Skip to content

Commit

Permalink
Auto-Update: 2024-10-28T15:01:19.649534+00:00
Browse files Browse the repository at this point in the history
  • Loading branch information
cad-safe-bot committed Oct 28, 2024
1 parent 804a3b5 commit a49a4b4
Show file tree
Hide file tree
Showing 218 changed files with 4,966 additions and 594 deletions.
72 changes: 36 additions & 36 deletions CVE-2013/CVE-2013-59xx/CVE-2013-5919.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2013-5919",
"sourceIdentifier": "[email protected]",
"published": "2014-05-30T14:55:08.397",
"lastModified": "2024-10-22T17:11:30.463",
"lastModified": "2024-10-28T12:04:18.930",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -61,6 +61,21 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.3:beta2:*:*:*:*:*:*",
"matchCriteriaId": "6AE9A26B-52F4-4732-A22B-90F763DB13B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.3:beta3:*:*:*:*:*:*",
"matchCriteriaId": "7C98C6B6-3CC3-4D6B-B569-6E46EA170658"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "EC2FC97D-56ED-4F7C-9F4A-3F1B73B5AABF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.3.1:*:*:*:*:*:*:*",
Expand Down Expand Up @@ -91,6 +106,26 @@
"criteria": "cpe:2.3:a:oisf:suricata:1.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0CD31DFD-F92C-4535-88AE-41E3AA402FD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.4:beta1:*:*:*:*:*:*",
"matchCriteriaId": "98C0B959-3F7C-4A6E-ACE5-A34B3AB559B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.4:beta2:*:*:*:*:*:*",
"matchCriteriaId": "94A52C3A-9FB3-4F8F-B406-24F5C8A17675"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.4:beta3:*:*:*:*:*:*",
"matchCriteriaId": "1B12DAD5-01DE-4270-9F2B-FE4F60DA51C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "48E2FD96-DCC0-45E0-94FE-CA58B4E14740"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:suricata:1.4.1:*:*:*:*:*:*:*",
Expand All @@ -117,45 +152,10 @@
"versionEndIncluding": "1.4.5",
"matchCriteriaId": "C221CDA5-C3CF-4015-AEE5-DECC263ACFAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:1.3:beta_2:*:*:*:*:*:*",
"matchCriteriaId": "070732A2-035D-4F15-8145-E44D9ECDE205"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:1.3:beta_3:*:*:*:*:*:*",
"matchCriteriaId": "80BB5706-1015-4AB7-879F-BD0709D75FCB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:1.3:rc_1:*:*:*:*:*:*",
"matchCriteriaId": "D554BA25-4F75-47BB-BBD6-F95AF6D3EA4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5EFC9D2C-F02C-4E85-B8B0-8003466F0304"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:1.4:beta_1:*:*:*:*:*:*",
"matchCriteriaId": "DB6E59BD-FAC6-41FA-B55D-136AE4F81656"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:1.4:beta_2:*:*:*:*:*:*",
"matchCriteriaId": "265A9EAE-23D7-4AD7-B345-2EDBCDD1D177"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:1.4:beta_3:*:*:*:*:*:*",
"matchCriteriaId": "3E8548B3-CFDF-4009-A47B-B17E79D5CFD9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:1.4:rc_1:*:*:*:*:*:*",
"matchCriteriaId": "CB6535F9-8DB6-475A-AE93-65BDD9E3E9A9"
}
]
}
Expand Down
6 changes: 3 additions & 3 deletions CVE-2017/CVE-2017-22xx/CVE-2017-2222.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2017-2222",
"sourceIdentifier": "[email protected]",
"published": "2017-07-07T13:29:00.710",
"lastModified": "2017-07-12T14:25:07.073",
"lastModified": "2024-10-28T11:41:16.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-members_project:wp-members:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:butlerblog:wp-members:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.1.7",
"matchCriteriaId": "886BBAE6-6D63-4734-B58A-3D9168D6783C"
"matchCriteriaId": "7C273FA7-06C1-4E9D-A297-E7B4F810672B"
}
]
}
Expand Down
6 changes: 3 additions & 3 deletions CVE-2019/CVE-2019-156xx/CVE-2019-15660.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2019-15660",
"sourceIdentifier": "[email protected]",
"published": "2019-08-27T13:15:10.333",
"lastModified": "2019-08-28T19:56:05.557",
"lastModified": "2024-10-28T11:41:16.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-members_project:wp-members:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:butlerblog:wp-members:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.2.8",
"matchCriteriaId": "BF306CEF-A2BC-4351-B13B-78834423AEC0"
"matchCriteriaId": "4B62F90D-3E7A-41CB-989E-8F627ED33CE5"
}
]
}
Expand Down
8 changes: 6 additions & 2 deletions CVE-2020/CVE-2020-263xx/CVE-2020-26303.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,17 @@
"id": "CVE-2020-26303",
"sourceIdentifier": "[email protected]",
"published": "2024-10-26T21:15:13.460",
"lastModified": "2024-10-26T21:15:13.460",
"vulnStatus": "Received",
"lastModified": "2024-10-28T13:58:09.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "insane is a whitelist-oriented HTML sanitizer. Versions 2.6.2 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available."
},
{
"lang": "es",
"value": "insane es un sanitizador HTML orientado a listas blancas. Las versiones 2.6.2 y anteriores contienen una o m\u00e1s expresiones regulares que son vulnerables a la denegaci\u00f3n de servicio de expresiones regulares (ReDoS). Al momento de la publicaci\u00f3n, no se conocen parches disponibles."
}
],
"metrics": {
Expand Down
8 changes: 6 additions & 2 deletions CVE-2020/CVE-2020-263xx/CVE-2020-26304.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,17 @@
"id": "CVE-2020-26304",
"sourceIdentifier": "[email protected]",
"published": "2024-10-26T21:15:13.673",
"lastModified": "2024-10-26T21:15:13.673",
"vulnStatus": "Received",
"lastModified": "2024-10-28T13:58:09.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Foundation is a front-end framework. Versions 6.3.3 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, it is unknown if any fixes are available."
},
{
"lang": "es",
"value": "Foundation es un framework de trabajo front-end. Las versiones 6.3.3 y anteriores contienen una o m\u00e1s expresiones regulares que son vulnerables a la denegaci\u00f3n de servicio por expresi\u00f3n regular (ReDoS). Al momento de la publicaci\u00f3n, se desconoce si hay alguna soluci\u00f3n disponible."
}
],
"metrics": {
Expand Down
8 changes: 6 additions & 2 deletions CVE-2020/CVE-2020-263xx/CVE-2020-26305.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,17 @@
"id": "CVE-2020-26305",
"sourceIdentifier": "[email protected]",
"published": "2024-10-26T21:15:13.783",
"lastModified": "2024-10-26T21:15:13.783",
"vulnStatus": "Received",
"lastModified": "2024-10-28T13:58:09.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CommonRegexJS is a CommonRegex port for JavaScript. All available versions contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available."
},
{
"lang": "es",
"value": "CommonRegexJS es un puerto de CommonRegex para JavaScript. Todas las versiones disponibles contienen una o m\u00e1s expresiones regulares que son vulnerables a la denegaci\u00f3n de servicio de expresiones regulares (ReDoS). Al momento de la publicaci\u00f3n, no se conoc\u00edan parches disponibles."
}
],
"metrics": {
Expand Down
8 changes: 6 additions & 2 deletions CVE-2020/CVE-2020-263xx/CVE-2020-26306.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,17 @@
"id": "CVE-2020-26306",
"sourceIdentifier": "[email protected]",
"published": "2024-10-26T21:15:13.883",
"lastModified": "2024-10-26T21:15:13.883",
"vulnStatus": "Received",
"lastModified": "2024-10-28T13:58:09.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Knwl.js is a Javascript library that parses through text for dates, times, phone numbers, emails, places, and more. Versions 1.0.2 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available."
},
{
"lang": "es",
"value": "Knwl.js es una librer\u00eda de Javascript que analiza textos en busca de fechas, horas, n\u00fameros de tel\u00e9fono, correos electr\u00f3nicos, lugares y m\u00e1s. Las versiones 1.0.2 y anteriores contienen una o m\u00e1s expresiones regulares que son vulnerables a la denegaci\u00f3n de servicio por expresi\u00f3n regular (ReDoS). Al momento de la publicaci\u00f3n, no se conocen parches disponibles."
}
],
"metrics": {
Expand Down
8 changes: 6 additions & 2 deletions CVE-2020/CVE-2020-263xx/CVE-2020-26307.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,17 @@
"id": "CVE-2020-26307",
"sourceIdentifier": "[email protected]",
"published": "2024-10-26T21:15:13.980",
"lastModified": "2024-10-26T21:15:13.980",
"vulnStatus": "Received",
"lastModified": "2024-10-28T13:58:09.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HTML2Markdown is a Javascript implementation for converting HTML to Markdown text. All available versions contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available."
},
{
"lang": "es",
"value": "HTML2Markdown es una implementaci\u00f3n de Javascript para convertir HTML en texto Markdown. Todas las versiones disponibles contienen una o m\u00e1s expresiones regulares que son vulnerables a la denegaci\u00f3n de servicio por expresi\u00f3n regular (ReDoS). Al momento de la publicaci\u00f3n, no se conoc\u00edan parches disponibles."
}
],
"metrics": {
Expand Down
8 changes: 6 additions & 2 deletions CVE-2020/CVE-2020-263xx/CVE-2020-26308.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,17 @@
"id": "CVE-2020-26308",
"sourceIdentifier": "[email protected]",
"published": "2024-10-26T21:15:14.087",
"lastModified": "2024-10-26T21:15:14.087",
"vulnStatus": "Received",
"lastModified": "2024-10-28T13:58:09.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Validate.js provides a declarative way of validating javascript objects. Versions 0.13.1 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available."
},
{
"lang": "es",
"value": "Validate.js proporciona una forma declarativa de validar objetos de JavaScript. Las versiones 0.13.1 y anteriores contienen una o m\u00e1s expresiones regulares que son vulnerables a la denegaci\u00f3n de servicio por expresi\u00f3n regular (ReDoS). Al momento de la publicaci\u00f3n, no se conoc\u00edan parches disponibles."
}
],
"metrics": {
Expand Down
8 changes: 6 additions & 2 deletions CVE-2020/CVE-2020-263xx/CVE-2020-26309.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,17 @@
"id": "CVE-2020-26309",
"sourceIdentifier": "[email protected]",
"published": "2024-10-26T21:15:14.190",
"lastModified": "2024-10-26T21:15:14.190",
"vulnStatus": "Received",
"lastModified": "2024-10-28T13:58:09.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Validate.js provides a declarative way of validating javascript objects. Versions 0.11.3 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, it is unknown if any patches are available."
},
{
"lang": "es",
"value": "Validate.js proporciona una forma declarativa de validar objetos de JavaScript. Las versiones 0.11.3 y anteriores contienen una o m\u00e1s expresiones regulares que son vulnerables a la denegaci\u00f3n de servicio por expresi\u00f3n regular (ReDoS). Al momento de la publicaci\u00f3n, se desconoce si hay parches disponibles."
}
],
"metrics": {
Expand Down
8 changes: 6 additions & 2 deletions CVE-2020/CVE-2020-263xx/CVE-2020-26310.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,17 @@
"id": "CVE-2020-26310",
"sourceIdentifier": "[email protected]",
"published": "2024-10-26T21:15:14.297",
"lastModified": "2024-10-26T21:15:14.297",
"vulnStatus": "Received",
"lastModified": "2024-10-28T13:58:09.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Validate.js provides a declarative way of validating javascript objects. All versions as of 30 November 2020 contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, it is unknown if any patches are available."
},
{
"lang": "es",
"value": "Validate.js proporciona una forma declarativa de validar objetos de JavaScript. Todas las versiones al 30 de noviembre de 2020 contienen una o m\u00e1s expresiones regulares que son vulnerables a la denegaci\u00f3n de servicio por expresi\u00f3n regular (ReDoS). Al momento de la publicaci\u00f3n, se desconoce si hay parches disponibles."
}
],
"metrics": {
Expand Down
8 changes: 6 additions & 2 deletions CVE-2020/CVE-2020-263xx/CVE-2020-26311.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,17 @@
"id": "CVE-2020-26311",
"sourceIdentifier": "[email protected]",
"published": "2024-10-26T21:15:14.400",
"lastModified": "2024-10-26T21:15:14.400",
"vulnStatus": "Received",
"lastModified": "2024-10-28T13:58:09.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Useragent is a user agent parser for Node.js. All versions as of time of publication contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no patches are available."
},
{
"lang": "es",
"value": "Useragent es un analizador de agente de usuario para Node.js. Todas las versiones al momento de la publicaci\u00f3n contienen una o m\u00e1s expresiones regulares que son vulnerables a la denegaci\u00f3n de servicio de expresiones regulares (ReDoS). Al momento de la publicaci\u00f3n, no hay parches disponibles."
}
],
"metrics": {
Expand Down
8 changes: 6 additions & 2 deletions CVE-2022/CVE-2022-303xx/CVE-2022-30354.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,17 @@
"id": "CVE-2022-30354",
"sourceIdentifier": "[email protected]",
"published": "2024-10-25T16:15:08.663",
"lastModified": "2024-10-25T16:15:08.663",
"vulnStatus": "Received",
"lastModified": "2024-10-28T13:58:09.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserWithTeam. Authentication is required. The information disclosed is associated with all registered user ID numbers."
},
{
"lang": "es",
"value": "OvalEdge 5.2.8.0 y versiones anteriores se ven afectadas por una vulnerabilidad de exposici\u00f3n de datos confidenciales a trav\u00e9s de una solicitud GET a /user/getUserWithTeam. Se requiere autenticaci\u00f3n. La informaci\u00f3n divulgada est\u00e1 asociada con todos los n\u00fameros de identificaci\u00f3n de usuario registrados."
}
],
"metrics": {},
Expand Down
8 changes: 6 additions & 2 deletions CVE-2022/CVE-2022-303xx/CVE-2022-30355.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,17 @@
"id": "CVE-2022-30355",
"sourceIdentifier": "[email protected]",
"published": "2024-10-25T16:15:08.733",
"lastModified": "2024-10-25T19:35:01.173",
"vulnStatus": "Received",
"lastModified": "2024-10-28T13:58:09.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /profile/updateProfile via the userId and email parameters. Authentication is required."
},
{
"lang": "es",
"value": "OvalEdge 5.2.8.0 y versiones anteriores se ven afectadas por una vulnerabilidad de apropiaci\u00f3n de cuenta mediante una solicitud POST a /profile/updateProfile mediante los par\u00e1metros userId y email. Se requiere autenticaci\u00f3n."
}
],
"metrics": {
Expand Down
8 changes: 6 additions & 2 deletions CVE-2022/CVE-2022-303xx/CVE-2022-30356.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,17 @@
"id": "CVE-2022-30356",
"sourceIdentifier": "[email protected]",
"published": "2024-10-25T17:15:03.387",
"lastModified": "2024-10-25T17:15:03.387",
"vulnStatus": "Received",
"lastModified": "2024-10-28T13:58:09.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OvalEdge 5.2.8.0 and earlier is affected by a Privilege Escalation vulnerability via a POST request to /user/assignuserrole via the userid and role parameters . Authentication is required with OE_ADMIN role privilege."
},
{
"lang": "es",
"value": "OvalEdge 5.2.8.0 y versiones anteriores se ven afectadas por una vulnerabilidad de escalada de privilegios a trav\u00e9s de una solicitud POST a /user/assignuserrole mediante los par\u00e1metros userid y role. Se requiere autenticaci\u00f3n con el privilegio de rol OE_ADMIN."
}
],
"metrics": {},
Expand Down
Loading

0 comments on commit a49a4b4

Please sign in to comment.