Auto-Update: 2025-06-04T18:00:20.827512+00:00

This commit is contained in:
cad-safe-bot 2025-06-04 18:03:58 +00:00
parent 890d8e85cb
commit f842c6e70b
131 changed files with 11025 additions and 790 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2011-2016",
"sourceIdentifier": "secure@microsoft.com",
"published": "2011-11-08T21:55:01.287",
"lastModified": "2025-04-11T00:51:21.963",
"lastModified": "2025-06-04T16:15:25.527",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-1745",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2014-05-21T11:14:09.677",
"lastModified": "2025-04-12T10:46:40.837",
"lastModified": "2025-06-04T16:15:26.713",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -52,6 +74,16 @@
"value": "CWE-399"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34701",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.847",
"lastModified": "2024-11-21T07:10:00.323",
"lastModified": "2025-06-04T16:15:27.477",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
@ -69,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34702",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.910",
"lastModified": "2024-11-21T07:10:00.490",
"lastModified": "2025-06-04T16:15:27.707",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
@ -49,6 +49,16 @@
"value": "CWE-362"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34703",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.967",
"lastModified": "2024-11-21T07:10:00.630",
"lastModified": "2025-06-04T16:15:27.880",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34705",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.083",
"lastModified": "2024-11-21T07:10:00.883",
"lastModified": "2025-06-04T16:15:28.040",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -49,6 +49,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34706",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.140",
"lastModified": "2024-11-21T07:10:01.003",
"lastModified": "2025-06-04T16:15:28.197",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34707",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.203",
"lastModified": "2024-11-21T07:10:01.167",
"lastModified": "2025-06-04T16:15:28.363",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -49,6 +49,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37137",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-14T11:15:50.153",
"lastModified": "2024-11-21T07:14:30.273",
"lastModified": "2025-06-04T16:15:28.550",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32167",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T02:15:21.880",
"lastModified": "2025-02-05T21:15:22.310",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T17:03:55.887",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -83,22 +83,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dlink:d-view_8:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0.1.89",
"matchCriteriaId": "6615CD5D-98F9-43B3-A9D2-44F83DB02689"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10332",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-718/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10332",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-718/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34302",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T02:15:31.207",
"lastModified": "2025-02-05T17:15:20.573",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T17:24:06.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -83,14 +83,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ashlar:cobalt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.4.1204.200",
"matchCriteriaId": "79D6F5D0-D5E5-4D09-A6C7-1FB59204DA27"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-862/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-862/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35710",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T02:15:33.090",
"lastModified": "2025-02-05T17:15:20.760",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T17:26:14.160",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -83,14 +83,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ashlar:cobalt:1204.57:*:*:*:*:*:*:*",
"matchCriteriaId": "F56E1DAA-535C-4396-960E-DA9FC2CDB5DB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-873/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-873/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35712",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T02:15:33.447",
"lastModified": "2025-02-04T17:15:15.947",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T17:26:17.243",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -83,14 +83,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ashlar:cobalt:1204.59:*:*:*:*:*:*:*",
"matchCriteriaId": "2D240A5B-56BC-4134-ACD6-77FA212E01C0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-875/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-875/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5529",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:28.377",
"lastModified": "2025-05-16T19:15:48.500",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-04T16:25:59.440",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pagevisitcounter:advanced_page_visit_counter:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "8.0.6",
"matchCriteriaId": "67B90117-F137-41D3-8343-2DB5417C3C38"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/095c9c35-2618-4f90-8435-a3c34f0bb7f1/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5932",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:28.637",
"lastModified": "2025-05-16T19:15:48.617",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-04T16:30:14.460",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:travelpayouts:travelpayouts:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.14",
"matchCriteriaId": "B928B1FA-2C88-4568-A706-79BAEC3943D1"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/16fbca64-cc35-455e-bfef-d1f28857f991/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5934",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:28.720",
"lastModified": "2025-05-16T19:15:48.740",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-04T16:37:15.200",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:travelpayouts:travelpayouts:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.13",
"matchCriteriaId": "52682883-A14C-4B0A-9C0D-54FDACA3E105"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/2a45cdba-df41-457e-bff9-2d6d89776dd0/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10075",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:32.450",
"lastModified": "2025-05-20T17:15:46.500",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-04T16:49:41.220",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automattic:jetpack:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "13.8",
"matchCriteriaId": "839BA77A-695D-4677-8FF2-39B566D5421D"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/a984976c-291a-4f68-90d4-e452605ea7d1/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/a984976c-291a-4f68-90d4-e452605ea7d1/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10076",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:32.533",
"lastModified": "2025-05-20T16:15:23.873",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-04T16:50:53.673",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,56 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automattic:jetpack:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "13.8",
"matchCriteriaId": "839BA77A-695D-4677-8FF2-39B566D5421D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automattic:jetpack_boost:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.4.8",
"matchCriteriaId": "7A7C8F9C-07EE-4F1D-99AE-A782F8FDCA67"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/15f278f6-0418-4c83-b925-b1a2d8c53e2f/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/15f278f6-0418-4c83-b925-b1a2d8c53e2f/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1103",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-31T15:15:10.863",
"lastModified": "2024-11-21T08:49:48.223",
"vulnStatus": "Modified",
"lastModified": "2025-06-04T17:52:03.500",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -105,8 +105,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:surajkumarvishwakarma:real_estate_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "21361FB2-BF44-43B2-B59A-F6539F07703B"
"criteria": "cpe:2.3:a:codeastro:real_estate_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "64EAEAD6-B0EE-4039-B827-3C243E2058F4"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13237",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:17.437",
"lastModified": "2025-01-09T21:15:24.977",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:31:52.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,44 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:file_entity_project:file_entity:*:*:*:*:*:drupal:*:*",
"versionStartIncluding": "7.x-2.0",
"versionEndExcluding": "7.x-2.38",
"matchCriteriaId": "8B5354A0-E0A8-4182-A874-90331DEEBEE4"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2024-001",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13238",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:17.557",
"lastModified": "2025-01-09T21:15:25.130",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:33:13.937",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,43 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typogrify_project:typogrify:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "8.x-1.3",
"matchCriteriaId": "6B281A25-D0D8-43E0-AA51-811206D355EE"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2024-002",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13239",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:17.663",
"lastModified": "2025-01-10T18:15:19.477",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:38:42.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,43 @@
"value": "CWE-1390"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:two-factor_authentication_project:two-factor_authentication:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "8.x-1.5",
"matchCriteriaId": "1B5226B1-893E-4148-9B06-25152D168912"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2024-003",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13240",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:17.780",
"lastModified": "2025-01-10T18:15:19.667",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:41:18.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,44 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getopensocial:open_social:*:*:*:*:*:drupal:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "12.0.5",
"matchCriteriaId": "B8427E13-9459-4D32-AC82-EAF5308387E2"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2024-004",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13241",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:17.910",
"lastModified": "2025-01-10T18:15:19.887",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:42:45.603",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,43 @@
"value": "CWE-285"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getopensocial:open_social:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "12.0.5",
"matchCriteriaId": "1B412E88-E6CF-4C9F-9D43-A09875055454"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2024-005",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13242",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:18.033",
"lastModified": "2025-01-10T18:15:20.073",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:49:53.157",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,42 @@
"value": "CWE-749"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:swift_mailer_project:swift_mailer:*:*:*:*:*:drupal:*:*",
"matchCriteriaId": "31FEC821-3005-44A1-A2E6-147A6A8D8872"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2024-006",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13243",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:18.140",
"lastModified": "2025-01-10T17:15:12.363",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:50:44.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,43 @@
"value": "CWE-862"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:entity_delete_log_project:entity_delete_log:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "1.1.1",
"matchCriteriaId": "2C997466-90F5-4615-8011-6D9565A69E34"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2024-007",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13244",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:18.250",
"lastModified": "2025-01-10T17:15:12.520",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:55:00.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,51 @@
"value": "CWE-352"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:migrate_tools_project:migrate_tools:*:*:*:*:*:drupal:*:*",
"versionStartIncluding": "6.0.0",
"versionEndExcluding": "6.0.3",
"matchCriteriaId": "3310A267-04F0-4B4F-92C8-80BFD4260449"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:migrate_tools_project:migrate_tools:*:*:*:*:*:drupal:*:*",
"versionStartIncluding": "8.x-1.0",
"versionEndIncluding": "8.x-5.2",
"matchCriteriaId": "4A340A6D-396B-40E1-82BD-5C720297BE0B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2024-008",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13250",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:18.980",
"lastModified": "2025-01-10T17:15:12.680",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:28:11.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,43 @@
"value": "CWE-352"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal_symfony_mailer_lite_project:drupal_symfony_mailer_lite:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "1.0.6",
"matchCriteriaId": "F2A17A09-51D4-43F3-A202-8BF76D54B836"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2024-014",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13251",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:19.093",
"lastModified": "2025-01-10T17:15:12.840",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:06:49.463",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,43 @@
"value": "CWE-266"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:registration_role_project:registration_role:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "2.0.1",
"matchCriteriaId": "2A7A9264-4621-443D-AD40-D7BA51AD528F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2024-015",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13252",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:19.207",
"lastModified": "2025-01-09T21:15:25.620",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:11:39.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,44 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tacjs_project:tacjs:*:*:*:*:*:drupal:*:*",
"versionStartIncluding": "8.x-1.0",
"versionEndExcluding": "8.x-6.5",
"matchCriteriaId": "B276B190-9B3A-4878-9CBE-32068041C862"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2024-016",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13253",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:19.317",
"lastModified": "2025-01-10T17:15:13.000",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:08:21.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,43 @@
"value": "CWE-863"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:advanced_pwa_inc_push_notifications_project:advanced_pwa_inc_push_notifications:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "8.x-1.5",
"matchCriteriaId": "B7D03E48-B643-4FEF-938D-9DA0A7D6DB94"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2024-017",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13254",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:19.437",
"lastModified": "2025-01-10T17:15:13.160",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:12:48.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,43 @@
"value": "CWE-201"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rest_views_project:rest_views:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "3.0.1",
"matchCriteriaId": "21A731AF-6DE4-42F3-8C03-0493DC7A30DE"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2024-018",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13255",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T19:15:19.540",
"lastModified": "2025-01-10T17:15:13.323",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:25:15.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,44 @@
"value": "CWE-202"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:restful_web_services_project:restful_web_services:*:*:*:*:*:drupal:*:*",
"versionStartIncluding": "7.x-2.0",
"versionEndExcluding": "7.x-2.10",
"matchCriteriaId": "340943F6-A1E3-438A-AEF0-9929EE99BB1E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2024-019",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23031",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-01T23:15:11.020",
"lastModified": "2024-11-21T08:56:51.323",
"lastModified": "2025-06-04T16:15:28.887",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23172",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-12T05:15:10.187",
"lastModified": "2024-11-21T08:57:07.193",
"lastModified": "2025-06-04T16:15:29.090",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23180",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-01-23T10:15:10.440",
"lastModified": "2024-11-21T08:57:08.213",
"lastModified": "2025-06-04T16:15:29.313",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23207",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:10.887",
"lastModified": "2024-11-21T08:57:11.247",
"lastModified": "2025-06-04T16:15:29.507",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23208",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:10.930",
"lastModified": "2024-11-21T08:57:11.403",
"lastModified": "2025-06-04T16:15:29.780",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23210",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:11.033",
"lastModified": "2024-11-21T08:57:11.727",
"lastModified": "2025-06-04T16:15:29.973",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23218",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:11.403",
"lastModified": "2024-11-21T08:57:12.947",
"lastModified": "2025-06-04T16:15:30.170",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-203"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23219",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:11.450",
"lastModified": "2024-11-21T08:57:13.093",
"lastModified": "2025-06-04T16:15:30.493",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-287"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23223",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:11.557",
"lastModified": "2024-11-21T08:57:13.563",
"lastModified": "2025-06-04T16:15:30.657",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23301",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-12T23:15:10.030",
"lastModified": "2024-11-21T08:57:27.587",
"lastModified": "2025-06-04T16:15:30.847",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23304",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-02-06T05:15:10.630",
"lastModified": "2024-11-21T08:57:27.987",
"lastModified": "2025-06-04T16:15:31.080",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-426"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-426"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23452",
"sourceIdentifier": "security@apache.org",
"published": "2024-02-08T09:15:46.420",
"lastModified": "2025-02-13T18:17:02.960",
"lastModified": "2025-06-04T16:15:31.587",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,13 +36,33 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23453",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-01-24T00:15:08.327",
"lastModified": "2024-11-21T08:57:44.420",
"lastModified": "2025-06-04T16:15:31.813",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-798"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23681",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2024-01-19T21:15:10.207",
"lastModified": "2024-11-21T08:58:09.807",
"lastModified": "2025-06-04T16:15:32.000",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.5,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23731",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-21T17:15:44.443",
"lastModified": "2024-11-21T08:58:15.953",
"lastModified": "2025-06-04T16:15:32.220",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-88"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-88"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23744",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-21T23:15:44.833",
"lastModified": "2024-11-21T08:58:18.277",
"lastModified": "2025-06-04T16:15:32.440",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23746",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T02:15:18.330",
"lastModified": "2024-11-21T08:58:18.647",
"lastModified": "2025-06-04T16:15:32.800",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-94"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23851",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-23T09:15:36.180",
"lastModified": "2024-11-21T08:58:33.703",
"lastModified": "2025-06-04T16:15:33.223",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23941",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-02-01T04:15:49.967",
"lastModified": "2024-11-21T08:58:43.940",
"lastModified": "2025-06-04T16:15:35.160",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2696",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-12T06:15:03.680",
"lastModified": "2024-11-21T09:10:18.937",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:16:24.410",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:swiftideas:swift_framework:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2024.04.30",
"matchCriteriaId": "EE7F8F0D-C942-4862-81AA-0C4EDBEAE87C"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/b6e64af0-adeb-4e28-9a81-f4024b0446ee/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/b6e64af0-adeb-4e28-9a81-f4024b0446ee/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27728",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T19:15:18.477",
"lastModified": "2024-08-20T14:35:06.747",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T17:18:07.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:friendica:friendica:2023.12:*:*:*:*:*:*:*",
"matchCriteriaId": "650584BD-FC4F-4520-BC82-38FED3F04B29"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/friendica/friendica/pull/13927",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://leo.oliver.nz/posts/2024/05/friendica-cve-disclosures/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27730",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T19:15:18.663",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T17:18:18.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:friendica:friendica:2023.12:*:*:*:*:*:*:*",
"matchCriteriaId": "650584BD-FC4F-4520-BC82-38FED3F04B29"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/friendica/friendica/pull/13927",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://leo.oliver.nz/posts/2024/05/friendica-cve-disclosures/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27731",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T19:15:18.770",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T17:18:28.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:friendica:friendica:2023.12:*:*:*:*:*:*:*",
"matchCriteriaId": "650584BD-FC4F-4520-BC82-38FED3F04B29"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/friendica/friendica/pull/13927",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://leo.oliver.nz/posts/2024/05/friendica-cve-disclosures/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2870",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-13T06:15:02.310",
"lastModified": "2024-11-21T09:10:43.113",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:16:48.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:swiftideas:swift_framework:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2024.04.30",
"matchCriteriaId": "EE7F8F0D-C942-4862-81AA-0C4EDBEAE87C"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/688522d2-ee28-44f8-828d-352f06e43885/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/688522d2-ee28-44f8-828d-352f06e43885/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32674",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-05-08T04:15:09.840",
"lastModified": "2024-11-21T09:15:26.933",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-04T17:23:08.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:heateor:social_login:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.32",
"matchCriteriaId": "97B44230-A277-4A15-B954-4B365FFCEBDC"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN87694318/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/heateor-social-login/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
},
{
"url": "https://jvn.jp/en/jp/JVN87694318/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/heateor-social-login/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33526",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-21T15:15:28.933",
"lastModified": "2024-11-21T09:17:04.753",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T17:27:49.967",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,62 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0",
"versionEndExcluding": "7.30",
"matchCriteriaId": "52D67CB8-7E23-48B1-8092-1E8F37C03F12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0",
"versionEndExcluding": "8.11",
"matchCriteriaId": "AB4AF100-B4F1-4EE1-AC8D-8F0EF216C0B0"
}
]
}
]
}
],
"references": [
{
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33527",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-21T15:15:29.050",
"lastModified": "2024-11-21T09:17:04.980",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T17:27:43.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,62 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0",
"versionEndExcluding": "7.30",
"matchCriteriaId": "52D67CB8-7E23-48B1-8092-1E8F37C03F12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0",
"versionEndExcluding": "8.11",
"matchCriteriaId": "AB4AF100-B4F1-4EE1-AC8D-8F0EF216C0B0"
}
]
}
]
}
],
"references": [
{
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33528",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-21T15:15:29.167",
"lastModified": "2024-11-21T09:17:05.203",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T17:27:37.820",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,62 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0",
"versionEndExcluding": "7.30",
"matchCriteriaId": "52D67CB8-7E23-48B1-8092-1E8F37C03F12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0",
"versionEndExcluding": "8.11",
"matchCriteriaId": "AB4AF100-B4F1-4EE1-AC8D-8F0EF216C0B0"
}
]
}
]
}
],
"references": [
{
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33529",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-21T15:15:29.290",
"lastModified": "2025-03-28T19:15:21.903",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T17:27:26.117",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,67 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0",
"versionEndExcluding": "7.30",
"matchCriteriaId": "52D67CB8-7E23-48B1-8092-1E8F37C03F12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0",
"versionEndExcluding": "8.11",
"matchCriteriaId": "AB4AF100-B4F1-4EE1-AC8D-8F0EF216C0B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ilias:ilias:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "268EF08B-B722-4D02-9013-C538FFE28FB1"
}
]
}
]
}
],
"references": [
{
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170040",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170040",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36650",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-11T16:15:29.043",
"lastModified": "2024-11-21T09:22:28.967",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T17:24:49.253",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:a3100r_firmware:4.1.2cu.5247_b20211129:*:*:*:*:*:*:*",
"matchCriteriaId": "9098D12E-0A3B-4CBF-AC5E-43C5394C7719"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:a3100r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40729E79-9D89-440F-B38D-E62D310E27F9"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Swind1er/f442fcac520a48c05c744c7b72362483",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Swind1er/f442fcac520a48c05c744c7b72362483",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39963",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-19T15:15:10.383",
"lastModified": "2024-11-21T09:28:38.597",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-04T17:02:19.887",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,78 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ax9_firmware:22.03.01.46:*:*:*:*:*:*:*",
"matchCriteriaId": "8FE7BDA5-B565-4E85-B253-880733FFC0B3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ax9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7542BB3-674B-4684-A3C6-91F9A0FBDD93"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ax12_firmware:22.03.01.46:*:*:*:*:*:*:*",
"matchCriteriaId": "ACC5CA19-0A08-462F-A948-9D2338076B61"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ax12:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "19AB5CD4-69C7-4619-8A1B-34B70D738D34"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Swind1er/c8e4369c7fdfd750c8ad01a276105c57",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Swind1er/c8e4369c7fdfd750c8ad01a276105c57",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40400",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-19T19:15:09.147",
"lastModified": "2024-11-21T09:31:02.747",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-04T16:46:06.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,62 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automad:automad:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.10.9",
"matchCriteriaId": "22AF6DF3-DC97-4C61-8445-D37FC2667D2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automad:automad:2.0.0:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "6BE6293D-5E0A-40BB-BA07-CEA72DA5C304"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automad:automad:2.0.0:alpha2:*:*:*:*:*:*",
"matchCriteriaId": "BFED5CBF-6897-49DF-BB3C-1D1CD01CDD82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automad:automad:2.0.0:alpha3:*:*:*:*:*:*",
"matchCriteriaId": "AA74897C-3FCE-4DE4-9B0E-8C49EF75BDD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automad:automad:2.0.0:alpha4:*:*:*:*:*:*",
"matchCriteriaId": "D79102BB-6E1E-4368-BEF7-7E2D0DE517BB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/marcantondahmen/automad/issues/106",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://github.com/marcantondahmen/automad/issues/106",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41139",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-07-29T09:15:02.563",
"lastModified": "2024-11-21T09:32:18.463",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:54:14.690",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skygroup:skysea_client_view:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.010.06",
"versionEndExcluding": "19.300.09h",
"matchCriteriaId": "C7B66BCD-8F7A-4AF9-9641-5AEBEFB6A15E"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN84326763/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.skyseaclientview.net/news/240729_02/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://jvn.jp/en/jp/JVN84326763/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.skyseaclientview.net/news/240729_02/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41281",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-19T17:15:03.330",
"lastModified": "2024-11-21T09:32:28.557",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-04T17:01:40.193",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linksys:wrt54g_firmware:4.21.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4A5CABCB-BD1B-4BFE-B6F5-CA80E16FD7C8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:linksys:wrt54g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79522505-0F38-4FC3-A9FB-00996F236ED4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/BuaaIOTTeam/Iot_Linksys/blob/main/Linksys_WRT54G_get_merge_mac.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/BuaaIOTTeam/Iot_Linksys/blob/main/Linksys_WRT54G_get_merge_mac.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41726",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-07-29T09:15:02.703",
"lastModified": "2024-11-21T09:33:03.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:54:49.050",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skygroup:skysea_client_view:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.200.13i",
"versionEndExcluding": "19.300.09h",
"matchCriteriaId": "3E9EC5EC-22BC-4BC4-BF45-D258CEB2C3C2"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN84326763/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.skyseaclientview.net/news/240729_02/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://jvn.jp/en/jp/JVN84326763/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.skyseaclientview.net/news/240729_02/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46278",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-07T16:15:05.547",
"lastModified": "2024-10-07T20:35:10.653",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-04T17:08:35.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sismics:teedy:1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AB7008DF-9901-48D2-9079-D4F89F4E810E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ayato-shitomi/CVE-2024-46278-teedy_1.11_account-takeover",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/ayato-shitomi/teedy_1.11_account-takeover",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46330",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T14:15:09.433",
"lastModified": "2024-09-30T12:46:20.237",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:16:02.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:vonets:vap11g-300_firmware:3.3.23.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8BB578CE-F4E2-4ABE-AFF5-D45B46DC4682"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:vonets:vap11g-300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B23375E-0E77-4423-AEDA-9A9F26052834"
}
]
}
]
}
],
"references": [
{
"url": "https://hawktesters.com/5519644d-246e-4924-b7c8-8fdf742117be/704b5e66-fee5-4289-aa55-eb7feb5f0edc.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48905",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-01T21:15:52.033",
"lastModified": "2025-05-06T16:15:26.390",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T17:26:59.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sematell:replyone:7.4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "604F1F53-A672-43BA-BE95-674B51590DD6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-082.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-082.txt",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48906",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-01T21:15:52.160",
"lastModified": "2025-05-06T16:15:26.597",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T17:26:52.673",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sematell:replyone:7.4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "604F1F53-A672-43BA-BE95-674B51590DD6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-081.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-081.txt",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48907",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-01T21:15:52.270",
"lastModified": "2025-05-02T15:15:47.830",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T17:26:45.490",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sematell:replyone:7.4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "604F1F53-A672-43BA-BE95-674B51590DD6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-083.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50305",
"sourceIdentifier": "security@apache.org",
"published": "2024-11-14T10:15:08.013",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:15:49.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,10 +61,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:traffic_server:*:-:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndExcluding": "9.2.6",
"matchCriteriaId": "1BC975AD-BDA9-4FE0-AAB0-7529EED6B114"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50306",
"sourceIdentifier": "security@apache.org",
"published": "2024-11-14T10:15:08.230",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:15:30.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:traffic_server:*:-:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndExcluding": "9.2.6",
"matchCriteriaId": "1BC975AD-BDA9-4FE0-AAB0-7529EED6B114"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.0.2",
"matchCriteriaId": "E45239B7-25FC-457A-BA85-D5353B4A1896"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52711",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-19T14:15:18.207",
"lastModified": "2024-11-22T18:15:17.860",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-04T17:02:31.407",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:di-8100_firmware:16.07.26a1:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA39417-3894-4D6D-A899-000F56AA482B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:di-8100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D417784-56F2-40AF-8FE8-C00E6F332131"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/CLan-nad/CVE/blob/main/D-Link/ip_position_asp/1.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8023",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-21T00:15:05.527",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:55:39.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -120,22 +140,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bladex:springblade:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.1.0",
"matchCriteriaId": "B5909ADC-4141-4EB4-9B7E-A337537565A3"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/topsky979/74dcbe81062718f314d81fb6ad5dc1e0",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.275292",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.275292",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.390087",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8521",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-07T08:15:11.523",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:56:10.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -120,34 +140,76 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wavelog:wavelog:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.1",
"matchCriteriaId": "8EDB2033-209C-4125-8398-926AA49008D6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/GithubUser843205/CVEs/tree/main/CVE-2024-8521",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/wavelog/wavelog/commit/b31002cec6b71ab5f738881806bb546430ec692e",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/wavelog/wavelog/pull/744",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/wavelog/wavelog/releases/tag/1.8.1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.276726",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.276726",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.399819",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8851",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:59.967",
"lastModified": "2025-05-16T21:15:33.257",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-04T16:31:03.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codepeople:polls_cp:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.77",
"matchCriteriaId": "71B64A6F-9192-4C6E-BDA6-3A65327FC808"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/493f3360-3155-4105-9b5c-60a8605275ab/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8854",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:16:00.053",
"lastModified": "2025-05-16T21:15:33.380",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-04T16:31:17.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codepeople:polls_cp:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.77",
"matchCriteriaId": "71B64A6F-9192-4C6E-BDA6-3A65327FC808"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/bffe0f75-33a2-4270-af13-835b8eb65688/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20129",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:25.407",
"lastModified": "2025-06-04T17:15:25.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based chat interface of Cisco Customer Collaboration Platform (CCP), formerly Cisco SocialMiner, could allow an unauthenticated, remote attacker to persuade users to disclose sensitive data.\r\n\r\nThis vulnerability is due to improper sanitization of HTTP requests that are sent to the web-based chat interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the chat interface of a targeted user on a vulnerable server. A successful exploit could allow the attacker to redirect chat traffic to a server that is under their control, resulting in sensitive information being redirected to the attacker."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccp-info-disc-ZyGerQpd",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20130",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:25.833",
"lastModified": "2025-06-04T17:15:25.833",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the API of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to upload files to an affected device.\r\n\r\nThis vulnerability is due to improper validation of the file copy function. An attacker could exploit this vulnerability by sending a crafted file upload request to a specific API endpoint. A successful exploit could allow the attacker to upload arbitrary files to an affected system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-P4M8vwXY",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20163",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:26.037",
"lastModified": "2025-06-04T17:15:26.037",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the SSH implementation of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an unauthenticated, remote attacker to impersonate Cisco NDFC-managed devices.\r\n\r\nThis vulnerability is due to insufficient SSH host key validation. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on SSH connections to Cisco NDFC-managed devices, which could allow an attacker to intercept this traffic. A successful exploit could allow the attacker to impersonate a managed device and capture user credentials."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-322"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-shkv-snQJtjrp",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20259",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:26.620",
"lastModified": "2025-06-04T17:15:26.620",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the update process of Cisco ThousandEyes Endpoint Agent for Windows could allow an authenticated, local attacker to delete arbitrary files on an affected device.\r\n\r\nThese vulnerabilities are due to improper access controls on files that are in the local file system. An attacker could exploit these vulnerabilities by using a symbolic link to perform an agent upgrade that redirects the delete operation of any protected file. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-te-endagent-filewrt-zNcDqNRJ",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20261",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:26.827",
"lastModified": "2025-06-04T17:15:26.827",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the SSH connection handling of Cisco Integrated Management Controller (IMC) for Cisco UCS B-Series, UCS C-Series, UCS S-Series, and UCS X-Series Servers could allow an authenticated, remote attacker to access internal services with elevated privileges.\r\n\r\nThis vulnerability is due to insufficient restrictions on access to internal services. An attacker with a valid user account could exploit this vulnerability by using crafted syntax when connecting to the Cisco IMC of an affected device through SSH. A successful exploit could allow the attacker to access internal services with elevated privileges, which may allow unauthorized modifications to the system, including the possibility of creating new administrator accounts on the affected device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-923"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-ssh-priv-esc-2mZDtdjM",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20273",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:27.050",
"lastModified": "2025-06-04T17:15:27.050",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Unified Intelligent Contact Management Enterprise could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device.\r\n\r\nThis vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-icm-xss-cfcqhXAg",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20275",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:27.350",
"lastModified": "2025-06-04T17:15:27.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the file opening process of Cisco Unified Contact Center Express (Unified CCX) Editor could allow an unauthenticated attacker to execute arbitrary code on an affected device. \r\n\r\nThis vulnerability is due to insecure deserialization of Java objects by the affected software. An attacker could exploit this vulnerability by persuading an authenticated, local user to open a crafted .aef file. A successful exploit could allow the attacker to execute arbitrary code on the host that is running the editor application with the privileges of the user who launched it."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-editor-rce-ezyYZte8",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20276",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:27.547",
"lastModified": "2025-06-04T17:15:27.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Unified CCX could allow an authenticated, remote attacker to execute arbitrary code on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials. \r\n\r\nThis vulnerability is due to insecure deserialization of Java objects by the affected software. An attacker could exploit this vulnerability by sending a crafted Java object to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of an affected device as a low-privilege user. A successful exploit could also allow the attacker to undertake further actions to elevate their privileges to root."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 3.8,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-multi-UhOTvPGL",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20277",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:27.753",
"lastModified": "2025-06-04T17:15:27.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Unified CCX could allow an authenticated, local attacker to execute arbitrary code on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r\nThis vulnerability is due to improper limitation of a pathname to a restricted directory (path traversal). An attacker could exploit this vulnerability by sending a crafted web request to an affected device, followed by a specific command through an SSH session. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of an affected device as a low-privilege user. A successful exploit could also allow the attacker to undertake further actions to elevate their privileges to root."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 3.4,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-multi-UhOTvPGL",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20278",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:27.963",
"lastModified": "2025-06-04T17:15:27.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of multiple Cisco Unified Communications products could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user.\r\n\r\nThis vulnerability is due to improper validation of user-supplied command arguments. An attacker could exploit this vulnerability by executing crafted commands on the CLI of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user. To exploit this vulnerability, the attacker must have valid administrative credentials."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vos-command-inject-65s2UCYy",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20279",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:28.213",
"lastModified": "2025-06-04T17:15:28.213",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Unified CCX could allow an authenticated, remote attacker to conduct a stored XSS attack on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r\nThis vulnerability is due to improper sanitization of user input to the web-based management interface. An attacker could exploit this vulnerability by submitting a malicious script through the interface. A successful exploit could allow the attacker to conduct a stored XSS attack on the affected system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-multi-UhOTvPGL",
"source": "psirt@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20286",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-04T17:15:28.427",
"lastModified": "2025-06-04T17:15:28.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems.\r\n\r\nThis vulnerability exists because credentials are improperly generated when Cisco ISE is being deployed on cloud platforms, resulting in different Cisco ISE deployments sharing the same credentials. These credentials are shared across multiple Cisco ISE deployments as long as the software release and cloud platform are the same. An attacker could exploit this vulnerability by extracting the user credentials from Cisco ISE that is deployed in the cloud and then using them to access Cisco ISE that is deployed in other cloud environments through unsecured ports. A successful exploit could allow the attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems.\r\nNote: If the Primary Administration node is deployed in the cloud, then Cisco ISE is affected by this vulnerability. If the Primary Administration node is on-premises, then it is not affected."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-259"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-aws-static-cred-FPMjUcm7",
"source": "psirt@cisco.com"
}
]
}

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-23106",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-04T16:15:35.457",
"lastModified": "2025-06-04T16:15:35.457",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. A Use-After-Free in the mobile processor leads to privilege escalation."
}
],
"metrics": {},
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23106/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2025-2336",
"sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c",
"published": "2025-06-04T17:15:28.643",
"lastModified": "2025-06-04T17:15:28.643",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper sanitization of the value of the 'href' and 'xlink:href' attributes in '<image>' SVG elements in AngularJS's\u00a0'ngSanitize'\u00a0module allows attackers to bypass common image source restrictions. This can lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing \u00a0and also negatively affect the application's performance and behavior by using too large or slow-to-load images.\n\nThis issue affects AngularJS versions greater than or equal to 1.3.1.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status ."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "36c7be3b-2937-45df-85ea-ca7133ea542c",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "36c7be3b-2937-45df-85ea-ca7133ea542c",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-791"
}
]
}
],
"references": [
{
"url": "https://codepen.io/herodevs/pen/bNGYaXx/412a3a4218387479898912f60c269c6c",
"source": "36c7be3b-2937-45df-85ea-ca7133ea542c"
},
{
"url": "https://www.herodevs.com/vulnerability-directory/cve-2025-2336",
"source": "36c7be3b-2937-45df-85ea-ca7133ea542c"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2676",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-24T01:15:17.177",
"lastModified": "2025-03-26T13:55:26.630",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:05:00.420",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -131,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -163,8 +163,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
"criteria": "cpe:2.3:a:phpgurukul:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E8782F27-C73C-497B-92B3-2F9DC551C233"
}
]
}
@ -177,7 +177,8 @@
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
"Third Party Advisory",
"Issue Tracking"
]
},
{
@ -207,8 +208,8 @@
"url": "https://vuldb.com/?submit.521443",
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
"Third Party Advisory",
"VDB Entry"
]
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2677",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-24T02:15:15.540",
"lastModified": "2025-03-26T13:48:38.670",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-04T16:03:58.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -131,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -163,8 +163,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
"criteria": "cpe:2.3:a:phpgurukul:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E8782F27-C73C-497B-92B3-2F9DC551C233"
}
]
}
@ -177,8 +177,8 @@
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
"Issue Tracking",
"Third Party Advisory"
]
},
{
@ -200,16 +200,16 @@
"url": "https://vuldb.com/?id.300694",
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.521444",
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
"Third Party Advisory",
"VDB Entry"
]
}
]

File diff suppressed because it is too large Load Diff

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-27954",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-02T18:15:24.030",
"lastModified": "2025-06-04T14:54:53.980",
"lastModified": "2025-06-04T16:15:35.770",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en Clinical Collaboration Platform 12.2.1.5 permite que un atacante remoto obtenga informaci\u00f3n confidencial y ejecute c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n usertoken de default.aspx."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/intruderlabs/cvex/tree/main/Carestream/session-token-in-url",

Some files were not shown because too many files have changed in this diff Show More