diff --git a/cpematch/05/05B3CE44-8EB8-4C20-B8D6-7AC2F062EF09.json b/cpematch/05/05B3CE44-8EB8-4C20-B8D6-7AC2F062EF09.json new file mode 100644 index 00000000000..b4b20081a9f --- /dev/null +++ b/cpematch/05/05B3CE44-8EB8-4C20-B8D6-7AC2F062EF09.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "05B3CE44-8EB8-4C20-B8D6-7AC2F062EF09", "criteria": "cpe:2.3:a:hashthemes:hash_form:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.1.1", "lastModified": "2025-02-14T19:47:23.733", "cpeLastModified": "2025-02-14T19:47:23.733", "created": "2025-02-14T19:47:23.733", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/2E/2E51EC0E-CD0A-4B0A-8DE3-55C41F818179.json b/cpematch/2E/2E51EC0E-CD0A-4B0A-8DE3-55C41F818179.json new file mode 100644 index 00000000000..602f26fafc5 --- /dev/null +++ b/cpematch/2E/2E51EC0E-CD0A-4B0A-8DE3-55C41F818179.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "2E51EC0E-CD0A-4B0A-8DE3-55C41F818179", "criteria": "cpe:2.3:a:hashthemes:hash_form:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.2.2", "lastModified": "2025-02-14T19:55:36.717", "cpeLastModified": "2025-02-14T19:55:36.717", "created": "2025-02-14T19:55:36.717", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/32/32A1EDDC-35D1-4A8A-BCD1-DC1810F385ED.json b/cpematch/32/32A1EDDC-35D1-4A8A-BCD1-DC1810F385ED.json new file mode 100644 index 00000000000..49261d943d0 --- /dev/null +++ b/cpematch/32/32A1EDDC-35D1-4A8A-BCD1-DC1810F385ED.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "32A1EDDC-35D1-4A8A-BCD1-DC1810F385ED", "criteria": "cpe:2.3:a:pomerium:pomerium:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.26.1", "lastModified": "2025-02-14T18:25:32.097", "cpeLastModified": "2025-02-14T18:25:32.097", "created": "2025-02-14T18:25:32.097", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:pomerium:pomerium:-:*:*:*:*:*:*:*", "cpeNameId": "FF697F7A-F927-45C7-B863-9C6E023467B9"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.0.1:*:*:*:*:*:*:*", "cpeNameId": "8E3F2515-A318-4613-B52C-902F420B99BB"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.0.2:*:*:*:*:*:*:*", "cpeNameId": "1C1F186F-7826-4B3C-88EA-B399F8689FA1"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.0.3:*:*:*:*:*:*:*", "cpeNameId": "806A67E7-2164-4F68-9405-78B26B7D9F3B"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.0.4:*:*:*:*:*:*:*", "cpeNameId": "E553CCD8-503A-4E68-AAF7-352E9415D6AF"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.0.5:*:*:*:*:*:*:*", "cpeNameId": "F07F9BCC-29CE-4171-B1ED-D31D8554CF8C"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.1.0:*:*:*:*:*:*:*", "cpeNameId": "E9C5594C-0846-43B4-8E3E-98010AB57B7B"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.2.0:*:*:*:*:*:*:*", "cpeNameId": "DF2648DF-FC57-4F5A-9C88-E5ADFD2BB111"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.2.1:*:*:*:*:*:*:*", "cpeNameId": "C986740E-EC70-4904-A4BC-39835B9A33FC"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.3.0:*:*:*:*:*:*:*", "cpeNameId": "FF2FF89F-77F0-4BA4-903E-9BCC6E9A43A5"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.3.1:*:*:*:*:*:*:*", "cpeNameId": "8B12284E-32AC-459C-B53F-DAB76972AB78"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.4.0:*:*:*:*:*:*:*", "cpeNameId": "E6D54E20-BBA7-4AF7-9F79-FC6C20A0DA50"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.4.1:*:*:*:*:*:*:*", "cpeNameId": "649CBA6E-709D-4DA2-BF26-4CD781BEE35F"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.4.2:*:*:*:*:*:*:*", "cpeNameId": "DD85B451-8893-4CA1-8110-4DFF1372FAF0"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.5.0:*:*:*:*:*:*:*", "cpeNameId": "5DEABB15-2C59-466B-801F-2F2AC9C0BBFC"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.5.1:*:*:*:*:*:*:*", "cpeNameId": "6CF9C17C-2CD9-4290-AA5F-6EC50819C0AD"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.5.2:*:*:*:*:*:*:*", "cpeNameId": "DCFB1588-A810-4881-9E6B-05F0F2139718"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.6.0:*:*:*:*:*:*:*", "cpeNameId": "98E8B3AF-204D-4361-BB43-F03572E2ADD6"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.6.1:*:*:*:*:*:*:*", "cpeNameId": "B521CB50-FB67-4C3A-9EA9-B9DB712F2852"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.6.2:*:*:*:*:*:*:*", "cpeNameId": "E2027008-3DBA-41FF-80D8-46DEB52B0F9D"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.6.3:*:*:*:*:*:*:*", "cpeNameId": "E898BE39-E0EE-435B-B6A1-E792B38ECA3E"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.6.4:*:*:*:*:*:*:*", "cpeNameId": "238520ED-872F-4905-B752-284402555B4B"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.7.0:*:*:*:*:*:*:*", "cpeNameId": "8ED1A829-5722-471E-A2E9-0511BFCE48B0"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.7.1:*:*:*:*:*:*:*", "cpeNameId": "D285FFF2-CD2F-4EFC-91F6-1FAB468FDA15"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.7.2:*:*:*:*:*:*:*", "cpeNameId": "30434079-D0E7-49C5-B53A-8767FE5EDA82"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.7.3:*:*:*:*:*:*:*", "cpeNameId": "F4F4EB1F-02FF-4780-8826-EFEA97EC0597"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.7.4:*:*:*:*:*:*:*", "cpeNameId": "8431072E-3BBC-4496-8ED2-5703D6587428"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.7.5:*:*:*:*:*:*:*", "cpeNameId": "83B9C435-14A9-4C3A-AA02-B1749255B6B6"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.7.6:*:*:*:*:*:*:*", "cpeNameId": "070F0A3B-6338-4C51-A8D1-0B9599852541"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.8.0:*:*:*:*:*:*:*", "cpeNameId": "80CC8720-0D37-4CB2-9D43-80AFC2877C74"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.8.1:*:*:*:*:*:*:*", "cpeNameId": "772B88DD-22C7-4B7B-8E13-E45B7FE0896B"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.8.2:*:*:*:*:*:*:*", "cpeNameId": "F44D8956-B87E-4B3F-A48E-9DF533379B14"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.8.3:*:*:*:*:*:*:*", "cpeNameId": "5DFACA3C-B0F8-486D-98B0-0188F604442F"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.8.4:*:*:*:*:*:*:*", "cpeNameId": "2C5879BF-FB53-47BF-B7BB-586F34039CC0"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.9.0:*:*:*:*:*:*:*", "cpeNameId": "75206395-934B-4F0E-B3DF-048C0F1F0D7F"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.9.1:*:*:*:*:*:*:*", "cpeNameId": "FED9B951-F9A4-493C-8B4D-79ABA0FA94F4"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.9.2:*:*:*:*:*:*:*", "cpeNameId": "F89CFD57-1809-466E-B875-EBA684154335"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.9.4:*:*:*:*:*:*:*", "cpeNameId": "2B7F5EEA-94FF-4F6B-A5DF-E82646956F9C"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.9.5:*:*:*:*:*:*:*", "cpeNameId": "1F251B7E-DA9E-45F3-9E39-770C49E43F1C"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.9.6:*:*:*:*:*:*:*", "cpeNameId": "7D6396D6-CB3B-4285-B68B-41AFA7252519"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.10.0:-:*:*:*:*:*:*", "cpeNameId": "C25C5CEC-B561-47C0-8985-D1ED0A426CD1"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.10.0:rc1:*:*:*:*:*:*", "cpeNameId": "162FD7F5-BFA5-428B-B645-D3FF8A90ACC4"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.10.0:rc2:*:*:*:*:*:*", "cpeNameId": "D69207E7-E480-420D-AE5C-6BC80F66BA1D"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.10.0:rc3:*:*:*:*:*:*", "cpeNameId": "889CC5A5-690E-4438-B3CD-92184E0A86D1"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.10.1:*:*:*:*:*:*:*", "cpeNameId": "B477AC9E-2E8D-4A52-9BF7-C8DBCB5A3F6B"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.10.2:*:*:*:*:*:*:*", "cpeNameId": "DCA09D5C-7304-484A-A7BD-81E766F264CD"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.10.3:*:*:*:*:*:*:*", "cpeNameId": "E62DC8A2-3CD1-44C8-A986-685810F52D41"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.10.4:*:*:*:*:*:*:*", "cpeNameId": "ACB7D9FC-C845-49C0-82DF-3C8048F2B688"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.10.5:*:*:*:*:*:*:*", "cpeNameId": "7E5FB71D-2661-4C7C-8785-47AECC2B6E2B"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.10.6:*:*:*:*:*:*:*", "cpeNameId": "5AE0FC48-8568-4CB7-A46C-4287528D595D"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.11.0:-:*:*:*:*:*:*", "cpeNameId": "805323D6-C204-4991-9702-EF07F6917A02"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.11.0:rc1:*:*:*:*:*:*", "cpeNameId": "1324AB18-84C3-4A95-9DC3-3120A8B2FF10"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.11.0:rc2:*:*:*:*:*:*", "cpeNameId": "B7EFA156-F91C-40A4-AE95-A85F489834C3"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.11.1:*:*:*:*:*:*:*", "cpeNameId": "A67399BA-06DA-4929-B9EB-0CE9CDCBE787"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.12.0:*:*:*:*:*:*:*", "cpeNameId": "DCF54BAC-BD80-40ED-9FB4-4174E0B796D9"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.12.1:*:*:*:*:*:*:*", "cpeNameId": "EDB00938-10E0-4B75-8EC0-3370DB40FD7C"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.12.2:*:*:*:*:*:*:*", "cpeNameId": "62667B0B-4E3B-414D-9A64-A665B3FC6571"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.13.0:*:*:*:*:*:*:*", "cpeNameId": "4C87A0F2-40CF-407B-A502-DBD928A210F5"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.13.1:*:*:*:*:*:*:*", "cpeNameId": "DFEC084C-9298-4AB1-9B9B-5AB09DAECAD0"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.13.2:*:*:*:*:*:*:*", "cpeNameId": "707FC942-5230-4A87-9F32-3F39B13C0C88"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.13.3:*:*:*:*:*:*:*", "cpeNameId": "706DD518-A780-43C0-9EF8-591D7CE45703"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.13.4:*:*:*:*:*:*:*", "cpeNameId": "57250891-098D-47D4-BD57-9AAD1D00F462"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.13.5:*:*:*:*:*:*:*", "cpeNameId": "7D482DAC-753C-4EB7-8F9E-5CC9B41B568C"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.13.6:*:*:*:*:*:*:*", "cpeNameId": "FC55835D-F78C-4DB4-996A-913D6A72D70A"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.14.0:-:*:*:*:*:*:*", "cpeNameId": "2628ECD8-E5EE-4FB2-BE4D-C8EF4B38797D"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.14.0:rc1:*:*:*:*:*:*", "cpeNameId": "7468B9D6-EB71-4AFF-8333-F63CDC099E93"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.14.0:rc2:*:*:*:*:*:*", "cpeNameId": "FB1DDCF1-90A6-4FFF-A5A9-EFCADF44115C"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.14.1:*:*:*:*:*:*:*", "cpeNameId": "044FB639-4C43-466E-B758-10DC5BA09C56"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.14.2:*:*:*:*:*:*:*", "cpeNameId": "5963BE11-0A90-48A0-B633-9FCF0A7FD325"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.14.3:*:*:*:*:*:*:*", "cpeNameId": "0BA322B3-DEE1-4720-8859-DECFA69B35E4"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.14.4:*:*:*:*:*:*:*", "cpeNameId": "FCDC3CB6-FB4D-4AE2-BD28-8F26B30B9BC3"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.14.5:*:*:*:*:*:*:*", "cpeNameId": "8ED42FE0-E20A-438A-898F-A4D6521DE421"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.14.6:*:*:*:*:*:*:*", "cpeNameId": "BBBF582D-4D5A-4CEF-B2F0-7037A1EDAADD"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.14.7:*:*:*:*:*:*:*", "cpeNameId": "F2338521-1137-48F0-8A91-FB84A3FD789D"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.14.8:*:*:*:*:*:*:*", "cpeNameId": "8EEC5495-8854-4FEB-8A3A-F484A82BC094"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.15.0:*:*:*:*:*:*:*", "cpeNameId": "DBECC7FF-4791-4BA1-BE4B-E7838FEE09D0"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.15.1:*:*:*:*:*:*:*", "cpeNameId": "20F8695F-D997-4101-8E84-844A85020A0F"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.15.2:*:*:*:*:*:*:*", "cpeNameId": "75534CBD-ADF3-4B29-A8F5-1FC783292DD7"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.15.3:*:*:*:*:*:*:*", "cpeNameId": "B2369B21-A79F-473A-93AA-AE7790449A40"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.15.4:*:*:*:*:*:*:*", "cpeNameId": "F11AAE6B-660C-4BE1-91A4-987EE218F3EC"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.15.5:*:*:*:*:*:*:*", "cpeNameId": "F9A435E1-9DA1-41FD-81B4-BB839354A784"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.15.6:*:*:*:*:*:*:*", "cpeNameId": "E297BB5B-5985-4C2D-8690-4BC15E38CE9A"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.15.7:*:*:*:*:*:*:*", "cpeNameId": "2541EF41-CF97-408A-9E43-187ABC6F8380"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.15.8:*:*:*:*:*:*:*", "cpeNameId": "CC792A75-6074-46E5-8864-F531670AEAB7"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.16.0:*:*:*:*:*:*:*", "cpeNameId": "B4C8A4BE-9425-458A-9466-5622D999E334"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.16.1:*:*:*:*:*:*:*", "cpeNameId": "0EC7EAB4-CD04-4A02-8710-93CF0AFE9E05"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.16.2:*:*:*:*:*:*:*", "cpeNameId": "80D17EE6-5430-47F5-8A3E-DCC52EDA39FD"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.16.3:*:*:*:*:*:*:*", "cpeNameId": "FF38DCD4-41C8-418F-A5F8-40263359EBF9"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.16.4:*:*:*:*:*:*:*", "cpeNameId": "60FA4ADD-543A-4FBD-ACC1-9428B625396D"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.17.0:*:*:*:*:*:*:*", "cpeNameId": "10020609-8C1A-4D69-8341-5031AED1A30F"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.17.1:*:*:*:*:*:*:*", "cpeNameId": "46E2EB88-B58C-4019-B4A1-CDBF203E7974"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.17.2:*:*:*:*:*:*:*", "cpeNameId": "61E2E83D-1B07-4D99-8498-738FA1EC43AF"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.17.3:*:*:*:*:*:*:*", "cpeNameId": "8D9BC202-BA49-4274-85A0-22D6AA6897CF"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.17.4:*:*:*:*:*:*:*", "cpeNameId": "08CE4191-4F0E-4884-8584-4EB0E23C02AD"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.18.0:*:*:*:*:*:*:*", "cpeNameId": "B53FABDA-610F-4E00-8E8A-9985855BBEE6"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.18.1:*:*:*:*:*:*:*", "cpeNameId": "F7AE9090-CBA2-46A0-8164-2A385462F9F9"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.19.0:*:*:*:*:*:*:*", "cpeNameId": "F083C3CF-8C6A-4232-973D-4617FD1713B5"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.19.1:*:*:*:*:*:*:*", "cpeNameId": "0B666189-CF9B-4175-80D7-7470F6E559E4"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.19.2:*:*:*:*:*:*:*", "cpeNameId": "A2AD857C-32B2-46E2-AC6A-1AC96837EED2"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.20.0:*:*:*:*:*:*:*", "cpeNameId": "09AAA781-7628-4220-9AF8-B38FDBC11ABA"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.20.1:*:*:*:*:*:*:*", "cpeNameId": "D553D332-825F-4CCE-AF79-5F14232EDBE9"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.21.0:-:*:*:*:*:*:*", "cpeNameId": "71816F26-C231-45E8-A53D-306233C00259"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.21.0:rc1:*:*:*:*:*:*", "cpeNameId": "693797DD-9E29-4A69-B0FD-2DEF1FF1A7E2"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.21.0:rc2:*:*:*:*:*:*", "cpeNameId": "C3FF89A0-FB3E-4B7C-B2DF-9164AFEC931A"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.21.1:*:*:*:*:*:*:*", "cpeNameId": "F622E472-D57C-4688-972B-C669F983173C"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.21.2:*:*:*:*:*:*:*", "cpeNameId": "AC108689-85EF-438C-9465-0A09C4B66E6A"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.21.3:*:*:*:*:*:*:*", "cpeNameId": "B20E49FB-9E41-4E66-9465-F029574BB17F"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.21.4:*:*:*:*:*:*:*", "cpeNameId": "62B30219-9D9E-4050-A054-6D6469ABE619"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.22.0:*:*:*:*:*:*:*", "cpeNameId": "27A5BCD1-8D66-4B70-BE1B-229244F7667B"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.22.1:*:*:*:*:*:*:*", "cpeNameId": "7252F314-14B4-4526-B30A-B1B05EC692BA"}, {"cpeName": "cpe:2.3:a:pomerium:pomerium:0.22.2:*:*:*:*:*:*:*", "cpeNameId": "8F9D0DB8-D54A-4490-A536-8757DD141B92"}]}} \ No newline at end of file diff --git a/cpematch/44/4442E90B-4840-4E66-800A-451533E638E3.json b/cpematch/44/4442E90B-4840-4E66-800A-451533E638E3.json new file mode 100644 index 00000000000..a0927989d2a --- /dev/null +++ b/cpematch/44/4442E90B-4840-4E66-800A-451533E638E3.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "4442E90B-4840-4E66-800A-451533E638E3", "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "versionEndExcluding": "15.10.99.128", "lastModified": "2025-02-14T19:07:31.937", "cpeLastModified": "2025-02-14T19:07:31.937", "created": "2025-02-14T19:07:31.937", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:enalean:tuleap:11.16.99.173:*:*:*:community:*:*:*", "cpeNameId": "47C293BE-F60D-4705-9159-28DC9C9F1221"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:11.17.99.144:*:*:*:community:*:*:*", "cpeNameId": "57AEE313-33ED-477A-AD95-89660F4D2B77"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:11.17.99.146:*:*:*:community:*:*:*", "cpeNameId": "68717D10-FD61-4B4D-A643-92729D3C877B"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:12.9.99.228:*:*:*:community:*:*:*", "cpeNameId": "DE52392F-1FE3-48B2-AFFF-E9DBBFDCC100"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:13.7.99.239:*:*:*:community:*:*:*", "cpeNameId": "AAEF3ABA-7670-4531-B368-DA3CDB3DE7A8"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:13.8.99.49:*:*:*:community:*:*:*", "cpeNameId": "5411BBE6-CC89-42C4-B072-665D9B40064B"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:14.0.99.24:*:*:*:community:*:*:*", "cpeNameId": "019F3BC4-38E4-4BFD-B27E-A7DE59195418"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:14.5.99.4:*:*:*:community:*:*:*", "cpeNameId": "9481FEA9-7689-45CE-B8F7-A3386294A919"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:14.7.99.76:*:*:*:community:*:*:*", "cpeNameId": "422BA4E1-C2C5-4949-9696-DE27B57140B9"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:14.7.99.143:*:*:*:community:*:*:*", "cpeNameId": "1D5A439E-2999-4A6E-A932-7206D091155F"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:14.8.99.60:*:*:*:community:*:*:*", "cpeNameId": "5D8D6730-7FB3-433D-9A05-F94C9D1A2295"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:14.10.99.4:*:*:*:community:*:*:*", "cpeNameId": "3ADC6F1E-3964-4620-A594-DD5A7B1AFD86"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:15.2.99.49:*:*:*:community:*:*:*", "cpeNameId": "300DAF17-F5DB-47B8-9ACA-4F3349099364"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:15.2.99.103:*:*:*:community:*:*:*", "cpeNameId": "25C6982B-38AE-40A7-BBC9-C5303746FC01"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:15.4.99.140:*:*:*:community:*:*:*", "cpeNameId": "3BD00905-60FD-438D-9A54-9405CD83778E"}]}} \ No newline at end of file diff --git a/cpematch/47/474C11AA-39EF-4745-8980-60B31E5DE18C.json b/cpematch/47/474C11AA-39EF-4745-8980-60B31E5DE18C.json new file mode 100644 index 00000000000..2902ba2e1c4 --- /dev/null +++ b/cpematch/47/474C11AA-39EF-4745-8980-60B31E5DE18C.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "474C11AA-39EF-4745-8980-60B31E5DE18C", "criteria": "cpe:2.3:a:zotregistry:zot:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.1.0", "lastModified": "2025-02-14T19:15:52.503", "cpeLastModified": "2025-02-14T19:15:52.503", "created": "2025-02-14T19:15:52.503", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/52/5279A5E2-D8E3-434E-831F-995426909E9C.json b/cpematch/52/5279A5E2-D8E3-434E-831F-995426909E9C.json new file mode 100644 index 00000000000..5ac1e93e913 --- /dev/null +++ b/cpematch/52/5279A5E2-D8E3-434E-831F-995426909E9C.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "5279A5E2-D8E3-434E-831F-995426909E9C", "criteria": "cpe:2.3:a:hashthemes:hash_form:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.2.0", "lastModified": "2025-02-14T19:53:08.193", "cpeLastModified": "2025-02-14T19:53:08.193", "created": "2025-02-14T19:53:08.193", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/5E/5E678AE7-E61F-4E1E-B93D-BDDC7EBC85D3.json b/cpematch/5E/5E678AE7-E61F-4E1E-B93D-BDDC7EBC85D3.json new file mode 100644 index 00000000000..e57115da5d5 --- /dev/null +++ b/cpematch/5E/5E678AE7-E61F-4E1E-B93D-BDDC7EBC85D3.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "5E678AE7-E61F-4E1E-B93D-BDDC7EBC85D3", "criteria": "cpe:2.3:a:phpgurukul:emergency_ambulance_hiring_portal:1.0:*:*:*:*:*:*:*", "lastModified": "2025-02-14T19:31:20.410", "cpeLastModified": "2025-02-14T19:11:35.450", "created": "2025-02-14T19:11:35.450", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/6E/6E4BE3C3-BCBC-4E12-9967-3E01A44AAC71.json b/cpematch/6E/6E4BE3C3-BCBC-4E12-9967-3E01A44AAC71.json new file mode 100644 index 00000000000..b4fd9d04f2c --- /dev/null +++ b/cpematch/6E/6E4BE3C3-BCBC-4E12-9967-3E01A44AAC71.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "6E4BE3C3-BCBC-4E12-9967-3E01A44AAC71", "criteria": "cpe:2.3:a:pega:pega_platform:23.1.1:*:*:*:*:*:*:*", "lastModified": "2025-02-14T18:56:06.840", "cpeLastModified": "2025-02-14T18:56:06.840", "created": "2025-02-14T18:56:06.840", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/7A/7A841525-B2CA-439A-A880-08983C80AF8A.json b/cpematch/7A/7A841525-B2CA-439A-A880-08983C80AF8A.json new file mode 100644 index 00000000000..f0ef07fbed6 --- /dev/null +++ b/cpematch/7A/7A841525-B2CA-439A-A880-08983C80AF8A.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "7A841525-B2CA-439A-A880-08983C80AF8A", "criteria": "cpe:2.3:a:svswebsoft:svs_pricing_tables:1.0.3:*:*:*:*:wordpress:*:*", "lastModified": "2025-02-14T19:32:43.933", "cpeLastModified": "2025-02-14T19:32:43.933", "created": "2025-02-14T19:32:43.933", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/85/85919ABE-B6AE-4FD8-8825-81EF4EB8C9C1.json b/cpematch/85/85919ABE-B6AE-4FD8-8825-81EF4EB8C9C1.json new file mode 100644 index 00000000000..59a59cf157d --- /dev/null +++ b/cpematch/85/85919ABE-B6AE-4FD8-8825-81EF4EB8C9C1.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "85919ABE-B6AE-4FD8-8825-81EF4EB8C9C1", "criteria": "cpe:2.3:a:teamwire:teamwire:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.0.1", "versionEndExcluding": "2.3.0", "lastModified": "2025-02-14T18:44:19.723", "cpeLastModified": "2025-02-14T18:44:19.723", "created": "2025-02-14T18:44:19.723", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/8D/8D09D261-8F05-4520-BD47-7470DD0B01AF.json b/cpematch/8D/8D09D261-8F05-4520-BD47-7470DD0B01AF.json new file mode 100644 index 00000000000..690ba6e4001 --- /dev/null +++ b/cpematch/8D/8D09D261-8F05-4520-BD47-7470DD0B01AF.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "8D09D261-8F05-4520-BD47-7470DD0B01AF", "criteria": "cpe:2.3:a:threeten:threeten_backport:1.6.8:*:*:*:*:*:*:*", "lastModified": "2025-02-14T19:35:32.323", "cpeLastModified": "2025-02-14T19:35:32.323", "created": "2025-02-14T19:35:32.323", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/90/9075B59E-6E80-483D-9A8A-FE45449937CD.json b/cpematch/90/9075B59E-6E80-483D-9A8A-FE45449937CD.json new file mode 100644 index 00000000000..09963c70db1 --- /dev/null +++ b/cpematch/90/9075B59E-6E80-483D-9A8A-FE45449937CD.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "9075B59E-6E80-483D-9A8A-FE45449937CD", "criteria": "cpe:2.3:a:widgetti:solara:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.35.1", "lastModified": "2025-02-14T18:41:50.350", "cpeLastModified": "2025-02-14T18:41:50.350", "created": "2025-02-14T18:41:50.350", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/97/972EA05D-5E71-425A-BFE0-939EC1654D1C.json b/cpematch/97/972EA05D-5E71-425A-BFE0-939EC1654D1C.json new file mode 100644 index 00000000000..e1fbdad5111 --- /dev/null +++ b/cpematch/97/972EA05D-5E71-425A-BFE0-939EC1654D1C.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "972EA05D-5E71-425A-BFE0-939EC1654D1C", "criteria": "cpe:2.3:a:svswebsoft:svs_pricing_tables:1.0.4:*:*:*:*:wordpress:*:*", "lastModified": "2025-02-14T19:32:43.933", "cpeLastModified": "2025-02-14T19:32:43.933", "created": "2025-02-14T19:32:43.933", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/9A/9A1D4912-D66A-44FB-8D1C-5DB107B5FC84.json b/cpematch/9A/9A1D4912-D66A-44FB-8D1C-5DB107B5FC84.json new file mode 100644 index 00000000000..a61be497956 --- /dev/null +++ b/cpematch/9A/9A1D4912-D66A-44FB-8D1C-5DB107B5FC84.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "9A1D4912-D66A-44FB-8D1C-5DB107B5FC84", "criteria": "cpe:2.3:a:fabrick:gestpay_for_woocommerce:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "20221130", "lastModified": "2025-02-14T19:12:01.977", "cpeLastModified": "2025-02-14T19:12:01.977", "created": "2025-02-14T19:12:01.977", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/A3/A33A0CAA-11FD-4A54-8881-3C6C4191F70F.json b/cpematch/A3/A33A0CAA-11FD-4A54-8881-3C6C4191F70F.json new file mode 100644 index 00000000000..850a9a935ed --- /dev/null +++ b/cpematch/A3/A33A0CAA-11FD-4A54-8881-3C6C4191F70F.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "A33A0CAA-11FD-4A54-8881-3C6C4191F70F", "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "versionStartIncluding": "15.10", "versionEndExcluding": "15.10-6", "lastModified": "2025-02-14T19:07:31.937", "cpeLastModified": "2025-02-14T19:07:31.937", "created": "2025-02-14T19:07:31.937", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/A5/A5EA8AFB-67D6-4EA3-80B7-7B547CF4481B.json b/cpematch/A5/A5EA8AFB-67D6-4EA3-80B7-7B547CF4481B.json new file mode 100644 index 00000000000..b379750cb19 --- /dev/null +++ b/cpematch/A5/A5EA8AFB-67D6-4EA3-80B7-7B547CF4481B.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "A5EA8AFB-67D6-4EA3-80B7-7B547CF4481B", "criteria": "cpe:2.3:a:pega:pega_platform:*:*:*:*:*:*:*:*", "versionStartIncluding": "7.1.7", "versionEndExcluding": "8.8.5", "lastModified": "2025-02-14T18:56:06.840", "cpeLastModified": "2025-02-14T18:56:06.840", "created": "2025-02-14T18:56:06.840", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:pega:pega_platform:7.1.7:*:*:*:*:*:*:*", "cpeNameId": "54E1689D-79B4-4E32-9B37-F228E51C825E"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:7.1.8:*:*:*:*:*:*:*", "cpeNameId": "3BFB730A-FE32-450A-B817-5ACF504FC028"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:7.1.9:*:*:*:*:*:*:*", "cpeNameId": "5C8CEF31-DEC3-4C62-AB58-F5F63D752062"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:7.1.10:*:*:*:*:*:*:*", "cpeNameId": "67A77AE8-05D4-471A-B206-A862EB3BEA97"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:7.2:*:*:*:*:*:*:*", "cpeNameId": "CEDEC2A3-453F-4112-9933-39BE269B6AB4"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:7.2:-:*:*:*:*:*:*", "cpeNameId": "995BBDDB-78EC-4F36-85FF-ED83B6346CAF"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:7.2:ml0:*:*:*:*:*:*", "cpeNameId": "2E7792CC-8EB5-4BA4-A08D-71331018DE52"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:7.2.0:*:*:*:*:*:*:*", "cpeNameId": "9BEDFD70-3A01-42E4-BDC5-152FFD756793"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:7.2.1:*:*:*:*:*:*:*", "cpeNameId": "00BC5504-9E70-4DEC-A25B-95E6E825B288"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:7.2.2:*:*:*:*:*:*:*", "cpeNameId": "832A6204-0A61-440E-84BD-55ED54BD6D2C"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:7.2.2.:*:*:*:*:*:*:*", "cpeNameId": "9E3644D1-008B-4468-BDE5-76693366DE10"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:7.3:*:*:*:*:*:*:*", "cpeNameId": "804E26E0-0FAE-4884-A22F-D84ACF4E659E"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:7.3.0:*:*:*:*:*:*:*", "cpeNameId": "CE380D2A-8FF1-4C20-94B2-60D347EC0B5E"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:7.3.1:*:*:*:*:*:*:*", "cpeNameId": "1A001091-597A-4C2B-964B-119AF2CF3984"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:7.4:*:*:*:*:*:*:*", "cpeNameId": "B74C7FEF-F178-4A61-BB03-0C9D7C4CD4A3"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:7.4.0:*:*:*:*:*:*:*", "cpeNameId": "F25D1C2D-56A0-42FE-AF3B-15550E5DCFF2"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.1:*:*:*:*:*:*:*", "cpeNameId": "DA08DCA2-1CC1-4A26-AD94-B8BF49DB2EAF"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.1.0:*:*:*:*:*:*:*", "cpeNameId": "1DE9F8BF-3052-4C39-B95D-A0E689640287"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.1.1:*:*:*:*:*:*:*", "cpeNameId": "D60DCEC7-9948-487B-85BE-070BCE6C6F29"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.1.2:*:*:*:*:*:*:*", "cpeNameId": "5BC025F9-C2D9-474E-A307-AC5C3D4B8F8E"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.1.3:*:*:*:*:*:*:*", "cpeNameId": "661AD1A2-A547-4E9B-B4B2-8B12D313C01A"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.1.4:*:*:*:*:*:*:*", "cpeNameId": "00C7DE9A-9134-4EAA-803F-BDDBD816BEB9"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.1.5:*:*:*:*:*:*:*", "cpeNameId": "7DC60E50-DAB8-4A0B-9B65-5B88A32A992F"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.1.6:*:*:*:*:*:*:*", "cpeNameId": "3308F132-DC54-45AA-94FD-23D6BB327822"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.1.7:*:*:*:*:*:*:*", "cpeNameId": "D009D2D8-CCD8-404E-AB5E-CBDA50DF4A4F"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.1.8:*:*:*:*:*:*:*", "cpeNameId": "0964A198-86E5-4595-B1C4-67E4A5CC9AD6"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.2:*:*:*:*:*:*:*", "cpeNameId": "18EFD573-02F4-4C41-89FD-BCE9B186960B"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.2.1:*:*:*:*:*:*:*", "cpeNameId": "DFBB7916-B1DF-4222-A340-DB63021B31DC"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.2.2:*:*:*:*:*:*:*", "cpeNameId": "556AAE92-D6A6-4775-BE2C-926D2D1EC2CF"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.2.3:*:*:*:*:*:*:*", "cpeNameId": "3BFC1184-C536-45A8-B894-D360660246A0"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.2.4:*:*:*:*:*:*:*", "cpeNameId": "BDC37298-8437-438B-B1A0-E5629FFD7274"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.2.5:*:*:*:*:*:*:*", "cpeNameId": "8D721B50-CFEE-48BC-90F9-323112E80EFA"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.2.6:*:*:*:*:*:*:*", "cpeNameId": "E7157245-F6E5-472C-A489-9FF192C0851B"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.2.7:*:*:*:*:*:*:*", "cpeNameId": "27F7814A-C43E-4687-97C9-E7AA17636450"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.3:*:*:*:*:*:*:*", "cpeNameId": "47943968-1B5A-4267-92D4-A070F20E041C"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.3.0:*:*:*:*:*:*:*", "cpeNameId": "3D8D9719-6391-4E64-92D7-BF1D48A68F70"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.3.1:*:*:*:*:*:*:*", "cpeNameId": "58510318-F6F7-432E-8D8B-9520B2C46357"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.3.2:*:*:*:*:*:*:*", "cpeNameId": "170B6829-D74E-45B2-81C6-9360BF830AC4"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.3.3:*:*:*:*:*:*:*", "cpeNameId": "E6F57C02-8A54-4AEE-98C8-D64F647D46ED"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.4:*:*:*:*:*:*:*", "cpeNameId": "17F46D78-728B-4C02-907C-6BA8D3CC576F"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.4.0.237:*:*:*:*:*:*:*", "cpeNameId": "C2183385-0AE1-48C2-9981-506A524B61A2"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.4.1:*:*:*:*:*:*:*", "cpeNameId": "9970444B-93F6-42A4-8AD6-A2D87635A4BF"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.4.2:*:*:*:*:*:*:*", "cpeNameId": "34F8E57A-649F-4A99-9ACB-0A0FCBF29FC3"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.5:*:*:*:*:*:*:*", "cpeNameId": "21E5D1E8-1B69-422D-9E6D-A91C56C5B93E"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.5.1:*:*:*:*:*:*:*", "cpeNameId": "303F912E-7DF2-48F7-9B39-53ADFEFDC6BB"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.5.2:*:*:*:*:*:*:*", "cpeNameId": "B199D1CE-6A2C-4F73-9016-E8978147949C"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.6:*:*:*:*:*:*:*", "cpeNameId": "6094F6B3-EDA9-41B7-8224-BDABE5EF4993"}, {"cpeName": "cpe:2.3:a:pega:pega_platform:8.8.3:*:*:*:*:*:*:*", "cpeNameId": "904D2A62-D642-4577-8FF9-07D776A47DAD"}]}} \ No newline at end of file diff --git a/cpematch/A7/A718BF3B-0247-49E7-B3D5-DDE14C75869A.json b/cpematch/A7/A718BF3B-0247-49E7-B3D5-DDE14C75869A.json new file mode 100644 index 00000000000..f615453ce1f --- /dev/null +++ b/cpematch/A7/A718BF3B-0247-49E7-B3D5-DDE14C75869A.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "A718BF3B-0247-49E7-B3D5-DDE14C75869A", "criteria": "cpe:2.3:a:santesoft:fft_imaging:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.2", "lastModified": "2025-02-14T19:00:55.193", "cpeLastModified": "2025-02-14T19:00:55.193", "created": "2025-02-14T19:00:55.193", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:santesoft:fft_imaging:-:*:*:*:*:*:*:*", "cpeNameId": "7AF7B00A-9EDE-498B-83E4-6F0069DFC244"}, {"cpeName": "cpe:2.3:a:santesoft:fft_imaging:1.4.1:*:*:*:*:*:*:*", "cpeNameId": "7C08AF19-3827-4F8B-804A-EE5710D9D0AE"}]}} \ No newline at end of file diff --git a/cpematch/B2/B2987451-DB93-40B3-A474-9C0B2D19BB3A.json b/cpematch/B2/B2987451-DB93-40B3-A474-9C0B2D19BB3A.json index c7a8a8e5e97..f1c3b9e7e1b 100644 --- a/cpematch/B2/B2987451-DB93-40B3-A474-9C0B2D19BB3A.json +++ b/cpematch/B2/B2987451-DB93-40B3-A474-9C0B2D19BB3A.json @@ -1 +1 @@ -{"matchString": {"matchCriteriaId": "B2987451-DB93-40B3-A474-9C0B2D19BB3A", "criteria": "cpe:2.3:a:wppdf:wppdf:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "20240307", "lastModified": "2025-01-29T21:19:31.027", "cpeLastModified": "2025-01-29T21:19:31.027", "created": "2025-01-29T21:19:31.027", "status": "Active"}} \ No newline at end of file +{"matchString": {"matchCriteriaId": "B2987451-DB93-40B3-A474-9C0B2D19BB3A", "criteria": "cpe:2.3:a:wppdf:wppdf:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "20240307", "lastModified": "2025-02-14T19:12:01.977", "cpeLastModified": "2025-01-29T21:19:31.027", "created": "2025-01-29T21:19:31.027", "status": "Inactive"}} \ No newline at end of file diff --git a/cpematch/B6/B6446531-ADA1-4E07-927F-1AB6E0169262.json b/cpematch/B6/B6446531-ADA1-4E07-927F-1AB6E0169262.json new file mode 100644 index 00000000000..72f2c520e79 --- /dev/null +++ b/cpematch/B6/B6446531-ADA1-4E07-927F-1AB6E0169262.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "B6446531-ADA1-4E07-927F-1AB6E0169262", "criteria": "cpe:2.3:a:laravel:livewire:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.12.7", "lastModified": "2025-02-14T19:43:11.247", "cpeLastModified": "2025-02-14T19:43:11.247", "created": "2025-02-14T19:43:11.247", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/BA/BAD0BC26-272E-40BA-85A1-76079EFDC305.json b/cpematch/BA/BAD0BC26-272E-40BA-85A1-76079EFDC305.json new file mode 100644 index 00000000000..d40b96202d3 --- /dev/null +++ b/cpematch/BA/BAD0BC26-272E-40BA-85A1-76079EFDC305.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "BAD0BC26-272E-40BA-85A1-76079EFDC305", "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "versionEndExcluding": "15.9-8", "lastModified": "2025-02-14T19:07:31.937", "cpeLastModified": "2025-02-14T19:07:31.937", "created": "2025-02-14T19:07:31.937", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:enalean:tuleap:11.15-1:*:*:*:enterprise:*:*:*", "cpeNameId": "10964F41-81D9-414B-B050-F02BEAE86DDD"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:11.15-8:*:*:*:enterprise:*:*:*", "cpeNameId": "C927EF85-4178-4573-9F00-54672006ED79"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:11.16-1:*:*:*:enterprise:*:*:*", "cpeNameId": "46A48A57-FDCB-413C-B3D0-1C85232EC08B"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:11.16-6:*:*:*:enterprise:*:*:*", "cpeNameId": "930B737A-9A46-470A-B688-2899151DAD47"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:11.16-7:*:*:*:enterprise:*:*:*", "cpeNameId": "748A771F-2A12-45FC-951B-9302C0A3A9F4"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:11.17-1:*:*:*:enterprise:*:*:*", "cpeNameId": "7C6E20DA-2C58-498F-8877-DCF02B2C696E"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:11.17-5:*:*:*:enterprise:*:*:*", "cpeNameId": "E34C3C14-DACF-4C1C-8B1A-64B49DC9DDCC"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:12.10:*:*:*:enterprise:*:*:*", "cpeNameId": "DB553162-5E69-4773-9E34-728EB076AA56"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:12.11-2:*:*:*:enterprise:*:*:*", "cpeNameId": "2C15713B-6136-4B68-A310-84DE25072F1C"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:13.6-5:*:*:*:enterprise:*:*:*", "cpeNameId": "AAD4139E-4671-4FAF-A36B-6CBC2412188D"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:13.7-1:*:*:*:enterprise:*:*:*", "cpeNameId": "1155DE03-6F56-4D59-9385-CFCCB9650E36"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:13.7-4:*:*:*:enterprise:*:*:*", "cpeNameId": "E079C705-0375-4C2C-9B77-E4BEE3C54F98"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:13.12-6:*:*:*:enterprise:*:*:*", "cpeNameId": "8AA819B0-2847-44E2-A4EC-DCB6DB076729"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:14.0:*:*:*:enterprise:*:*:*", "cpeNameId": "0835293C-DE62-4B77-9F9F-421E2AD507A2"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:14.0-3:*:*:*:enterprise:*:*:*", "cpeNameId": "0CED9962-A961-4151-BE49-2DC6AF1CA1CE"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:14.4-7:*:*:*:enterprise:*:*:*", "cpeNameId": "A62A3EDF-97B5-4661-8C93-2BA60F73D2D5"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:14.5:*:*:*:enterprise:*:*:*", "cpeNameId": "1B2F71F1-8A05-441A-864A-1D5703190A9A"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:14.5-2:*:*:*:enterprise:*:*:*", "cpeNameId": "C9F4C23F-4AC5-44BD-9E76-C51F913B47A9"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:14.7-7:*:*:*:enterprise:*:*:*", "cpeNameId": "8ABBD71A-84C2-4E88-A5FA-EABF527C78EF"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:14.8:*:*:*:enterprise:*:*:*", "cpeNameId": "F7743CD6-7B9A-4042-B706-FBD493AF27E2"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:14.8-3:*:*:*:enterprise:*:*:*", "cpeNameId": "B1F32B4B-C42F-41EE-A7AF-244C3CAB5F0F"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:14.9-5:*:*:*:enterprise:*:*:*", "cpeNameId": "B6DAB06D-0599-4A75-A34C-302276013FE6"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:14.10:*:*:*:enterprise:*:*:*", "cpeNameId": "2293A22E-3C8E-4200-A05F-6A57977AE484"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:14.10-2:*:*:*:enterprise:*:*:*", "cpeNameId": "A9EED561-C533-42A7-B0DA-EF780E123084"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:15.1-8:*:*:*:enterprise:*:*:*", "cpeNameId": "31F39683-DA65-48DC-8732-F774E0515DC9"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:15.2:*:*:*:enterprise:*:*:*", "cpeNameId": "843005D0-4724-4E3A-870E-129075C667B4"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:15.2-4:*:*:*:enterprise:*:*:*", "cpeNameId": "A84E7BA9-690B-49C8-9273-D528F45D7224"}, {"cpeName": "cpe:2.3:a:enalean:tuleap:15.3.5:*:*:*:enterprise:*:*:*", "cpeNameId": "C1EDE65C-8798-4840-990B-EA550268933C"}]}} \ No newline at end of file diff --git a/cpematch/BB/BBB1C352-EABC-4A0E-AC28-EC16A7AEF95B.json b/cpematch/BB/BBB1C352-EABC-4A0E-AC28-EC16A7AEF95B.json new file mode 100644 index 00000000000..e168fd6efe5 --- /dev/null +++ b/cpematch/BB/BBB1C352-EABC-4A0E-AC28-EC16A7AEF95B.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "BBB1C352-EABC-4A0E-AC28-EC16A7AEF95B", "criteria": "cpe:2.3:a:ssoready:ssoready:*:*:*:*:*:*:*:*", "versionEndExcluding": "2024-10-09", "lastModified": "2025-02-14T19:35:19.470", "cpeLastModified": "2025-02-14T19:35:19.470", "created": "2025-02-14T19:35:19.470", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/C2/C237995B-84C8-4370-9E47-829CC48453F7.json b/cpematch/C2/C237995B-84C8-4370-9E47-829CC48453F7.json new file mode 100644 index 00000000000..19686c9a81e --- /dev/null +++ b/cpematch/C2/C237995B-84C8-4370-9E47-829CC48453F7.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "C237995B-84C8-4370-9E47-829CC48453F7", "criteria": "cpe:2.3:a:laravel:livewire:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", "versionEndIncluding": "3.5.2", "lastModified": "2025-02-14T19:43:11.247", "cpeLastModified": "2025-02-14T19:43:11.247", "created": "2025-02-14T19:43:11.247", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/D2/D2C162F0-68A7-405D-A6EA-0917C9EDCCAF.json b/cpematch/D2/D2C162F0-68A7-405D-A6EA-0917C9EDCCAF.json new file mode 100644 index 00000000000..c53eff2ab10 --- /dev/null +++ b/cpematch/D2/D2C162F0-68A7-405D-A6EA-0917C9EDCCAF.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "D2C162F0-68A7-405D-A6EA-0917C9EDCCAF", "criteria": "cpe:2.3:a:alldata:alldata:0.4.6:*:*:*:*:*:*:*", "lastModified": "2025-02-14T19:20:53.770", "cpeLastModified": "2025-02-14T19:20:53.770", "created": "2025-02-14T19:20:53.770", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/E1/E1C43E68-074E-42B1-B940-6D1304AB175C.json b/cpematch/E1/E1C43E68-074E-42B1-B940-6D1304AB175C.json new file mode 100644 index 00000000000..98bd79fde9d --- /dev/null +++ b/cpematch/E1/E1C43E68-074E-42B1-B940-6D1304AB175C.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "E1C43E68-074E-42B1-B940-6D1304AB175C", "criteria": "cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.3.12", "lastModified": "2025-02-14T19:22:47.490", "cpeLastModified": "2025-02-14T19:22:47.490", "created": "2025-02-14T19:22:47.490", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:admidio:admidio:-:*:*:*:*:*:*:*", "cpeNameId": "8769E356-8703-4F4B-8E3E-01D03EFA142F"}, {"cpeName": "cpe:2.3:a:admidio:admidio:0.1:*:*:*:*:*:*:*", "cpeNameId": "F84DF97A-ED5A-4333-A2E8-2F31B60C8B99"}, {"cpeName": "cpe:2.3:a:admidio:admidio:0.5:*:*:*:*:*:*:*", "cpeNameId": "BDE800F8-8FEE-4DC2-99E4-589626052EAB"}, {"cpeName": "cpe:2.3:a:admidio:admidio:0.6:*:*:*:*:*:*:*", "cpeNameId": "5811EC30-7E1C-48F1-989D-E6304223C31F"}, {"cpeName": "cpe:2.3:a:admidio:admidio:0.6.1:*:*:*:*:*:*:*", "cpeNameId": "E65DA7D2-E7C1-4A94-9BD0-CA0DF00509D5"}, {"cpeName": "cpe:2.3:a:admidio:admidio:0.7:*:*:*:*:*:*:*", "cpeNameId": "3C2785FE-0F70-4C79-A496-D9BBE6963341"}, {"cpeName": "cpe:2.3:a:admidio:admidio:0.9:*:*:*:*:*:*:*", "cpeNameId": "6F720943-CDC5-4EA0-8AAC-FB71E211576B"}, {"cpeName": "cpe:2.3:a:admidio:admidio:0.9.1:*:*:*:*:*:*:*", "cpeNameId": "564577F0-7FE9-4E97-86AB-F27DFF0502D6"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.0:*:*:*:*:*:*:*", "cpeNameId": "4B96ECBE-1B90-4A86-B5EA-ED0449501B35"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.0.3:*:*:*:*:*:*:*", "cpeNameId": "912BAF22-05A1-4485-9B11-4212BD6A1754"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.1.0:*:*:*:*:*:*:*", "cpeNameId": "D6E48BF0-AEDE-48D7-A5B9-BE133CD247BB"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.1.1:*:*:*:*:*:*:*", "cpeNameId": "628E9BE7-EE8B-4C7D-B8D2-7900D19E2B43"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.1.2:*:*:*:*:*:*:*", "cpeNameId": "C88B8A4D-41EB-4AA5-92D1-EF319A468163"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.2.0:*:*:*:*:*:*:*", "cpeNameId": "0B71FF5B-3CD0-4C54-AB01-FF06D9C4C0F0"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.2.1:*:*:*:*:*:*:*", "cpeNameId": "68714467-212B-42C3-B8DD-D58EECAA8A53"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.2.2:*:*:*:*:*:*:*", "cpeNameId": "0AB1D737-AEBE-4749-AF03-63C517E026BA"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.2.3:*:*:*:*:*:*:*", "cpeNameId": "B397181C-D4A7-40EB-A6DB-C42FD760BD27"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.2.4:*:*:*:*:*:*:*", "cpeNameId": "0169E434-AA00-4B75-BEE1-EBC2C5D968B0"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.3.0:*:*:*:*:*:*:*", "cpeNameId": "47A36110-419B-4C3C-BF52-950BA78F06A3"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.3.1:*:*:*:*:*:*:*", "cpeNameId": "A2F2FDFB-D80A-4A9D-A87D-D6678D647FD8"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.3.2:*:*:*:*:*:*:*", "cpeNameId": "1DDA48DF-2607-4DFB-952B-65311B5E916D"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.3.3:*:*:*:*:*:*:*", "cpeNameId": "4D32F4B1-A3E4-48D6-8B32-11CC58C3FC35"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.4.0:*:*:*:*:*:*:*", "cpeNameId": "237CE149-B975-4041-B344-3AEF860A2F04"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.4.1:*:*:*:*:*:*:*", "cpeNameId": "99172CF0-F0BC-40A5-94FA-4E560D59A5EF"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.4.2:*:*:*:*:*:*:*", "cpeNameId": "97A7C2F2-0E34-4BA0-9363-50438B4789A0"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.4.3:*:*:*:*:*:*:*", "cpeNameId": "C0BB073B-A6D7-43C8-9580-16EF3FD9B79C"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.4.4:*:*:*:*:*:*:*", "cpeNameId": "F67B113C-E787-49A1-BFC3-40547F806A36"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.4.5:*:*:*:*:*:*:*", "cpeNameId": "FE9859D6-BC0F-460B-8554-41B32336E371"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.4.6:*:*:*:*:*:*:*", "cpeNameId": "80D2F0FD-E39B-4C31-BF67-21E23E1AC37C"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.4.7:*:*:*:*:*:*:*", "cpeNameId": "F8CA73C1-3AEF-4182-A338-95D9EB90823F"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.4.8:*:*:*:*:*:*:*", "cpeNameId": "E1F7C66D-4029-41B4-9BA6-FC090617575A"}, {"cpeName": "cpe:2.3:a:admidio:admidio:1.4.9:*:*:*:*:*:*:*", "cpeNameId": "482BF0B6-8C74-4CC5-8451-7A5D15E553D4"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.0.0:*:*:*:*:*:*:*", "cpeNameId": "94770EC9-F036-42A9-9D2F-F5EED169CE94"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.0.1:*:*:*:*:*:*:*", "cpeNameId": "BA51A7C9-7D32-4D6A-BC14-49B4C65744CC"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.0.2:*:*:*:*:*:*:*", "cpeNameId": "740DE03D-4F39-4FA0-858B-51B88305CCC7"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.0.3:*:*:*:*:*:*:*", "cpeNameId": "37B68E11-93DF-401F-8B7A-4BA9C8A66A68"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.0.4:*:*:*:*:*:*:*", "cpeNameId": "B764EB37-5E4C-41F0-83E9-F7BDFC76F69D"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.0.5:*:*:*:*:*:*:*", "cpeNameId": "ACCA004F-3BDC-4F37-8F2C-F7188C1BB18C"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.0.6:*:*:*:*:*:*:*", "cpeNameId": "C420150E-B77E-44EF-9509-A876BDA69EA3"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.0.7:*:*:*:*:*:*:*", "cpeNameId": "85974F42-B801-45F5-9884-E8728B0FF1E7"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.0.8:*:*:*:*:*:*:*", "cpeNameId": "8DBC00C5-7AFE-478A-8100-0486FB02D181"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.0.9:*:*:*:*:*:*:*", "cpeNameId": "1BEDA376-D910-46A7-A674-1B5B4763714A"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.1.0:*:*:*:*:*:*:*", "cpeNameId": "267F5AF1-30B8-4A65-851B-A8D99C2EEA3D"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.1.1:*:*:*:*:*:*:*", "cpeNameId": "A73B8AEA-D75D-4170-99B5-8D12D68261E8"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.1.2:*:*:*:*:*:*:*", "cpeNameId": "64D33153-44CA-43A3-99B1-BE1ADAACDE7D"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.1.3:*:*:*:*:*:*:*", "cpeNameId": "8E9BCB84-5909-40F8-8195-21DEB994823A"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.1.4:*:*:*:*:*:*:*", "cpeNameId": "A529EABE-9CF5-45AA-8E56-098F9F83FF2C"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.1.5:*:*:*:*:*:*:*", "cpeNameId": "7032D76C-4C36-4274-85E4-71EBCF95BBF7"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.1.6:*:*:*:*:*:*:*", "cpeNameId": "7112F387-5A3C-4293-8637-A03434E18664"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.1.7:*:*:*:*:*:*:*", "cpeNameId": "3CA81785-E96B-4A72-8E2E-E85EEA12AC90"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.1.8:*:*:*:*:*:*:*", "cpeNameId": "BFF16E6A-5CB8-42BB-8D1E-FBCA9C515C5C"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.1.9:*:*:*:*:*:*:*", "cpeNameId": "38BB33FB-DF81-479B-910E-95B890503976"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.1.10:*:*:*:*:*:*:*", "cpeNameId": "6946DE6A-3AA3-4664-AED9-05AC651F85BE"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.1.11:*:*:*:*:*:*:*", "cpeNameId": "B7944A78-E8C7-42CD-92EC-95FBC94E4F07"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.2.0:*:*:*:*:*:*:*", "cpeNameId": "4891BEA6-AF11-45D1-BAA6-3B1FDB235201"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.2.1:*:*:*:*:*:*:*", "cpeNameId": "E6631D0C-68AE-4A2B-8E15-5EBB14F5FEFC"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.2.2:*:*:*:*:*:*:*", "cpeNameId": "F5EF4B9F-958E-4316-A729-D6B97CDA2956"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.2.3:*:*:*:*:*:*:*", "cpeNameId": "A549BD20-3607-43E7-A71F-85478702BC9D"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.2.4:*:*:*:*:*:*:*", "cpeNameId": "E98A75C3-FEBB-4475-97D2-26147192222E"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.2.5:*:*:*:*:*:*:*", "cpeNameId": "AB043A1B-CC9D-4079-A039-CEA04216B764"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.2.6:*:*:*:*:*:*:*", "cpeNameId": "1807FFD1-E395-4B2A-95FB-73BC87B7E6E7"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.2.7:*:*:*:*:*:*:*", "cpeNameId": "D9820F8B-96B4-4714-9AE6-DADAB8D90370"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.2.8:*:*:*:*:*:*:*", "cpeNameId": "BB639C1F-8AE3-4F26-B4C6-9D36BF926386"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.2.9:*:*:*:*:*:*:*", "cpeNameId": "827EF72C-6CD1-42A3-B8A8-498E67A85037"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.3.0:*:*:*:*:*:*:*", "cpeNameId": "D810F243-862C-4EA7-BA6C-B3CF6B7DDFE0"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.3.1:*:*:*:*:*:*:*", "cpeNameId": "77B5099A-2D4B-4858-B5A2-819CD830B031"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.3.2:*:*:*:*:*:*:*", "cpeNameId": "FD3D7885-7101-44F1-BA6E-4D6714FC87D4"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.3.3:*:*:*:*:*:*:*", "cpeNameId": "6D4D32C4-ED23-4B29-BBCA-DFA3D67B7304"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.3.4:*:*:*:*:*:*:*", "cpeNameId": "06D45CD6-0AA8-4FC8-A8A2-C11234E1511D"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.3.5:*:*:*:*:*:*:*", "cpeNameId": "048D34D4-83AB-4840-9526-E343FABD6F58"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.3.6:*:*:*:*:*:*:*", "cpeNameId": "99B90B18-38D6-403F-A8DF-E8095C81A685"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.3.7:*:*:*:*:*:*:*", "cpeNameId": "E413B55F-B1EF-43E5-8298-A13DBC80DBE6"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.4.0:*:*:*:*:*:*:*", "cpeNameId": "EC82E584-6FF3-4236-ABC9-5E899EFAB988"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.4.1:*:*:*:*:*:*:*", "cpeNameId": "6E1DACA8-F72B-453B-AE47-1C7419A8128B"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.4.2:*:*:*:*:*:*:*", "cpeNameId": "6A389153-833A-4828-8156-CB8FEE8592D6"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.4.3:*:*:*:*:*:*:*", "cpeNameId": "6506FB0A-9DA9-4CAF-A3A2-1E9CAD4440A8"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.4.4:*:*:*:*:*:*:*", "cpeNameId": "43898759-8859-4218-960F-0BD6B8F07F36"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.4.5:*:*:*:*:*:*:*", "cpeNameId": "2AECCE12-34A9-4B61-AF6B-91D0DF99BEFB"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.4.6:*:*:*:*:*:*:*", "cpeNameId": "B880C7CC-3A04-4981-9A42-02BFE041AD6D"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.4.7:*:*:*:*:*:*:*", "cpeNameId": "C55D9E9F-E37E-40EA-A84F-8DE39D3E50DE"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.4.8:*:*:*:*:*:*:*", "cpeNameId": "42855DA2-84F0-4029-BAA9-D4B39A605815"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.4.9:*:*:*:*:*:*:*", "cpeNameId": "DC639B6A-78A9-4CE3-9011-41A0FCEB82D8"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.4.10:*:*:*:*:*:*:*", "cpeNameId": "816AE20A-F23E-4F66-8036-18213CF4A83C"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.4.11:*:*:*:*:*:*:*", "cpeNameId": "43B9BF75-214A-4DBB-BD47-ECDBE3B50ED6"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.4.12:*:*:*:*:*:*:*", "cpeNameId": "8F08D16C-E41E-4207-8745-8894E07D2567"}, {"cpeName": "cpe:2.3:a:admidio:admidio:2.4.13:*:*:*:*:*:*:*", "cpeNameId": "A18A16A5-A97E-4FF6-A65A-4B7A44A2CF3E"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.1.0:*:*:*:*:*:*:*", "cpeNameId": "0B263215-FFC0-4E55-AAE9-DB7C8C34CB52"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.1.1:*:*:*:*:*:*:*", "cpeNameId": "79DFC1D3-9B57-4732-BF64-7F554CD26BD3"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.1.2:*:*:*:*:*:*:*", "cpeNameId": "E281B127-3166-4127-92C0-CFB6B3992B56"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.1.3:*:*:*:*:*:*:*", "cpeNameId": "0FFE7452-E9A2-4A24-AD75-A92E04C12EDB"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.1.4:*:*:*:*:*:*:*", "cpeNameId": "7922FED3-006B-486B-BABC-CF39A954C65A"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.1.6:*:*:*:*:*:*:*", "cpeNameId": "C6A2E444-3B5D-42F1-A41D-A9DF9D0C5CBE"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.1.7:*:*:*:*:*:*:*", "cpeNameId": "06329519-7CF1-413D-9CBA-FA2CEF787C14"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.1.8:*:*:*:*:*:*:*", "cpeNameId": "343D7CD9-5730-4CB2-A049-5D98DE121154"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.1.9:*:*:*:*:*:*:*", "cpeNameId": "4C5B674C-B149-46A2-8938-101C58D29816"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.1.10:*:*:*:*:*:*:*", "cpeNameId": "800A1F6F-1AE2-47BC-BE9B-F7A481B2AA13"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.2.0:*:*:*:*:*:*:*", "cpeNameId": "E3EF8238-0AE4-437F-8C49-B1DDDE7E09D8"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.2.1:*:*:*:*:*:*:*", "cpeNameId": "DAE28D88-9F8A-4705-B956-06E9359FE903"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.2.2:*:*:*:*:*:*:*", "cpeNameId": "69E2F990-324C-48CE-AD5F-978A354232DE"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.2.3:*:*:*:*:*:*:*", "cpeNameId": "5F64A790-C6EC-4303-9841-1396BDA47CBE"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.2.4:*:*:*:*:*:*:*", "cpeNameId": "94A57865-39CB-40CD-9CDE-24BD4A3037BE"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.2.5:*:*:*:*:*:*:*", "cpeNameId": "2151F0FD-B66C-43B0-A016-5A3AE1B5EA4D"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.2.6:*:*:*:*:*:*:*", "cpeNameId": "2F1F4553-5FFA-4B26-A3DD-B035FF0912F9"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.2.7:*:*:*:*:*:*:*", "cpeNameId": "E32771E2-1ED1-49A9-86E4-471144467B04"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.2.8:*:*:*:*:*:*:*", "cpeNameId": "52E4C3F6-28EE-49A3-833B-24F6FCC22791"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.2.9:*:*:*:*:*:*:*", "cpeNameId": "0BA33A05-55DB-47FD-96A9-E76A32E5822F"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.2.10:*:*:*:*:*:*:*", "cpeNameId": "26FB37C2-1FA0-4EF8-BD22-CFF4BBDF64D6"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.2.11:*:*:*:*:*:*:*", "cpeNameId": "5A19D905-3A06-4A4E-9851-E2ECA1D09047"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.2.12:*:*:*:*:*:*:*", "cpeNameId": "90BC5FA2-0432-4D1A-ACCB-B8BB0AEBB205"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.2.13:*:*:*:*:*:*:*", "cpeNameId": "C877AB15-872C-4FF3-89F3-64EA12110E20"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.2.14:*:*:*:*:*:*:*", "cpeNameId": "D6D54F94-1F03-4E84-A0ED-40A764326AFD"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.2.15:*:*:*:*:*:*:*", "cpeNameId": "B8E6B1D6-3E6C-4438-8FD5-92F1F23093E9"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.0:*:*:*:*:*:*:*", "cpeNameId": "EBB70918-CE90-4F88-8F76-819851E7D004"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.1:*:*:*:*:*:*:*", "cpeNameId": "2F6977C6-8512-4D12-A75D-D99E4935A63D"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.2:*:*:*:*:*:*:*", "cpeNameId": "282FC002-3435-4C0B-9907-F5EBCF62C831"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.3:*:*:*:*:*:*:*", "cpeNameId": "5E1C7330-08FE-42ED-8F2C-056622BF1ADA"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.4:*:*:*:*:*:*:*", "cpeNameId": "1EB5EFBF-779B-4C22-8CAF-350793D888BA"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.5:*:*:*:*:*:*:*", "cpeNameId": "FC067696-E828-4C11-B17B-F2E49DDC8AF2"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.6:*:*:*:*:*:*:*", "cpeNameId": "2A19AE8D-4B7B-4890-BEEE-41484C576453"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.7:*:*:*:*:*:*:*", "cpeNameId": "5C4573D3-D9E7-42BD-B8C6-05BA6A7A8D4F"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.8:*:*:*:*:*:*:*", "cpeNameId": "1E909045-AE38-4604-B289-AC9DF0E72478"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.9:*:*:*:*:*:*:*", "cpeNameId": "FBFC269E-A0A8-4806-A28D-018E035BC076"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.10:*:*:*:*:*:*:*", "cpeNameId": "F41580FC-6267-4E89-B9B0-8649EE936F24"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.11:*:*:*:*:*:*:*", "cpeNameId": "6B251B83-D491-4735-8CFE-DA95090E7FC2"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.12:*:*:*:*:*:*:*", "cpeNameId": "3646B571-9331-4237-8780-522176F6ACAF"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.13:*:*:*:*:*:*:*", "cpeNameId": "7C57C2D4-00FD-4C1C-869C-5A0E3F631FBC"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.14:*:*:*:*:*:*:*", "cpeNameId": "A68AA2D8-9AA4-4BE6-BC17-451A61FD0419"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.15:*:*:*:*:*:*:*", "cpeNameId": "F41F7FC9-635B-49B4-BA85-53BBF3464BC3"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.16:*:*:*:*:*:*:*", "cpeNameId": "73A6B8F5-D18A-4CF4-BB6A-8A37D3E949AC"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.17:*:*:*:*:*:*:*", "cpeNameId": "8B74CF8F-5C38-4B26-8E24-E83EE8D02558"}, {"cpeName": "cpe:2.3:a:admidio:admidio:3.3.18:*:*:*:*:*:*:*", "cpeNameId": "91CA9C14-192A-4152-8A5E-A6FAEFBDA01E"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.0:-:*:*:*:*:*:*", "cpeNameId": "82099480-9EF1-4385-A4C6-601915F86DD1"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.0:beta1:*:*:*:*:*:*", "cpeNameId": "FD2213F9-C677-42F0-B916-5764535E3530"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.0:beta2:*:*:*:*:*:*", "cpeNameId": "74FCA0E1-633A-47C4-AD45-58A1FBA25F67"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.0:beta3:*:*:*:*:*:*", "cpeNameId": "49410DBE-6957-4682-870C-EA72821CE43E"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.0:beta4:*:*:*:*:*:*", "cpeNameId": "68882531-B925-4FA4-8CB6-793418FD7B63"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.0:beta5:*:*:*:*:*:*", "cpeNameId": "F0E84F4C-A22B-42A6-82D7-C84325EFA00A"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.1:*:*:*:*:*:*:*", "cpeNameId": "972E5240-4B25-4F6E-8C99-8E712A433BE6"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.1.1:*:*:*:*:*:*:*", "cpeNameId": "7A63AED7-F467-4423-915A-006712CB441C"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.2:*:*:*:*:*:*:*", "cpeNameId": "A3021585-95CB-4FC9-9C5C-54733378DF81"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.3:*:*:*:*:*:*:*", "cpeNameId": "43F51424-8757-4F05-8DC8-620506B8554D"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.4:*:*:*:*:*:*:*", "cpeNameId": "54E07E3B-9E89-4E0A-B83F-E3B5867D73E2"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.5:*:*:*:*:*:*:*", "cpeNameId": "50FAF6F8-9EE9-4155-8BAF-FFDECC27C34E"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.6:*:*:*:*:*:*:*", "cpeNameId": "6F8EA0B2-9CC8-465E-8FF2-2BCF4E1DFD4B"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.7:*:*:*:*:*:*:*", "cpeNameId": "961EC9C1-CF03-45CA-AAB1-499191737EF5"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.8:*:*:*:*:*:*:*", "cpeNameId": "FCFBD3B4-CAF5-4E8D-B6FA-021E6EC27192"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.9:*:*:*:*:*:*:*", "cpeNameId": "D51F3537-8A8F-4911-86FB-D35621E92F08"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.10:*:*:*:*:*:*:*", "cpeNameId": "14E6969C-CE65-4CB6-8D30-DDADF38C751A"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.11:*:*:*:*:*:*:*", "cpeNameId": "E6167934-37C8-4885-99D7-E37D6984434C"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.12:*:*:*:*:*:*:*", "cpeNameId": "8CE4279E-4596-4995-99A7-00F2D34D006C"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.0.13:*:*:*:*:*:*:*", "cpeNameId": "2F5A0026-C87D-4E7D-A56D-ECBE351712D0"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.1:beta1:*:*:*:*:*:*", "cpeNameId": "7E32D619-C0AC-48F4-B803-4EF10201BA7A"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.1:beta2:*:*:*:*:*:*", "cpeNameId": "69B5B4A7-1E53-4F42-84F1-46256197931E"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.1.0:-:*:*:*:*:*:*", "cpeNameId": "33473045-A02D-43EF-8717-271BAF51E576"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.1.1:*:*:*:*:*:*:*", "cpeNameId": "D95F83FA-B75B-4D27-82A2-34E52B4046D4"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.1.2:*:*:*:*:*:*:*", "cpeNameId": "73CC316C-FA58-48EA-82D9-0B90A2AD89C8"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.1.3:*:*:*:*:*:*:*", "cpeNameId": "D60E2982-4525-4E92-B74E-53DDD687A3B0"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.1.4:*:*:*:*:*:*:*", "cpeNameId": "0FAA8E03-23C2-45DF-BEEE-922F926EB18C"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.1.5:*:*:*:*:*:*:*", "cpeNameId": "3ED77604-492C-47F7-A266-110E1AB04234"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.1.6:*:*:*:*:*:*:*", "cpeNameId": "3617B401-0481-4904-8913-7F91F84B040F"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.1.7:*:*:*:*:*:*:*", "cpeNameId": "75B8E96E-F6B2-4464-86DB-F325A11E5F1C"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.1.8:*:*:*:*:*:*:*", "cpeNameId": "97D531AD-E5FC-401A-94D9-B4CC06ECA046"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.1.9:*:*:*:*:*:*:*", "cpeNameId": "DF963826-8EB8-46EF-9504-83EDD7C43DC3"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.1.10:*:*:*:*:*:*:*", "cpeNameId": "FC0B6E34-4C6D-4167-88F8-5E9B58282B70"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.1.11:*:*:*:*:*:*:*", "cpeNameId": "8256803D-3975-4DCE-9FCC-240180EC4672"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.1.12:*:*:*:*:*:*:*", "cpeNameId": "76EFD967-3BC8-4BFA-923F-62C9F2C85016"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.1.13:*:*:*:*:*:*:*", "cpeNameId": "2D2F9712-F172-4997-8BE4-BC49A8C7F5CC"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.2.7:*:*:*:*:*:*:*", "cpeNameId": "E583EDBA-3AC0-44D0-AB64-4E761B27A7EB"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.2.8:*:*:*:*:*:*:*", "cpeNameId": "625B88EC-80B4-4631-A139-35F17E6094BC"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.2.9:*:*:*:*:*:*:*", "cpeNameId": "5316B0D8-5475-4BF1-894A-A2D843A3FDD8"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.2.10:*:*:*:*:*:*:*", "cpeNameId": "19E58303-F939-4EEA-9AF0-3558621E17A1"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.2.11:*:*:*:*:*:*:*", "cpeNameId": "9756BC48-837B-448A-8F5C-1FA696591440"}, {"cpeName": "cpe:2.3:a:admidio:admidio:4.2.12:*:*:*:*:*:*:*", "cpeNameId": "368FE30D-7729-4BCB-8135-F3D25DB933A1"}]}} \ No newline at end of file diff --git a/cpematch/F7/F7ED1780-FD28-472F-A715-A6190DC0C42C.json b/cpematch/F7/F7ED1780-FD28-472F-A715-A6190DC0C42C.json index a48d4b4169e..0279cc105da 100644 --- a/cpematch/F7/F7ED1780-FD28-472F-A715-A6190DC0C42C.json +++ b/cpematch/F7/F7ED1780-FD28-472F-A715-A6190DC0C42C.json @@ -1 +1 @@ -{"matchString": {"matchCriteriaId": "F7ED1780-FD28-472F-A715-A6190DC0C42C", "criteria": "cpe:2.3:a:anujk305:emergency_ambulance_hiring_portal:1.0:*:*:*:*:*:*:*", "lastModified": "2025-02-12T22:35:07.987", "cpeLastModified": "2025-02-12T22:35:07.987", "created": "2025-02-12T22:35:07.987", "status": "Active"}} \ No newline at end of file +{"matchString": {"matchCriteriaId": "F7ED1780-FD28-472F-A715-A6190DC0C42C", "criteria": "cpe:2.3:a:anujk305:emergency_ambulance_hiring_portal:1.0:*:*:*:*:*:*:*", "lastModified": "2025-02-12T22:35:07.987", "cpeLastModified": "2025-02-14T19:10:17.010", "created": "2025-02-12T22:35:07.987", "status": "Active"}} \ No newline at end of file diff --git a/cve/2020/CVE-2020-19698.json b/cve/2020/CVE-2020-19698.json index b05bb397073..172bd073a99 100644 --- a/cve/2020/CVE-2020-19698.json +++ b/cve/2020/CVE-2020-19698.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2020-19698", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:07.823", "lastModified": "2024-11-21T05:09:20.290", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross Site Scripting vulnerability found in Pandao Editor.md v.1.5.0 allows a remote attacker to execute arbitrary code via a crafted script to the editor parameter."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:ipandao:editor.md:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE347363-151B-40A1-B1CB-17D7E5FC45AA"}]}]}], "references": [{"url": "https://github.com/pandao/editor.md/issues/700", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/pandao/editor.md/issues/700", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2020-19698", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:07.823", "lastModified": "2025-02-14T19:15:11.397", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross Site Scripting vulnerability found in Pandao Editor.md v.1.5.0 allows a remote attacker to execute arbitrary code via a crafted script to the editor parameter."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:ipandao:editor.md:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE347363-151B-40A1-B1CB-17D7E5FC45AA"}]}]}], "references": [{"url": "https://github.com/pandao/editor.md/issues/700", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/pandao/editor.md/issues/700", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2020/CVE-2020-19699.json b/cve/2020/CVE-2020-19699.json index ee89ab6d49e..220c2c903bc 100644 --- a/cve/2020/CVE-2020-19699.json +++ b/cve/2020/CVE-2020-19699.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2020-19699", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:07.863", "lastModified": "2024-11-21T05:09:20.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross Site Scripting vulnerability found in KOHGYLW Kiftd v.1.0.18 allows a remote attacker to execute arbitrary code via the tag in the upload file page."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:kiftd_project:kiftd:1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "651947BB-B5F7-41E3-92F7-BB284A105309"}]}]}], "references": [{"url": "https://github.com/KOHGYLW/kiftd/issues/32#issuecomment-509868583", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking"]}, {"url": "https://kohgylw.gitee.io/", "source": "cve@mitre.org", "tags": ["Product"]}, {"url": "https://github.com/KOHGYLW/kiftd/issues/32#issuecomment-509868583", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking"]}, {"url": "https://kohgylw.gitee.io/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2020-19699", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:07.863", "lastModified": "2025-02-14T19:15:12.447", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross Site Scripting vulnerability found in KOHGYLW Kiftd v.1.0.18 allows a remote attacker to execute arbitrary code via the tag in the upload file page."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:kiftd_project:kiftd:1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "651947BB-B5F7-41E3-92F7-BB284A105309"}]}]}], "references": [{"url": "https://github.com/KOHGYLW/kiftd/issues/32#issuecomment-509868583", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking"]}, {"url": "https://kohgylw.gitee.io/", "source": "cve@mitre.org", "tags": ["Product"]}, {"url": "https://github.com/KOHGYLW/kiftd/issues/32#issuecomment-509868583", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking"]}, {"url": "https://kohgylw.gitee.io/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}]}} \ No newline at end of file diff --git a/cve/2020/CVE-2020-19850.json b/cve/2020/CVE-2020-19850.json index 1826e0567d9..32fee91beb7 100644 --- a/cve/2020/CVE-2020-19850.json +++ b/cve/2020/CVE-2020-19850.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2020-19850", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:07.897", "lastModified": "2024-11-21T05:09:25.427", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue found in Directus API v.2.2.0 allows a remote attacker to cause a denial of service via a great amount of HTTP requests."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-400"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:monospace:directus:2.2.0:*:*:*:*:-:*:*", "matchCriteriaId": "7CA0A8B4-8182-4DE0-BDA1-5ACF259BAF91"}]}]}], "references": [{"url": "https://github.com/directus/api/issues/982", "source": "cve@mitre.org", "tags": ["Exploit", "Patch"]}, {"url": "https://github.com/directus/api/issues/982", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2020-19850", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:07.897", "lastModified": "2025-02-14T19:15:12.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue found in Directus API v.2.2.0 allows a remote attacker to cause a denial of service via a great amount of HTTP requests."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-400"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-400"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:monospace:directus:2.2.0:*:*:*:*:-:*:*", "matchCriteriaId": "7CA0A8B4-8182-4DE0-BDA1-5ACF259BAF91"}]}]}], "references": [{"url": "https://github.com/directus/api/issues/982", "source": "cve@mitre.org", "tags": ["Exploit", "Patch"]}, {"url": "https://github.com/directus/api/issues/982", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Patch"]}]}} \ No newline at end of file diff --git a/cve/2020/CVE-2020-20521.json b/cve/2020/CVE-2020-20521.json index daefba31628..86cf94d5291 100644 --- a/cve/2020/CVE-2020-20521.json +++ b/cve/2020/CVE-2020-20521.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2020-20521", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:07.930", "lastModified": "2024-11-21T05:12:07.693", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross Site Scripting vulnerability found in KiteCMS v.1.1 allows a remote attacker to execute arbitrary code via the comment parameter."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:kitesky:kitecms:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9724ED81-2F10-41CD-9E11-B934B3D48457"}]}]}], "references": [{"url": "https://github.com/Kitesky/KiteCMS/issues/1", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking"]}, {"url": "https://github.com/Kitesky/KiteCMS/issues/1", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2020-20521", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:07.930", "lastModified": "2025-02-14T19:15:12.807", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross Site Scripting vulnerability found in KiteCMS v.1.1 allows a remote attacker to execute arbitrary code via the comment parameter."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:kitesky:kitecms:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9724ED81-2F10-41CD-9E11-B934B3D48457"}]}]}], "references": [{"url": "https://github.com/Kitesky/KiteCMS/issues/1", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking"]}, {"url": "https://github.com/Kitesky/KiteCMS/issues/1", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking"]}]}} \ No newline at end of file diff --git a/cve/2020/CVE-2020-23259.json b/cve/2020/CVE-2020-23259.json index cf2fbb7fef4..478d7825eb9 100644 --- a/cve/2020/CVE-2020-23259.json +++ b/cve/2020/CVE-2020-23259.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2020-23259", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.340", "lastModified": "2024-11-21T05:13:41.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue found in Jsish v.3.0.11 and before allows an attacker to cause a denial of service via the Jsi_Strlen function in the src/jsiChar.c file."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.0.11", "matchCriteriaId": "633EAFF5-6C2C-4EA3-8E68-C899A78ECC1E"}]}]}], "references": [{"url": "https://github.com/pcmacdon/jsish/issues/13", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking", "Patch"]}, {"url": "https://jsish.org/fossil/jsi2/tktview?name=b6bb078e00", "source": "cve@mitre.org", "tags": ["Broken Link"]}, {"url": "https://github.com/pcmacdon/jsish/issues/13", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Patch"]}, {"url": "https://jsish.org/fossil/jsi2/tktview?name=b6bb078e00", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2020-23259", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.340", "lastModified": "2025-02-14T19:15:12.967", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue found in Jsish v.3.0.11 and before allows an attacker to cause a denial of service via the Jsi_Strlen function in the src/jsiChar.c file."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-476"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.0.11", "matchCriteriaId": "633EAFF5-6C2C-4EA3-8E68-C899A78ECC1E"}]}]}], "references": [{"url": "https://github.com/pcmacdon/jsish/issues/13", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking", "Patch"]}, {"url": "https://jsish.org/fossil/jsi2/tktview?name=b6bb078e00", "source": "cve@mitre.org", "tags": ["Broken Link"]}, {"url": "https://github.com/pcmacdon/jsish/issues/13", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Patch"]}, {"url": "https://jsish.org/fossil/jsi2/tktview?name=b6bb078e00", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"]}]}} \ No newline at end of file diff --git a/cve/2020/CVE-2020-23260.json b/cve/2020/CVE-2020-23260.json index 2f9d29e2ee2..4bb057359c2 100644 --- a/cve/2020/CVE-2020-23260.json +++ b/cve/2020/CVE-2020-23260.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2020-23260", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.373", "lastModified": "2024-11-21T05:13:41.360", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue found in Jsish v.3.0.11 and before allows an attacker to cause a denial of service via the StringReplaceCmd function in the src/jsiChar.c file."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.0.11", "matchCriteriaId": "633EAFF5-6C2C-4EA3-8E68-C899A78ECC1E"}]}]}], "references": [{"url": "https://github.com/pcmacdon/jsish/issues/14", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking", "Patch"]}, {"url": "https://jsish.org/fossil/jsi2/tktview?name=3e211e44b1", "source": "cve@mitre.org", "tags": ["Broken Link"]}, {"url": "https://github.com/pcmacdon/jsish/issues/14", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Patch"]}, {"url": "https://jsish.org/fossil/jsi2/tktview?name=3e211e44b1", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2020-23260", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.373", "lastModified": "2025-02-14T18:15:18.170", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue found in Jsish v.3.0.11 and before allows an attacker to cause a denial of service via the StringReplaceCmd function in the src/jsiChar.c file."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-787"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.0.11", "matchCriteriaId": "633EAFF5-6C2C-4EA3-8E68-C899A78ECC1E"}]}]}], "references": [{"url": "https://github.com/pcmacdon/jsish/issues/14", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking", "Patch"]}, {"url": "https://jsish.org/fossil/jsi2/tktview?name=3e211e44b1", "source": "cve@mitre.org", "tags": ["Broken Link"]}, {"url": "https://github.com/pcmacdon/jsish/issues/14", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Patch"]}, {"url": "https://jsish.org/fossil/jsi2/tktview?name=3e211e44b1", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"]}]}} \ No newline at end of file diff --git a/cve/2020/CVE-2020-23327.json b/cve/2020/CVE-2020-23327.json index e3a71041c9c..6ba2f061afe 100644 --- a/cve/2020/CVE-2020-23327.json +++ b/cve/2020/CVE-2020-23327.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2020-23327", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.413", "lastModified": "2024-11-21T05:13:45.137", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross Site Scripting vulnerability found in ZblogCN ZblogPHP v.1.0 allows a local attacker to execute arbitrary code via a crafted payload in title parameter of the module management model."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:zblogcn:zblogphp:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56498773-446C-4E07-8133-82E342815799"}]}]}], "references": [{"url": "https://github.com/zblogcn/zblogphp/issues/262", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking"]}, {"url": "https://github.com/zblogcn/zblogphp/issues/262", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2020-23327", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.413", "lastModified": "2025-02-14T18:15:19.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross Site Scripting vulnerability found in ZblogCN ZblogPHP v.1.0 allows a local attacker to execute arbitrary code via a crafted payload in title parameter of the module management model."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:zblogcn:zblogphp:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56498773-446C-4E07-8133-82E342815799"}]}]}], "references": [{"url": "https://github.com/zblogcn/zblogphp/issues/262", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking"]}, {"url": "https://github.com/zblogcn/zblogphp/issues/262", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking"]}]}} \ No newline at end of file diff --git a/cve/2020/CVE-2020-29312.json b/cve/2020/CVE-2020-29312.json index f403e484568..3d62f2e3b16 100644 --- a/cve/2020/CVE-2020-29312.json +++ b/cve/2020/CVE-2020-29312.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2020-29312", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.457", "lastModified": "2024-11-21T05:23:53.797", "vulnStatus": "Modified", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "An issue found in Zend Framework v.3.1.3 and before allow a remote attacker to execute arbitrary code via the unserialize function. Note: This has been disputed by third parties as incomplete and incorrect. The framework does not have a version that surpasses 2.x.x and was deprecated in early 2020."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-502"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.1.3", "matchCriteriaId": "EE98955F-D65E-4675-A060-942DD2CC6CC5"}]}]}], "references": [{"url": "http://zend.com", "source": "cve@mitre.org", "tags": ["Product"]}, {"url": "https://cowtransfer.com/s/f9684f004d7149", "source": "cve@mitre.org", "tags": ["Broken Link"]}, {"url": "https://github.com/zendframework/zendframework", "source": "cve@mitre.org", "tags": ["Product"]}, {"url": "http://zend.com", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://cowtransfer.com/s/f9684f004d7149", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"]}, {"url": "https://github.com/zendframework/zendframework", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2020-29312", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.457", "lastModified": "2025-02-14T18:15:19.360", "vulnStatus": "Modified", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "An issue found in Zend Framework v.3.1.3 and before allow a remote attacker to execute arbitrary code via the unserialize function. Note: This has been disputed by third parties as incomplete and incorrect. The framework does not have a version that surpasses 2.x.x and was deprecated in early 2020."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-502"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-502"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.1.3", "matchCriteriaId": "EE98955F-D65E-4675-A060-942DD2CC6CC5"}]}]}], "references": [{"url": "http://zend.com", "source": "cve@mitre.org", "tags": ["Product"]}, {"url": "https://cowtransfer.com/s/f9684f004d7149", "source": "cve@mitre.org", "tags": ["Broken Link"]}, {"url": "https://github.com/zendframework/zendframework", "source": "cve@mitre.org", "tags": ["Product"]}, {"url": "http://zend.com", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://cowtransfer.com/s/f9684f004d7149", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"]}, {"url": "https://github.com/zendframework/zendframework", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}]}} \ No newline at end of file diff --git a/cve/2021/CVE-2021-28235.json b/cve/2021/CVE-2021-28235.json index 85a4f5b91c8..671471e4ca5 100644 --- a/cve/2021/CVE-2021-28235.json +++ b/cve/2021/CVE-2021-28235.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2021-28235", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.507", "lastModified": "2024-11-21T05:59:22.957", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Authentication vulnerability found in Etcd-io v.3.4.10 allows remote attackers to escalate privileges via the debug function."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-287"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:etcd:etcd:3.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "423FB650-0346-4036-B0CE-D07170756FA4"}]}]}], "references": [{"url": "http://etcd.com", "source": "cve@mitre.org", "tags": ["Broken Link"]}, {"url": "https://github.com/etcd-io/etcd", "source": "cve@mitre.org", "tags": ["Product"]}, {"url": "https://github.com/etcd-io/etcd/pull/15648", "source": "cve@mitre.org"}, {"url": "https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj.png", "source": "cve@mitre.org", "tags": ["Product"]}, {"url": "https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj_2.png", "source": "cve@mitre.org", "tags": ["Product"]}, {"url": "http://etcd.com", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"]}, {"url": "https://github.com/etcd-io/etcd", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://github.com/etcd-io/etcd/pull/15648", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj.png", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj_2.png", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2021-28235", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.507", "lastModified": "2025-02-14T18:15:19.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Authentication vulnerability found in Etcd-io v.3.4.10 allows remote attackers to escalate privileges via the debug function."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-287"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-287"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:etcd:etcd:3.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "423FB650-0346-4036-B0CE-D07170756FA4"}]}]}], "references": [{"url": "http://etcd.com", "source": "cve@mitre.org", "tags": ["Broken Link"]}, {"url": "https://github.com/etcd-io/etcd", "source": "cve@mitre.org", "tags": ["Product"]}, {"url": "https://github.com/etcd-io/etcd/pull/15648", "source": "cve@mitre.org"}, {"url": "https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj.png", "source": "cve@mitre.org", "tags": ["Product"]}, {"url": "https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj_2.png", "source": "cve@mitre.org", "tags": ["Product"]}, {"url": "http://etcd.com", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"]}, {"url": "https://github.com/etcd-io/etcd", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://github.com/etcd-io/etcd/pull/15648", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj.png", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj_2.png", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}]}} \ No newline at end of file diff --git a/cve/2021/CVE-2021-31707.json b/cve/2021/CVE-2021-31707.json index 6669d55e49b..1bb92cbc8f6 100644 --- a/cve/2021/CVE-2021-31707.json +++ b/cve/2021/CVE-2021-31707.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2021-31707", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.547", "lastModified": "2024-11-21T06:06:08.610", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Permissions vulnerability found in KiteCMS allows a remote attacker to execute arbitrary code via the upload file type."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-434"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:kitesky:kitecms:-:*:*:*:*:*:*:*", "matchCriteriaId": "57BFED2E-0004-4DF5-B1BB-5EACDEA0F4B8"}]}]}], "references": [{"url": "https://github.com/Kitesky/KiteCMS/issues/8", "source": "cve@mitre.org", "tags": ["Broken Link"]}, {"url": "https://vuldb.com/?id.224929", "source": "nvd@nist.gov", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "https://github.com/Kitesky/KiteCMS/issues/8", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2021-31707", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.547", "lastModified": "2025-02-14T18:15:19.870", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Permissions vulnerability found in KiteCMS allows a remote attacker to execute arbitrary code via the upload file type."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-434"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-434"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:kitesky:kitecms:-:*:*:*:*:*:*:*", "matchCriteriaId": "57BFED2E-0004-4DF5-B1BB-5EACDEA0F4B8"}]}]}], "references": [{"url": "https://github.com/Kitesky/KiteCMS/issues/8", "source": "cve@mitre.org", "tags": ["Broken Link"]}, {"url": "https://vuldb.com/?id.224929", "source": "nvd@nist.gov", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "https://github.com/Kitesky/KiteCMS/issues/8", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"]}]}} \ No newline at end of file diff --git a/cve/2021/CVE-2021-3267.json b/cve/2021/CVE-2021-3267.json index 165cb33d327..12f2a1c47e2 100644 --- a/cve/2021/CVE-2021-3267.json +++ b/cve/2021/CVE-2021-3267.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2021-3267", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.587", "lastModified": "2024-11-21T06:21:11.180", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "File Upload vulnerability found in KiteCMS v.1.1 allows a remote attacker to execute arbitrary code via the uploadFile function."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-434"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:kitesky:kitecms:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "206854A6-CDE7-4607-B768-79570E16AE42"}]}]}], "references": [{"url": "https://github.com/Kitesky/KiteCMS/issues/6", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking"]}, {"url": "https://github.com/Kitesky/KiteCMS/issues/6", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2021-3267", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.587", "lastModified": "2025-02-14T18:15:21.857", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "File Upload vulnerability found in KiteCMS v.1.1 allows a remote attacker to execute arbitrary code via the uploadFile function."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-434"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:kitesky:kitecms:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "206854A6-CDE7-4607-B768-79570E16AE42"}]}]}], "references": [{"url": "https://github.com/Kitesky/KiteCMS/issues/6", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking"]}, {"url": "https://github.com/Kitesky/KiteCMS/issues/6", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking"]}]}} \ No newline at end of file diff --git a/cve/2021/CVE-2021-39350.json b/cve/2021/CVE-2021-39350.json index 130f8b0a89c..ea2a0b9f702 100644 --- a/cve/2021/CVE-2021-39350.json +++ b/cve/2021/CVE-2021-39350.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2021-39350", "sourceIdentifier": "security@wordfence.com", "published": "2021-10-06T16:15:07.427", "lastModified": "2024-11-21T06:19:22.673", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "The FV Flowplayer Video Player WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the player_id parameter found in the ~/view/stats.php file which allows attackers to inject arbitrary web scripts, in versions 7.5.0.727 - 7.5.2.727."}, {"lang": "es", "value": "El plugin FV Flowplayer Video Player de WordPress es vulnerable a un ataque de tipo Cross-Site Scripting Reflejado por medio del par\u00e1metro player_id encontrado en el archivo ~/view/stats.php que permite a atacantes inyectar scripts web arbitrarios, en versiones 7.5.0.727 - 7.5.2.727"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}], "cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "weaknesses": [{"source": "security@wordfence.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:foliovision:fv_flowplayer_video_player:*:*:*:*:*:wordpress:*:*", "versionStartIncluding": "7.5.0.727", "versionEndIncluding": "7.5.2.727", "matchCriteriaId": "CB579125-468C-4BA1-98E3-FAF6BB70B424"}]}]}], "references": [{"url": "https://plugins.trac.wordpress.org/changeset/2580834/fv-wordpress-flowplayer/trunk/view/stats.php", "source": "security@wordfence.com", "tags": ["Patch", "Third Party Advisory"]}, {"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39350", "source": "security@wordfence.com", "tags": ["Third Party Advisory"]}, {"url": "https://plugins.trac.wordpress.org/changeset/2580834/fv-wordpress-flowplayer/trunk/view/stats.php", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory"]}, {"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39350", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2021-39350", "sourceIdentifier": "security@wordfence.com", "published": "2021-10-06T16:15:07.427", "lastModified": "2025-02-14T19:15:13.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "The FV Flowplayer Video Player WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the player_id parameter found in the ~/view/stats.php file which allows attackers to inject arbitrary web scripts, in versions 7.5.0.727 - 7.5.2.727."}, {"lang": "es", "value": "El plugin FV Flowplayer Video Player de WordPress es vulnerable a un ataque de tipo Cross-Site Scripting Reflejado por medio del par\u00e1metro player_id encontrado en el archivo ~/view/stats.php que permite a atacantes inyectar scripts web arbitrarios, en versiones 7.5.0.727 - 7.5.2.727"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}], "cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "weaknesses": [{"source": "security@wordfence.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:foliovision:fv_flowplayer_video_player:*:*:*:*:*:wordpress:*:*", "versionStartIncluding": "7.5.0.727", "versionEndIncluding": "7.5.2.727", "matchCriteriaId": "CB579125-468C-4BA1-98E3-FAF6BB70B424"}]}]}], "references": [{"url": "https://plugins.trac.wordpress.org/changeset/2580834/fv-wordpress-flowplayer/trunk/view/stats.php", "source": "security@wordfence.com", "tags": ["Patch", "Third Party Advisory"]}, {"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39350", "source": "security@wordfence.com", "tags": ["Third Party Advisory"]}, {"url": "https://plugins.trac.wordpress.org/changeset/2580834/fv-wordpress-flowplayer/trunk/view/stats.php", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory"]}, {"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39350", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2021/CVE-2021-39351.json b/cve/2021/CVE-2021-39351.json index 54af735bda1..defc3028398 100644 --- a/cve/2021/CVE-2021-39351.json +++ b/cve/2021/CVE-2021-39351.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2021-39351", "sourceIdentifier": "security@wordfence.com", "published": "2021-10-06T16:15:07.490", "lastModified": "2024-11-21T06:19:22.940", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "The WP Bannerize WordPress plugin is vulnerable to authenticated SQL injection via the id parameter found in the ~/Classes/wpBannerizeAdmin.php file which allows attackers to exfiltrate sensitive information from vulnerable sites. This issue affects versions 2.0.0 - 4.0.2."}, {"lang": "es", "value": "El plugin WP Bannerize de WordPress es vulnerable a una inyecci\u00f3n SQL autenticada por medio del par\u00e1metro id que se encuentra en el archivo ~/Classes/wpBannerizeAdmin.php, que permite a atacantes exfiltrar informaci\u00f3n confidencial de sitios vulnerables. Este problema afecta a versiones 2.0.0 - 4.0.2"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 3.6}], "cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "security@wordfence.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:wp_bannerize_project:wp_bannerize:*:*:*:*:*:wordpress:*:*", "versionStartIncluding": "2.0.0", "versionEndIncluding": "4.0.2", "matchCriteriaId": "0F16C964-F255-4B72-B2D1-CB304FF7D731"}]}]}], "references": [{"url": "https://plugins.trac.wordpress.org/browser/wp-bannerize/trunk/Classes/wpBannerizeAdmin.php#L1681", "source": "security@wordfence.com", "tags": ["Patch", "Third Party Advisory"]}, {"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39351", "source": "security@wordfence.com", "tags": ["Third Party Advisory"]}, {"url": "https://plugins.trac.wordpress.org/browser/wp-bannerize/trunk/Classes/wpBannerizeAdmin.php#L1681", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory"]}, {"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39351", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2021-39351", "sourceIdentifier": "security@wordfence.com", "published": "2021-10-06T16:15:07.490", "lastModified": "2025-02-14T19:15:13.407", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "The WP Bannerize WordPress plugin is vulnerable to authenticated SQL injection via the id parameter found in the ~/Classes/wpBannerizeAdmin.php file which allows attackers to exfiltrate sensitive information from vulnerable sites. This issue affects versions 2.0.0 - 4.0.2."}, {"lang": "es", "value": "El plugin WP Bannerize de WordPress es vulnerable a una inyecci\u00f3n SQL autenticada por medio del par\u00e1metro id que se encuentra en el archivo ~/Classes/wpBannerizeAdmin.php, que permite a atacantes exfiltrar informaci\u00f3n confidencial de sitios vulnerables. Este problema afecta a versiones 2.0.0 - 4.0.2"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "baseScore": 7.7, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.1, "impactScore": 4.0}], "cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "security@wordfence.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:wp_bannerize_project:wp_bannerize:*:*:*:*:*:wordpress:*:*", "versionStartIncluding": "2.0.0", "versionEndIncluding": "4.0.2", "matchCriteriaId": "0F16C964-F255-4B72-B2D1-CB304FF7D731"}]}]}], "references": [{"url": "https://plugins.trac.wordpress.org/browser/wp-bannerize/trunk/Classes/wpBannerizeAdmin.php#L1681", "source": "security@wordfence.com", "tags": ["Patch", "Third Party Advisory"]}, {"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39351", "source": "security@wordfence.com", "tags": ["Third Party Advisory"]}, {"url": "https://plugins.trac.wordpress.org/browser/wp-bannerize/trunk/Classes/wpBannerizeAdmin.php#L1681", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory"]}, {"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39351", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2022/CVE-2022-47870.json b/cve/2022/CVE-2022-47870.json index 2823d3b96df..15d87e8c8b3 100644 --- a/cve/2022/CVE-2022-47870.json +++ b/cve/2022/CVE-2022-47870.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2022-47870", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T13:15:08.373", "lastModified": "2024-11-21T07:32:26.203", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "A Cross Site Scripting (XSS) vulnerability in the web SQL monitor login page in Redgate SQL Monitor 12.1.31.893 allows remote attackers to inject arbitrary web Script or HTML via the returnUrl parameter."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:red-gate:sql_monitor:12.1.31.893:*:*:*:*:*:*:*", "matchCriteriaId": "AE9AD169-DABA-4A7A-A4CF-5D596E3626E6"}]}]}], "references": [{"url": "https://packetstormsecurity.com/files/171647/SQL-Monitor-12.1.31.893-Cross-Site-Scripting.html", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}, {"url": "https://packetstormsecurity.com/files/171647/SQL-Monitor-12.1.31.893-Cross-Site-Scripting.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2022-47870", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T13:15:08.373", "lastModified": "2025-02-14T19:15:13.597", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "A Cross Site Scripting (XSS) vulnerability in the web SQL monitor login page in Redgate SQL Monitor 12.1.31.893 allows remote attackers to inject arbitrary web Script or HTML via the returnUrl parameter."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:red-gate:sql_monitor:12.1.31.893:*:*:*:*:*:*:*", "matchCriteriaId": "AE9AD169-DABA-4A7A-A4CF-5D596E3626E6"}]}]}], "references": [{"url": "https://packetstormsecurity.com/files/171647/SQL-Monitor-12.1.31.893-Cross-Site-Scripting.html", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}, {"url": "https://packetstormsecurity.com/files/171647/SQL-Monitor-12.1.31.893-Cross-Site-Scripting.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}]}} \ No newline at end of file diff --git a/cve/2022/CVE-2022-48223.json b/cve/2022/CVE-2022-48223.json index 752cfff8dfe..37acde540e8 100644 --- a/cve/2022/CVE-2022-48223.json +++ b/cve/2022/CVE-2022-48223.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2022-48223", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T16:15:07.187", "lastModified": "2024-11-21T07:32:59.567", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Acuant AcuFill SDK before 10.22.02.03. During SDK repair, certutil.exe is called by the Acuant installer to repair certificates. This call is vulnerable to DLL hijacking due to a race condition and insecure permissions on the executing directory."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "baseScore": 6.7, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-427"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:gbgplc:acuant_acufill_sdk:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.22.02.03", "matchCriteriaId": "C982B4DA-273F-4B30-B931-2988851C07A5"}]}]}], "references": [{"url": "https://acuant.com", "source": "cve@mitre.org", "tags": ["Not Applicable"]}, {"url": "https://hackandpwn.com/disclosures/CVE-2022-48223.pdf", "source": "cve@mitre.org", "tags": ["Third Party Advisory"]}, {"url": "https://acuant.com", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Not Applicable"]}, {"url": "https://hackandpwn.com/disclosures/CVE-2022-48223.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2022-48223", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T16:15:07.187", "lastModified": "2025-02-14T18:15:22.503", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Acuant AcuFill SDK before 10.22.02.03. During SDK repair, certutil.exe is called by the Acuant installer to repair certificates. This call is vulnerable to DLL hijacking due to a race condition and insecure permissions on the executing directory."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "baseScore": 6.7, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 0.8, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "baseScore": 6.7, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-427"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:gbgplc:acuant_acufill_sdk:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.22.02.03", "matchCriteriaId": "C982B4DA-273F-4B30-B931-2988851C07A5"}]}]}], "references": [{"url": "https://acuant.com", "source": "cve@mitre.org", "tags": ["Not Applicable"]}, {"url": "https://hackandpwn.com/disclosures/CVE-2022-48223.pdf", "source": "cve@mitre.org", "tags": ["Third Party Advisory"]}, {"url": "https://acuant.com", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Not Applicable"]}, {"url": "https://hackandpwn.com/disclosures/CVE-2022-48223.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2022/CVE-2022-48224.json b/cve/2022/CVE-2022-48224.json index eadf92f0fb8..549f9ea77e6 100644 --- a/cve/2022/CVE-2022-48224.json +++ b/cve/2022/CVE-2022-48224.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2022-48224", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T16:15:07.230", "lastModified": "2024-11-21T07:32:59.707", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Acuant AcuFill SDK before 10.22.02.03. It is installed with insecure permissions (full write access within Program Files). Standard users can replace files within this directory that get executed with elevated privileges, leading to a complete arbitrary code execution (elevation of privileges)."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.3, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-427"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:gbgplc:acuant_acufill_sdk:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.22.02.03", "matchCriteriaId": "C982B4DA-273F-4B30-B931-2988851C07A5"}]}]}], "references": [{"url": "https://acuant.com", "source": "cve@mitre.org", "tags": ["Not Applicable"]}, {"url": "https://hackandpwn.com/disclosures/CVE-2022-48224.pdf", "source": "cve@mitre.org", "tags": ["Third Party Advisory"]}, {"url": "https://acuant.com", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Not Applicable"]}, {"url": "https://hackandpwn.com/disclosures/CVE-2022-48224.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2022-48224", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T16:15:07.230", "lastModified": "2025-02-14T18:15:22.703", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Acuant AcuFill SDK before 10.22.02.03. It is installed with insecure permissions (full write access within Program Files). Standard users can replace files within this directory that get executed with elevated privileges, leading to a complete arbitrary code execution (elevation of privileges)."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.3, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.3, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-427"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:gbgplc:acuant_acufill_sdk:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.22.02.03", "matchCriteriaId": "C982B4DA-273F-4B30-B931-2988851C07A5"}]}]}], "references": [{"url": "https://acuant.com", "source": "cve@mitre.org", "tags": ["Not Applicable"]}, {"url": "https://hackandpwn.com/disclosures/CVE-2022-48224.pdf", "source": "cve@mitre.org", "tags": ["Third Party Advisory"]}, {"url": "https://acuant.com", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Not Applicable"]}, {"url": "https://hackandpwn.com/disclosures/CVE-2022-48224.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2022/CVE-2022-48225.json b/cve/2022/CVE-2022-48225.json index da9f70d3a29..a93db6140b5 100644 --- a/cve/2022/CVE-2022-48225.json +++ b/cve/2022/CVE-2022-48225.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2022-48225", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.757", "lastModified": "2024-11-21T07:32:59.857", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Acuant AcuFill SDK before 10.22.02.03. It is used to install drivers from several different vendors. The Gemalto Document Reader child installation process is vulnerable to DLL hijacking, because it attempts to execute (with elevated privileges) multiple non-existent DLLs out of a non-existent standard-user writable location."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.3, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-427"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:gbgplc:acuant_acufill_sdk:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.22.02.03", "matchCriteriaId": "C982B4DA-273F-4B30-B931-2988851C07A5"}]}]}], "references": [{"url": "https://acuant.com", "source": "cve@mitre.org", "tags": ["Not Applicable"]}, {"url": "https://hackandpwn.com/disclosures/CVE-2022-48225.pdf", "source": "cve@mitre.org", "tags": ["Third Party Advisory"]}, {"url": "https://acuant.com", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Not Applicable"]}, {"url": "https://hackandpwn.com/disclosures/CVE-2022-48225.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2022-48225", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.757", "lastModified": "2025-02-14T18:15:22.903", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Acuant AcuFill SDK before 10.22.02.03. It is used to install drivers from several different vendors. The Gemalto Document Reader child installation process is vulnerable to DLL hijacking, because it attempts to execute (with elevated privileges) multiple non-existent DLLs out of a non-existent standard-user writable location."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.3, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.3, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-427"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:gbgplc:acuant_acufill_sdk:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.22.02.03", "matchCriteriaId": "C982B4DA-273F-4B30-B931-2988851C07A5"}]}]}], "references": [{"url": "https://acuant.com", "source": "cve@mitre.org", "tags": ["Not Applicable"]}, {"url": "https://hackandpwn.com/disclosures/CVE-2022-48225.pdf", "source": "cve@mitre.org", "tags": ["Third Party Advisory"]}, {"url": "https://acuant.com", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Not Applicable"]}, {"url": "https://hackandpwn.com/disclosures/CVE-2022-48225.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-27091.json b/cve/2023/CVE-2023-27091.json index c0f2eea3a81..818393d9f72 100644 --- a/cve/2023/CVE-2023-27091.json +++ b/cve/2023/CVE-2023-27091.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-27091", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T18:15:07.043", "lastModified": "2024-11-21T07:52:18.373", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An unauthorized access issue found in XiaoBingby TeaCMS 2.3.3 allows attackers to escalate privileges via the id and keywords parameter(s)."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-287"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:teacms_project:teacms:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9D996D2D-6075-45D2-B3D7-9EA005FCCE1A"}]}]}], "references": [{"url": "https://gitee.com/xiaobingby/TeaCMS/issues/I6GDRU", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking", "Third Party Advisory"]}, {"url": "https://gitee.com/xiaobingby/TeaCMS/issues/I6SXAF", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking", "Third Party Advisory"]}, {"url": "https://gitee.com/xiaobingby/TeaCMS/issues/I6GDRU", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Third Party Advisory"]}, {"url": "https://gitee.com/xiaobingby/TeaCMS/issues/I6SXAF", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-27091", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T18:15:07.043", "lastModified": "2025-02-14T18:15:23.107", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An unauthorized access issue found in XiaoBingby TeaCMS 2.3.3 allows attackers to escalate privileges via the id and keywords parameter(s)."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-287"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-276"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:teacms_project:teacms:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9D996D2D-6075-45D2-B3D7-9EA005FCCE1A"}]}]}], "references": [{"url": "https://gitee.com/xiaobingby/TeaCMS/issues/I6GDRU", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking", "Third Party Advisory"]}, {"url": "https://gitee.com/xiaobingby/TeaCMS/issues/I6SXAF", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking", "Third Party Advisory"]}, {"url": "https://gitee.com/xiaobingby/TeaCMS/issues/I6GDRU", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Third Party Advisory"]}, {"url": "https://gitee.com/xiaobingby/TeaCMS/issues/I6SXAF", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-3084.json b/cve/2024/CVE-2024-3084.json index 2a1d42b9fd4..70aa1ddc2b1 100644 --- a/cve/2024/CVE-2024-3084.json +++ b/cve/2024/CVE-2024-3084.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-3084", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-30T08:15:07.510", "lastModified": "2024-11-21T09:28:51.727", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. It has been rated as problematic. This issue affects some unknown processing of the component Hire an Ambulance Page. The manipulation of the argument Patient Name/Relative Name/Relative Phone Number/City/State/Message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258677 was assigned to this vulnerability."}, {"lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Emergency Ambulance Hiring Portal 1.0. Ha sido calificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del componente Hire an Ambulance Page. La manipulaci\u00f3n del argumento Patient Name/Relative Name/Relative Phone Number/City/State/Message conduce a cross-site scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-258677."}], "metrics": {"cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_sxss.md", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.258677", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.258677", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.306957", "source": "cna@vuldb.com"}, {"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_sxss.md", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?ctiid.258677", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?id.258677", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?submit.306957", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-3084", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-30T08:15:07.510", "lastModified": "2025-02-14T19:20:29.973", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. It has been rated as problematic. This issue affects some unknown processing of the component Hire an Ambulance Page. The manipulation of the argument Patient Name/Relative Name/Relative Phone Number/City/State/Message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258677 was assigned to this vulnerability."}, {"lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Emergency Ambulance Hiring Portal 1.0. Ha sido calificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del componente Hire an Ambulance Page. La manipulaci\u00f3n del argumento Patient Name/Relative Name/Relative Phone Number/City/State/Message conduce a cross-site scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-258677."}], "metrics": {"cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpgurukul:emergency_ambulance_hiring_portal:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E678AE7-E61F-4E1E-B93D-BDDC7EBC85D3"}]}]}], "references": [{"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_sxss.md", "source": "cna@vuldb.com", "tags": ["Exploit"]}, {"url": "https://vuldb.com/?ctiid.258677", "source": "cna@vuldb.com", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?id.258677", "source": "cna@vuldb.com", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "https://vuldb.com/?submit.306957", "source": "cna@vuldb.com", "tags": ["Exploit", "VDB Entry"]}, {"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_sxss.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"]}, {"url": "https://vuldb.com/?ctiid.258677", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?id.258677", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "https://vuldb.com/?submit.306957", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "VDB Entry"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-3085.json b/cve/2024/CVE-2024-3085.json index 59c68d4f1b7..84b6d10389d 100644 --- a/cve/2024/CVE-2024-3085.json +++ b/cve/2024/CVE-2024-3085.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-3085", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-30T09:15:22.093", "lastModified": "2024-11-21T09:28:51.873", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability classified as critical has been found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. Affected is an unknown function of the file /admin/login.php of the component Admin Login Page. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258678 is the identifier assigned to this vulnerability."}, {"lang": "es", "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Emergency Ambulance Hiring Portal 1.0 y se ha clasificado como cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/login.php del componente Admin Login Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento nombre de usuario conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-258678 es el identificador asignado a esta vulnerabilidad."}], "metrics": {"cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL"}, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_sqli.md", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.258678", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.258678", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.306958", "source": "cna@vuldb.com"}, {"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_sqli.md", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?ctiid.258678", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?id.258678", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?submit.306958", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-3085", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-30T09:15:22.093", "lastModified": "2025-02-14T19:22:32.327", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability classified as critical has been found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. Affected is an unknown function of the file /admin/login.php of the component Admin Login Page. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258678 is the identifier assigned to this vulnerability."}, {"lang": "es", "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Emergency Ambulance Hiring Portal 1.0 y se ha clasificado como cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/login.php del componente Admin Login Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento nombre de usuario conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-258678 es el identificador asignado a esta vulnerabilidad."}], "metrics": {"cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 3.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL"}, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpgurukul:emergency_ambulance_hiring_portal:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E678AE7-E61F-4E1E-B93D-BDDC7EBC85D3"}]}]}], "references": [{"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_sqli.md", "source": "cna@vuldb.com", "tags": ["Exploit"]}, {"url": "https://vuldb.com/?ctiid.258678", "source": "cna@vuldb.com", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?id.258678", "source": "cna@vuldb.com", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "https://vuldb.com/?submit.306958", "source": "cna@vuldb.com", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_sqli.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"]}, {"url": "https://vuldb.com/?ctiid.258678", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?id.258678", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "https://vuldb.com/?submit.306958", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-3086.json b/cve/2024/CVE-2024-3086.json index c6061dcb7fb..f45ee6e479f 100644 --- a/cve/2024/CVE-2024-3086.json +++ b/cve/2024/CVE-2024-3086.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-3086", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-30T09:15:22.367", "lastModified": "2024-11-21T09:28:52.027", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability classified as problematic was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. Affected by this vulnerability is an unknown functionality of the file ambulance-tracking.php of the component Ambulance Tracking Page. The manipulation of the argument searchdata leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258679."}, {"lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Emergency Ambulance Hiring Portal 1.0 y se ha clasificado como problem\u00e1tica. Una funci\u00f3n desconocida del archivo ambulance-tracking.php del componente Ambulance Tracking Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento searchdata conduce a cross-site scripting. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-258679."}], "metrics": {"cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_rxss.md", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.258679", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.258679", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.306960", "source": "cna@vuldb.com"}, {"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_rxss.md", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?ctiid.258679", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?id.258679", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?submit.306960", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-3086", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-30T09:15:22.367", "lastModified": "2025-02-14T19:31:38.957", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability classified as problematic was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. Affected by this vulnerability is an unknown functionality of the file ambulance-tracking.php of the component Ambulance Tracking Page. The manipulation of the argument searchdata leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258679."}, {"lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Emergency Ambulance Hiring Portal 1.0 y se ha clasificado como problem\u00e1tica. Una funci\u00f3n desconocida del archivo ambulance-tracking.php del componente Ambulance Tracking Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento searchdata conduce a cross-site scripting. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-258679."}], "metrics": {"cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpgurukul:emergency_ambulance_hiring_portal:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E678AE7-E61F-4E1E-B93D-BDDC7EBC85D3"}]}]}], "references": [{"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_rxss.md", "source": "cna@vuldb.com", "tags": ["Exploit"]}, {"url": "https://vuldb.com/?ctiid.258679", "source": "cna@vuldb.com", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?id.258679", "source": "cna@vuldb.com", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?submit.306960", "source": "cna@vuldb.com", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_rxss.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"]}, {"url": "https://vuldb.com/?ctiid.258679", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?id.258679", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?submit.306960", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-3087.json b/cve/2024/CVE-2024-3087.json index 3b4a01b1ee1..76b34652e6f 100644 --- a/cve/2024/CVE-2024-3087.json +++ b/cve/2024/CVE-2024-3087.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-3087", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-30T11:15:50.123", "lastModified": "2024-11-21T09:28:52.170", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. Affected by this issue is some unknown functionality of the file ambulance-tracking.php of the component Ambulance Tracking Page. The manipulation of the argument searchdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258680."}, {"lang": "es", "value": "Una vulnerabilidad fue encontrada en PHPGurukul Emergency Ambulance Hiring Portal 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo ambulance-tracking.php del componente Ambulance Tracking Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento searchdata conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-258680."}], "metrics": {"cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL"}, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_rce.md", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.258680", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.258680", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.306961", "source": "cna@vuldb.com"}, {"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_rce.md", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?ctiid.258680", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?id.258680", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?submit.306961", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-3087", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-30T11:15:50.123", "lastModified": "2025-02-14T19:21:40.207", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. Affected by this issue is some unknown functionality of the file ambulance-tracking.php of the component Ambulance Tracking Page. The manipulation of the argument searchdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258680."}, {"lang": "es", "value": "Una vulnerabilidad fue encontrada en PHPGurukul Emergency Ambulance Hiring Portal 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo ambulance-tracking.php del componente Ambulance Tracking Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento searchdata conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-258680."}], "metrics": {"cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 3.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL"}, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpgurukul:emergency_ambulance_hiring_portal:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E678AE7-E61F-4E1E-B93D-BDDC7EBC85D3"}]}]}], "references": [{"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_rce.md", "source": "cna@vuldb.com", "tags": ["Exploit"]}, {"url": "https://vuldb.com/?ctiid.258680", "source": "cna@vuldb.com", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?id.258680", "source": "cna@vuldb.com", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?submit.306961", "source": "cna@vuldb.com", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_rce.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"]}, {"url": "https://vuldb.com/?ctiid.258680", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?id.258680", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?submit.306961", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-3089.json b/cve/2024/CVE-2024-3089.json index 0730dcb0561..07e5e506228 100644 --- a/cve/2024/CVE-2024-3089.json +++ b/cve/2024/CVE-2024-3089.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-3089", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-30T12:15:07.730", "lastModified": "2024-11-21T09:28:52.557", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability has been found in PHPGurukul Emergency Ambulance Hiring Portal 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/manage-ambulance.php of the component Manage Ambulance Page. The manipulation of the argument del leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258682 is the identifier assigned to this vulnerability."}, {"lang": "es", "value": "Una vulnerabilidad fue encontrada en PHPGurukul Emergency Ambulance Hiring Portal 1.0 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo /admin/manage-ambulance.php del componente Manage Ambulance Page. La manipulaci\u00f3n del argumento del conduce a la Cross-Site Request Forgery. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-258682 es el identificador asignado a esta vulnerabilidad."}], "metrics": {"cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-352"}]}], "references": [{"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_csrf.md", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.258682", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.258682", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.306963", "source": "cna@vuldb.com"}, {"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_csrf.md", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?ctiid.258682", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?id.258682", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?submit.306963", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-3089", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-30T12:15:07.730", "lastModified": "2025-02-14T19:26:18.517", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability has been found in PHPGurukul Emergency Ambulance Hiring Portal 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/manage-ambulance.php of the component Manage Ambulance Page. The manipulation of the argument del leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258682 is the identifier assigned to this vulnerability."}, {"lang": "es", "value": "Una vulnerabilidad fue encontrada en PHPGurukul Emergency Ambulance Hiring Portal 1.0 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo /admin/manage-ambulance.php del componente Manage Ambulance Page. La manipulaci\u00f3n del argumento del conduce a la Cross-Site Request Forgery. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-258682 es el identificador asignado a esta vulnerabilidad."}], "metrics": {"cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-352"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpgurukul:emergency_ambulance_hiring_portal:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E678AE7-E61F-4E1E-B93D-BDDC7EBC85D3"}]}]}], "references": [{"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_csrf.md", "source": "cna@vuldb.com", "tags": ["Exploit"]}, {"url": "https://vuldb.com/?ctiid.258682", "source": "cna@vuldb.com", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?id.258682", "source": "cna@vuldb.com", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "https://vuldb.com/?submit.306963", "source": "cna@vuldb.com", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_csrf.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"]}, {"url": "https://vuldb.com/?ctiid.258682", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?id.258682", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "https://vuldb.com/?submit.306963", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-3090.json b/cve/2024/CVE-2024-3090.json index dba90b886c7..acabf5d933e 100644 --- a/cve/2024/CVE-2024-3090.json +++ b/cve/2024/CVE-2024-3090.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-3090", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-30T13:15:45.663", "lastModified": "2024-11-21T09:28:52.707", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/add-ambulance.php of the component Add Ambulance Page. The manipulation of the argument Ambulance Reg No/Driver Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258683."}, {"lang": "es", "value": "Una vulnerabilidad fue encontrada en PHPGurukul Emergency Ambulance Hiring Portal 1.0 y clasificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo /admin/add-ambulance.php del componente Agregar p\u00e1gina de ambulancia. La manipulaci\u00f3n del argumento N\u00famero de registro de ambulancia/Nombre del conductor conduce a cross-site scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-258683."}], "metrics": {"cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "baseScore": 2.4, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 0.9, "impactScore": 1.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", "baseScore": 3.3, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "MULTIPLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "LOW", "exploitabilityScore": 6.4, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_authsxss.md", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.258683", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.258683", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.306964", "source": "cna@vuldb.com"}, {"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_authsxss.md", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?ctiid.258683", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?id.258683", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?submit.306964", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-3090", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-30T13:15:45.663", "lastModified": "2025-02-14T19:21:14.980", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/add-ambulance.php of the component Add Ambulance Page. The manipulation of the argument Ambulance Reg No/Driver Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258683."}, {"lang": "es", "value": "Una vulnerabilidad fue encontrada en PHPGurukul Emergency Ambulance Hiring Portal 1.0 y clasificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo /admin/add-ambulance.php del componente Agregar p\u00e1gina de ambulancia. La manipulaci\u00f3n del argumento N\u00famero de registro de ambulancia/Nombre del conductor conduce a cross-site scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-258683."}], "metrics": {"cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "baseScore": 2.4, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 0.9, "impactScore": 1.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "baseScore": 4.8, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.7, "impactScore": 2.7}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", "baseScore": 3.3, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "MULTIPLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "LOW", "exploitabilityScore": 6.4, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpgurukul:emergency_ambulance_hiring_portal:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E678AE7-E61F-4E1E-B93D-BDDC7EBC85D3"}]}]}], "references": [{"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_authsxss.md", "source": "cna@vuldb.com", "tags": ["Exploit"]}, {"url": "https://vuldb.com/?ctiid.258683", "source": "cna@vuldb.com", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?id.258683", "source": "cna@vuldb.com", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "https://vuldb.com/?submit.306964", "source": "cna@vuldb.com", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_authsxss.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"]}, {"url": "https://vuldb.com/?ctiid.258683", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?id.258683", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "https://vuldb.com/?submit.306964", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-3091.json b/cve/2024/CVE-2024-3091.json index ceccd5e5bb0..f83de169586 100644 --- a/cve/2024/CVE-2024-3091.json +++ b/cve/2024/CVE-2024-3091.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-3091", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-30T14:15:07.720", "lastModified": "2024-11-21T09:28:52.837", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/search.php of the component Search Request Page. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258684."}, {"lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Emergency Ambulance Hiring Portal 1.0. Ha sido clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /admin/search.php del componente Search Request Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a cross-site scripting. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-258684."}], "metrics": {"cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "baseScore": 2.4, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 0.9, "impactScore": 1.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", "baseScore": 3.3, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "MULTIPLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "LOW", "exploitabilityScore": 6.4, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_authrxss.md", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.258684", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.258684", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.306965", "source": "cna@vuldb.com"}, {"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_authrxss.md", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?ctiid.258684", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?id.258684", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?submit.306965", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-3091", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-30T14:15:07.720", "lastModified": "2025-02-14T19:23:29.123", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/search.php of the component Search Request Page. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258684."}, {"lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Emergency Ambulance Hiring Portal 1.0. Ha sido clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /admin/search.php del componente Search Request Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a cross-site scripting. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-258684."}], "metrics": {"cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "baseScore": 2.4, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 0.9, "impactScore": 1.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 2.7}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", "baseScore": 3.3, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "MULTIPLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "LOW", "exploitabilityScore": 6.4, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpgurukul:emergency_ambulance_hiring_portal:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E678AE7-E61F-4E1E-B93D-BDDC7EBC85D3"}]}]}], "references": [{"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_authrxss.md", "source": "cna@vuldb.com", "tags": ["Exploit"]}, {"url": "https://vuldb.com/?ctiid.258684", "source": "cna@vuldb.com", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?id.258684", "source": "cna@vuldb.com", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?submit.306965", "source": "cna@vuldb.com", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_authrxss.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"]}, {"url": "https://vuldb.com/?ctiid.258684", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?id.258684", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Permissions Required", "VDB Entry"]}, {"url": "https://vuldb.com/?submit.306965", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-3220.json b/cve/2024/CVE-2024-3220.json index 3f2eee2da33..949475ab9b6 100644 --- a/cve/2024/CVE-2024-3220.json +++ b/cve/2024/CVE-2024-3220.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-3220", "sourceIdentifier": "cna@python.org", "published": "2025-02-14T17:15:15.567", "lastModified": "2025-02-14T17:15:15.567", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "There is a defect in the CPython standard library module \u201cmimetypes\u201d where on Windows the default list of known file locations are writable meaning other users can create invalid files to cause MemoryError to be raised on Python runtime startup or have file extensions be interpreted as the incorrect file type.\n\nThis defect is caused by the default locations of Linux and macOS platforms (such as \u201c/etc/mime.types\u201d) also being used on Windows, where they are user-writable locations (\u201cC:\\etc\\mime.types\u201d).\n\nTo work-around this issue a user can call mimetypes.init() with an empty list (\u201c[]\u201d) on Windows platforms to avoid using the default list of known file locations."}], "metrics": {"cvssMetricV40": [{"source": "cna@python.org", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 2.3, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}]}, "weaknesses": [{"source": "cna@python.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-426"}]}], "references": [{"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/CDXW34ND2LSAOYAR5N6UNONP4ZBX4D6R/", "source": "cna@python.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-3220", "sourceIdentifier": "cna@python.org", "published": "2025-02-14T17:15:15.567", "lastModified": "2025-02-14T19:15:13.770", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "There is a defect in the CPython standard library module \u201cmimetypes\u201d where on Windows the default list of known file locations are writable meaning other users can create invalid files to cause MemoryError to be raised on Python runtime startup or have file extensions be interpreted as the incorrect file type.\n\nThis defect is caused by the default locations of Linux and macOS platforms (such as \u201c/etc/mime.types\u201d) also being used on Windows, where they are user-writable locations (\u201cC:\\etc\\mime.types\u201d).\n\nTo work-around this issue a user can call mimetypes.init() with an empty list (\u201c[]\u201d) on Windows platforms to avoid using the default list of known file locations."}], "metrics": {"cvssMetricV40": [{"source": "cna@python.org", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 2.3, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}]}, "weaknesses": [{"source": "cna@python.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-426"}]}], "references": [{"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/CDXW34ND2LSAOYAR5N6UNONP4ZBX4D6R/", "source": "cna@python.org"}, {"url": "http://www.openwall.com/lists/oss-security/2025/02/14/8", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-46922.json b/cve/2024/CVE-2024-46922.json index e41426f4ef0..31948d59b36 100644 --- a/cve/2024/CVE-2024-46922.json +++ b/cve/2024/CVE-2024-46922.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-46922", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:39.230", "lastModified": "2025-02-12T22:15:39.230", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The absence of a null check leads to a Denial of Service at amdgpu_cs_parser_bos in the Xclipse Driver."}], "metrics": {}, "references": [{"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-46922", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:39.230", "lastModified": "2025-02-14T18:15:23.333", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The absence of a null check leads to a Denial of Service at amdgpu_cs_parser_bos in the Xclipse Driver."}, {"lang": "es", "value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 1480 y 2400. La ausencia de una verificaci\u00f3n nula conduce a una denegaci\u00f3n de servicio en amdgpu_cs_parser_bos en Xclipse Driver."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-476"}]}], "references": [{"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-46923.json b/cve/2024/CVE-2024-46923.json index 64a53c1733f..0afeeb3fff4 100644 --- a/cve/2024/CVE-2024-46923.json +++ b/cve/2024/CVE-2024-46923.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-46923", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:39.347", "lastModified": "2025-02-12T22:15:39.347", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. The absence of a null check leads to a Denial of Service at amdgpu_cs_ib_fill in the Xclipse Driver."}], "metrics": {}, "references": [{"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-46923", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:39.347", "lastModified": "2025-02-14T18:15:23.530", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. The absence of a null check leads to a Denial of Service at amdgpu_cs_ib_fill in the Xclipse Driver."}, {"lang": "es", "value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 2200, 1480 y 2400. La ausencia de una verificaci\u00f3n nula genera una denegaci\u00f3n de servicio en amdgpu_cs_ib_fill en Xclipse Driver."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-476"}]}], "references": [{"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-57000.json b/cve/2024/CVE-2024-57000.json index 279fff039ba..72607070790 100644 --- a/cve/2024/CVE-2024-57000.json +++ b/cve/2024/CVE-2024-57000.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-57000", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T23:15:09.337", "lastModified": "2025-02-12T16:15:42.317", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue in Anyscale Inc Ray between v.2.9.3 and v.2.40.0 allows a remote attacker to execute arbitrary code via a crafted script."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-94"}]}], "references": [{"url": "https://github.com/honysyang/Ray.git", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-57000", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T23:15:09.337", "lastModified": "2025-02-14T18:15:23.743", "vulnStatus": "Rejected", "cveTags": [], "descriptions": [{"lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-48022. Reason: This candidate is a duplicate of CVE-2023-48022. Notes: All CVE users should reference CVE-2023-48022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."}], "metrics": {}, "references": []}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-0503.json b/cve/2025/CVE-2025-0503.json new file mode 100644 index 00000000000..e44a0b92e06 --- /dev/null +++ b/cve/2025/CVE-2025-0503.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-0503", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2025-02-14T18:15:23.870", "lastModified": "2025-02-14T18:15:23.870", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Mattermost versions 9.11.x <= 9.11.6 fail to filter out DMs from the deleted channels endpoint which allows an attacker to infer user IDs and other metadata from deleted DMs if someone had manually marked DMs as deleted in the database."}], "metrics": {"cvssMetricV31": [{"source": "responsibledisclosure@mattermost.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "baseScore": 3.1, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.6, "impactScore": 1.4}]}, "weaknesses": [{"source": "responsibledisclosure@mattermost.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-754"}]}], "references": [{"url": "https://mattermost.com/security-updates", "source": "responsibledisclosure@mattermost.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-25349.json b/cve/2025/CVE-2025-25349.json index 5dbd934e1f5..92054df1ac2 100644 --- a/cve/2025/CVE-2025-25349.json +++ b/cve/2025/CVE-2025-25349.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2025-25349", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T16:15:46.323", "lastModified": "2025-02-12T16:15:46.323", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "PHPGurukul Daily Expense Tracker System v1.1 is vulnerable to SQL Injection in /dets/add-expense.php via the costitem parameter."}], "metrics": {}, "references": [{"url": "https://github.com/vkcyberexpert/CVE-Writeup/blob/main/PHPGurukul/Daily%20Expense%20Tracker%20System/SQL%20Injection%20item%20add-expense%20costitem%20parameter.pdf", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2025-25349", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T16:15:46.323", "lastModified": "2025-02-14T19:34:31.553", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "PHPGurukul Daily Expense Tracker System v1.1 is vulnerable to SQL Injection in /dets/add-expense.php via the costitem parameter."}, {"lang": "es", "value": "PHPGurukul Daily Expense Tracker System v1.1 es vulnerable a la inyecci\u00f3n SQL en /dets/add-expense.php a trav\u00e9s del par\u00e1metro costitem."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpgurukul:daily_expense_tracker_system:1.1:*:*:*:-:*:*:*", "matchCriteriaId": "0EA23473-6F20-499A-9088-4567AACC8157"}]}]}], "references": [{"url": "https://github.com/vkcyberexpert/CVE-Writeup/blob/main/PHPGurukul/Daily%20Expense%20Tracker%20System/SQL%20Injection%20item%20add-expense%20costitem%20parameter.pdf", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-25351.json b/cve/2025/CVE-2025-25351.json index 83130b072ae..ac876378b12 100644 --- a/cve/2025/CVE-2025-25351.json +++ b/cve/2025/CVE-2025-25351.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2025-25351", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T16:15:46.453", "lastModified": "2025-02-12T16:15:46.453", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "PHPGurukul Daily Expense Tracker System v1.1 is vulnerable to SQL Injection in /dets/add-expense.php via the dateexpense parameter."}], "metrics": {}, "references": [{"url": "https://github.com/vkcyberexpert/CVE-Writeup/blob/main/PHPGurukul/Daily%20Expense%20Tracker%20System/SQL%20Injection%20dateexpense%20daily%20expense.pdf", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2025-25351", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T16:15:46.453", "lastModified": "2025-02-14T19:35:39.130", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "PHPGurukul Daily Expense Tracker System v1.1 is vulnerable to SQL Injection in /dets/add-expense.php via the dateexpense parameter."}, {"lang": "es", "value": "PHPGurukul Daily Expense Tracker System v1.1 es vulnerable a la inyecci\u00f3n SQL en /dets/add-expense.php a trav\u00e9s del par\u00e1metro dateexpense."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpgurukul:daily_expense_tracker_system:1.1:*:*:*:-:*:*:*", "matchCriteriaId": "0EA23473-6F20-499A-9088-4567AACC8157"}]}]}], "references": [{"url": "https://github.com/vkcyberexpert/CVE-Writeup/blob/main/PHPGurukul/Daily%20Expense%20Tracker%20System/SQL%20Injection%20dateexpense%20daily%20expense.pdf", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-25352.json b/cve/2025/CVE-2025-25352.json index a2cbf7929b2..65525858ee0 100644 --- a/cve/2025/CVE-2025-25352.json +++ b/cve/2025/CVE-2025-25352.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2025-25352", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:49.343", "lastModified": "2025-02-13T16:16:49.343", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A SQL Injection vulnerability was found in /admin/aboutus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the pagetitle POST request parameter."}], "metrics": {}, "references": [{"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20About.pdf", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2025-25352", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:49.343", "lastModified": "2025-02-14T19:43:23.960", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "A SQL Injection vulnerability was found in /admin/aboutus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the pagetitle POST request parameter."}, {"lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/aboutus.php en PHPGurukul Land Record System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud POST pagetitle."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"}]}]}], "references": [{"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20About.pdf", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20About.pdf", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-25354.json b/cve/2025/CVE-2025-25354.json index d71680f662f..297fd324034 100644 --- a/cve/2025/CVE-2025-25354.json +++ b/cve/2025/CVE-2025-25354.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2025-25354", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:49.433", "lastModified": "2025-02-13T16:16:49.433", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A SQL Injection was found in /admin/admin-profile.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the contactnumber POST request parameter."}], "metrics": {}, "references": [{"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20contact.pdf", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2025-25354", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:49.433", "lastModified": "2025-02-14T19:39:33.147", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "A SQL Injection was found in /admin/admin-profile.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the contactnumber POST request parameter."}, {"lang": "es", "value": "Se encontr\u00f3 una inyecci\u00f3n SQL en /admin/admin-profile.php en PHPGurukul Land Record System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud POST contactnumber."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"}]}]}], "references": [{"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20contact.pdf", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20contact.pdf", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-25355.json b/cve/2025/CVE-2025-25355.json index 17ebf62f1a4..37a16bfd44f 100644 --- a/cve/2025/CVE-2025-25355.json +++ b/cve/2025/CVE-2025-25355.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2025-25355", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:49.530", "lastModified": "2025-02-13T16:16:49.530", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A SQL Injection vulnerability was found in /admin/bwdates-reports-details.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the fromdate POST request parameter."}], "metrics": {}, "references": [{"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20fromdate.pdf", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2025-25355", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:49.530", "lastModified": "2025-02-14T19:39:06.877", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "A SQL Injection vulnerability was found in /admin/bwdates-reports-details.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the fromdate POST request parameter."}, {"lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/bwdates-reports-details.php en PHPGurukul Land Record System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud POST fromdate."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"}]}]}], "references": [{"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20fromdate.pdf", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-25356.json b/cve/2025/CVE-2025-25356.json index b668f66f2f7..25e1ff5e1fc 100644 --- a/cve/2025/CVE-2025-25356.json +++ b/cve/2025/CVE-2025-25356.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2025-25356", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:49.613", "lastModified": "2025-02-13T16:16:49.613", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A SQL Injection vulnerability was found in /admin/bwdates-reports-details.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the \" todate\" POST request parameter."}], "metrics": {}, "references": [{"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20tadate.pdf", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2025-25356", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:49.613", "lastModified": "2025-02-14T19:38:41.850", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "A SQL Injection vulnerability was found in /admin/bwdates-reports-details.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the \" todate\" POST request parameter."}, {"lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/bwdates-reports-details.php en PHPGurukul Land Record System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud POST \"todate\"."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"}]}]}], "references": [{"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20tadate.pdf", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20tadate.pdf", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-25357.json b/cve/2025/CVE-2025-25357.json index 414c42bcb3d..e1072a2e1c1 100644 --- a/cve/2025/CVE-2025-25357.json +++ b/cve/2025/CVE-2025-25357.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2025-25357", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:49.700", "lastModified": "2025-02-13T16:16:49.700", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A SQL Injection vulnerability was found in /admin/contactus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the email POST request parameter."}], "metrics": {}, "references": [{"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20Emails.pdf", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2025-25357", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:49.700", "lastModified": "2025-02-14T19:38:15.303", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "A SQL Injection vulnerability was found in /admin/contactus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the email POST request parameter."}, {"lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/contactus.php en PHPGurukul Land Record System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud POST del correo electr\u00f3nico."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"}]}]}], "references": [{"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20Emails.pdf", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20Emails.pdf", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-25988.json b/cve/2025/CVE-2025-25988.json index a5373ab4d29..e5f213329b4 100644 --- a/cve/2025/CVE-2025-25988.json +++ b/cve/2025/CVE-2025-25988.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2025-25988", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-14T17:15:21.157", "lastModified": "2025-02-14T17:15:21.157", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross Site Scripting vulnerability in hooskcms v.1.8 allows a remote attacker to cause a denial of service via the custom Link title parameter and the Title parameter."}], "metrics": {}, "references": [{"url": "https://github.com/havok89/Hoosk/issues/67", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2025-25988", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-14T17:15:21.157", "lastModified": "2025-02-14T19:15:14.497", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross Site Scripting vulnerability in hooskcms v.1.8 allows a remote attacker to cause a denial of service via the custom Link title parameter and the Title parameter."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "baseScore": 4.8, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.7, "impactScore": 2.7}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://github.com/havok89/Hoosk/issues/67", "source": "cve@mitre.org"}, {"url": "https://github.com/havok89/Hoosk/issues/67", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-25992.json b/cve/2025/CVE-2025-25992.json index 76e93dfea82..4d70e3b4377 100644 --- a/cve/2025/CVE-2025-25992.json +++ b/cve/2025/CVE-2025-25992.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2025-25992", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-14T17:15:21.640", "lastModified": "2025-02-14T17:15:21.640", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "SQL Injection vulnerability in FeMiner wms 1.0 allows a remote attacker to obtain sensitive information via the inquire_inout_item.php component."}], "metrics": {}, "references": [{"url": "https://github.com/FeMiner/wms/issues/19", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2025-25992", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-14T17:15:21.640", "lastModified": "2025-02-14T19:15:14.633", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "SQL Injection vulnerability in FeMiner wms 1.0 allows a remote attacker to obtain sensitive information via the inquire_inout_item.php component."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "baseScore": 5.1, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.5, "impactScore": 2.5}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://github.com/FeMiner/wms/issues/19", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-25993.json b/cve/2025/CVE-2025-25993.json index 1dc894234e2..84f140cbd5b 100644 --- a/cve/2025/CVE-2025-25993.json +++ b/cve/2025/CVE-2025-25993.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2025-25993", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-14T17:15:21.793", "lastModified": "2025-02-14T17:15:21.793", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "SQL Injection vulnerability in FeMiner wms wms 1.0 allows a remote attacker to obtain sensitive information via the parameter \"itemid.\""}], "metrics": {}, "references": [{"url": "https://github.com/FeMiner/wms/issues/21", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2025-25993", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-14T17:15:21.793", "lastModified": "2025-02-14T19:15:14.763", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "SQL Injection vulnerability in FeMiner wms wms 1.0 allows a remote attacker to obtain sensitive information via the parameter \"itemid.\""}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "baseScore": 5.1, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.5, "impactScore": 2.5}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://github.com/FeMiner/wms/issues/21", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-25997.json b/cve/2025/CVE-2025-25997.json index 9979b98186e..78cb23b2168 100644 --- a/cve/2025/CVE-2025-25997.json +++ b/cve/2025/CVE-2025-25997.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2025-25997", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-14T17:15:22.117", "lastModified": "2025-02-14T17:15:22.117", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Directory Traversal vulnerability in FeMiner wms v.1.0 allows a remote attacker to obtain sensitive information via the databak.php component."}], "metrics": {}, "references": [{"url": "https://github.com/FeMiner/wms/issues/22", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2025-25997", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-14T17:15:22.117", "lastModified": "2025-02-14T19:15:14.903", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Directory Traversal vulnerability in FeMiner wms v.1.0 allows a remote attacker to obtain sensitive information via the databak.php component."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.5, "impactScore": 4.7}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-22"}]}], "references": [{"url": "https://github.com/FeMiner/wms/issues/22", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-26156.json b/cve/2025/CVE-2025-26156.json index ab90240d908..4aac01a3e5a 100644 --- a/cve/2025/CVE-2025-26156.json +++ b/cve/2025/CVE-2025-26156.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2025-26156", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-14T17:15:22.273", "lastModified": "2025-02-14T17:15:22.273", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A SQL Injection vulnerability was found in /shopping/track-orders.php in PHPGurukul Online Shopping Portal v2.1, which allows remote attackers to execute arbitrary code via orderid POST request parameter."}], "metrics": {}, "references": [{"url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/README.md", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2025-26156", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-14T17:15:22.273", "lastModified": "2025-02-14T19:15:15.033", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A SQL Injection vulnerability was found in /shopping/track-orders.php in PHPGurukul Online Shopping Portal v2.1, which allows remote attackers to execute arbitrary code via orderid POST request parameter."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/README.md", "source": "cve@mitre.org"}, {"url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/README.md", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}} \ No newline at end of file diff --git a/syncdate.json b/syncdate.json index d8b6ac4fd0d..e0c603a5207 100644 --- a/syncdate.json +++ b/syncdate.json @@ -1,10 +1,10 @@ { "vulnerabilities": { - "lastModStartDate": "2025-02-14T16:03:28.600", - "lastModEndDate": "2025-02-14T18:03:06.680" + "lastModStartDate": "2025-02-14T18:03:06.680", + "lastModEndDate": "2025-02-14T20:02:48.940" }, "matchStrings": { - "lastModStartDate": "2025-02-14T16:03:00.147", - "lastModEndDate": "2025-02-14T18:03:01.267" + "lastModStartDate": "2025-02-14T18:03:01.267", + "lastModEndDate": "2025-02-14T20:02:48.350" } } \ No newline at end of file