Auto-Update: 2025-04-17T18:00:20.440624+00:00

This commit is contained in:
cad-safe-bot 2025-04-17 18:03:53 +00:00
parent abb949d122
commit e964f1a0e4
363 changed files with 16322 additions and 654 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-1999-0236",
"sourceIdentifier": "cve@mitre.org",
"published": "1997-01-01T05:00:00.000",
"lastModified": "2025-04-03T01:03:51.193",
"vulnStatus": "Deferred",
"lastModified": "2025-04-17T17:14:30.760",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -67,7 +67,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "NVD-CWE-noinfo"
}
]
}
@ -81,8 +81,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D623D8C0-65D2-4269-A1D4-5CB3899F44C8"
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0",
"matchCriteriaId": "9A453C77-BCCD-4BE2-BE55-FE5E21F9EEBF"
},
{
"vulnerable": true,
@ -97,11 +98,17 @@
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0236",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0236",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-26630",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-10T09:15:43.953",
"lastModified": "2024-11-21T05:20:10.273",
"lastModified": "2025-04-17T16:15:20.770",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-6998",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-07-27T21:15:08.297",
"lastModified": "2024-11-21T05:36:27.750",
"lastModified": "2025-04-17T16:15:21.730",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-22640",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-07-28T15:15:07.193",
"lastModified": "2024-11-21T05:50:22.060",
"lastModified": "2025-04-17T16:15:21.933",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -73,6 +73,16 @@
"value": "CWE-307"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-22642",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-07-28T15:15:07.257",
"lastModified": "2024-11-21T05:50:22.347",
"lastModified": "2025-04-17T16:15:22.093",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-400"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-22644",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-07-28T15:15:07.310",
"lastModified": "2024-11-21T05:50:22.600",
"lastModified": "2025-04-17T16:15:22.230",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-798"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-321"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-22646",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-07-28T15:15:07.367",
"lastModified": "2024-11-21T05:50:22.847",
"lastModified": "2025-04-17T16:15:22.370",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-22648",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-07-28T15:15:07.420",
"lastModified": "2024-11-21T05:50:23.107",
"lastModified": "2025-04-17T16:15:22.503",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-732"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-22650",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-07-28T15:15:07.477",
"lastModified": "2024-11-21T05:50:23.373",
"lastModified": "2025-04-17T16:15:22.643",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-23"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-26264",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-01-28T20:15:10.927",
"lastModified": "2024-11-21T05:56:00.323",
"lastModified": "2025-04-17T16:15:22.780",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -94,6 +94,16 @@
"value": "CWE-306"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-27493",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-04-01T23:15:09.207",
"lastModified": "2024-11-21T05:58:06.113",
"lastModified": "2025-04-17T16:15:22.950",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -94,6 +94,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-707"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-27497",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-04-01T23:15:09.267",
"lastModified": "2024-11-21T05:58:06.597",
"lastModified": "2025-04-17T16:15:23.113",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -94,6 +94,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-28655",
"sourceIdentifier": "security@apache.org",
"published": "2022-12-16T13:15:08.723",
"lastModified": "2024-11-21T06:00:02.277",
"lastModified": "2025-04-17T16:15:23.250",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,13 +36,33 @@
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-32960",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-04-01T23:15:09.817",
"lastModified": "2024-11-21T06:08:00.637",
"lastModified": "2025-04-17T16:15:23.433",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -94,6 +94,16 @@
"value": "CWE-863"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-34527",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-07-02T22:15:08.757",
"lastModified": "2025-04-16T16:15:18.007",
"vulnStatus": "Modified",
"lastModified": "2025-04-17T17:59:06.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -258,11 +258,19 @@
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2021-34527-printnightmare-detection-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2021-34527-printnightmare-mitigation-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-38410",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-07-27T21:15:08.523",
"lastModified": "2024-11-21T06:17:01.790",
"lastModified": "2025-04-17T16:15:23.570",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-427"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-38417",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-07-27T21:15:08.577",
"lastModified": "2024-11-21T06:17:02.813",
"lastModified": "2025-04-17T16:15:23.727",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-42535",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-07-27T21:15:08.633",
"lastModified": "2024-11-21T06:27:45.453",
"lastModified": "2025-04-17T16:15:23.857",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-42537",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-07-27T21:15:08.687",
"lastModified": "2024-11-21T06:27:45.703",
"lastModified": "2025-04-17T16:15:23.990",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-611"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-44463",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-01-28T20:15:12.137",
"lastModified": "2024-11-21T06:31:01.623",
"lastModified": "2025-04-17T16:15:24.120",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -94,6 +94,16 @@
"value": "CWE-427"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1059",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-10-21T16:15:10.527",
"lastModified": "2024-11-21T06:39:57.217",
"lastModified": "2025-04-17T16:15:24.267",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1066",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-10-21T16:15:10.597",
"lastModified": "2024-11-21T06:39:57.923",
"lastModified": "2025-04-17T16:15:24.417",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1070",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-10-21T16:15:10.673",
"lastModified": "2024-11-21T06:39:58.407",
"lastModified": "2025-04-17T16:15:24.543",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,20 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-26423",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-10-21T16:15:10.727",
"lastModified": "2024-11-21T06:53:55.210",
"lastModified": "2025-04-17T16:15:24.677",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,20 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-27494",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-10-21T16:15:10.783",
"lastModified": "2024-11-21T06:55:50.290",
"lastModified": "2025-04-17T16:15:24.810",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-38659",
"sourceIdentifier": "psirt@hcl.com",
"published": "2022-12-19T11:15:10.330",
"lastModified": "2024-11-21T07:16:52.910",
"lastModified": "2025-04-17T16:15:24.940",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-326"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-326"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-40434",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-19T22:15:11.020",
"lastModified": "2024-11-21T07:21:24.060",
"lastModified": "2025-04-17T16:15:25.137",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-42544",
"sourceIdentifier": "security@android.com",
"published": "2022-12-16T16:15:24.227",
"lastModified": "2024-11-21T07:25:10.607",
"lastModified": "2025-04-17T16:15:25.493",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-74"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-42839",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:47.330",
"lastModified": "2024-11-21T07:25:26.900",
"lastModified": "2025-04-17T16:15:25.663",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-44750",
"sourceIdentifier": "psirt@hcl.com",
"published": "2022-12-19T11:15:10.807",
"lastModified": "2024-11-21T07:28:25.523",
"lastModified": "2025-04-17T16:15:25.840",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-44752",
"sourceIdentifier": "psirt@hcl.com",
"published": "2022-12-19T11:15:10.950",
"lastModified": "2024-11-21T07:28:25.810",
"lastModified": "2025-04-17T16:15:25.970",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-44754",
"sourceIdentifier": "psirt@hcl.com",
"published": "2022-12-19T11:15:11.070",
"lastModified": "2024-11-21T07:28:26.060",
"lastModified": "2025-04-17T16:15:26.100",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46870",
"sourceIdentifier": "security@apache.org",
"published": "2022-12-16T13:15:09.103",
"lastModified": "2024-11-21T07:31:12.807",
"lastModified": "2025-04-17T16:15:26.343",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,13 +36,33 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32378",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:47.943",
"lastModified": "2024-11-21T08:03:14.050",
"lastModified": "2025-04-17T16:15:26.570",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42225",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:10.493",
"lastModified": "2025-01-23T18:15:28.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:43:15.710",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.0.33",
"matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42226",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:10.620",
"lastModified": "2025-01-23T18:15:28.997",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:43:43.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.0.33",
"matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42227",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:10.770",
"lastModified": "2025-01-23T18:15:29.260",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:43:48.100",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.0.33",
"matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42228",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:10.887",
"lastModified": "2025-01-23T18:15:29.450",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:43:54.063",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.0.33",
"matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42229",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:10.993",
"lastModified": "2025-01-23T18:15:29.657",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:43:58.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.0.33",
"matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42230",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:11.110",
"lastModified": "2025-01-14T15:15:11.633",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:44:01.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.0.33",
"matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42231",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:11.233",
"lastModified": "2025-01-23T17:15:12.523",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:44:04.820",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.0.33",
"matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42232",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:11.353",
"lastModified": "2025-01-23T17:15:12.693",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:44:08.917",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.0.33",
"matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42233",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:11.480",
"lastModified": "2025-01-14T15:15:12.000",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:44:11.843",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.0.33",
"matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42234",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:11.593",
"lastModified": "2025-02-03T14:15:36.287",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:44:15.430",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.0.33",
"matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42235",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:11.717",
"lastModified": "2025-01-31T19:15:15.320",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:35:22.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.42.2",
"matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42236",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:11.830",
"lastModified": "2025-01-31T19:15:15.497",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:35:10.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.42.2",
"matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42237",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:11.953",
"lastModified": "2025-01-31T19:15:15.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:35:07.840",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.42.2",
"matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42238",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:12.080",
"lastModified": "2025-01-31T19:15:15.837",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:35:05.157",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.42.2",
"matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42239",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:12.197",
"lastModified": "2025-01-31T19:15:16.003",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:35:01.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.42.2",
"matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42240",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:12.327",
"lastModified": "2025-01-31T19:15:16.180",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:34:58.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.42.2",
"matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42241",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:12.450",
"lastModified": "2025-01-31T19:15:16.347",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:34:55.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.42.2",
"matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42242",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:12.583",
"lastModified": "2025-01-31T19:15:16.510",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:34:52.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.42.2",
"matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42243",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:12.690",
"lastModified": "2025-01-31T19:15:16.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:34:49.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.42.2",
"matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42244",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:12.810",
"lastModified": "2025-01-14T17:15:11.847",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:34:45.740",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.42.2",
"matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42245",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:12.950",
"lastModified": "2025-01-14T15:15:12.170",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:34:42.030",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.42.2",
"matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42246",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:13.057",
"lastModified": "2025-01-14T15:15:12.317",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:34:38.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.42.2",
"matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42247",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:13.177",
"lastModified": "2025-01-14T15:15:12.470",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:34:34.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.42.2",
"matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42248",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:13.293",
"lastModified": "2025-01-31T17:15:11.570",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:34:29.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.42.2",
"matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42249",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:13.413",
"lastModified": "2025-01-14T15:15:12.610",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:34:22.640",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.42.2",
"matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42250",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:13.557",
"lastModified": "2025-01-14T15:15:12.760",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:34:15.420",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.42.2",
"matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51339",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T19:15:11.510",
"lastModified": "2025-02-21T18:15:15.993",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:59:04.733",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpjabbers:event_ticketing_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C2D66142-CE36-42B4-8198-4487F8604086"
}
]
}
]
}
],
"references": [
{
"url": "https://packetstorm.news/files/id/176519",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"VDB Entry"
]
},
{
"url": "https://www.phpjabbers.com/event-ticketing-system/#sectionDemo",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51959",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-10T15:15:09.347",
"lastModified": "2024-11-21T08:38:59.080",
"lastModified": "2025-04-17T16:15:26.863",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51962",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-10T16:15:49.763",
"lastModified": "2024-11-21T08:38:59.613",
"lastModified": "2025-04-17T16:15:27.027",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11924",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-04-17T06:15:42.460",
"lastModified": "2025-04-17T06:15:42.460",
"lastModified": "2025-04-17T16:15:27.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "The Icegram Express formerly known as Email Subscribers WordPress plugin before 5.7.52 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/70288369-132d-4211-bca0-0411736df747/",

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-12530",
"sourceIdentifier": "security@opentext.com",
"published": "2025-04-17T16:15:27.360",
"lastModified": "2025-04-17T16:15:27.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled Search Path Element vulnerability in OpenText Secure Content Manager on Windows allows DLL Side-Loading.This issue affects Secure Content Manager: 23.4.\n\nEnd-users can potentially exploit the vulnerability to execute malicious code in the trusted context of the thick-client application."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@opentext.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security@opentext.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"references": [
{
"url": "https://portal.microfocus.com/s/article/KM000040073?",
"source": "security@opentext.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20010",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-02-05T06:15:47.387",
"lastModified": "2024-11-21T08:51:47.437",
"lastModified": "2025-04-17T16:15:27.490",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-843"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25517",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T15:15:07.843",
"lastModified": "2024-11-21T09:00:54.813",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:20:09.337",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#mfaspx",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#mfaspx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25518",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T15:15:07.903",
"lastModified": "2024-11-21T09:00:55.037",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:20:04.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_get_fields_approveaspx",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_get_fields_approveaspx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25519",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T15:15:07.960",
"lastModified": "2024-11-21T09:00:55.263",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:20:01.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_printaspx",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_printaspx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25520",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T15:15:08.017",
"lastModified": "2024-11-21T09:00:55.510",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:19:58.233",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#sys_blogtemplate_newaspx",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#sys_blogtemplate_newaspx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25521",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T15:15:08.073",
"lastModified": "2024-11-21T09:00:55.743",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:19:53.447",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_companyaspx",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_companyaspx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25522",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T15:15:08.130",
"lastModified": "2024-11-21T09:00:55.970",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:19:48.983",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_form_saveaspx",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_form_saveaspx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25523",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T15:15:08.183",
"lastModified": "2024-11-21T09:00:56.200",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:19:45.957",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#file_memoaspx",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#file_memoaspx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25524",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T15:15:08.253",
"lastModified": "2024-11-21T09:00:56.413",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:19:41.527",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#workplanattachdownloadaspx",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#workplanattachdownloadaspx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25525",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T15:15:08.310",
"lastModified": "2024-11-21T09:00:56.637",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:19:08.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#officefiledownloadaspx",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#officefiledownloadaspx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25526",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T15:15:08.367",
"lastModified": "2024-11-21T09:00:56.860",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:19:03.610",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#pm_gatt_incaspx",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#pm_gatt_incaspx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25527",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T16:15:08.503",
"lastModified": "2025-03-13T19:15:43.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:18:59.457",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#worklog_template_showaspx",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#worklog_template_showaspx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25528",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T17:15:07.513",
"lastModified": "2024-11-21T09:00:57.247",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:18:09.550",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_stat_settingaspx",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_stat_settingaspx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25529",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T16:15:08.570",
"lastModified": "2024-11-21T09:00:57.463",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:18:30.693",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_office_file_history_showaspx",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_office_file_history_showaspx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25530",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T16:15:08.623",
"lastModified": "2024-11-21T09:00:57.667",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:18:25.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_find_condictionaspx",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_find_condictionaspx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25531",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T16:15:08.680",
"lastModified": "2024-11-21T09:00:57.887",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:18:14.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#searchcondictionaspx",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#searchcondictionaspx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25532",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T17:15:07.567",
"lastModified": "2024-11-21T09:00:58.100",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:18:02.440",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_dictaspx",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_dictaspx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25533",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T17:15:07.620",
"lastModified": "2024-11-21T09:00:58.313",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T17:17:52.013",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*",
"matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#information-leakage-and-unauthorized-access-to-sensitive-data",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#information-leakage-and-unauthorized-access-to-sensitive-data",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-40124",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-17T17:15:31.853",
"lastModified": "2025-04-17T17:15:31.853",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Pydio Core <= 8.2.5 is vulnerable to Cross Site Scripting (XSS) via the New URL Bookmark feature."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/Xib3rR4dAr/711195d5793bfbb4364dc179ecaae25d",
"source": "cve@mitre.org"
},
{
"url": "https://pydio.com/en/community/releases/pydio-core/pydio-core-pydio-enterprise-825-hotfix-824",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41049",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-29T15:15:13.177",
"lastModified": "2024-11-21T09:32:08.363",
"vulnStatus": "Modified",
"lastModified": "2025-04-17T17:33:03.630",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -22,11 +22,11 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
@ -34,7 +34,7 @@
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42094",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-29T18:15:11.917",
"lastModified": "2024-11-21T09:33:35.180",
"vulnStatus": "Modified",
"lastModified": "2025-04-17T16:56:56.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -22,8 +22,8 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
@ -31,11 +31,11 @@
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
"impactScore": 5.2
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42108",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:03.333",
"lastModified": "2024-12-19T19:15:07.023",
"vulnStatus": "Modified",
"lastModified": "2025-04-17T16:56:53.877",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -22,20 +22,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
"impactScore": 3.6
}
]
},
@ -73,7 +73,10 @@
"references": [
{
"url": "https://git.kernel.org/stable/c/4a41bb9f2b402469d425a1c13359d3b3ea4e6403",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/92cbbe7759193e3418f38d0d73f8fe125312c58b",

View File

@ -0,0 +1,52 @@
{
"id": "CVE-2024-55238",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-17T16:15:27.780",
"lastModified": "2025-04-17T16:15:27.780",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenMetadata <=1.4.1 is vulnerable to SQL Injection. An attacker can extract information from the database in function listCount in the WorkflowDAO interface. The workflowtype and status parameters can be used to build a SQL query."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"references": [
{
"url": "https://gist.github.com/javadk/68c597cdb94768dab31a3219c2ad9904",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/open-metadata/OpenMetadata/blob/98945cb2db87ebb325d3a72131f049abffcba345/openmetadata-service/src/main/java/org/openmetadata/service/jdbi3/CollectionDAO.java#L4243",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/open-metadata/OpenMetadata/blob/98945cb2db87ebb325d3a72131f049abffcba345/openmetadata-service/src/main/java/org/openmetadata/service/jdbi3/CollectionDAO.java#L4247",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-56518",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-17T16:15:27.900",
"lastModified": "2025-04-17T16:15:27.900",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hazelcast Management Center through 6.0 allows remote code execution via a JndiLoginModule user.provider.url in a hazelcast-client XML document (aka a client configuration file), which can be uploaded at the /cluster-connections URI."
}
],
"metrics": {},
"references": [
{
"url": "https://docs.hazelcast.com/management-center/6.0-snapshot/getting-started/install",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/azraelxuemo/c3d42739aa3306a41111ef603dc65b4c",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57635",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T01:15:12.047",
"lastModified": "2025-01-14T16:15:33.743",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:47:59.290",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openlink/virtuoso-opensource/issues/1182",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57636",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T01:15:12.167",
"lastModified": "2025-01-14T16:15:33.907",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:47:56.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openlink/virtuoso-opensource/issues/1194",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57637",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T01:15:12.280",
"lastModified": "2025-01-14T16:15:34.070",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:47:53.007",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openlink/virtuoso-opensource/issues/1192",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57638",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T01:15:12.390",
"lastModified": "2025-01-15T16:15:30.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:47:50.117",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openlink/virtuoso-opensource/issues/1190",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57639",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T01:15:12.517",
"lastModified": "2025-01-15T16:15:30.393",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:47:46.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openlink/virtuoso-opensource/issues/1185",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57640",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T01:15:12.627",
"lastModified": "2025-01-15T16:15:30.570",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:47:43.887",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openlink/virtuoso-opensource/issues/1184",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57641",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T01:15:12.740",
"lastModified": "2025-01-15T16:15:30.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:47:41.460",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openlink/virtuoso-opensource/issues/1183",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57642",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T01:15:12.873",
"lastModified": "2025-01-17T18:15:30.030",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:47:38.257",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openlink/virtuoso-opensource/issues/1191",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57643",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T01:15:12.980",
"lastModified": "2025-01-16T16:15:34.030",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:47:34.500",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openlink/virtuoso-opensource/issues/1181",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57644",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T01:15:13.090",
"lastModified": "2025-01-15T16:15:30.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:47:28.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openlink/virtuoso-opensource/issues/1193",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57645",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T01:15:13.200",
"lastModified": "2025-01-15T16:15:31.120",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-17T16:47:25.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openlink/virtuoso-opensource/issues/1197",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

Some files were not shown because too many files have changed in this diff Show More