Auto-Update: 2025-06-04T18:00:20.827512+00:00

This commit is contained in:
cad-safe-bot 2025-06-04 18:03:58 +00:00
parent 890d8e85cb
commit f842c6e70b
131 changed files with 11025 additions and 790 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2011-2016", "id": "CVE-2011-2016",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2011-11-08T21:55:01.287", "published": "2011-11-08T21:55:01.287",
"lastModified": "2025-04-11T00:51:21.963", "lastModified": "2025-06-04T16:15:25.527",
"vulnStatus": "Deferred", "vulnStatus": "Deferred",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -16,6 +16,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
],
"cvssMetricV2": [ "cvssMetricV2": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-1745", "id": "CVE-2014-1745",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2014-05-21T11:14:09.677", "published": "2014-05-21T11:14:09.677",
"lastModified": "2025-04-12T10:46:40.837", "lastModified": "2025-06-04T16:15:26.713",
"vulnStatus": "Deferred", "vulnStatus": "Deferred",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -16,6 +16,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
],
"cvssMetricV2": [ "cvssMetricV2": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -52,6 +74,16 @@
"value": "CWE-399" "value": "CWE-399"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34701", "id": "CVE-2022-34701",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.847", "published": "2022-08-09T20:15:10.847",
"lastModified": "2024-11-21T07:10:00.323", "lastModified": "2025-06-04T16:15:27.477",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "secure@microsoft.com", "source": "secure@microsoft.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
@ -69,6 +69,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34702", "id": "CVE-2022-34702",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.910", "published": "2022-08-09T20:15:10.910",
"lastModified": "2024-11-21T07:10:00.490", "lastModified": "2025-06-04T16:15:27.707",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "secure@microsoft.com", "source": "secure@microsoft.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
@ -49,6 +49,16 @@
"value": "CWE-362" "value": "CWE-362"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34703", "id": "CVE-2022-34703",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.967", "published": "2022-08-09T20:15:10.967",
"lastModified": "2024-11-21T07:10:00.630", "lastModified": "2025-06-04T16:15:27.880",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "secure@microsoft.com", "source": "secure@microsoft.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34705", "id": "CVE-2022-34705",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.083", "published": "2022-08-09T20:15:11.083",
"lastModified": "2024-11-21T07:10:00.883", "lastModified": "2025-06-04T16:15:28.040",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "secure@microsoft.com", "source": "secure@microsoft.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -49,6 +49,16 @@
"value": "CWE-416" "value": "CWE-416"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34706", "id": "CVE-2022-34706",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.140", "published": "2022-08-09T20:15:11.140",
"lastModified": "2024-11-21T07:10:01.003", "lastModified": "2025-06-04T16:15:28.197",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "secure@microsoft.com", "source": "secure@microsoft.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34707", "id": "CVE-2022-34707",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.203", "published": "2022-08-09T20:15:11.203",
"lastModified": "2024-11-21T07:10:01.167", "lastModified": "2025-06-04T16:15:28.363",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "secure@microsoft.com", "source": "secure@microsoft.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -49,6 +49,16 @@
"value": "CWE-416" "value": "CWE-416"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37137", "id": "CVE-2022-37137",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-09-14T11:15:50.153", "published": "2022-09-14T11:15:50.153",
"lastModified": "2024-11-21T07:14:30.273", "lastModified": "2025-06-04T16:15:28.550",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.3, "exploitabilityScore": 2.3,
"impactScore": 2.7 "impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "CWE-79" "value": "CWE-79"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32167", "id": "CVE-2023-32167",
"sourceIdentifier": "zdi-disclosures@trendmicro.com", "sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T02:15:21.880", "published": "2024-05-03T02:15:21.880",
"lastModified": "2025-02-05T21:15:22.310", "lastModified": "2025-06-04T17:03:55.887",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -83,22 +83,52 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10332", "nodes": [
"source": "zdi-disclosures@trendmicro.com"
},
{ {
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-718/", "operator": "OR",
"source": "zdi-disclosures@trendmicro.com" "negate": false,
}, "cpeMatch": [
{ {
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10332", "vulnerable": true,
"source": "af854a3a-2127-422b-91ae-364da2661108" "criteria": "cpe:2.3:a:dlink:d-view_8:*:*:*:*:*:*:*:*",
}, "versionEndExcluding": "2.0.1.89",
{ "matchCriteriaId": "6615CD5D-98F9-43B3-A9D2-44F83DB02689"
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-718/", }
"source": "af854a3a-2127-422b-91ae-364da2661108" ]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10332",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-718/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10332",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-718/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34302", "id": "CVE-2023-34302",
"sourceIdentifier": "zdi-disclosures@trendmicro.com", "sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T02:15:31.207", "published": "2024-05-03T02:15:31.207",
"lastModified": "2025-02-05T17:15:20.573", "lastModified": "2025-06-04T17:24:06.557",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -83,14 +83,38 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-862/", "nodes": [
"source": "zdi-disclosures@trendmicro.com"
},
{ {
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-862/", "operator": "OR",
"source": "af854a3a-2127-422b-91ae-364da2661108" "negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ashlar:cobalt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.4.1204.200",
"matchCriteriaId": "79D6F5D0-D5E5-4D09-A6C7-1FB59204DA27"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-862/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-862/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35710", "id": "CVE-2023-35710",
"sourceIdentifier": "zdi-disclosures@trendmicro.com", "sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T02:15:33.090", "published": "2024-05-03T02:15:33.090",
"lastModified": "2025-02-05T17:15:20.760", "lastModified": "2025-06-04T17:26:14.160",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -83,14 +83,37 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-873/", "nodes": [
"source": "zdi-disclosures@trendmicro.com"
},
{ {
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-873/", "operator": "OR",
"source": "af854a3a-2127-422b-91ae-364da2661108" "negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ashlar:cobalt:1204.57:*:*:*:*:*:*:*",
"matchCriteriaId": "F56E1DAA-535C-4396-960E-DA9FC2CDB5DB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-873/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-873/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35712", "id": "CVE-2023-35712",
"sourceIdentifier": "zdi-disclosures@trendmicro.com", "sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T02:15:33.447", "published": "2024-05-03T02:15:33.447",
"lastModified": "2025-02-04T17:15:15.947", "lastModified": "2025-06-04T17:26:17.243",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -83,14 +83,37 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-875/", "nodes": [
"source": "zdi-disclosures@trendmicro.com"
},
{ {
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-875/", "operator": "OR",
"source": "af854a3a-2127-422b-91ae-364da2661108" "negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ashlar:cobalt:1204.59:*:*:*:*:*:*:*",
"matchCriteriaId": "2D240A5B-56BC-4134-ACD6-77FA212E01C0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-875/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-875/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5529", "id": "CVE-2023-5529",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:28.377", "published": "2025-05-15T20:15:28.377",
"lastModified": "2025-05-16T19:15:48.500", "lastModified": "2025-06-04T16:25:59.440",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,10 +39,44 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://wpscan.com/vulnerability/095c9c35-2618-4f90-8435-a3c34f0bb7f1/", "source": "nvd@nist.gov",
"source": "contact@wpscan.com" "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pagevisitcounter:advanced_page_visit_counter:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "8.0.6",
"matchCriteriaId": "67B90117-F137-41D3-8343-2DB5417C3C38"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/095c9c35-2618-4f90-8435-a3c34f0bb7f1/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5932", "id": "CVE-2023-5932",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:28.637", "published": "2025-05-15T20:15:28.637",
"lastModified": "2025-05-16T19:15:48.617", "lastModified": "2025-06-04T16:30:14.460",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,10 +39,44 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://wpscan.com/vulnerability/16fbca64-cc35-455e-bfef-d1f28857f991/", "source": "nvd@nist.gov",
"source": "contact@wpscan.com" "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:travelpayouts:travelpayouts:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.14",
"matchCriteriaId": "B928B1FA-2C88-4568-A706-79BAEC3943D1"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/16fbca64-cc35-455e-bfef-d1f28857f991/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5934", "id": "CVE-2023-5934",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:28.720", "published": "2025-05-15T20:15:28.720",
"lastModified": "2025-05-16T19:15:48.740", "lastModified": "2025-06-04T16:37:15.200",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,10 +39,44 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://wpscan.com/vulnerability/2a45cdba-df41-457e-bff9-2d6d89776dd0/", "source": "nvd@nist.gov",
"source": "contact@wpscan.com" "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:travelpayouts:travelpayouts:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.13",
"matchCriteriaId": "52682883-A14C-4B0A-9C0D-54FDACA3E105"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/2a45cdba-df41-457e-bff9-2d6d89776dd0/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10075", "id": "CVE-2024-10075",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:32.450", "published": "2025-05-15T20:15:32.450",
"lastModified": "2025-05-20T17:15:46.500", "lastModified": "2025-06-04T16:49:41.220",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,14 +39,52 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://wpscan.com/vulnerability/a984976c-291a-4f68-90d4-e452605ea7d1/", "source": "nvd@nist.gov",
"source": "contact@wpscan.com" "type": "Primary",
}, "description": [
{ {
"url": "https://wpscan.com/vulnerability/a984976c-291a-4f68-90d4-e452605ea7d1/", "lang": "en",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automattic:jetpack:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "13.8",
"matchCriteriaId": "839BA77A-695D-4677-8FF2-39B566D5421D"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/a984976c-291a-4f68-90d4-e452605ea7d1/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/a984976c-291a-4f68-90d4-e452605ea7d1/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10076", "id": "CVE-2024-10076",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:32.533", "published": "2025-05-15T20:15:32.533",
"lastModified": "2025-05-20T16:15:23.873", "lastModified": "2025-06-04T16:50:53.673",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,14 +39,56 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://wpscan.com/vulnerability/15f278f6-0418-4c83-b925-b1a2d8c53e2f/", "source": "nvd@nist.gov",
"source": "contact@wpscan.com" "type": "Primary",
}, "description": [
{ {
"url": "https://wpscan.com/vulnerability/15f278f6-0418-4c83-b925-b1a2d8c53e2f/", "lang": "en",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automattic:jetpack:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "13.8",
"matchCriteriaId": "839BA77A-695D-4677-8FF2-39B566D5421D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automattic:jetpack_boost:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.4.8",
"matchCriteriaId": "7A7C8F9C-07EE-4F1D-99AE-A782F8FDCA67"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/15f278f6-0418-4c83-b925-b1a2d8c53e2f/",
"source": "contact@wpscan.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/15f278f6-0418-4c83-b925-b1a2d8c53e2f/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1103", "id": "CVE-2024-1103",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-31T15:15:10.863", "published": "2024-01-31T15:15:10.863",
"lastModified": "2024-11-21T08:49:48.223", "lastModified": "2025-06-04T17:52:03.500",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -105,8 +105,8 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:surajkumarvishwakarma:real_estate_management_system:1.0:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:codeastro:real_estate_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "21361FB2-BF44-43B2-B59A-F6539F07703B" "matchCriteriaId": "64EAEAD6-B0EE-4039-B827-3C243E2058F4"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13237", "id": "CVE-2024-13237",
"sourceIdentifier": "mlhess@drupal.org", "sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:17.437", "published": "2025-01-09T19:15:17.437",
"lastModified": "2025-01-09T21:15:24.977", "lastModified": "2025-06-04T16:31:52.380",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,12 +49,44 @@
"value": "CWE-79" "value": "CWE-79"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:file_entity_project:file_entity:*:*:*:*:*:drupal:*:*",
"versionStartIncluding": "7.x-2.0",
"versionEndExcluding": "7.x-2.38",
"matchCriteriaId": "8B5354A0-E0A8-4182-A874-90331DEEBEE4"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.drupal.org/sa-contrib-2024-001", "url": "https://www.drupal.org/sa-contrib-2024-001",
"source": "mlhess@drupal.org" "source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13238", "id": "CVE-2024-13238",
"sourceIdentifier": "mlhess@drupal.org", "sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:17.557", "published": "2025-01-09T19:15:17.557",
"lastModified": "2025-01-09T21:15:25.130", "lastModified": "2025-06-04T16:33:13.937",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,12 +49,43 @@
"value": "CWE-79" "value": "CWE-79"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typogrify_project:typogrify:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "8.x-1.3",
"matchCriteriaId": "6B281A25-D0D8-43E0-AA51-811206D355EE"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.drupal.org/sa-contrib-2024-002", "url": "https://www.drupal.org/sa-contrib-2024-002",
"source": "mlhess@drupal.org" "source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13239", "id": "CVE-2024-13239",
"sourceIdentifier": "mlhess@drupal.org", "sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:17.663", "published": "2025-01-09T19:15:17.663",
"lastModified": "2025-01-10T18:15:19.477", "lastModified": "2025-06-04T16:38:42.120",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,12 +49,43 @@
"value": "CWE-1390" "value": "CWE-1390"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:two-factor_authentication_project:two-factor_authentication:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "8.x-1.5",
"matchCriteriaId": "1B5226B1-893E-4148-9B06-25152D168912"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.drupal.org/sa-contrib-2024-003", "url": "https://www.drupal.org/sa-contrib-2024-003",
"source": "mlhess@drupal.org" "source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13240", "id": "CVE-2024-13240",
"sourceIdentifier": "mlhess@drupal.org", "sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:17.780", "published": "2025-01-09T19:15:17.780",
"lastModified": "2025-01-10T18:15:19.667", "lastModified": "2025-06-04T16:41:18.817",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,12 +49,44 @@
"value": "CWE-284" "value": "CWE-284"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getopensocial:open_social:*:*:*:*:*:drupal:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "12.0.5",
"matchCriteriaId": "B8427E13-9459-4D32-AC82-EAF5308387E2"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.drupal.org/sa-contrib-2024-004", "url": "https://www.drupal.org/sa-contrib-2024-004",
"source": "mlhess@drupal.org" "source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13241", "id": "CVE-2024-13241",
"sourceIdentifier": "mlhess@drupal.org", "sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:17.910", "published": "2025-01-09T19:15:17.910",
"lastModified": "2025-01-10T18:15:19.887", "lastModified": "2025-06-04T16:42:45.603",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,12 +49,43 @@
"value": "CWE-285" "value": "CWE-285"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getopensocial:open_social:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "12.0.5",
"matchCriteriaId": "1B412E88-E6CF-4C9F-9D43-A09875055454"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.drupal.org/sa-contrib-2024-005", "url": "https://www.drupal.org/sa-contrib-2024-005",
"source": "mlhess@drupal.org" "source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13242", "id": "CVE-2024-13242",
"sourceIdentifier": "mlhess@drupal.org", "sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:18.033", "published": "2025-01-09T19:15:18.033",
"lastModified": "2025-01-10T18:15:20.073", "lastModified": "2025-06-04T16:49:53.157",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,12 +49,42 @@
"value": "CWE-749" "value": "CWE-749"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:swift_mailer_project:swift_mailer:*:*:*:*:*:drupal:*:*",
"matchCriteriaId": "31FEC821-3005-44A1-A2E6-147A6A8D8872"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.drupal.org/sa-contrib-2024-006", "url": "https://www.drupal.org/sa-contrib-2024-006",
"source": "mlhess@drupal.org" "source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13243", "id": "CVE-2024-13243",
"sourceIdentifier": "mlhess@drupal.org", "sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:18.140", "published": "2025-01-09T19:15:18.140",
"lastModified": "2025-01-10T17:15:12.363", "lastModified": "2025-06-04T16:50:44.397",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,12 +49,43 @@
"value": "CWE-862" "value": "CWE-862"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:entity_delete_log_project:entity_delete_log:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "1.1.1",
"matchCriteriaId": "2C997466-90F5-4615-8011-6D9565A69E34"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.drupal.org/sa-contrib-2024-007", "url": "https://www.drupal.org/sa-contrib-2024-007",
"source": "mlhess@drupal.org" "source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13244", "id": "CVE-2024-13244",
"sourceIdentifier": "mlhess@drupal.org", "sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:18.250", "published": "2025-01-09T19:15:18.250",
"lastModified": "2025-01-10T17:15:12.520", "lastModified": "2025-06-04T16:55:00.510",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,12 +49,51 @@
"value": "CWE-352" "value": "CWE-352"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:migrate_tools_project:migrate_tools:*:*:*:*:*:drupal:*:*",
"versionStartIncluding": "6.0.0",
"versionEndExcluding": "6.0.3",
"matchCriteriaId": "3310A267-04F0-4B4F-92C8-80BFD4260449"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:migrate_tools_project:migrate_tools:*:*:*:*:*:drupal:*:*",
"versionStartIncluding": "8.x-1.0",
"versionEndIncluding": "8.x-5.2",
"matchCriteriaId": "4A340A6D-396B-40E1-82BD-5C720297BE0B"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.drupal.org/sa-contrib-2024-008", "url": "https://www.drupal.org/sa-contrib-2024-008",
"source": "mlhess@drupal.org" "source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13250", "id": "CVE-2024-13250",
"sourceIdentifier": "mlhess@drupal.org", "sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:18.980", "published": "2025-01-09T19:15:18.980",
"lastModified": "2025-01-10T17:15:12.680", "lastModified": "2025-06-04T16:28:11.437",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,12 +49,43 @@
"value": "CWE-352" "value": "CWE-352"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal_symfony_mailer_lite_project:drupal_symfony_mailer_lite:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "1.0.6",
"matchCriteriaId": "F2A17A09-51D4-43F3-A202-8BF76D54B836"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.drupal.org/sa-contrib-2024-014", "url": "https://www.drupal.org/sa-contrib-2024-014",
"source": "mlhess@drupal.org" "source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13251", "id": "CVE-2024-13251",
"sourceIdentifier": "mlhess@drupal.org", "sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:19.093", "published": "2025-01-09T19:15:19.093",
"lastModified": "2025-01-10T17:15:12.840", "lastModified": "2025-06-04T16:06:49.463",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,12 +49,43 @@
"value": "CWE-266" "value": "CWE-266"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:registration_role_project:registration_role:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "2.0.1",
"matchCriteriaId": "2A7A9264-4621-443D-AD40-D7BA51AD528F"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.drupal.org/sa-contrib-2024-015", "url": "https://www.drupal.org/sa-contrib-2024-015",
"source": "mlhess@drupal.org" "source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13252", "id": "CVE-2024-13252",
"sourceIdentifier": "mlhess@drupal.org", "sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:19.207", "published": "2025-01-09T19:15:19.207",
"lastModified": "2025-01-09T21:15:25.620", "lastModified": "2025-06-04T16:11:39.377",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,12 +49,44 @@
"value": "CWE-79" "value": "CWE-79"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tacjs_project:tacjs:*:*:*:*:*:drupal:*:*",
"versionStartIncluding": "8.x-1.0",
"versionEndExcluding": "8.x-6.5",
"matchCriteriaId": "B276B190-9B3A-4878-9CBE-32068041C862"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.drupal.org/sa-contrib-2024-016", "url": "https://www.drupal.org/sa-contrib-2024-016",
"source": "mlhess@drupal.org" "source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13253", "id": "CVE-2024-13253",
"sourceIdentifier": "mlhess@drupal.org", "sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:19.317", "published": "2025-01-09T19:15:19.317",
"lastModified": "2025-01-10T17:15:13.000", "lastModified": "2025-06-04T16:08:21.780",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,12 +49,43 @@
"value": "CWE-863" "value": "CWE-863"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:advanced_pwa_inc_push_notifications_project:advanced_pwa_inc_push_notifications:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "8.x-1.5",
"matchCriteriaId": "B7D03E48-B643-4FEF-938D-9DA0A7D6DB94"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.drupal.org/sa-contrib-2024-017", "url": "https://www.drupal.org/sa-contrib-2024-017",
"source": "mlhess@drupal.org" "source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13254", "id": "CVE-2024-13254",
"sourceIdentifier": "mlhess@drupal.org", "sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:19.437", "published": "2025-01-09T19:15:19.437",
"lastModified": "2025-01-10T17:15:13.160", "lastModified": "2025-06-04T16:12:48.180",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,12 +49,43 @@
"value": "CWE-201" "value": "CWE-201"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rest_views_project:rest_views:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "3.0.1",
"matchCriteriaId": "21A731AF-6DE4-42F3-8C03-0493DC7A30DE"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.drupal.org/sa-contrib-2024-018", "url": "https://www.drupal.org/sa-contrib-2024-018",
"source": "mlhess@drupal.org" "source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13255", "id": "CVE-2024-13255",
"sourceIdentifier": "mlhess@drupal.org", "sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:19.540", "published": "2025-01-09T19:15:19.540",
"lastModified": "2025-01-10T17:15:13.323", "lastModified": "2025-06-04T16:25:15.250",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,12 +49,44 @@
"value": "CWE-202" "value": "CWE-202"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:restful_web_services_project:restful_web_services:*:*:*:*:*:drupal:*:*",
"versionStartIncluding": "7.x-2.0",
"versionEndExcluding": "7.x-2.10",
"matchCriteriaId": "340943F6-A1E3-438A-AEF0-9929EE99BB1E"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.drupal.org/sa-contrib-2024-019", "url": "https://www.drupal.org/sa-contrib-2024-019",
"source": "mlhess@drupal.org" "source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23031", "id": "CVE-2024-23031",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-02-01T23:15:11.020", "published": "2024-02-01T23:15:11.020",
"lastModified": "2024-11-21T08:56:51.323", "lastModified": "2025-06-04T16:15:28.887",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 2.7 "impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "CWE-79" "value": "CWE-79"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23172", "id": "CVE-2024-23172",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-01-12T05:15:10.187", "published": "2024-01-12T05:15:10.187",
"lastModified": "2024-11-21T08:57:07.193", "lastModified": "2025-06-04T16:15:29.090",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.3, "exploitabilityScore": 2.3,
"impactScore": 2.7 "impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "CWE-79" "value": "CWE-79"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23180", "id": "CVE-2024-23180",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-01-23T10:15:10.440", "published": "2024-01-23T10:15:10.440",
"lastModified": "2024-11-21T08:57:08.213", "lastModified": "2025-06-04T16:15:29.313",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23207", "id": "CVE-2024-23207",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:10.887", "published": "2024-01-23T01:15:10.887",
"lastModified": "2024-11-21T08:57:11.247", "lastModified": "2025-06-04T16:15:29.507",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23208", "id": "CVE-2024-23208",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:10.930", "published": "2024-01-23T01:15:10.930",
"lastModified": "2024-11-21T08:57:11.403", "lastModified": "2025-06-04T16:15:29.780",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
} }
] ]
}, },

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23210", "id": "CVE-2024-23210",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:11.033", "published": "2024-01-23T01:15:11.033",
"lastModified": "2024-11-21T08:57:11.727", "lastModified": "2025-06-04T16:15:29.973",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23218", "id": "CVE-2024-23218",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:11.403", "published": "2024-01-23T01:15:11.403",
"lastModified": "2024-11-21T08:57:12.947", "lastModified": "2025-06-04T16:15:30.170",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.2, "exploitabilityScore": 2.2,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "CWE-203" "value": "CWE-203"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23219", "id": "CVE-2024-23219",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:11.450", "published": "2024-01-23T01:15:11.450",
"lastModified": "2024-11-21T08:57:13.093", "lastModified": "2025-06-04T16:15:30.493",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.5, "exploitabilityScore": 2.5,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "CWE-287" "value": "CWE-287"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23223", "id": "CVE-2024-23223",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:11.557", "published": "2024-01-23T01:15:11.557",
"lastModified": "2024-11-21T08:57:13.563", "lastModified": "2025-06-04T16:15:30.657",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.5, "exploitabilityScore": 2.5,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23301", "id": "CVE-2024-23301",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-01-12T23:15:10.030", "published": "2024-01-12T23:15:10.030",
"lastModified": "2024-11-21T08:57:27.587", "lastModified": "2025-06-04T16:15:30.847",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23304", "id": "CVE-2024-23304",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-02-06T05:15:10.630", "published": "2024-02-06T05:15:10.630",
"lastModified": "2024-11-21T08:57:27.987", "lastModified": "2025-06-04T16:15:31.080",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "CWE-426" "value": "CWE-426"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-426"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23452", "id": "CVE-2024-23452",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2024-02-08T09:15:46.420", "published": "2024-02-08T09:15:46.420",
"lastModified": "2025-02-13T18:17:02.960", "lastModified": "2025-06-04T16:15:31.587",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,13 +36,33 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
] ]
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "security@apache.org", "source": "security@apache.org",
"type": "Primary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23453", "id": "CVE-2024-23453",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-01-24T00:15:08.327", "published": "2024-01-24T00:15:08.327",
"lastModified": "2024-11-21T08:57:44.420", "lastModified": "2025-06-04T16:15:31.813",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "CWE-798" "value": "CWE-798"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23681", "id": "CVE-2024-23681",
"sourceIdentifier": "disclosure@vulncheck.com", "sourceIdentifier": "disclosure@vulncheck.com",
"published": "2024-01-19T21:15:10.207", "published": "2024-01-19T21:15:10.207",
"lastModified": "2024-11-21T08:58:09.807", "lastModified": "2025-06-04T16:15:32.000",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.5, "exploitabilityScore": 1.5,
"impactScore": 6.0 "impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0
} }
] ]
}, },

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23731", "id": "CVE-2024-23731",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-01-21T17:15:44.443", "published": "2024-01-21T17:15:44.443",
"lastModified": "2024-11-21T08:58:15.953", "lastModified": "2025-06-04T16:15:32.220",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "CWE-88" "value": "CWE-88"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-88"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23744", "id": "CVE-2024-23744",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-01-21T23:15:44.833", "published": "2024-01-21T23:15:44.833",
"lastModified": "2024-11-21T08:58:18.277", "lastModified": "2025-06-04T16:15:32.440",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
] ]
}, },

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23746", "id": "CVE-2024-23746",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T02:15:18.330", "published": "2024-02-02T02:15:18.330",
"lastModified": "2024-11-21T08:58:18.647", "lastModified": "2025-06-04T16:15:32.800",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "CWE-94" "value": "CWE-94"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23851", "id": "CVE-2024-23851",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-01-23T09:15:36.180", "published": "2024-01-23T09:15:36.180",
"lastModified": "2024-11-21T08:58:33.703", "lastModified": "2025-06-04T16:15:33.223",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23941", "id": "CVE-2024-23941",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-02-01T04:15:49.967", "published": "2024-02-01T04:15:49.967",
"lastModified": "2024-11-21T08:58:43.940", "lastModified": "2025-06-04T16:15:35.160",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.3, "exploitabilityScore": 2.3,
"impactScore": 2.7 "impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "CWE-79" "value": "CWE-79"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2696", "id": "CVE-2024-2696",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-12T06:15:03.680", "published": "2024-07-12T06:15:03.680",
"lastModified": "2024-11-21T09:10:18.937", "lastModified": "2025-06-04T16:16:24.410",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,14 +39,52 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://wpscan.com/vulnerability/b6e64af0-adeb-4e28-9a81-f4024b0446ee/", "source": "nvd@nist.gov",
"source": "contact@wpscan.com" "type": "Primary",
}, "description": [
{ {
"url": "https://wpscan.com/vulnerability/b6e64af0-adeb-4e28-9a81-f4024b0446ee/", "lang": "en",
"source": "af854a3a-2127-422b-91ae-364da2661108" "value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:swiftideas:swift_framework:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2024.04.30",
"matchCriteriaId": "EE7F8F0D-C942-4862-81AA-0C4EDBEAE87C"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/b6e64af0-adeb-4e28-9a81-f4024b0446ee/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/b6e64af0-adeb-4e28-9a81-f4024b0446ee/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27728", "id": "CVE-2024-27728",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T19:15:18.477", "published": "2024-08-15T19:15:18.477",
"lastModified": "2024-08-20T14:35:06.747", "lastModified": "2025-06-04T17:18:07.780",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,39 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://github.com/friendica/friendica/pull/13927", "nodes": [
"source": "cve@mitre.org"
},
{ {
"url": "https://leo.oliver.nz/posts/2024/05/friendica-cve-disclosures/", "operator": "OR",
"source": "cve@mitre.org" "negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:friendica:friendica:2023.12:*:*:*:*:*:*:*",
"matchCriteriaId": "650584BD-FC4F-4520-BC82-38FED3F04B29"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/friendica/friendica/pull/13927",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://leo.oliver.nz/posts/2024/05/friendica-cve-disclosures/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27730", "id": "CVE-2024-27730",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T19:15:18.663", "published": "2024-08-15T19:15:18.663",
"lastModified": "2024-08-19T13:00:23.117", "lastModified": "2025-06-04T17:18:18.597",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,39 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://github.com/friendica/friendica/pull/13927", "nodes": [
"source": "cve@mitre.org"
},
{ {
"url": "https://leo.oliver.nz/posts/2024/05/friendica-cve-disclosures/", "operator": "OR",
"source": "cve@mitre.org" "negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:friendica:friendica:2023.12:*:*:*:*:*:*:*",
"matchCriteriaId": "650584BD-FC4F-4520-BC82-38FED3F04B29"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/friendica/friendica/pull/13927",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://leo.oliver.nz/posts/2024/05/friendica-cve-disclosures/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27731", "id": "CVE-2024-27731",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T19:15:18.770", "published": "2024-08-15T19:15:18.770",
"lastModified": "2024-08-19T13:00:23.117", "lastModified": "2025-06-04T17:18:28.940",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,39 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://github.com/friendica/friendica/pull/13927", "nodes": [
"source": "cve@mitre.org"
},
{ {
"url": "https://leo.oliver.nz/posts/2024/05/friendica-cve-disclosures/", "operator": "OR",
"source": "cve@mitre.org" "negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:friendica:friendica:2023.12:*:*:*:*:*:*:*",
"matchCriteriaId": "650584BD-FC4F-4520-BC82-38FED3F04B29"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/friendica/friendica/pull/13927",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://leo.oliver.nz/posts/2024/05/friendica-cve-disclosures/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2870", "id": "CVE-2024-2870",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-13T06:15:02.310", "published": "2024-07-13T06:15:02.310",
"lastModified": "2024-11-21T09:10:43.113", "lastModified": "2025-06-04T16:16:48.353",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,14 +39,52 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://wpscan.com/vulnerability/688522d2-ee28-44f8-828d-352f06e43885/", "source": "nvd@nist.gov",
"source": "contact@wpscan.com" "type": "Primary",
}, "description": [
{ {
"url": "https://wpscan.com/vulnerability/688522d2-ee28-44f8-828d-352f06e43885/", "lang": "en",
"source": "af854a3a-2127-422b-91ae-364da2661108" "value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:swiftideas:swift_framework:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2024.04.30",
"matchCriteriaId": "EE7F8F0D-C942-4862-81AA-0C4EDBEAE87C"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/688522d2-ee28-44f8-828d-352f06e43885/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/688522d2-ee28-44f8-828d-352f06e43885/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32674", "id": "CVE-2024-32674",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-05-08T04:15:09.840", "published": "2024-05-08T04:15:09.840",
"lastModified": "2024-11-21T09:15:26.933", "lastModified": "2025-06-04T17:23:08.190",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,22 +51,52 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://jvn.jp/en/jp/JVN87694318/", "nodes": [
"source": "vultures@jpcert.or.jp"
},
{ {
"url": "https://wordpress.org/plugins/heateor-social-login/", "operator": "OR",
"source": "vultures@jpcert.or.jp" "negate": false,
}, "cpeMatch": [
{ {
"url": "https://jvn.jp/en/jp/JVN87694318/", "vulnerable": true,
"source": "af854a3a-2127-422b-91ae-364da2661108" "criteria": "cpe:2.3:a:heateor:social_login:*:*:*:*:*:wordpress:*:*",
}, "versionEndExcluding": "1.1.32",
{ "matchCriteriaId": "97B44230-A277-4A15-B954-4B365FFCEBDC"
"url": "https://wordpress.org/plugins/heateor-social-login/", }
"source": "af854a3a-2127-422b-91ae-364da2661108" ]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN87694318/",
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/heateor-social-login/",
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
},
{
"url": "https://jvn.jp/en/jp/JVN87694318/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/heateor-social-login/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33526", "id": "CVE-2024-33526",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-05-21T15:15:28.933", "published": "2024-05-21T15:15:28.933",
"lastModified": "2024-11-21T09:17:04.753", "lastModified": "2025-06-04T17:27:49.967",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,22 +51,62 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029", "nodes": [
"source": "cve@mitre.org" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0",
"versionEndExcluding": "7.30",
"matchCriteriaId": "52D67CB8-7E23-48B1-8092-1E8F37C03F12"
}, },
{ {
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/", "vulnerable": true,
"source": "cve@mitre.org" "criteria": "cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*",
}, "versionStartIncluding": "8.0",
{ "versionEndExcluding": "8.11",
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029", "matchCriteriaId": "AB4AF100-B4F1-4EE1-AC8D-8F0EF216C0B0"
"source": "af854a3a-2127-422b-91ae-364da2661108" }
}, ]
{ }
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/", ]
"source": "af854a3a-2127-422b-91ae-364da2661108" }
],
"references": [
{
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33527", "id": "CVE-2024-33527",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-05-21T15:15:29.050", "published": "2024-05-21T15:15:29.050",
"lastModified": "2024-11-21T09:17:04.980", "lastModified": "2025-06-04T17:27:43.120",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,22 +51,62 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029", "nodes": [
"source": "cve@mitre.org" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0",
"versionEndExcluding": "7.30",
"matchCriteriaId": "52D67CB8-7E23-48B1-8092-1E8F37C03F12"
}, },
{ {
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/", "vulnerable": true,
"source": "cve@mitre.org" "criteria": "cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*",
}, "versionStartIncluding": "8.0",
{ "versionEndExcluding": "8.11",
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029", "matchCriteriaId": "AB4AF100-B4F1-4EE1-AC8D-8F0EF216C0B0"
"source": "af854a3a-2127-422b-91ae-364da2661108" }
}, ]
{ }
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/", ]
"source": "af854a3a-2127-422b-91ae-364da2661108" }
],
"references": [
{
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33528", "id": "CVE-2024-33528",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-05-21T15:15:29.167", "published": "2024-05-21T15:15:29.167",
"lastModified": "2024-11-21T09:17:05.203", "lastModified": "2025-06-04T17:27:37.820",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,22 +51,62 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029", "nodes": [
"source": "cve@mitre.org" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0",
"versionEndExcluding": "7.30",
"matchCriteriaId": "52D67CB8-7E23-48B1-8092-1E8F37C03F12"
}, },
{ {
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/", "vulnerable": true,
"source": "cve@mitre.org" "criteria": "cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*",
}, "versionStartIncluding": "8.0",
{ "versionEndExcluding": "8.11",
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029", "matchCriteriaId": "AB4AF100-B4F1-4EE1-AC8D-8F0EF216C0B0"
"source": "af854a3a-2127-422b-91ae-364da2661108" }
}, ]
{ }
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/", ]
"source": "af854a3a-2127-422b-91ae-364da2661108" }
],
"references": [
{
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33529", "id": "CVE-2024-33529",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-05-21T15:15:29.290", "published": "2024-05-21T15:15:29.290",
"lastModified": "2025-03-28T19:15:21.903", "lastModified": "2025-06-04T17:27:26.117",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,22 +51,67 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170040", "nodes": [
"source": "cve@mitre.org" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0",
"versionEndExcluding": "7.30",
"matchCriteriaId": "52D67CB8-7E23-48B1-8092-1E8F37C03F12"
}, },
{ {
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/", "vulnerable": true,
"source": "cve@mitre.org" "criteria": "cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0",
"versionEndExcluding": "8.11",
"matchCriteriaId": "AB4AF100-B4F1-4EE1-AC8D-8F0EF216C0B0"
}, },
{ {
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170040", "vulnerable": true,
"source": "af854a3a-2127-422b-91ae-364da2661108" "criteria": "cpe:2.3:a:ilias:ilias:9.0:*:*:*:*:*:*:*",
}, "matchCriteriaId": "268EF08B-B722-4D02-9013-C538FFE28FB1"
{ }
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/", ]
"source": "af854a3a-2127-422b-91ae-364da2661108" }
]
}
],
"references": [
{
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170040",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170040",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36650", "id": "CVE-2024-36650",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-11T16:15:29.043", "published": "2024-06-11T16:15:29.043",
"lastModified": "2024-11-21T09:22:28.967", "lastModified": "2025-06-04T17:24:49.253",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,51 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://gist.github.com/Swind1er/f442fcac520a48c05c744c7b72362483", "operator": "AND",
"source": "cve@mitre.org" "nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:a3100r_firmware:4.1.2cu.5247_b20211129:*:*:*:*:*:*:*",
"matchCriteriaId": "9098D12E-0A3B-4CBF-AC5E-43C5394C7719"
}
]
}, },
{ {
"url": "https://gist.github.com/Swind1er/f442fcac520a48c05c744c7b72362483", "operator": "OR",
"source": "af854a3a-2127-422b-91ae-364da2661108" "negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:a3100r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40729E79-9D89-440F-B38D-E62D310E27F9"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Swind1er/f442fcac520a48c05c744c7b72362483",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Swind1er/f442fcac520a48c05c744c7b72362483",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39963", "id": "CVE-2024-39963",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-07-19T15:15:10.383", "published": "2024-07-19T15:15:10.383",
"lastModified": "2024-11-21T09:28:38.597", "lastModified": "2025-06-04T17:02:19.887",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,78 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://gist.github.com/Swind1er/c8e4369c7fdfd750c8ad01a276105c57", "operator": "AND",
"source": "cve@mitre.org" "nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ax9_firmware:22.03.01.46:*:*:*:*:*:*:*",
"matchCriteriaId": "8FE7BDA5-B565-4E85-B253-880733FFC0B3"
}
]
}, },
{ {
"url": "https://gist.github.com/Swind1er/c8e4369c7fdfd750c8ad01a276105c57", "operator": "OR",
"source": "af854a3a-2127-422b-91ae-364da2661108" "negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ax9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7542BB3-674B-4684-A3C6-91F9A0FBDD93"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ax12_firmware:22.03.01.46:*:*:*:*:*:*:*",
"matchCriteriaId": "ACC5CA19-0A08-462F-A948-9D2338076B61"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ax12:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "19AB5CD4-69C7-4619-8A1B-34B70D738D34"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Swind1er/c8e4369c7fdfd750c8ad01a276105c57",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Swind1er/c8e4369c7fdfd750c8ad01a276105c57",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40400", "id": "CVE-2024-40400",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-07-19T19:15:09.147", "published": "2024-07-19T19:15:09.147",
"lastModified": "2024-11-21T09:31:02.747", "lastModified": "2025-06-04T16:46:06.003",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,62 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://github.com/marcantondahmen/automad/issues/106", "nodes": [
"source": "cve@mitre.org" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automad:automad:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.10.9",
"matchCriteriaId": "22AF6DF3-DC97-4C61-8445-D37FC2667D2B"
}, },
{ {
"url": "https://github.com/marcantondahmen/automad/issues/106", "vulnerable": true,
"source": "af854a3a-2127-422b-91ae-364da2661108" "criteria": "cpe:2.3:a:automad:automad:2.0.0:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "6BE6293D-5E0A-40BB-BA07-CEA72DA5C304"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automad:automad:2.0.0:alpha2:*:*:*:*:*:*",
"matchCriteriaId": "BFED5CBF-6897-49DF-BB3C-1D1CD01CDD82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automad:automad:2.0.0:alpha3:*:*:*:*:*:*",
"matchCriteriaId": "AA74897C-3FCE-4DE4-9B0E-8C49EF75BDD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automad:automad:2.0.0:alpha4:*:*:*:*:*:*",
"matchCriteriaId": "D79102BB-6E1E-4368-BEF7-7E2D0DE517BB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/marcantondahmen/automad/issues/106",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://github.com/marcantondahmen/automad/issues/106",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41139", "id": "CVE-2024-41139",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-07-29T09:15:02.563", "published": "2024-07-29T09:15:02.563",
"lastModified": "2024-11-21T09:32:18.463", "lastModified": "2025-06-04T16:54:14.690",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,22 +51,53 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://jvn.jp/en/jp/JVN84326763/", "nodes": [
"source": "vultures@jpcert.or.jp"
},
{ {
"url": "https://www.skyseaclientview.net/news/240729_02/", "operator": "OR",
"source": "vultures@jpcert.or.jp" "negate": false,
}, "cpeMatch": [
{ {
"url": "https://jvn.jp/en/jp/JVN84326763/", "vulnerable": true,
"source": "af854a3a-2127-422b-91ae-364da2661108" "criteria": "cpe:2.3:a:skygroup:skysea_client_view:*:*:*:*:*:*:*:*",
}, "versionStartIncluding": "6.010.06",
{ "versionEndExcluding": "19.300.09h",
"url": "https://www.skyseaclientview.net/news/240729_02/", "matchCriteriaId": "C7B66BCD-8F7A-4AF9-9641-5AEBEFB6A15E"
"source": "af854a3a-2127-422b-91ae-364da2661108" }
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN84326763/",
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.skyseaclientview.net/news/240729_02/",
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://jvn.jp/en/jp/JVN84326763/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.skyseaclientview.net/news/240729_02/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41281", "id": "CVE-2024-41281",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-07-19T17:15:03.330", "published": "2024-07-19T17:15:03.330",
"lastModified": "2024-11-21T09:32:28.557", "lastModified": "2025-06-04T17:01:40.193",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,49 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://github.com/BuaaIOTTeam/Iot_Linksys/blob/main/Linksys_WRT54G_get_merge_mac.md", "operator": "AND",
"source": "cve@mitre.org" "nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linksys:wrt54g_firmware:4.21.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4A5CABCB-BD1B-4BFE-B6F5-CA80E16FD7C8"
}
]
}, },
{ {
"url": "https://github.com/BuaaIOTTeam/Iot_Linksys/blob/main/Linksys_WRT54G_get_merge_mac.md", "operator": "OR",
"source": "af854a3a-2127-422b-91ae-364da2661108" "negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:linksys:wrt54g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79522505-0F38-4FC3-A9FB-00996F236ED4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/BuaaIOTTeam/Iot_Linksys/blob/main/Linksys_WRT54G_get_merge_mac.md",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/BuaaIOTTeam/Iot_Linksys/blob/main/Linksys_WRT54G_get_merge_mac.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41726", "id": "CVE-2024-41726",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-07-29T09:15:02.703", "published": "2024-07-29T09:15:02.703",
"lastModified": "2024-11-21T09:33:03.933", "lastModified": "2025-06-04T16:54:49.050",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,22 +51,53 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://jvn.jp/en/jp/JVN84326763/", "nodes": [
"source": "vultures@jpcert.or.jp"
},
{ {
"url": "https://www.skyseaclientview.net/news/240729_02/", "operator": "OR",
"source": "vultures@jpcert.or.jp" "negate": false,
}, "cpeMatch": [
{ {
"url": "https://jvn.jp/en/jp/JVN84326763/", "vulnerable": true,
"source": "af854a3a-2127-422b-91ae-364da2661108" "criteria": "cpe:2.3:a:skygroup:skysea_client_view:*:*:*:*:*:*:*:*",
}, "versionStartIncluding": "15.200.13i",
{ "versionEndExcluding": "19.300.09h",
"url": "https://www.skyseaclientview.net/news/240729_02/", "matchCriteriaId": "3E9EC5EC-22BC-4BC4-BF45-D258CEB2C3C2"
"source": "af854a3a-2127-422b-91ae-364da2661108" }
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN84326763/",
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.skyseaclientview.net/news/240729_02/",
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://jvn.jp/en/jp/JVN84326763/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.skyseaclientview.net/news/240729_02/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46278", "id": "CVE-2024-46278",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-10-07T16:15:05.547", "published": "2024-10-07T16:15:05.547",
"lastModified": "2024-10-07T20:35:10.653", "lastModified": "2025-06-04T17:08:35.510",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,39 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://github.com/ayato-shitomi/CVE-2024-46278-teedy_1.11_account-takeover", "nodes": [
"source": "cve@mitre.org"
},
{ {
"url": "https://github.com/ayato-shitomi/teedy_1.11_account-takeover", "operator": "OR",
"source": "cve@mitre.org" "negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sismics:teedy:1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AB7008DF-9901-48D2-9079-D4F89F4E810E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ayato-shitomi/CVE-2024-46278-teedy_1.11_account-takeover",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/ayato-shitomi/teedy_1.11_account-takeover",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46330", "id": "CVE-2024-46330",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T14:15:09.433", "published": "2024-09-26T14:15:09.433",
"lastModified": "2024-09-30T12:46:20.237", "lastModified": "2025-06-04T16:16:02.940",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,42 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://hawktesters.com/5519644d-246e-4924-b7c8-8fdf742117be/704b5e66-fee5-4289-aa55-eb7feb5f0edc.pdf", "operator": "AND",
"source": "cve@mitre.org" "nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:vonets:vap11g-300_firmware:3.3.23.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8BB578CE-F4E2-4ABE-AFF5-D45B46DC4682"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:vonets:vap11g-300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B23375E-0E77-4423-AEDA-9A9F26052834"
}
]
}
]
}
],
"references": [
{
"url": "https://hawktesters.com/5519644d-246e-4924-b7c8-8fdf742117be/704b5e66-fee5-4289-aa55-eb7feb5f0edc.pdf",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48905", "id": "CVE-2024-48905",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-05-01T21:15:52.033", "published": "2025-05-01T21:15:52.033",
"lastModified": "2025-05-06T16:15:26.390", "lastModified": "2025-06-04T17:26:59.047",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,39 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-082.txt", "nodes": [
"source": "cve@mitre.org"
},
{ {
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-082.txt", "operator": "OR",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sematell:replyone:7.4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "604F1F53-A672-43BA-BE95-674B51590DD6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-082.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-082.txt",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48906", "id": "CVE-2024-48906",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-05-01T21:15:52.160", "published": "2025-05-01T21:15:52.160",
"lastModified": "2025-05-06T16:15:26.597", "lastModified": "2025-06-04T17:26:52.673",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,39 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-081.txt", "nodes": [
"source": "cve@mitre.org"
},
{ {
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-081.txt", "operator": "OR",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sematell:replyone:7.4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "604F1F53-A672-43BA-BE95-674B51590DD6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-081.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-081.txt",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48907", "id": "CVE-2024-48907",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-05-01T21:15:52.270", "published": "2025-05-01T21:15:52.270",
"lastModified": "2025-05-02T15:15:47.830", "lastModified": "2025-06-04T17:26:45.490",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,31 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-083.txt", "nodes": [
"source": "cve@mitre.org" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sematell:replyone:7.4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "604F1F53-A672-43BA-BE95-674B51590DD6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-083.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50305", "id": "CVE-2024-50305",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2024-11-14T10:15:08.013", "published": "2024-11-14T10:15:08.013",
"lastModified": "2024-11-15T13:58:08.913", "lastModified": "2025-06-04T16:15:49.817",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -61,10 +61,33 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y", "nodes": [
"source": "security@apache.org" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:traffic_server:*:-:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndExcluding": "9.2.6",
"matchCriteriaId": "1BC975AD-BDA9-4FE0-AAB0-7529EED6B114"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50306", "id": "CVE-2024-50306",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2024-11-14T10:15:08.230", "published": "2024-11-14T10:15:08.230",
"lastModified": "2024-11-15T13:58:08.913", "lastModified": "2025-06-04T16:15:30.250",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,40 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y", "nodes": [
"source": "security@apache.org" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:traffic_server:*:-:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndExcluding": "9.2.6",
"matchCriteriaId": "1BC975AD-BDA9-4FE0-AAB0-7529EED6B114"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.0.2",
"matchCriteriaId": "E45239B7-25FC-457A-BA85-D5353B4A1896"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52711", "id": "CVE-2024-52711",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-19T14:15:18.207", "published": "2024-11-19T14:15:18.207",
"lastModified": "2024-11-22T18:15:17.860", "lastModified": "2025-06-04T17:02:31.407",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,43 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://github.com/CLan-nad/CVE/blob/main/D-Link/ip_position_asp/1.md", "operator": "AND",
"source": "cve@mitre.org" "nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:di-8100_firmware:16.07.26a1:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA39417-3894-4D6D-A899-000F56AA482B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:di-8100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D417784-56F2-40AF-8FE8-C00E6F332131"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/CLan-nad/CVE/blob/main/D-Link/ip_position_asp/1.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8023", "id": "CVE-2024-8023",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-21T00:15:05.527", "published": "2024-08-21T00:15:05.527",
"lastModified": "2024-08-21T12:30:33.697", "lastModified": "2025-06-04T16:55:39.557",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -120,22 +140,55 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://gist.github.com/topsky979/74dcbe81062718f314d81fb6ad5dc1e0", "nodes": [
"source": "cna@vuldb.com"
},
{ {
"url": "https://vuldb.com/?ctiid.275292", "operator": "OR",
"source": "cna@vuldb.com" "negate": false,
}, "cpeMatch": [
{ {
"url": "https://vuldb.com/?id.275292", "vulnerable": true,
"source": "cna@vuldb.com" "criteria": "cpe:2.3:a:bladex:springblade:*:*:*:*:*:*:*:*",
}, "versionEndIncluding": "4.1.0",
{ "matchCriteriaId": "B5909ADC-4141-4EB4-9B7E-A337537565A3"
"url": "https://vuldb.com/?submit.390087", }
"source": "cna@vuldb.com" ]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/topsky979/74dcbe81062718f314d81fb6ad5dc1e0",
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.275292",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.275292",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.390087",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8521", "id": "CVE-2024-8521",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-07T08:15:11.523", "published": "2024-09-07T08:15:11.523",
"lastModified": "2024-09-09T13:03:38.303", "lastModified": "2025-06-04T16:56:10.697",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -120,34 +140,76 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://github.com/GithubUser843205/CVEs/tree/main/CVE-2024-8521", "nodes": [
"source": "cna@vuldb.com"
},
{ {
"url": "https://github.com/wavelog/wavelog/commit/b31002cec6b71ab5f738881806bb546430ec692e", "operator": "OR",
"source": "cna@vuldb.com" "negate": false,
}, "cpeMatch": [
{ {
"url": "https://github.com/wavelog/wavelog/pull/744", "vulnerable": true,
"source": "cna@vuldb.com" "criteria": "cpe:2.3:a:wavelog:wavelog:*:*:*:*:*:*:*:*",
}, "versionEndExcluding": "1.8.1",
{ "matchCriteriaId": "8EDB2033-209C-4125-8398-926AA49008D6"
"url": "https://github.com/wavelog/wavelog/releases/tag/1.8.1", }
"source": "cna@vuldb.com" ]
}, }
{ ]
"url": "https://vuldb.com/?ctiid.276726", }
"source": "cna@vuldb.com" ],
}, "references": [
{ {
"url": "https://vuldb.com/?id.276726", "url": "https://github.com/GithubUser843205/CVEs/tree/main/CVE-2024-8521",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
}, "tags": [
{ "Exploit"
"url": "https://vuldb.com/?submit.399819", ]
"source": "cna@vuldb.com" },
{
"url": "https://github.com/wavelog/wavelog/commit/b31002cec6b71ab5f738881806bb546430ec692e",
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/wavelog/wavelog/pull/744",
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/wavelog/wavelog/releases/tag/1.8.1",
"source": "cna@vuldb.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.276726",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.276726",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.399819",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8851", "id": "CVE-2024-8851",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:59.967", "published": "2025-05-15T20:15:59.967",
"lastModified": "2025-05-16T21:15:33.257", "lastModified": "2025-06-04T16:31:03.757",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,10 +39,44 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://wpscan.com/vulnerability/493f3360-3155-4105-9b5c-60a8605275ab/", "source": "nvd@nist.gov",
"source": "contact@wpscan.com" "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codepeople:polls_cp:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.77",
"matchCriteriaId": "71B64A6F-9192-4C6E-BDA6-3A65327FC808"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/493f3360-3155-4105-9b5c-60a8605275ab/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8854", "id": "CVE-2024-8854",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:16:00.053", "published": "2025-05-15T20:16:00.053",
"lastModified": "2025-05-16T21:15:33.380", "lastModified": "2025-06-04T16:31:17.827",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,10 +39,44 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://wpscan.com/vulnerability/bffe0f75-33a2-4270-af13-835b8eb65688/", "source": "nvd@nist.gov",
"source": "contact@wpscan.com" "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codepeople:polls_cp:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.77",
"matchCriteriaId": "71B64A6F-9192-4C6E-BDA6-3A65327FC808"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/bffe0f75-33a2-4270-af13-835b8eb65688/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20129",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:25.407",
"lastModified": "2025-06-04T17:15:25.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based chat interface of Cisco Customer Collaboration Platform (CCP), formerly Cisco SocialMiner, could allow an unauthenticated, remote attacker to persuade users to disclose sensitive data.\r\n\r\nThis vulnerability is due to improper sanitization of HTTP requests that are sent to the web-based chat interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the chat interface of a targeted user on a vulnerable server. A successful exploit could allow the attacker to redirect chat traffic to a server that is under their control, resulting in sensitive information being redirected to the attacker."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccp-info-disc-ZyGerQpd",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20130",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:25.833",
"lastModified": "2025-06-04T17:15:25.833",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the API of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to upload files to an affected device.\r\n\r\nThis vulnerability is due to improper validation of the file copy function. An attacker could exploit this vulnerability by sending a crafted file upload request to a specific API endpoint. A successful exploit could allow the attacker to upload arbitrary files to an affected system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-P4M8vwXY",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20163",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:26.037",
"lastModified": "2025-06-04T17:15:26.037",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the SSH implementation of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an unauthenticated, remote attacker to impersonate Cisco NDFC-managed devices.\r\n\r\nThis vulnerability is due to insufficient SSH host key validation. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on SSH connections to Cisco NDFC-managed devices, which could allow an attacker to intercept this traffic. A successful exploit could allow the attacker to impersonate a managed device and capture user credentials."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-322"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-shkv-snQJtjrp",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20259",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:26.620",
"lastModified": "2025-06-04T17:15:26.620",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the update process of Cisco ThousandEyes Endpoint Agent for Windows could allow an authenticated, local attacker to delete arbitrary files on an affected device.\r\n\r\nThese vulnerabilities are due to improper access controls on files that are in the local file system. An attacker could exploit these vulnerabilities by using a symbolic link to perform an agent upgrade that redirects the delete operation of any protected file. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-te-endagent-filewrt-zNcDqNRJ",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20261",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:26.827",
"lastModified": "2025-06-04T17:15:26.827",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the SSH connection handling of Cisco Integrated Management Controller (IMC) for Cisco UCS B-Series, UCS C-Series, UCS S-Series, and UCS X-Series Servers could allow an authenticated, remote attacker to access internal services with elevated privileges.\r\n\r\nThis vulnerability is due to insufficient restrictions on access to internal services. An attacker with a valid user account could exploit this vulnerability by using crafted syntax when connecting to the Cisco IMC of an affected device through SSH. A successful exploit could allow the attacker to access internal services with elevated privileges, which may allow unauthorized modifications to the system, including the possibility of creating new administrator accounts on the affected device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-923"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-ssh-priv-esc-2mZDtdjM",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20273",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:27.050",
"lastModified": "2025-06-04T17:15:27.050",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Unified Intelligent Contact Management Enterprise could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device.\r\n\r\nThis vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-icm-xss-cfcqhXAg",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20275",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:27.350",
"lastModified": "2025-06-04T17:15:27.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the file opening process of Cisco Unified Contact Center Express (Unified CCX) Editor could allow an unauthenticated attacker to execute arbitrary code on an affected device. \r\n\r\nThis vulnerability is due to insecure deserialization of Java objects by the affected software. An attacker could exploit this vulnerability by persuading an authenticated, local user to open a crafted .aef file. A successful exploit could allow the attacker to execute arbitrary code on the host that is running the editor application with the privileges of the user who launched it."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-editor-rce-ezyYZte8",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20276",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:27.547",
"lastModified": "2025-06-04T17:15:27.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Unified CCX could allow an authenticated, remote attacker to execute arbitrary code on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials. \r\n\r\nThis vulnerability is due to insecure deserialization of Java objects by the affected software. An attacker could exploit this vulnerability by sending a crafted Java object to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of an affected device as a low-privilege user. A successful exploit could also allow the attacker to undertake further actions to elevate their privileges to root."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 3.8,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-multi-UhOTvPGL",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20277",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:27.753",
"lastModified": "2025-06-04T17:15:27.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Unified CCX could allow an authenticated, local attacker to execute arbitrary code on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r\nThis vulnerability is due to improper limitation of a pathname to a restricted directory (path traversal). An attacker could exploit this vulnerability by sending a crafted web request to an affected device, followed by a specific command through an SSH session. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of an affected device as a low-privilege user. A successful exploit could also allow the attacker to undertake further actions to elevate their privileges to root."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 3.4,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-multi-UhOTvPGL",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20278",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:27.963",
"lastModified": "2025-06-04T17:15:27.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of multiple Cisco Unified Communications products could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user.\r\n\r\nThis vulnerability is due to improper validation of user-supplied command arguments. An attacker could exploit this vulnerability by executing crafted commands on the CLI of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user. To exploit this vulnerability, the attacker must have valid administrative credentials."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vos-command-inject-65s2UCYy",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20279",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:28.213",
"lastModified": "2025-06-04T17:15:28.213",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Unified CCX could allow an authenticated, remote attacker to conduct a stored XSS attack on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r\nThis vulnerability is due to improper sanitization of user input to the web-based management interface. An attacker could exploit this vulnerability by submitting a malicious script through the interface. A successful exploit could allow the attacker to conduct a stored XSS attack on the affected system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-multi-UhOTvPGL",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20286",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:28.427",
"lastModified": "2025-06-04T17:15:28.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems.\r\n\r\nThis vulnerability exists because credentials are improperly generated when Cisco ISE is being deployed on cloud platforms, resulting in different Cisco ISE deployments sharing the same credentials. These credentials are shared across multiple Cisco ISE deployments as long as the software release and cloud platform are the same. An attacker could exploit this vulnerability by extracting the user credentials from Cisco ISE that is deployed in the cloud and then using them to access Cisco ISE that is deployed in other cloud environments through unsecured ports. A successful exploit could allow the attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems.\r\nNote: If the Primary Administration node is deployed in the cloud, then Cisco ISE is affected by this vulnerability. If the Primary Administration node is on-premises, then it is not affected."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-259"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-aws-static-cred-FPMjUcm7",
"source": "psirt@cisco.com"
}
]
}

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-23106",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-04T16:15:35.457",
"lastModified": "2025-06-04T16:15:35.457",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. A Use-After-Free in the mobile processor leads to privilege escalation."
}
],
"metrics": {},
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23106/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2025-2336",
"sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c",
"published": "2025-06-04T17:15:28.643",
"lastModified": "2025-06-04T17:15:28.643",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper sanitization of the value of the 'href' and 'xlink:href' attributes in '<image>' SVG elements in AngularJS's\u00a0'ngSanitize'\u00a0module allows attackers to bypass common image source restrictions. This can lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing \u00a0and also negatively affect the application's performance and behavior by using too large or slow-to-load images.\n\nThis issue affects AngularJS versions greater than or equal to 1.3.1.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status ."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "36c7be3b-2937-45df-85ea-ca7133ea542c",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "36c7be3b-2937-45df-85ea-ca7133ea542c",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-791"
}
]
}
],
"references": [
{
"url": "https://codepen.io/herodevs/pen/bNGYaXx/412a3a4218387479898912f60c269c6c",
"source": "36c7be3b-2937-45df-85ea-ca7133ea542c"
},
{
"url": "https://www.herodevs.com/vulnerability-directory/cve-2025-2336",
"source": "36c7be3b-2937-45df-85ea-ca7133ea542c"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2676", "id": "CVE-2025-2676",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-24T01:15:17.177", "published": "2025-03-24T01:15:17.177",
"lastModified": "2025-03-26T13:55:26.630", "lastModified": "2025-06-04T16:05:00.420",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -131,7 +131,7 @@
"weaknesses": [ "weaknesses": [
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Secondary", "type": "Primary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -163,8 +163,8 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:phpgurukul:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10" "matchCriteriaId": "E8782F27-C73C-497B-92B3-2F9DC551C233"
} }
] ]
} }
@ -177,7 +177,8 @@
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"tags": [ "tags": [
"Exploit", "Exploit",
"Third Party Advisory" "Third Party Advisory",
"Issue Tracking"
] ]
}, },
{ {
@ -207,8 +208,8 @@
"url": "https://vuldb.com/?submit.521443", "url": "https://vuldb.com/?submit.521443",
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"tags": [ "tags": [
"VDB Entry", "Third Party Advisory",
"Third Party Advisory" "VDB Entry"
] ]
} }
] ]

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2677", "id": "CVE-2025-2677",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-24T02:15:15.540", "published": "2025-03-24T02:15:15.540",
"lastModified": "2025-03-26T13:48:38.670", "lastModified": "2025-06-04T16:03:58.597",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -131,7 +131,7 @@
"weaknesses": [ "weaknesses": [
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Secondary", "type": "Primary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -163,8 +163,8 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:phpgurukul:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10" "matchCriteriaId": "E8782F27-C73C-497B-92B3-2F9DC551C233"
} }
] ]
} }
@ -177,8 +177,8 @@
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"tags": [ "tags": [
"Exploit", "Exploit",
"Third Party Advisory", "Issue Tracking",
"Issue Tracking" "Third Party Advisory"
] ]
}, },
{ {
@ -200,16 +200,16 @@
"url": "https://vuldb.com/?id.300694", "url": "https://vuldb.com/?id.300694",
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"tags": [ "tags": [
"VDB Entry", "Third Party Advisory",
"Third Party Advisory" "VDB Entry"
] ]
}, },
{ {
"url": "https://vuldb.com/?submit.521444", "url": "https://vuldb.com/?submit.521444",
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"tags": [ "tags": [
"VDB Entry", "Third Party Advisory",
"Third Party Advisory" "VDB Entry"
] ]
} }
] ]

File diff suppressed because it is too large Load Diff

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-27954", "id": "CVE-2025-27954",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-06-02T18:15:24.030", "published": "2025-06-02T18:15:24.030",
"lastModified": "2025-06-04T14:54:53.980", "lastModified": "2025-06-04T16:15:35.770",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en Clinical Collaboration Platform 12.2.1.5 permite que un atacante remoto obtenga informaci\u00f3n confidencial y ejecute c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n usertoken de default.aspx." "value": "Un problema en Clinical Collaboration Platform 12.2.1.5 permite que un atacante remoto obtenga informaci\u00f3n confidencial y ejecute c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n usertoken de default.aspx."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/intruderlabs/cvex/tree/main/Carestream/session-token-in-url", "url": "https://github.com/intruderlabs/cvex/tree/main/Carestream/session-token-in-url",

Some files were not shown because too many files have changed in this diff Show More