-2024-37373.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-37373", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-14T03:15:04.667", "lastModified": "2024-08-14T13:00:48.243", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper input validation in the Central Filestore in Ivanti Avalanche 6.3.1 allows a remote authenticated attacker with admin rights to achieve RCE."}, {"lang": "es", "value": "La validaci\u00f3n de entrada incorrecta en el almac\u00e9n de archivos central en Ivanti Avalanche 6.3.1 permite que un atacante remoto autenticado con derechos de administrador logre RCE."}], "metrics": {"cvssMetricV30": [{"source": "support@hackerone.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}]}, "references": [{"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-4-CVE-2024-38652-CVE-2024-38653-CVE-2024-36136-CVE-2024-37399-CVE-2024-37373", "source": "support@hackerone.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-37373", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-14T03:15:04.667", "lastModified": "2024-08-14T14:35:26.827", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper input validation in the Central Filestore in Ivanti Avalanche 6.3.1 allows a remote authenticated attacker with admin rights to achieve RCE."}, {"lang": "es", "value": "La validaci\u00f3n de entrada incorrecta en el almac\u00e9n de archivos central en Ivanti Avalanche 6.3.1 permite que un atacante remoto autenticado con derechos de administrador logre RCE."}], "metrics": {"cvssMetricV30": [{"source": "support@hackerone.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-20"}]}], "references": [{"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-4-CVE-2024-38652-CVE-2024-38653-CVE-2024-36136-CVE-2024-37399-CVE-2024-37373", "source": "support@hackerone.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-37399.json b/cve/2024/CVE-2024-37399.json index 5a4a9ffc06d..1fcf58b59b4 100644 --- a/cve/2024/CVE-2024-37399.json +++ b/cve/2024/CVE-2024-37399.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-37399", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-14T03:15:04.850", "lastModified": "2024-08-14T13:00:37.107", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A NULL pointer dereference in WLAvalancheService in Ivanti Avalanche 6.3.1 allows a remote unauthenticated attacker to crash the service, resulting in a DoS."}, {"lang": "es", "value": "Una desreferencia de puntero NULL en WLAvalancheService en Ivanti Avalanche 6.3.1 permite que un atacante remoto no autenticado bloquee el servicio, lo que resulta en un DoS."}], "metrics": {"cvssMetricV30": [{"source": "support@hackerone.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "references": [{"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-4-CVE-2024-38652-CVE-2024-38653-CVE-2024-36136-CVE-2024-37399-CVE-2024-37373", "source": "support@hackerone.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-37399", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-14T03:15:04.850", "lastModified": "2024-08-14T14:35:28.153", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A NULL pointer dereference in WLAvalancheService in Ivanti Avalanche 6.3.1 allows a remote unauthenticated attacker to crash the service, resulting in a DoS."}, {"lang": "es", "value": "Una desreferencia de puntero NULL en WLAvalancheService en Ivanti Avalanche 6.3.1 permite que un atacante remoto no autenticado bloquee el servicio, lo que resulta en un DoS."}], "metrics": {"cvssMetricV30": [{"source": "support@hackerone.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-476"}]}], "references": [{"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-4-CVE-2024-38652-CVE-2024-38653-CVE-2024-36136-CVE-2024-37399-CVE-2024-37373", "source": "support@hackerone.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-37662.json b/cve/2024/CVE-2024-37662.json index e2b59fdc8f9..186bd0d2fa8 100644 --- a/cve/2024/CVE-2024-37662.json +++ b/cve/2024/CVE-2024-37662.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-37662", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T18:15:17.560", "lastModified": "2024-06-20T12:44:22.977", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "TP-LINK TL-7DR5130 v1.0.23 is vulnerable to TCP DoS or hijacking attacks. An attacker in the same WLAN as the victim can disconnect or hijack the traffic between the victim and any remote server by sending out forged TCP RST messages to evict NAT mappings in the router."}, {"lang": "es", "value": "TP-LINK TL-7DR5130 v1.0.23 es vulnerable a TCP DoS o ataques de secuestro. Un atacante en la misma WLAN que la v\u00edctima puede desconectar o secuestrar el tr\u00e1fico entre la v\u00edctima y cualquier servidor remoto enviando mensajes TCP RST falsificados para desalojar las asignaciones NAT en el enrutador."}], "metrics": {}, "references": [{"url": "https://github.com/ouuan/router-vuln-report/blob/master/nat-rst/tl-7dr5130-nat-rst.md", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-37662", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T18:15:17.560", "lastModified": "2024-08-14T14:35:29.050", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "TP-LINK TL-7DR5130 v1.0.23 is vulnerable to TCP DoS or hijacking attacks. An attacker in the same WLAN as the victim can disconnect or hijack the traffic between the victim and any remote server by sending out forged TCP RST messages to evict NAT mappings in the router."}, {"lang": "es", "value": "TP-LINK TL-7DR5130 v1.0.23 es vulnerable a TCP DoS o ataques de secuestro. Un atacante en la misma WLAN que la v\u00edctima puede desconectar o secuestrar el tr\u00e1fico entre la v\u00edctima y cualquier servidor remoto enviando mensajes TCP RST falsificados para desalojar las asignaciones NAT en el enrutador."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.5, "impactScore": 4.7}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-940"}]}], "references": [{"url": "https://github.com/ouuan/router-vuln-report/blob/master/nat-rst/tl-7dr5130-nat-rst.md", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-38213.json b/cve/2024/CVE-2024-38213.json index 512fe002afe..50afb3c39c5 100644 --- a/cve/2024/CVE-2024-38213.json +++ b/cve/2024/CVE-2024-38213.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-38213", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-13T18:15:30.750", "lastModified": "2024-08-14T02:07:05.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "cisaExploitAdd": "2024-08-13", "cisaActionDue": "2024-09-03", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability", "descriptions": [{"lang": "en", "value": "Windows Mark of the Web Security Feature Bypass Vulnerability"}], "metrics": {"cvssMetricV31": [{"source": "secure@microsoft.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "secure@microsoft.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-693"}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38213", "source": "secure@microsoft.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-38213", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-13T18:15:30.750", "lastModified": "2024-08-14T14:55:49.887", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-08-13", "cisaActionDue": "2024-09-03", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability", "descriptions": [{"lang": "en", "value": "Windows Mark of the Web Security Feature Bypass Vulnerability"}, {"lang": "es", "value": "Vulnerabilidad de omisi\u00f3n de la caracter\u00edstica de seguridad web de Windows"}], "metrics": {"cvssMetricV31": [{"source": "secure@microsoft.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-693"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.10240.20680", "matchCriteriaId": "CF7733FD-F870-4578-A567-9900AD6C78E3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.14393.7070", "matchCriteriaId": "D96DA51E-404E-49AE-B852-56FF8A1CEEA6"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.17763.5936", "matchCriteriaId": "9B52F95E-6080-46C6-B4B6-E2B3F3E78456"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.19044.4529", "matchCriteriaId": "1CEAF689-E8DB-4D3C-BC2E-B386BC077BC5"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.19045.4529", "matchCriteriaId": "970F54FC-F4ED-49B9-BE94-96B7212FD149"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.22000.3019", "matchCriteriaId": "84ECD6C0-8C47-4D2F-82B5-4F8C0BBC5FEE"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.22621.3737", "matchCriteriaId": "4E80DF17-1F27-474E-B147-9F5B6C494300"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.22631.3737", "matchCriteriaId": "4258468C-56CC-45C0-B510-FC833E942876"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.2.9200.24919", "matchCriteriaId": "48EA2B6D-D604-4548-88E9-4FE312C8CCA5"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.14393.7070", "matchCriteriaId": "FA61AAF0-D769-4287-AA5C-EFDAD067E9F1"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.17763.5936", "matchCriteriaId": "12F9D974-A968-4CBB-81D8-C73B76DD284A"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.20348.2522", "matchCriteriaId": "498A643B-0180-4AD3-BD7C-5E3CEB0FD112"}, {"vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.25398.950", "matchCriteriaId": "0EA59E2D-57B2-4E8B-937A-3EB51A3AD285"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38213", "source": "secure@microsoft.com", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-38652.json b/cve/2024/CVE-2024-38652.json index a7f744d45bc..43524ec7415 100644 --- a/cve/2024/CVE-2024-38652.json +++ b/cve/2024/CVE-2024-38652.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-38652", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-14T03:15:05.020", "lastModified": "2024-08-14T13:00:37.107", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Path traversal in the skin management component of Ivanti Avalanche 6.3.1 allows a remote unauthenticated attacker to achieve denial of service via arbitrary file deletion."}, {"lang": "es", "value": "El path traversal en el componente de gesti\u00f3n de aspectos de Ivanti Avalanche 6.3.1 permite a un atacante remoto no autenticado lograr una denegaci\u00f3n de servicio mediante la eliminaci\u00f3n arbitraria de archivos."}], "metrics": {"cvssMetricV30": [{"source": "support@hackerone.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 4.2}]}, "references": [{"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-4-CVE-2024-38652-CVE-2024-38653-CVE-2024-36136-CVE-2024-37399-CVE-2024-37373", "source": "support@hackerone.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-38652", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-14T03:15:05.020", "lastModified": "2024-08-14T14:35:31.657", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Path traversal in the skin management component of Ivanti Avalanche 6.3.1 allows a remote unauthenticated attacker to achieve denial of service via arbitrary file deletion."}, {"lang": "es", "value": "El path traversal en el componente de gesti\u00f3n de aspectos de Ivanti Avalanche 6.3.1 permite a un atacante remoto no autenticado lograr una denegaci\u00f3n de servicio mediante la eliminaci\u00f3n arbitraria de archivos."}], "metrics": {"cvssMetricV30": [{"source": "support@hackerone.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 4.2}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-22"}]}], "references": [{"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-4-CVE-2024-38652-CVE-2024-38653-CVE-2024-36136-CVE-2024-37399-CVE-2024-37373", "source": "support@hackerone.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-38653.json b/cve/2024/CVE-2024-38653.json index 23b36cc0f0e..df9066db957 100644 --- a/cve/2024/CVE-2024-38653.json +++ b/cve/2024/CVE-2024-38653.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-38653", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-14T03:15:05.200", "lastModified": "2024-08-14T13:00:37.107", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "XXE in SmartDeviceServer in Ivanti Avalanche 6.3.1 allows a remote unauthenticated attacker to read arbitrary files on the server."}, {"lang": "es", "value": "XXE en SmartDeviceServer en Ivanti Avalanche 6.3.1 permite que un atacante remoto no autenticado lea archivos arbitrarios en el servidor."}], "metrics": {"cvssMetricV30": [{"source": "support@hackerone.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 4.2}]}, "references": [{"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-4-CVE-2024-38652-CVE-2024-38653-CVE-2024-36136-CVE-2024-37399-CVE-2024-37373", "source": "support@hackerone.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-38653", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-14T03:15:05.200", "lastModified": "2024-08-14T14:35:32.550", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "XXE in SmartDeviceServer in Ivanti Avalanche 6.3.1 allows a remote unauthenticated attacker to read arbitrary files on the server."}, {"lang": "es", "value": "XXE en SmartDeviceServer en Ivanti Avalanche 6.3.1 permite que un atacante remoto no autenticado lea archivos arbitrarios en el servidor."}], "metrics": {"cvssMetricV30": [{"source": "support@hackerone.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 4.2}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-611"}]}], "references": [{"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-4-CVE-2024-38652-CVE-2024-38653-CVE-2024-36136-CVE-2024-37399-CVE-2024-37373", "source": "support@hackerone.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39283.json b/cve/2024/CVE-2024-39283.json new file mode 100644 index 00000000000..f653e9fb095 --- /dev/null +++ b/cve/2024/CVE-2024-39283.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39283", "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:27.277", "lastModified": "2024-08-14T14:15:27.277", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Incomplete filtering of special elements in Intel(R) TDX module software before version TDX_1.5.01.00.592 may allow an authenticated user to potentially enable escalation of privilege via local access."}], "metrics": {"cvssMetricV40": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "HIGH", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "HIGH", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 8.5, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "secure@intel.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.8, "impactScore": 5.2}]}, "weaknesses": [{"source": "secure@intel.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-791"}]}], "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01010.html", "source": "secure@intel.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39383.json b/cve/2024/CVE-2024-39383.json new file mode 100644 index 00000000000..7834c634198 --- /dev/null +++ b/cve/2024/CVE-2024-39383.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39383", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:21.760", "lastModified": "2024-08-14T15:15:21.760", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-416"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39386.json b/cve/2024/CVE-2024-39386.json new file mode 100644 index 00000000000..e2d4061c2de --- /dev/null +++ b/cve/2024/CVE-2024-39386.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39386", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:22.000", "lastModified": "2024-08-14T15:15:22.000", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Bridge versions 13.0.8, 14.1.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/bridge/apsb24-59.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39387.json b/cve/2024/CVE-2024-39387.json new file mode 100644 index 00000000000..b0b6b16e8cc --- /dev/null +++ b/cve/2024/CVE-2024-39387.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39387", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:22.233", "lastModified": "2024-08-14T15:15:22.233", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Bridge versions 13.0.8, 14.1.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/bridge/apsb24-59.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39388.json b/cve/2024/CVE-2024-39388.json new file mode 100644 index 00000000000..5b7f72490fd --- /dev/null +++ b/cve/2024/CVE-2024-39388.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39388", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:22.470", "lastModified": "2024-08-14T15:15:22.470", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Substance3D - Stager versions 3.0.2 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-416"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb24-60.htm", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39389.json b/cve/2024/CVE-2024-39389.json new file mode 100644 index 00000000000..c641b578291 --- /dev/null +++ b/cve/2024/CVE-2024-39389.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39389", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:22.717", "lastModified": "2024-08-14T15:15:22.717", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-121"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39390.json b/cve/2024/CVE-2024-39390.json new file mode 100644 index 00000000000..ee1e3e818ca --- /dev/null +++ b/cve/2024/CVE-2024-39390.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39390", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:22.963", "lastModified": "2024-08-14T15:15:22.963", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39391.json b/cve/2024/CVE-2024-39391.json new file mode 100644 index 00000000000..c4a6c504019 --- /dev/null +++ b/cve/2024/CVE-2024-39391.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39391", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:23.213", "lastModified": "2024-08-14T15:15:23.213", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39393.json b/cve/2024/CVE-2024-39393.json new file mode 100644 index 00000000000..41d921b2019 --- /dev/null +++ b/cve/2024/CVE-2024-39393.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39393", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:23.493", "lastModified": "2024-08-14T15:15:23.493", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39394.json b/cve/2024/CVE-2024-39394.json new file mode 100644 index 00000000000..6d76ee7cf20 --- /dev/null +++ b/cve/2024/CVE-2024-39394.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39394", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:23.823", "lastModified": "2024-08-14T15:15:23.823", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39395.json b/cve/2024/CVE-2024-39395.json new file mode 100644 index 00000000000..04cbfc32ed1 --- /dev/null +++ b/cve/2024/CVE-2024-39395.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39395", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:24.133", "lastModified": "2024-08-14T15:15:24.133", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service (DoS). An attacker could exploit this vulnerability to crash the application, resulting in a DoS condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39397.json b/cve/2024/CVE-2024-39397.json index 23c9296d106..2716a6c6d2d 100644 --- a/cve/2024/CVE-2024-39397.json +++ b/cve/2024/CVE-2024-39397.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39397", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:24.123", "lastModified": "2024-08-14T13:00:37.107", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Unrestricted Upload of File with Dangerous Type vulnerability that could result in arbitrary code execution by an attacker. An attacker could exploit this vulnerability by uploading a malicious file which can then be executed on the server. Exploitation of this issue does not require user interaction, but attack complexity is high and scope is changed."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 2.2, "impactScore": 6.0}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-434"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39397", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:24.123", "lastModified": "2024-08-14T14:46:52.150", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Unrestricted Upload of File with Dangerous Type vulnerability that could result in arbitrary code execution by an attacker. An attacker could exploit this vulnerability by uploading a malicious file which can then be executed on the server. Exploitation of this issue does not require user interaction, but attack complexity is high and scope is changed."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 2.2, "impactScore": 6.0}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-434"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39398.json b/cve/2024/CVE-2024-39398.json index e6963a0a6aa..aefc5df0065 100644 --- a/cve/2024/CVE-2024-39398.json +++ b/cve/2024/CVE-2024-39398.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39398", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:24.377", "lastModified": "2024-08-14T13:00:37.107", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Restriction of Excessive Authentication Attempts vulnerability that could result in a security feature bypass. An attacker could exploit this vulnerability to perform brute force attacks and potentially gain unauthorized access to accounts. Exploitation of this issue does not require user interaction, but attack complexity is high."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.2, "impactScore": 5.2}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-307"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39398", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:24.377", "lastModified": "2024-08-14T14:47:10.077", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Restriction of Excessive Authentication Attempts vulnerability that could result in a security feature bypass. An attacker could exploit this vulnerability to perform brute force attacks and potentially gain unauthorized access to accounts. Exploitation of this issue does not require user interaction, but attack complexity is high."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.2, "impactScore": 5.2}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-307"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39399.json b/cve/2024/CVE-2024-39399.json index 3a9616eb440..d05c6abda8e 100644 --- a/cve/2024/CVE-2024-39399.json +++ b/cve/2024/CVE-2024-39399.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39399", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:24.607", "lastModified": "2024-08-14T13:00:37.107", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to arbitrary file system read. A low-privileged attacker could exploit this vulnerability to gain access to files and directories that are outside the restricted directory. Exploitation of this issue does not require user interaction and scope is changed."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.1, "impactScore": 4.0}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-22"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39399", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:24.607", "lastModified": "2024-08-14T14:47:39.603", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to arbitrary file system read. A low-privileged attacker could exploit this vulnerability to gain access to files and directories that are outside the restricted directory. Exploitation of this issue does not require user interaction and scope is changed."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.1, "impactScore": 4.0}, {"source": "psirt@adobe.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.1, "impactScore": 4.0}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-22"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39400.json b/cve/2024/CVE-2024-39400.json index 799e1c5a306..7382abca5bc 100644 --- a/cve/2024/CVE-2024-39400.json +++ b/cve/2024/CVE-2024-39400.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39400", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:24.863", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an admin attacker to inject and execute arbitrary JavaScript code within the context of the user's browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a malicious link. Confidentiality and integrity impact is high as it affects other admin accounts."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.7, "impactScore": 5.8}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39400", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:24.863", "lastModified": "2024-08-14T14:48:01.763", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an admin attacker to inject and execute arbitrary JavaScript code within the context of the user's browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a malicious link. Confidentiality and integrity impact is high as it affects other admin accounts."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.7, "impactScore": 5.8}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39401.json b/cve/2024/CVE-2024-39401.json index bc8ad3efb95..1947ddebac7 100644 --- a/cve/2024/CVE-2024-39401.json +++ b/cve/2024/CVE-2024-39401.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39401", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:25.097", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an admin attacker. Exploitation of this issue requires user interaction and scope is changed."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.7, "impactScore": 6.0}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-78"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39401", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:25.097", "lastModified": "2024-08-14T14:48:25.370", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an admin attacker. Exploitation of this issue requires user interaction and scope is changed."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.7, "impactScore": 6.0}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-78"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39402.json b/cve/2024/CVE-2024-39402.json index 6638040768d..72005e10908 100644 --- a/cve/2024/CVE-2024-39402.json +++ b/cve/2024/CVE-2024-39402.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39402", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:25.317", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an admin attacker. Exploitation of this issue requires user interaction and scope is changed."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.7, "impactScore": 6.0}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-78"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39402", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:25.317", "lastModified": "2024-08-14T14:45:28.210", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an admin attacker. Exploitation of this issue requires user interaction and scope is changed."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.7, "impactScore": 6.0}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-78"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39403.json b/cve/2024/CVE-2024-39403.json index 06e752201f7..5ae9b867d71 100644 --- a/cve/2024/CVE-2024-39403.json +++ b/cve/2024/CVE-2024-39403.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39403", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:25.540", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. Confidentiality impact is high due to the attacker being able to exfiltrate sensitive information."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 7.6, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.3, "impactScore": 4.7}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39403", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:25.540", "lastModified": "2024-08-14T14:45:31.187", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. Confidentiality impact is high due to the attacker being able to exfiltrate sensitive information."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 7.6, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.3, "impactScore": 4.7}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39404.json b/cve/2024/CVE-2024-39404.json index 06583b6167b..cdafdc802fc 100644 --- a/cve/2024/CVE-2024-39404.json +++ b/cve/2024/CVE-2024-39404.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39404", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:25.760", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and modify minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-285"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39404", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:25.760", "lastModified": "2024-08-14T14:44:35.470", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and modify minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-285"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39405.json b/cve/2024/CVE-2024-39405.json index 95325562d0d..c18d8e5b1c9 100644 --- a/cve/2024/CVE-2024-39405.json +++ b/cve/2024/CVE-2024-39405.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39405", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:26.013", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and modify minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-285"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39405", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:26.013", "lastModified": "2024-08-14T14:44:17.217", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and modify minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-285"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39406.json b/cve/2024/CVE-2024-39406.json index e212dbc5e0b..6487c3310e2 100644 --- a/cve/2024/CVE-2024-39406.json +++ b/cve/2024/CVE-2024-39406.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39406", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:26.243", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to arbitrary file system read. An attacker could exploit this vulnerability to gain access to files and directories that are outside the restricted directory. Exploitation of this issue does not require user interaction and scope is changed."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.3, "impactScore": 4.0}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-22"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39406", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:26.243", "lastModified": "2024-08-14T14:43:58.617", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to arbitrary file system read. An attacker could exploit this vulnerability to gain access to files and directories that are outside the restricted directory. Exploitation of this issue does not require user interaction and scope is changed."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.1, "impactScore": 4.0}, {"source": "psirt@adobe.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.3, "impactScore": 4.0}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-22"}]}, {"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-22"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39407.json b/cve/2024/CVE-2024-39407.json index 8ab51ca0ba4..a4cc42e9222 100644 --- a/cve/2024/CVE-2024-39407.json +++ b/cve/2024/CVE-2024-39407.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39407", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:26.483", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and modify minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-285"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39407", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:26.483", "lastModified": "2024-08-14T14:42:50.467", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and modify minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-285"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39408.json b/cve/2024/CVE-2024-39408.json index 72039906df5..ec58cf5f5e4 100644 --- a/cve/2024/CVE-2024-39408.json +++ b/cve/2024/CVE-2024-39408.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39408", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:26.703", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor unauthorised actions on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-352"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39408", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:26.703", "lastModified": "2024-08-14T14:42:31.313", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor unauthorised actions on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.4}, {"source": "psirt@adobe.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-352"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39409.json b/cve/2024/CVE-2024-39409.json index d7b75384c45..13f648b40b3 100644 --- a/cve/2024/CVE-2024-39409.json +++ b/cve/2024/CVE-2024-39409.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39409", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:26.937", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor unauthorised actions on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-352"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39409", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:26.937", "lastModified": "2024-08-14T14:42:10.687", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor unauthorised actions on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.4}, {"source": "psirt@adobe.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-352"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39410.json b/cve/2024/CVE-2024-39410.json index c60aa7499ba..f76d05d3c59 100644 --- a/cve/2024/CVE-2024-39410.json +++ b/cve/2024/CVE-2024-39410.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39410", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:27.177", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor unauthorised actions on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-352"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39410", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:27.177", "lastModified": "2024-08-14T14:41:36.527", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor unauthorised actions on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.1, "impactScore": 3.4}, {"source": "psirt@adobe.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-352"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39411.json b/cve/2024/CVE-2024-39411.json index c995dfc0c7d..481809c6a81 100644 --- a/cve/2024/CVE-2024-39411.json +++ b/cve/2024/CVE-2024-39411.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39411", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:27.407", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-285"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39411", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:27.407", "lastModified": "2024-08-14T14:40:55.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-285"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39412.json b/cve/2024/CVE-2024-39412.json index 484e3845398..2fe134923b2 100644 --- a/cve/2024/CVE-2024-39412.json +++ b/cve/2024/CVE-2024-39412.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39412", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:27.650", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-285"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39412", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:27.650", "lastModified": "2024-08-14T14:45:35.393", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}, {"source": "psirt@adobe.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-285"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39413.json b/cve/2024/CVE-2024-39413.json index c441719e24f..de2d7182b12 100644 --- a/cve/2024/CVE-2024-39413.json +++ b/cve/2024/CVE-2024-39413.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39413", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:27.890", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-285"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39413", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:27.890", "lastModified": "2024-08-14T14:39:39.737", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-285"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39414.json b/cve/2024/CVE-2024-39414.json index 8834364cec6..e25fde34177 100644 --- a/cve/2024/CVE-2024-39414.json +++ b/cve/2024/CVE-2024-39414.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39414", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:28.107", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-284"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39414", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:28.107", "lastModified": "2024-08-14T14:39:26.427", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-284"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39415.json b/cve/2024/CVE-2024-39415.json index d9252b92fa1..cef69ce474d 100644 --- a/cve/2024/CVE-2024-39415.json +++ b/cve/2024/CVE-2024-39415.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39415", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:28.327", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-285"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39415", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:28.327", "lastModified": "2024-08-14T14:34:26.620", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-285"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39416.json b/cve/2024/CVE-2024-39416.json index 5a3584051b2..a38c23354be 100644 --- a/cve/2024/CVE-2024-39416.json +++ b/cve/2024/CVE-2024-39416.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39416", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:28.560", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-285"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39416", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:28.560", "lastModified": "2024-08-14T14:34:23.330", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-285"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39417.json b/cve/2024/CVE-2024-39417.json index 9aecbe153df..73c06c6f338 100644 --- a/cve/2024/CVE-2024-39417.json +++ b/cve/2024/CVE-2024-39417.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39417", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:28.780", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-285"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39417", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:28.780", "lastModified": "2024-08-14T14:33:20.707", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-285"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39418.json b/cve/2024/CVE-2024-39418.json index e08b62e92cd..f482dfa9465 100644 --- a/cve/2024/CVE-2024-39418.json +++ b/cve/2024/CVE-2024-39418.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39418", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:29.010", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures to view and edit low-sensitivity information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 2.5}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-285"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39418", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:29.010", "lastModified": "2024-08-14T14:32:59.893", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures to view and edit low-sensitivity information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 2.5}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-285"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39419.json b/cve/2024/CVE-2024-39419.json index 0a06a58c68c..9f235b6331a 100644 --- a/cve/2024/CVE-2024-39419.json +++ b/cve/2024/CVE-2024-39419.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39419", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:29.283", "lastModified": "2024-08-14T13:00:25.793", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and modify minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-285"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39419", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:29.283", "lastModified": "2024-08-14T14:25:31.337", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and modify minor information. Exploitation of this issue does not require user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-285"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "FCD55BE5-59AF-4C75-9187-A90F23262716"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "2.4.3", "matchCriteriaId": "11A61231-5593-481E-A28C-A68BC6EEC49A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"}, {"vulnerable": true, "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"}]}]}], "references": [{"url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html", "source": "psirt@adobe.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39420.json b/cve/2024/CVE-2024-39420.json new file mode 100644 index 00000000000..e8df11d3db2 --- /dev/null +++ b/cve/2024/CVE-2024-39420.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39420", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:24.960", "lastModified": "2024-08-14T15:15:24.960", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could result in arbitrary code execution in the context of the current user. This issue occurs when the state of a resource changes between its check-time and use-time, allowing an attacker to manipulate the resource. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-367"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39422.json b/cve/2024/CVE-2024-39422.json new file mode 100644 index 00000000000..ee3b1f5ee49 --- /dev/null +++ b/cve/2024/CVE-2024-39422.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39422", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:25.187", "lastModified": "2024-08-14T15:15:25.187", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-416"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39423.json b/cve/2024/CVE-2024-39423.json new file mode 100644 index 00000000000..5cca79f80b1 --- /dev/null +++ b/cve/2024/CVE-2024-39423.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39423", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:25.427", "lastModified": "2024-08-14T15:15:25.427", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39424.json b/cve/2024/CVE-2024-39424.json new file mode 100644 index 00000000000..cd1cfb83462 --- /dev/null +++ b/cve/2024/CVE-2024-39424.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39424", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:25.640", "lastModified": "2024-08-14T15:15:25.640", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-416"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39425.json b/cve/2024/CVE-2024-39425.json new file mode 100644 index 00000000000..c92f87b4b8c --- /dev/null +++ b/cve/2024/CVE-2024-39425.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39425", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:25.883", "lastModified": "2024-08-14T15:15:25.883", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could lead to privilege escalation. Exploitation of this issue require local low-privilege access to the affected system and attack complexity is high."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.0, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-367"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39426.json b/cve/2024/CVE-2024-39426.json new file mode 100644 index 00000000000..8d35c5869cd --- /dev/null +++ b/cve/2024/CVE-2024-39426.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39426", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:26.113", "lastModified": "2024-08-14T15:15:26.113", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39472.json b/cve/2024/CVE-2024-39472.json index 9c5a7528df6..6e42a4d9365 100644 --- a/cve/2024/CVE-2024-39472.json +++ b/cve/2024/CVE-2024-39472.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39472", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-05T07:15:10.020", "lastModified": "2024-07-08T17:12:34.903", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: fix log recovery buffer allocation for the legacy h_size fixup\n\nCommit a70f9fe52daa (\"xfs: detect and handle invalid iclog size set by\nmkfs\") added a fixup for incorrect h_size values used for the initial\numount record in old xfsprogs versions. Later commit 0c771b99d6c9\n(\"xfs: clean up calculation of LR header blocks\") cleaned up the log\nreover buffer calculation, but stoped using the fixed up h_size value\nto size the log recovery buffer, which can lead to an out of bounds\naccess when the incorrect h_size does not come from the old mkfs\ntool, but a fuzzer.\n\nFix this by open coding xlog_logrec_hblks and taking the fixed h_size\ninto account for this calculation."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xfs: corrige la asignaci\u00f3n del b\u00fafer de recuperaci\u00f3n de registros para la correcci\u00f3n heredada de h_size. El commit a70f9fe52daa (\"xfs: detecta y maneja el tama\u00f1o de iclog no v\u00e1lido establecido por mkfs\") agreg\u00f3 una correcci\u00f3n para los valores incorrectos de h_size usados para el registro desmontaje inicial en versiones antiguas de xfsprogs. Posteriormente, el commit 0c771b99d6c9 (\"xfs: c\u00e1lculo de limpieza de bloques de encabezado LR\") limpi\u00f3 el c\u00e1lculo del b\u00fafer de recuperaci\u00f3n de registros, pero dej\u00f3 de usar el valor h_size fijo para dimensionar el b\u00fafer de recuperaci\u00f3n de registros, lo que puede provocar un acceso fuera de los l\u00edmites cuando el h_size incorrecto no proviene de la antigua herramienta mkfs, sino de un fuzzer. Solucione este problema abriendo la codificaci\u00f3n xlog_logrec_hblks y teniendo en cuenta el h_size fijo para este c\u00e1lculo."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-770"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndIncluding": "6.9.3", "matchCriteriaId": "FE25FF84-C614-42A2-B1D1-02DDB269B4FC"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/45cf976008ddef4a9c9a30310c9b4fb2a9a6602a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Mailing List", "Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39472", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-05T07:15:10.020", "lastModified": "2024-08-14T14:15:27.533", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: fix log recovery buffer allocation for the legacy h_size fixup\n\nCommit a70f9fe52daa (\"xfs: detect and handle invalid iclog size set by\nmkfs\") added a fixup for incorrect h_size values used for the initial\numount record in old xfsprogs versions. Later commit 0c771b99d6c9\n(\"xfs: clean up calculation of LR header blocks\") cleaned up the log\nreover buffer calculation, but stoped using the fixed up h_size value\nto size the log recovery buffer, which can lead to an out of bounds\naccess when the incorrect h_size does not come from the old mkfs\ntool, but a fuzzer.\n\nFix this by open coding xlog_logrec_hblks and taking the fixed h_size\ninto account for this calculation."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xfs: corrige la asignaci\u00f3n del b\u00fafer de recuperaci\u00f3n de registros para la correcci\u00f3n heredada de h_size. El commit a70f9fe52daa (\"xfs: detecta y maneja el tama\u00f1o de iclog no v\u00e1lido establecido por mkfs\") agreg\u00f3 una correcci\u00f3n para los valores incorrectos de h_size usados para el registro desmontaje inicial en versiones antiguas de xfsprogs. Posteriormente, el commit 0c771b99d6c9 (\"xfs: c\u00e1lculo de limpieza de bloques de encabezado LR\") limpi\u00f3 el c\u00e1lculo del b\u00fafer de recuperaci\u00f3n de registros, pero dej\u00f3 de usar el valor h_size fijo para dimensionar el b\u00fafer de recuperaci\u00f3n de registros, lo que puede provocar un acceso fuera de los l\u00edmites cuando el h_size incorrecto no proviene de la antigua herramienta mkfs, sino de un fuzzer. Solucione este problema abriendo la codificaci\u00f3n xlog_logrec_hblks y teniendo en cuenta el h_size fijo para este c\u00e1lculo."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-770"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndIncluding": "6.9.3", "matchCriteriaId": "FE25FF84-C614-42A2-B1D1-02DDB269B4FC"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/45cf976008ddef4a9c9a30310c9b4fb2a9a6602a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Mailing List", "Patch"]}, {"url": "https://git.kernel.org/stable/c/57835c0e7152e36b03875dd6c56dfeed685c1b1f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/c2389c074973aa94e34992e7f66dac0de37595b5", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39778.json b/cve/2024/CVE-2024-39778.json new file mode 100644 index 00000000000..e1a0b46e8d7 --- /dev/null +++ b/cve/2024/CVE-2024-39778.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39778", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-08-14T15:15:26.333", "lastModified": "2024-08-14T15:15:26.333", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "When a stateless virtual server is configured on BIG-IP system with a High-Speed Bridge (HSB), undisclosed requests can cause TMM to terminate.\n\n\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."}], "metrics": {"cvssMetricV40": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "LOW", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 8.7, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "f5sirt@f5.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-702"}]}], "references": [{"url": "https://my.f5.com/manage/s/article/K05710614", "source": "f5sirt@f5.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39792.json b/cve/2024/CVE-2024-39792.json new file mode 100644 index 00000000000..afd9dccdbcb --- /dev/null +++ b/cve/2024/CVE-2024-39792.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39792", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-08-14T15:15:26.580", "lastModified": "2024-08-14T15:15:26.580", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "When the NGINX Plus is configured to use the MQTT pre-read module, undisclosed requests can cause an increase in memory resource utilization.\u00a0\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."}], "metrics": {"cvssMetricV40": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 8.7, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "f5sirt@f5.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-825"}]}], "references": [{"url": "https://my.f5.com/manage/s/article/K000140108", "source": "f5sirt@f5.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39809.json b/cve/2024/CVE-2024-39809.json new file mode 100644 index 00000000000..94dcf9e22b9 --- /dev/null +++ b/cve/2024/CVE-2024-39809.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-39809", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-08-14T15:15:26.820", "lastModified": "2024-08-14T15:15:26.820", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Central Manager user session refresh token does not expire when a user logs out.\u00a0\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated"}], "metrics": {"cvssMetricV40": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "NONE", "userInteraction": "ACTIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "HIGH", "subsequentSystemAvailability": "HIGH", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 8.9, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.6, "impactScore": 5.9}]}, "weaknesses": [{"source": "f5sirt@f5.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-613"}]}], "references": [{"url": "https://my.f5.com/manage/s/article/K000140111", "source": "f5sirt@f5.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41042.json b/cve/2024/CVE-2024-41042.json index 3447c20ac73..d97366d0c4f 100644 --- a/cve/2024/CVE-2024-41042.json +++ b/cve/2024/CVE-2024-41042.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-41042", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T15:15:12.647", "lastModified": "2024-07-29T16:21:52.517", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: prefer nft_chain_validate\n\nnft_chain_validate already performs loop detection because a cycle will\nresult in a call stack overflow (ctx->level >= NFT_JUMP_STACK_SIZE).\n\nIt also follows maps via ->validate callback in nft_lookup, so there\nappears no reason to iterate the maps again.\n\nnf_tables_check_loops() and all its helper functions can be removed.\nThis improves ruleset load time significantly, from 23s down to 12s.\n\nThis also fixes a crash bug. Old loop detection code can result in\nunbounded recursion:\n\nBUG: TASK stack guard page was hit at ....\nOops: stack guard page: 0000 [#1] PREEMPT SMP KASAN\nCPU: 4 PID: 1539 Comm: nft Not tainted 6.10.0-rc5+ #1\n[..]\n\nwith a suitable ruleset during validation of register stores.\n\nI can't see any actual reason to attempt to check for this from\nnft_validate_register_store(), at this point the transaction is still in\nprogress, so we don't have a full picture of the rule graph.\n\nFor nf-next it might make sense to either remove it or make this depend\non table->validate_state in case we could catch an error earlier\n(for improved error reporting to userspace)."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/9df785aeb7dcc8efd1d4110bb27d26005298ebae", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/cff3bd012a9512ac5ed858d38e6ed65f6391008c", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-41042", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T15:15:12.647", "lastModified": "2024-08-14T14:15:27.650", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: prefer nft_chain_validate\n\nnft_chain_validate already performs loop detection because a cycle will\nresult in a call stack overflow (ctx->level >= NFT_JUMP_STACK_SIZE).\n\nIt also follows maps via ->validate callback in nft_lookup, so there\nappears no reason to iterate the maps again.\n\nnf_tables_check_loops() and all its helper functions can be removed.\nThis improves ruleset load time significantly, from 23s down to 12s.\n\nThis also fixes a crash bug. Old loop detection code can result in\nunbounded recursion:\n\nBUG: TASK stack guard page was hit at ....\nOops: stack guard page: 0000 [#1] PREEMPT SMP KASAN\nCPU: 4 PID: 1539 Comm: nft Not tainted 6.10.0-rc5+ #1\n[..]\n\nwith a suitable ruleset during validation of register stores.\n\nI can't see any actual reason to attempt to check for this from\nnft_validate_register_store(), at this point the transaction is still in\nprogress, so we don't have a full picture of the rule graph.\n\nFor nf-next it might make sense to either remove it or make this depend\non table->validate_state in case we could catch an error earlier\n(for improved error reporting to userspace)."}, {"lang": "es", "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nf_tables: prefiere nft_chain_validate nft_chain_validate ya realiza detecci\u00f3n de bucle porque un ciclo resultar\u00e1 en un desbordamiento de la pila de llamadas (ctx->level >= NFT_JUMP_STACK_SIZE). Tambi\u00e9n sigue los mapas a trav\u00e9s de ->validate callback en nft_lookup, por lo que no parece haber raz\u00f3n para iterar los mapas nuevamente. nf_tables_check_loops() y todas sus funciones auxiliares se pueden eliminar. Esto mejora significativamente el tiempo de carga del conjunto de reglas, de 23 a 12 segundos. Esto tambi\u00e9n corrige un error de bloqueo. El c\u00f3digo de detecci\u00f3n de bucle antiguo puede provocar una recursividad ilimitada: ERROR: La p\u00e1gina de protecci\u00f3n de pila de TAREA fue visitada en... Vaya: p\u00e1gina de protecci\u00f3n de pila: 0000 [#1] PREEMPT SMP KASAN CPU: 4 PID: 1539 Comm: nft No contaminado 6.10. 0-rc5+ #1 [..] con un conjunto de reglas adecuado durante la validaci\u00f3n de los almacenes de registros. No veo ninguna raz\u00f3n real para intentar verificar esto desde nft_validate_register_store(); en este punto, la transacci\u00f3n a\u00fan est\u00e1 en progreso, por lo que no tenemos una imagen completa del gr\u00e1fico de reglas. Para nf-next, podr\u00eda tener sentido eliminarlo o hacer que esto dependa de table->validate_state en caso de que podamos detectar un error antes (para mejorar el informe de errores al espacio de usuario)."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/717c91c6ed73e248de6a15bc53adefb81446c9d0", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/9df785aeb7dcc8efd1d4110bb27d26005298ebae", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/b6b6e430470e1c3c5513311cb35a15a205595abe", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/cff3bd012a9512ac5ed858d38e6ed65f6391008c", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41164.json b/cve/2024/CVE-2024-41164.json new file mode 100644 index 00000000000..8f9d4dfcccb --- /dev/null +++ b/cve/2024/CVE-2024-41164.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41164", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-08-14T15:15:27.093", "lastModified": "2024-08-14T15:15:27.093", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "When TCP profile with Multipath TCP enabled (MPTCP) is configured on a Virtual Server, undisclosed traffic along with conditions beyond the attackers control can cause TMM to terminate.\n\n \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated."}], "metrics": {"cvssMetricV40": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "LOW", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 8.2, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.2, "impactScore": 3.6}]}, "weaknesses": [{"source": "f5sirt@f5.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-476"}]}], "references": [{"url": "https://my.f5.com/manage/s/article/K000138477", "source": "f5sirt@f5.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41719.json b/cve/2024/CVE-2024-41719.json new file mode 100644 index 00000000000..085c472f3ef --- /dev/null +++ b/cve/2024/CVE-2024-41719.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41719", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-08-14T15:15:27.343", "lastModified": "2024-08-14T15:15:27.343", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "When generating QKView of BIG-IP Next instance from the BIG-IP Next Central Manager (CM), F5 iHealth credentials will be logged in the BIG-IP Central Manager logs.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."}], "metrics": {"cvssMetricV40": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "PASSIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.1, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 0.6, "impactScore": 3.6}]}, "weaknesses": [{"source": "f5sirt@f5.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-532"}]}], "references": [{"url": "https://my.f5.com/manage/s/article/K000140006", "source": "f5sirt@f5.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41723.json b/cve/2024/CVE-2024-41723.json new file mode 100644 index 00000000000..b7948e164f6 --- /dev/null +++ b/cve/2024/CVE-2024-41723.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41723", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-08-14T15:15:27.593", "lastModified": "2024-08-14T15:15:27.593", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Undisclosed requests to BIG-IP iControl REST can lead to information leak of user account names.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."}], "metrics": {"cvssMetricV40": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "f5sirt@f5.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-200"}]}], "references": [{"url": "https://my.f5.com/manage/s/article/K10438187", "source": "f5sirt@f5.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41727.json b/cve/2024/CVE-2024-41727.json new file mode 100644 index 00000000000..8af33024743 --- /dev/null +++ b/cve/2024/CVE-2024-41727.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41727", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-08-14T15:15:27.837", "lastModified": "2024-08-14T15:15:27.837", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "In BIG-IP tenants running on r2000 and r4000 series hardware, or BIG-IP Virtual Edition (VEs) using Intel E810 SR-IOV NIC, undisclosed traffic can cause an increase in memory resource utilization.\u00a0\u00a0\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated."}], "metrics": {"cvssMetricV40": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "LOW", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 8.7, "baseSeverity": "HIGH"}}], "cvssMetricV31": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "f5sirt@f5.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-400"}]}], "references": [{"url": "https://my.f5.com/manage/s/article/K000138833", "source": "f5sirt@f5.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41830.json b/cve/2024/CVE-2024-41830.json new file mode 100644 index 00000000000..4ac2098a936 --- /dev/null +++ b/cve/2024/CVE-2024-41830.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41830", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:28.087", "lastModified": "2024-08-14T15:15:28.087", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-416"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41831.json b/cve/2024/CVE-2024-41831.json new file mode 100644 index 00000000000..d0aaf1daa80 --- /dev/null +++ b/cve/2024/CVE-2024-41831.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41831", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:28.307", "lastModified": "2024-08-14T15:15:28.307", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-416"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41832.json b/cve/2024/CVE-2024-41832.json new file mode 100644 index 00000000000..9c4aeb7141b --- /dev/null +++ b/cve/2024/CVE-2024-41832.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41832", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:28.530", "lastModified": "2024-08-14T15:15:28.530", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41833.json b/cve/2024/CVE-2024-41833.json new file mode 100644 index 00000000000..89502ab8c74 --- /dev/null +++ b/cve/2024/CVE-2024-41833.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41833", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:28.757", "lastModified": "2024-08-14T15:15:28.757", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41834.json b/cve/2024/CVE-2024-41834.json new file mode 100644 index 00000000000..4ab4a8d61e6 --- /dev/null +++ b/cve/2024/CVE-2024-41834.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41834", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:28.983", "lastModified": "2024-08-14T15:15:28.983", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41835.json b/cve/2024/CVE-2024-41835.json new file mode 100644 index 00000000000..96d717bd000 --- /dev/null +++ b/cve/2024/CVE-2024-41835.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41835", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:29.207", "lastModified": "2024-08-14T15:15:29.207", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41840.json b/cve/2024/CVE-2024-41840.json new file mode 100644 index 00000000000..9282f020d6c --- /dev/null +++ b/cve/2024/CVE-2024-41840.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41840", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:29.453", "lastModified": "2024-08-14T15:15:29.453", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Bridge versions 13.0.8, 14.1.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/bridge/apsb24-59.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41850.json b/cve/2024/CVE-2024-41850.json new file mode 100644 index 00000000000..4084f4bb255 --- /dev/null +++ b/cve/2024/CVE-2024-41850.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41850", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:29.667", "lastModified": "2024-08-14T15:15:29.667", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-122"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41851.json b/cve/2024/CVE-2024-41851.json new file mode 100644 index 00000000000..2044472d54c --- /dev/null +++ b/cve/2024/CVE-2024-41851.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41851", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:29.917", "lastModified": "2024-08-14T15:15:29.917", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-190"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41852.json b/cve/2024/CVE-2024-41852.json new file mode 100644 index 00000000000..0c868e77264 --- /dev/null +++ b/cve/2024/CVE-2024-41852.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41852", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:30.160", "lastModified": "2024-08-14T15:15:30.160", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-121"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41853.json b/cve/2024/CVE-2024-41853.json new file mode 100644 index 00000000000..089133182df --- /dev/null +++ b/cve/2024/CVE-2024-41853.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41853", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:30.380", "lastModified": "2024-08-14T15:15:30.380", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-122"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41854.json b/cve/2024/CVE-2024-41854.json new file mode 100644 index 00000000000..b1787a6fbb6 --- /dev/null +++ b/cve/2024/CVE-2024-41854.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41854", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:30.613", "lastModified": "2024-08-14T15:15:30.613", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41856.json b/cve/2024/CVE-2024-41856.json new file mode 100644 index 00000000000..d4430dc6b09 --- /dev/null +++ b/cve/2024/CVE-2024-41856.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41856", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:30.833", "lastModified": "2024-08-14T15:15:30.833", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Illustrator versions 28.5, 27.9.4 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-20"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/illustrator/apsb24-45.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41865.json b/cve/2024/CVE-2024-41865.json new file mode 100644 index 00000000000..4f4ca946511 --- /dev/null +++ b/cve/2024/CVE-2024-41865.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41865", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:31.227", "lastModified": "2024-08-14T15:15:31.227", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dimension versions 3.4.11 and earlier are affected by an Untrusted Search Path vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by inserting a malicious file into the search path, which the application might execute instead of the legitimate file. This could occur if the application uses a search path to locate executables or libraries. Exploitation of this issue requires user interaction."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-426"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/dimension/apsb24-47.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41866.json b/cve/2024/CVE-2024-41866.json new file mode 100644 index 00000000000..45323927062 --- /dev/null +++ b/cve/2024/CVE-2024-41866.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-41866", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:31.460", "lastModified": "2024-08-14T15:15:31.460", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service (DoS). An attacker could exploit this vulnerability to crash the application, resulting in a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}], "metrics": {"cvssMetricV31": [{"source": "psirt@adobe.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "psirt@adobe.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}], "references": [{"url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", "source": "psirt@adobe.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-42258.json b/cve/2024/CVE-2024-42258.json index 87af886b9a4..0787e28f5dd 100644 --- a/cve/2024/CVE-2024-42258.json +++ b/cve/2024/CVE-2024-42258.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-42258", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-12T15:15:20.983", "lastModified": "2024-08-13T17:17:22.600", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machines\n\nYves-Alexis Perez reported commit 4ef9ad19e176 (\"mm: huge_memory: don't\nforce huge page alignment on 32 bit\") didn't work for x86_32 [1]. It is\nbecause x86_32 uses CONFIG_X86_32 instead of CONFIG_32BIT.\n\n!CONFIG_64BIT should cover all 32 bit machines.\n\n[1] https://lore.kernel.org/linux-mm/CAHbLzkr1LwH3pcTgM+aGQ31ip2bKqiqEQ8=FQB+t2c3dhNKNHA@mail.gmail.com/"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: enorme_memoria: use! CONFIG_64BIT para relajar la alineaci\u00f3n de p\u00e1ginas enormes en m\u00e1quinas de 32 bits Yves-Alexis Perez inform\u00f3 el commit 4ef9ad19e176 (\"mm: memoria_enorme: no fuerce la alineaci\u00f3n de p\u00e1ginas enormes en 32 bit\") no funcion\u00f3 para x86_32 [1]. Es porque x86_32 usa CONFIG_X86_32 en lugar de CONFIG_32BIT. !CONFIG_64BIT deber\u00eda cubrir todas las m\u00e1quinas de 32 bits. [1] https://lore.kernel.org/linux-mm/CAHbLzkr1LwH3pcTgM+aGQ31ip2bKqiqEQ8=FQB+t2c3dhNKNHA@mail.gmail.com/"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-770"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.8", "versionEndExcluding": "6.10.3", "matchCriteriaId": "38E515B9-DAD5-4A5A-9C4C-1B6873D3185A"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/7e1f4efb8d6140b2ec79bf760c43e1fc186e8dfc", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/d9592025000b3cf26c742f3505da7b83aedc26d5", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-42258", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-12T15:15:20.983", "lastModified": "2024-08-14T14:15:27.727", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machines\n\nYves-Alexis Perez reported commit 4ef9ad19e176 (\"mm: huge_memory: don't\nforce huge page alignment on 32 bit\") didn't work for x86_32 [1]. It is\nbecause x86_32 uses CONFIG_X86_32 instead of CONFIG_32BIT.\n\n!CONFIG_64BIT should cover all 32 bit machines.\n\n[1] https://lore.kernel.org/linux-mm/CAHbLzkr1LwH3pcTgM+aGQ31ip2bKqiqEQ8=FQB+t2c3dhNKNHA@mail.gmail.com/"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: enorme_memoria: use! CONFIG_64BIT para relajar la alineaci\u00f3n de p\u00e1ginas enormes en m\u00e1quinas de 32 bits Yves-Alexis Perez inform\u00f3 el commit 4ef9ad19e176 (\"mm: memoria_enorme: no fuerce la alineaci\u00f3n de p\u00e1ginas enormes en 32 bit\") no funcion\u00f3 para x86_32 [1]. Es porque x86_32 usa CONFIG_X86_32 en lugar de CONFIG_32BIT. !CONFIG_64BIT deber\u00eda cubrir todas las m\u00e1quinas de 32 bits. [1] https://lore.kernel.org/linux-mm/CAHbLzkr1LwH3pcTgM+aGQ31ip2bKqiqEQ8=FQB+t2c3dhNKNHA@mail.gmail.com/"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-770"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.8", "versionEndExcluding": "6.10.3", "matchCriteriaId": "38E515B9-DAD5-4A5A-9C4C-1B6873D3185A"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/7e1f4efb8d6140b2ec79bf760c43e1fc186e8dfc", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/89f2914dd4b47d2fad3deef0d700f9526d98d11f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/a5c399fe433a115e9d3693169b5f357f3194af0a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/d9592025000b3cf26c742f3505da7b83aedc26d5", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-42259.json b/cve/2024/CVE-2024-42259.json new file mode 100644 index 00000000000..1e428c5600a --- /dev/null +++ b/cve/2024/CVE-2024-42259.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-42259", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-14T15:15:31.673", "lastModified": "2024-08-14T15:15:31.673", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/gem: Fix Virtual Memory mapping boundaries calculation\n\nCalculating the size of the mapped area as the lesser value\nbetween the requested size and the actual size does not consider\nthe partial mapping offset. This can cause page fault access.\n\nFix the calculation of the starting and ending addresses, the\ntotal size is now deduced from the difference between the end and\nstart addresses.\n\nAdditionally, the calculations have been rewritten in a clearer\nand more understandable form.\n\n[Joonas: Add Requires: tag]\nRequires: 60a2066c5005 (\"drm/i915/gem: Adjust vma offset for framebuffer mmap offset\")\n(cherry picked from commit 97b6784753da06d9d40232328efc5c5367e53417)"}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/4b09513ce93b3dcb590baaaff2ce96f2d098312d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/8bdd9ef7e9b1b2a73e394712b72b22055e0e26c3", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/ead9289a51ea82eb5b27029fcf4c34b2dd60cf06", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-42739.json b/cve/2024/CVE-2024-42739.json index 18991acb78f..ec75a52bce3 100644 --- a/cve/2024/CVE-2024-42739.json +++ b/cve/2024/CVE-2024-42739.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-42739", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-13T14:15:13.940", "lastModified": "2024-08-13T17:36:32.647", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setAccessDeviceCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-78"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6369_b20230113:*:*:*:*:*:*:*", "matchCriteriaId": "FAA27C60-0FFD-45E3-91B1-0C2F8EBF2442"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591"}]}]}], "references": [{"url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/setAccessDeviceCfg/setAccessDeviceCfg.md", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-42739", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-13T14:15:13.940", "lastModified": "2024-08-14T15:35:13.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setAccessDeviceCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands."}, {"lang": "es", "value": "En TOTOLINK X5000r v9.1.0cu.2350_b20230313, el archivo /cgi-bin/cstecgi.cgi contiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en setAccessDeviceCfg. Los atacantes autenticados pueden enviar paquetes maliciosos para ejecutar comandos arbitrarios."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-78"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6369_b20230113:*:*:*:*:*:*:*", "matchCriteriaId": "FAA27C60-0FFD-45E3-91B1-0C2F8EBF2442"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591"}]}]}], "references": [{"url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/setAccessDeviceCfg/setAccessDeviceCfg.md", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-5894.json b/cve/2024/CVE-2024-5894.json index 5c580e5d249..4dc141f850e 100644 --- a/cve/2024/CVE-2024-5894.json +++ b/cve/2024/CVE-2024-5894.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-5894", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-12T15:15:53.693", "lastModified": "2024-06-13T18:36:09.010", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. This vulnerability affects unknown code of the file manage_product.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-268138 is the identifier assigned to this vulnerability."}, {"lang": "es", "value": "Una vulnerabilidad fue encontrada en SourceCodester Online Eyewear Shop 1.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo enable_product.php. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-268138 es el identificador asignado a esta vulnerabilidad."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5}, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://github.com/Hefei-Coffee/cve/blob/main/sql10.md", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.268138", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.268138", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.354912", "source": "cna@vuldb.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-5894", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-12T15:15:53.693", "lastModified": "2024-08-14T14:05:24.070", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. This vulnerability affects unknown code of the file manage_product.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-268138 is the identifier assigned to this vulnerability."}, {"lang": "es", "value": "Una vulnerabilidad fue encontrada en SourceCodester Online Eyewear Shop 1.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo enable_product.php. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-268138 es el identificador asignado a esta vulnerabilidad."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5}, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:oretnom23:online_eyewear_shop:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "464A3580-D632-43EB-93EF-E2A1A5736F14"}]}]}], "references": [{"url": "https://github.com/Hefei-Coffee/cve/blob/main/sql10.md", "source": "cna@vuldb.com", "tags": ["Exploit"]}, {"url": "https://vuldb.com/?ctiid.268138", "source": "cna@vuldb.com", "tags": ["Permissions Required", "Third Party Advisory"]}, {"url": "https://vuldb.com/?id.268138", "source": "cna@vuldb.com", "tags": ["Third Party Advisory"]}, {"url": "https://vuldb.com/?submit.354912", "source": "cna@vuldb.com", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-5895.json b/cve/2024/CVE-2024-5895.json index 0f45abd5d05..83e308c7b70 100644 --- a/cve/2024/CVE-2024-5895.json +++ b/cve/2024/CVE-2024-5895.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-5895", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-12T15:15:53.970", "lastModified": "2024-06-13T18:36:09.010", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. This issue affects the function delete_users of the file /classes/Users.php?f=delete. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268139."}, {"lang": "es", "value": "Una vulnerabilidad fue encontrada en SourceCodester Employee and Visitor Gate Pass Logging System 1.0 y clasificada como cr\u00edtica. Este problema afecta la funci\u00f3n eliminar_usuarios del archivo /classes/Users.php?f=delete. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-268139."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.5}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://github.com/Hefei-Coffee/cve/blob/main/sql11.md", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.268139", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.268139", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.354915", "source": "cna@vuldb.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-5895", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-12T15:15:53.970", "lastModified": "2024-08-14T15:12:22.450", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. This issue affects the function delete_users of the file /classes/Users.php?f=delete. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268139."}, {"lang": "es", "value": "Una vulnerabilidad fue encontrada en SourceCodester Employee and Visitor Gate Pass Logging System 1.0 y clasificada como cr\u00edtica. Este problema afecta la funci\u00f3n eliminar_usuarios del archivo /classes/Users.php?f=delete. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-268139."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.5}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E79823D1-656B-47ED-B919-817CF98B423B"}]}]}], "references": [{"url": "https://github.com/Hefei-Coffee/cve/blob/main/sql11.md", "source": "cna@vuldb.com", "tags": ["Exploit"]}, {"url": "https://vuldb.com/?ctiid.268139", "source": "cna@vuldb.com", "tags": ["Permissions Required", "Third Party Advisory"]}, {"url": "https://vuldb.com/?id.268139", "source": "cna@vuldb.com", "tags": ["Third Party Advisory"]}, {"url": "https://vuldb.com/?submit.354915", "source": "cna@vuldb.com", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-6123.json b/cve/2024/CVE-2024-6123.json index ce633e8241a..1f9caa318e4 100644 --- a/cve/2024/CVE-2024-6123.json +++ b/cve/2024/CVE-2024-6123.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-6123", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T08:15:10.983", "lastModified": "2024-07-09T18:19:14.047", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Bit Form plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'iconUpload' function in all versions up to, and including, 2.12.2. This makes it possible for authenticated attackers, with administrator-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible."}, {"lang": "es", "value": " El complemento Bit Form para WordPress es vulnerable a cargas de archivos arbitrarias debido a la falta de validaci\u00f3n del tipo de archivo en la funci\u00f3n 'iconUpload' en todas las versiones hasta la 2.12.2 incluida. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo."}], "metrics": {"cvssMetricV31": [{"source": "security@wordfence.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}]}, "references": [{"url": "https://plugins.trac.wordpress.org/browser/bit-form/tags/2.12.2/includes/Admin/AdminAjax.php#L1176", "source": "security@wordfence.com"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d1b255f-d775-4bd5-892e-42bf82dd5632?source=cve", "source": "security@wordfence.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-6123", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T08:15:10.983", "lastModified": "2024-08-14T14:15:27.870", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Bit Form plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'iconUpload' function in all versions up to, and including, 2.13.3. This makes it possible for authenticated attackers, with administrator-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible."}, {"lang": "es", "value": " El complemento Bit Form para WordPress es vulnerable a cargas de archivos arbitrarias debido a la falta de validaci\u00f3n del tipo de archivo en la funci\u00f3n 'iconUpload' en todas las versiones hasta la 2.12.2 incluida. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo."}], "metrics": {"cvssMetricV31": [{"source": "security@wordfence.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}]}, "weaknesses": [{"source": "security@wordfence.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-434"}]}], "references": [{"url": "https://plugins.trac.wordpress.org/browser/bit-form/tags/2.12.2/includes/Admin/AdminAjax.php#L1176", "source": "security@wordfence.com"}, {"url": "https://plugins.trac.wordpress.org/changeset/3114814/bit-form/trunk/includes/Admin/AdminAjax.php", "source": "security@wordfence.com"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d1b255f-d775-4bd5-892e-42bf82dd5632?source=cve", "source": "security@wordfence.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-7347.json b/cve/2024/CVE-2024-7347.json new file mode 100644 index 00000000000..da2b3e13c07 --- /dev/null +++ b/cve/2024/CVE-2024-7347.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-7347", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-08-14T15:15:31.870", "lastModified": "2024-08-14T15:15:31.870", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."}], "metrics": {"cvssMetricV40": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "LOCAL", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "baseScore": 5.7, "baseSeverity": "MEDIUM"}}], "cvssMetricV31": [{"source": "f5sirt@f5.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.0, "impactScore": 3.6}]}, "weaknesses": [{"source": "f5sirt@f5.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-126"}]}], "references": [{"url": "https://my.f5.com/manage/s/article/K000140529", "source": "f5sirt@f5.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-7790.json b/cve/2024/CVE-2024-7790.json new file mode 100644 index 00000000000..7230f4617ee --- /dev/null +++ b/cve/2024/CVE-2024-7790.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-7790", "sourceIdentifier": "vulnreport@tenable.com", "published": "2024-08-14T14:15:28.190", "lastModified": "2024-08-14T14:15:28.190", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A stored cross site scripting vulnerabilities exists in DevikaAI from commit\u00a06acce21fb08c3d1123ef05df6a33912bf0ee77c2 onwards via improperly decoded user input."}], "metrics": {"cvssMetricV31": [{"source": "vulnreport@tenable.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 3.9, "impactScore": 2.5}]}, "references": [{"url": "https://www.tenable.com/security/research/tra-2024-31", "source": "vulnreport@tenable.com"}]}} \ No newline at end of file diff --git a/syncdate.json b/syncdate.json index 770ec33fb95..22f80aa1b55 100644 --- a/syncdate.json +++ b/syncdate.json @@ -1 +1 @@ -{"lastModStartDate": "2024-08-14T12:02:45.606129+00:00", "lastModEndDate": "2024-08-14T14:02:37.131848+00:00"} \ No newline at end of file +{"lastModStartDate": "2024-08-14T14:02:37.131848+00:00", "lastModEndDate": "2024-08-14T16:03:04.373857+00:00"} \ No newline at end of file