-
Notifications
You must be signed in to change notification settings - Fork 28
/
Copy pathcve_data.json
1 lines (1 loc) · 26.1 KB
/
cve_data.json
1
[{ "Package_Name": "cpanel-dovecot", "CVE_ID": "CVE-2019-11500", "Patched_Version": "2.3.7.2", "First_Vulnerable_Version" : "2.3", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-dovecot", "CVE_ID": "CVE-2019-7524", "Patched_Version": "2.3.5", "First_Vulnerable_Version" : "2.3", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-dovecot-solr", "CVE_ID": "CVE-2021-44228", "Patched_Version": "8.8.24", "First_Vulnerable_Version" : "8.8.23", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-dovecot-solr", "CVE_ID": "CVE-2021-45046", "Patched_Version": "8.8.25", "First_Vulnerable_Version" : "8.8.23", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2019-0211", "Patched_Version": "2.4.38", "First_Vulnerable_Version" : "2.4", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2021-41773|EA-10157", "Patched_Version": "2.4.50", "First_Vulnerable_Version" : "2.4", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2021-42013|EA-10179", "Patched_Version": "2.4.51", "First_Vulnerable_Version" : "2.4", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2021-44790|EA-10370", "Patched_Version": "2.4.52", "First_Vulnerable_Version" : "2.4", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2021-44224|EA-10370", "Patched_Version": "2.4.52", "First_Vulnerable_Version" : "2.4", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2022-22720|EA-10550", "Patched_Version": "2.4.53", "First_Vulnerable_Version" : "2.4", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2022-22721|EA-10550", "Patched_Version": "2.4.53", "First_Vulnerable_Version" : "2.4", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-openssl11", "CVE_ID": "CVE-2022-0778|EA-10564", "Patched_Version": "1.1.1.14", "First_Vulnerable_Version" : "1.1.1.13", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-php73", "CVE_ID": "CVE-2021-21703|EA-10237", "Patched_Version": "7.3.33", "First_Vulnerable_Version" : "7.3.32", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php74", "CVE_ID": "CVE-2021-21703|EA-10228", "Patched_Version": "7.4.26", "First_Vulnerable_Version" : "7.24.25", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php80", "CVE_ID": "CVE-2021-21703|EA-10225", "Patched_Version": "8.0.13", "First_Vulnerable_Version" : "8.0.12", "OS_Vulnerable": "ALL"},{ "Package_Name": "sudo", "CVE_ID": "CVE-2021-3156", "Patched_Version": "1.8.24", "First_Vulnerable_Version" : "1.8.23", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2019-16928", "Patched_Version": "4.92.6", "First_Vulnerable_Version" : "4.92", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2019-15846", "Patched_Version": "4.92.3", "First_Vulnerable_Version" : "4.92", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2019-10149", "Patched_Version": "4.91.0", "First_Vulnerable_Version" : "4.90", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2019-10149", "Patched_Version": "4.87.0", "First_Vulnerable_Version" : "4.86", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2018-6789", "Patched_Version": "4.90.1", "First_Vulnerable_Version" : "4.90", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28007", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28008", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28009", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28010", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28011", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28012", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28013", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28014", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28015", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28017", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28018", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28019", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28021", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28022", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28023", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28024", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28025", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2020-28026", "Patched_Version": "4.94.2", "First_Vulnerable_Version" : "4.93", "OS_Vulnerable": "ALL"},{ "Package_Name": "polkit", "CVE_ID": "CVE-2021-4034", "Patched_Version": "0.112.26.9.1", "First_Vulnerable_Version" : "0.112.24.8.3", "OS_Vulnerable": "centos-7 cloudlinux-7 cloudlinux-8 almalinux-8 rocky-8"},{ "Package_Name": "policykit-1", "CVE_ID": "CVE-2021-4034", "Patched_Version": "0.105.261.2", "First_Vulnerable_Version" : "0.105.259.3", "OS_Vulnerable": "ubuntu-20"},{ "Package_Name": "linux-headers", "CVE_ID": "CVE-2022-0847", "Patched_Version": "5.4.0.104.108", "First_Vulnerable_Version" : "5.4.0.101.107", "OS_Vulnerable": "ubuntu-20"},{ "Package_Name": "linux-headers", "CVE_ID": "CVE-2022-25636", "Patched_Version": "5.4.0.104", "First_Vulnerable_Version" : "5.4.0.101", "OS_Vulnerable": "ubuntu-20"},{ "Package_Name": "kernel", "CVE_ID": "CVE-2022-0847", "Patched_Version": "4.18.0.348.12.2", "First_Vulnerable_Version" : "4.17.0.348.11.1", "OS_Vulnerable": "cloudlinux-8 almalinux-8"},{ "Package_Name": "ea-openssl11", "CVE_ID": "CVE-2022-1292|EA-10676", "Patched_Version": "1.1.1.15", "First_Vulnerable_Version" : "1.1.1.14", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "cpanel-php74-horde", "CVE_ID": "CVE-2022-30287", "Patched_Version": "5.2.23", "First_Vulnerable_Version" : "5.2.14", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-openssl11", "CVE_ID": "CVE-2022-2097|EA-10811", "Patched_Version": "1.1.1.17", "First_Vulnerable_Version" : "1.1.1.15", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-nodejs16", "CVE_ID": "CVE-2022-32212|EA-10822", "Patched_Version": "16.16.0", "First_Vulnerable_Version" : "16.15.8", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2021-40438|EA-10179", "Patched_Version": "2.4.51", "First_Vulnerable_Version" : "2.4", "OS_Vulnerable": "ALL"},{ "Package_Name": "linux-headers", "CVE_ID": "CVE-2022-2588", "Patched_Version": "5.4.0.124", "First_Vulnerable_Version" : "5.4.0.121", "OS_Vulnerable": "ubuntu-20"},{ "Package_Name": "kernel", "CVE_ID": "CVE-2022-32250|CVE-2022-1966", "Patched_Version": "4.18.0", "First_Vulnerable_Version" : "4.17.3", "OS_Vulnerable": "centos-7 cloudlinux-8 almalinux-8 rocky-8"},{ "Package_Name": "linux-headers", "CVE_ID": "CVE-2022-32250", "Patched_Version": "5.4.0.117", "First_Vulnerable_Version" : "5.4.0.113", "OS_Vulnerable": "ubuntu-20"},{ "Package_Name": "ea-nodejs16", "CVE_ID": "CVE-2022-35256|EA-10948", "Patched_Version": "16.17.1", "First_Vulnerable_Version" : "16.16.3", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2022-37451|CPANEL-41571", "Patched_Version": "4.95.6", "First_Vulnerable_Version" : "4.95", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php74", "CVE_ID": "CVE-2022-31628|CVE-2022-31629", "Patched_Version": "7.4.32", "First_Vulnerable_Version" : "7.4.31", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php80", "CVE_ID": "CVE-2022-31628|CVE-2022-31629", "Patched_Version": "8.0.24", "First_Vulnerable_Version" : "8.0.23", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php81", "CVE_ID": "CVE-2022-31628|CVE-2022-31629", "Patched_Version": "8.1.11", "First_Vulnerable_Version" : "8.1.10", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-tomcat85", "CVE_ID": "CVE-2022-34305|EA-10980", "Patched_Version": "8.5.83", "First_Vulnerable_Version" : "8.5.82", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-libcurl", "CVE_ID": "CVE-2022-32221|CVE-2022-35260|CVE-2022-42915|CVE-2022-42916|EA-11016", "Patched_Version": "7.86.0", "First_Vulnerable_Version" : "7.85.8", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-php80", "CVE_ID": "CVE-2022-31630|CVE-2022-37454|EA-11020", "Patched_Version": "8.0.25", "First_Vulnerable_Version" : "8.0.24", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php81", "CVE_ID": "CVE-2022-31630|CVE-2022-37454|EA-11021", "Patched_Version": "8.1.12", "First_Vulnerable_Version" : "8.1.11", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nodejs16", "CVE_ID": "CVE-2022-43548|EA-11040", "Patched_Version": "16.18.1", "First_Vulnerable_Version" : "16.17.11", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php74", "CVE_ID": "CVE-2022-37454|CVE-2022-31630|EA-11038", "Patched_Version": "7.4.33", "First_Vulnerable_Version" : "7.3.32", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2022-3559|CPANEL-41943|CPANEL-42271", "First_Vulnerable_Version": "4.95", "Patched_Version": "4.95.7", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-git", "CVE_ID": "CVE-2022-23521|CVE-2022-41903|CPANEL-42269", "First_Vulnerable_Version": "2.30.6", "Patched_Version": "2.38.3", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2006-20001", "First_Vulnerable_Version": "2.4", "Patched_Version": "2.4.55", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2022-36760", "First_Vulnerable_Version": "2.4", "Patched_Version": "2.4.55", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2022-37436", "First_Vulnerable_Version": "2.4", "Patched_Version": "2.4.55", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-openssl11", "CVE_ID": "CVE-2023-0286|CVE-2022-4304|CVE-2023-0215|CVE-2022-4450|EA-11213", "First_Vulnerable_Version": "1.1.1.19", "Patched_Version": "1.1.1.20", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-php80", "CVE_ID": "CVE-2023-0567|CVE-2023-0568|CVE-2023-0662|EA-11227", "First_Vulnerable_Version": "8.0.27", "Patched_Version": "8.0.28", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php81", "CVE_ID": "CVE-2023-0567|CVE-2023-0568|CVE-2023-0662|EA-11244", "First_Vulnerable_Version": "8.1.15", "Patched_Version": "8.1.16", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php82", "CVE_ID": "CVE-2023-0567|CVE-2023-0568|CVE-2023-0662|EA-11226", "First_Vulnerable_Version": "8.2.2", "Patched_Version": "8.2.3", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-libcurl", "CVE_ID": "CVE-2023-23916|CVE-2023-23915|CVE-2023-23914|EA-11241", "First_Vulnerable_Version": "7.87.0", "Patched_Version": "7.88.0", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-nodejs16", "CVE_ID": "CVE-2023-23918|CVE-2023-23919|CVE-2023-23920|CVE-2023-23936|CVE-2023-24807|EA-11255", "First_Vulnerable_Version": "16.19.0", "Patched_Version": "16.19.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-clamav", "CVE_ID": "CVE-2023-20032", "First_Vulnerable_Version": "0.104.4.2.1", "Patched_Version": "0.104.4.2.2", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-phpmyadmin", "CVE_ID": "CVE-2023-36838|CPANEL-42384|CPANEL-42385", "First_Vulnerable_Version": "4.3.0", "Patched_Version": "4.9.11.2", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2023-27522|CVE-2023-25690|EA-11284", "First_Vulnerable_Version": "2.4.55", "Patched_Version": "2.4.56", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-libcurl", "CVE_ID": "CVE-2023-27538|CVE-2023-27537|CVE-2023-27536|CVE-2023-27535|CVE-2023-27534|EA-11303", "First_Vulnerable_Version": "7.88.1", "Patched_Version": "8.0.1", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-ruby27", "CVE_ID": "CVE-2023-28755|CVE-2023-28756|EA-11327", "First_Vulnerable_Version": "2.7.7", "Patched_Version": "2.7.8", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-libxml2", "CVE_ID": "EA-11388", "First_Vulnerable_Version": "2.10.4", "Patched_Version": "2.11.1", "OS_Vulnerable": "centos-7 cloudlinux-7 cloudlinux-8 almalinux-8 almalinux-9"},{ "Package_Name": "linux-headers", "CVE_ID": "CVE-2023-32233", "First_Vulnerable_Version": "5.4.0.148", "Patched_Version": "5.4.0.151", "OS_Vulnerable": "ubuntu-20"},{ "Package_Name": "linux-headers", "CVE_ID": "CVE-2023-32233", "First_Vulnerable_Version": "5.15.0.72", "Patched_Version": "5.15.0.73", "OS_Vulnerable": "ubuntu-20"},{ "Package_Name": "ea-libcurl", "CVE_ID": "CVE-2023-28322|CVE-2023-28321|CVE-2023-28320|CVE-2023-28319|EA-11432", "First_Vulnerable_Version": "8.0.1", "Patched_Version": "8.1.1", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-openssl11", "CVE_ID": "CVE-2023-2650", "First_Vulnerable_Version": "1.1.1.20", "Patched_Version": "1.1.1.21", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-libcurl", "CVE_ID": "CVE-2023-32001|EA-11560", "First_Vulnerable_Version": "8.1.2", "Patched_Version": "8.2.0", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "linux-headers", "CVE_ID": "CVE-2023-32629", "First_Vulnerable_Version": "5.4.0.154", "Patched_Version": "5.4.0.155.172", "OS_Vulnerable": "ubuntu-20"},{ "Package_Name": "ea-openssl11", "CVE_ID": "CVE-2023-3817|CVE-2023-3446|EA-11578", "First_Vulnerable_Version": "1.1.1.21", "Patched_Version": "1.1.1.22", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-php80", "CVE_ID": "CVE-2023-3823|CVE-2023-3824|EA-11590", "First_Vulnerable_Version": "8.0.29", "Patched_Version": "8.0.30", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php81", "CVE_ID": "CVE-2023-3823|CVE-2023-3824|EA-11589", "First_Vulnerable_Version": "8.1.21", "Patched_Version": "8.1.22", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nodejs16", "CVE_ID": "CVE-2023-32559|CVE-2023-32006|CVE-2023-32002|EA-11604", "First_Vulnerable_Version": "16.20.1", "Patched_Version": "16.20.2", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php82", "CVE_ID": "CVE-2023-3823|CVE-2023-3824|EA-11619", "First_Vulnerable_Version": "8.2.8", "Patched_Version": "8.2.9", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-libcurl", "CVE_ID": "CVE-2023-38039|EA-11680", "First_Vulnerable_Version": "8.2.1", "Patched_Version": "8.3.0", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-openssl11", "CVE_ID": "CVE-2023-4807|EA-11665", "First_Vulnerable_Version": "1.1.1.22", "Patched_Version": "1.1.1.23", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2023-42114|CVE-2023-42115|CVE-2023-42116|CVE-2023-42118|CPANEL-43374|CPANEL-43378", "First_Vulnerable_Version": "4.96", "Patched_Version": "4.96.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "glibc", "CVE_ID": "CVE-2023-4911", "First_Vulnerable_Version": "2.28", "Patched_Version": "2.28", "OS_Vulnerable": "almalinux-8 rocky-8 almalinux-9 rocky-9 cloudlinux-8 ubuntu-22"},{ "Package_Name": "ea-libnghttp2", "CVE_ID": "CVE-2023-44487|EA-11729", "First_Vulnerable_Version": "1.56", "Patched_Version": "1.57", "OS_Vulnerable": "cloudlinux-7 almalinux-8 rocky-8 cloudlinux-8 centos-7 almalinux-9 rocky-9"},{ "Package_Name": "ea-nghttp2", "CVE_ID": "CVE-2023-44487|EA-11729", "First_Vulnerable_Version": "1.56", "Patched_Version": "1.57", "OS_Vulnerable": "cloudlinux-7 almalinux-8 rocky-8 cloudlinux-8 centos-7 almalinux-9 rocky-9"},{ "Package_Name": "ea-libcurl", "CVE_ID": "CVE-2023-38545|CVE-2023-38546", "First_Vulnerable_Version": "8.3.0", "Patched_Version": "8.4.0", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-apache24-mod_http2", "CVE_ID": "CVE-2023-44487|EA-11729", "First_Vulnerable_Version": "2.4.57", "Patched_Version": "2.4.57", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-tomcat85", "CVE_ID": "CVE-2023-45648|CVE-2023-44487|CVE-2023-42795|CVE-2023-42794|EA-11728", "First_Vulnerable_Version": "8.5.93", "Patched_Version": "8.5.94", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2023-42117|CVE-2023-42119", "First_Vulnerable_Version": "4.96.1", "Patched_Version": "4.96.2", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nodejs18", "CVE_ID": "CVE-2023-45143|CVE-2023-44487|CVE-2023-39331|CVE-2023-39332|CVE-2023-38552|CVE-2023-39333|EA-11746", "First_Vulnerable_Version": "18.18.0", "Patched_Version": "18.18.2", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nodejs20", "CVE_ID": "CVE-2023-45143|CVE-2023-44487|CVE-2023-39331|CVE-2023-39332|CVE-2023-38552|CVE-2023-39333|EA-11747", "First_Vulnerable_Version": "20.8.0", "Patched_Version": "20.8.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-roundcubemail", "CVE_ID": "CVE-2023-5631|CVE-2023-43770", "First_Vulnerable_Version": "1.6.0", "Patched_Version": "1.6.4", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2023-31122|CVE-2023-43622|CVE-2023-45802|EA-11758", "First_Vulnerable_Version": "2.4.57", "Patched_Version": "2.4.58", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-libcurl", "CVE_ID": "CVE-2023-46219|CVE-2023-46218|EA-11857", "First_Vulnerable_Version": "8.4.0", "Patched_Version": "8.5.0", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2023-51766", "First_Vulnerable_Version": "4.96.1", "Patched_Version": "4.96.2", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-libcurl", "CVE_ID": "CVE-2024-0853|EA-11948", "First_Vulnerable_Version": "8.5.0", "Patched_Version": "8.6.0", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "cpanel-clamav", "CVE_ID": "CVE-2024-20328|CVE-2024-20290", "First_Vulnerable_Version": "1.0.4", "Patched_Version": "1.0.5", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-libcurl", "CVE_ID": "CVE-2024-2466|CVE-2024-2398|CVE-2024-2379|CVE-2024-2004|EA-12051", "First_Vulnerable_Version": "8.6.0", "Patched_Version": "8.7.1", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "kernel", "CVE_ID": "CVE-2023-6817", "First_Vulnerable_Version": "4.18.0.513.11.1", "Patched_Version": "4.18.0.513.18.1", "OS_Vulnerable": "almalinux-8 rocky-8 cloudlinux-8"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2024-24795|CVE-2024-27316|CVE-2023-38709|EA-12070", "First_Vulnerable_Version": "2.4.58", "Patched_Version": "2.4.59", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nghttp2", "CVE_ID": "CVE-2024-28182|EA-12069", "First_Vulnerable_Version": "1.60.0", "Patched_Version": "1.61.0", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nodejs18", "CVE_ID": "CVE-2024-27983|CVE-2024-27982|EA-12067", "First_Vulnerable_Version": "18.20.0", "Patched_Version": "18.20.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nodejs20", "CVE_ID": "CVE-2024-27983|CVE-2024-27982|EA-12068", "First_Vulnerable_Version": "20.12.0", "Patched_Version": "20.12.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php81", "CVE_ID": "CVE-2024-1874|CVE-2024-2756|CVE-2024-3096|EA-12087", "First_Vulnerable_Version": "8.1.27", "Patched_Version": "8.1.28", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php82", "CVE_ID": "CVE-2024-1874|CVE-2024-2756|CVE-2024-3096|EA-12085", "First_Vulnerable_Version": "8.2.17", "Patched_Version": "8.2.18", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php83", "CVE_ID": "CVE-2024-1874|CVE-2024-2756|CVE-2024-3096|EA-12086", "First_Vulnerable_Version": "8.3.4", "Patched_Version": "8.3.6", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-openssl11", "CVE_ID": "CVE-2023-5678|CVE-2024-0727|EA-12071", "First_Vulnerable_Version": "1.1.1.23", "Patched_Version": "1.1.1.24", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-php81", "CVE_ID": "CVE-2024-4577|CVE-2024-5458|CVE-2024-5585|EA-12192", "First_Vulnerable_Version": "8.1.28", "Patched_Version": "8.1.29", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php82", "CVE_ID": "CVE-2024-4577|CVE-2024-5458|CVE-2024-5585|EA-12194", "First_Vulnerable_Version": "8.2.18", "Patched_Version": "8.2.20", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php83", "CVE_ID": "CVE-2024-4577|CVE-2024-5458|CVE-2024-5585|EA-12193", "First_Vulnerable_Version": "8.3.7", "Patched_Version": "8.3.8", "OS_Vulnerable": "ALL"},{ "Package_Name": "openssh-server", "CVE_ID": "CVE-2024-6387", "First_Vulnerable_Version": "8.5", "Patched_Version": "8.7", "OS_Vulnerable": "rocky-9 almalinux-9"},{ "Package_Name": "openssh-server", "CVE_ID": "CVE-2024-6387", "First_Vulnerable_Version": "8.8", "Patched_Version": "8.9", "OS_Vulnerable": "ubuntu-22"},{ "Package_Name": "ea-nodejs18", "CVE_ID": "CVE-2024-36138|CVE-2024-22020|EA-12274", "First_Vulnerable_Version": "18.20.3", "Patched_Version": "18.20.4", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nodejs20", "CVE_ID": "CVE-2024-36138|CVE-2024-22020|CVE-2024-22018|CVE-2024-36137|CVE-2024-37372|EA-12264", "First_Vulnerable_Version": "20.15.0", "Patched_Version": "20.15.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nodejs22", "CVE_ID": "CVE-2024-36138|CVE-2024-22020|CVE-2024-22018|CVE-2024-36137|CVE-2024-37372|EA-12265", "First_Vulnerable_Version": "22.3.0", "Patched_Version": "22.4.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2024-39884|CVE-2024-36387|CVE-2024-38472|CVE-2024-38473|CVE-2024-38474|CVE-2024-38475|CVE-2024-38476|CVE-2024-38477|CVE-2024-39573|EA-12261", "First_Vulnerable_Version": "2.4.59", "Patched_Version": "2.4.61", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-openssl11", "CVE_ID": "CVE-2024-4741|EA-12205", "First_Vulnerable_Version": "1.1.1.22", "Patched_Version": "1.1.1.23", "OS_Vulnerable": "centos-7 cloudlinux-7 cloudlinux-8"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2024-39929|CVE-2023-51766", "First_Vulnerable_Version": "4.97.1.1", "Patched_Version": "4.97.1.3", "OS_Vulnerable": "ubuntu-22 almalinux-8 almalinux-9 rocky-8 rocky-9"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2024-39929|CVE-2023-51766", "First_Vulnerable_Version": "4.96.1.1", "Patched_Version": "4.96.2.2", "OS_Vulnerable": "ubuntu-20 centos-7 cloudlinux-7"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2024-40725", "First_Vulnerable_Version": "2.4.61", "Patched_Version": "2.4.62", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-roundcubemail", "CVE_ID": "CVE-2024-42008|CVE-2024-42009|CVE-2024-42010", "First_Vulnerable_Version": "1.6.6.6.1", "Patched_Version": "1.6.8.0.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nginx", "CVE_ID": "CVE-2024-7347", "First_Vulnerable_Version": "1.26.1.1", "Patched_Version": "1.26.2", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php81", "CVE_ID": "CVE-2024-8925|CVE-2024-8926|CVE-2024-8927|CVE-2024-9026", "First_Vulnerable_Version": "8.1.29.1", "Patched_Version": "8.1.30", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php82", "CVE_ID": "CVE-2024-8925|CVE-2024-8926|CVE-2024-8927|CVE-2024-9026", "First_Vulnerable_Version": "8.2.23.1", "Patched_Version": "8.2.24", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php83", "CVE_ID": "CVE-2024-8925|CVE-2024-8926|CVE-2024-8927|CVE-2024-9026", "First_Vulnerable_Version": "8.3.11.1", "Patched_Version": "8.3.12", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-unbound", "CVE_ID": "CVE-2024-8508", "First_Vulnerable_Version": "1.21.0.1", "Patched_Version": "1.21.1.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-php83", "CVE_ID": "CVE-2024-9026|CVE-2024-8925|CVE-2024-8926|CVE-2024-8927", "First_Vulnerable_Version": "8.3.11.1", "Patched_Version": "8.3.12", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-dovecot-solr", "CVE_ID": "CVE-2024-45216|CVE-2024-45217", "First_Vulnerable_Version": "8.11.3.1", "Patched_Version": "8.11.4", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-perl-536-cpanel-json-xs", "CVE_ID": "CVE-2022-48623", "First_Vulnerable_Version": "4.30.1", "Patched_Version": "4.38", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-pure-ftpd", "CVE_ID": "CVE-2024-48208", "First_Vulnerable_Version": "1.0.51", "Patched_Version": "1.0.52", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-libcurl", "CVE_ID": "CVE-2024-9681", "First_Vulnerable_Version": "8.10.1", "Patched_Version": "8.11.0", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-php81", "CVE_ID": "CVE-2024-11233|CVE-2024-11234|CVE-2024-11236|CVE-2024-11236|CVE-2024-8929|CVE-2024-8932", "First_Vulnerable_Version": "8.1.30.1", "Patched_Version": "8.1.31", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php82", "CVE_ID": "CVE-2024-11233|CVE-2024-11234|CVE-2024-11236|CVE-2024-11236|CVE-2024-8929|CVE-2024-8932", "First_Vulnerable_Version": "8.2.25.1", "Patched_Version": "8.2.26", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php83", "CVE_ID": "CVE-2024-11233|CVE-2024-11234|CVE-2024-11236|CVE-2024-11236|CVE-2024-8929|CVE-2024-8932", "First_Vulnerable_Version": "8.3.13.1", "Patched_Version": "8.3.14", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-libcurl", "CVE_ID": "CVE-2024-11053", "First_Vulnerable_Version": "8.11.0", "Patched_Version": "8.11.1", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-redis62", "CVE_ID": "CVE-2024-46981", "First_Vulnerable_Version": "6.2.16.1.3.1", "Patched_Version": "6.2.17.1.1.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-dovecot", "CVE_ID": "CVE-2024-23184|CVE-2024-23185", "First_Vulnerable_Version": "2.3.21.0", "Patched_Version": "2.3.21.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "rsync", "CVE_ID": "CVE-2024-12085|CVE-2024-12086|CVE-2024-12087|CVE-2024-12088|CVE-2024-12747", "First_Vulnerable_Version": "3.3.9", "Patched_Version": "3.4.0", "OS_Vulnerable": "ALL"}]