-
Notifications
You must be signed in to change notification settings - Fork 29
Expand file tree
/
Copy pathcve_data.json
More file actions
1 lines (1 loc) · 14 KB
/
cve_data.json
File metadata and controls
1 lines (1 loc) · 14 KB
1
[{ "Package_Name": "ea-libcurl", "CVE_ID": "CVE-2024-0853|EA-11948", "First_Vulnerable_Version": "8.5.0", "Patched_Version": "8.6.0", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "cpanel-clamav", "CVE_ID": "CVE-2024-20328|CVE-2024-20290", "First_Vulnerable_Version": "1.0.4", "Patched_Version": "1.0.5", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-libcurl", "CVE_ID": "CVE-2024-2466|CVE-2024-2398|CVE-2024-2379|CVE-2024-2004|EA-12051", "First_Vulnerable_Version": "8.6.0", "Patched_Version": "8.7.1", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "kernel", "CVE_ID": "CVE-2023-6817", "First_Vulnerable_Version": "4.18.0.513.11.1", "Patched_Version": "4.18.0.513.18.1", "OS_Vulnerable": "almalinux-8 rocky-8 cloudlinux-8"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2024-24795|CVE-2024-27316|CVE-2023-38709|EA-12070", "First_Vulnerable_Version": "2.4.58", "Patched_Version": "2.4.59", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nghttp2", "CVE_ID": "CVE-2024-28182|EA-12069", "First_Vulnerable_Version": "1.60.0", "Patched_Version": "1.61.0", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nodejs18", "CVE_ID": "CVE-2024-27983|CVE-2024-27982|EA-12067", "First_Vulnerable_Version": "18.20.0", "Patched_Version": "18.20.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nodejs20", "CVE_ID": "CVE-2024-27983|CVE-2024-27982|EA-12068", "First_Vulnerable_Version": "20.12.0", "Patched_Version": "20.12.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php81", "CVE_ID": "CVE-2024-1874|CVE-2024-2756|CVE-2024-3096|EA-12087", "First_Vulnerable_Version": "8.1.27", "Patched_Version": "8.1.28", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php82", "CVE_ID": "CVE-2024-1874|CVE-2024-2756|CVE-2024-3096|EA-12085", "First_Vulnerable_Version": "8.2.17", "Patched_Version": "8.2.18", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php83", "CVE_ID": "CVE-2024-1874|CVE-2024-2756|CVE-2024-3096|EA-12086", "First_Vulnerable_Version": "8.3.4", "Patched_Version": "8.3.6", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-openssl11", "CVE_ID": "CVE-2023-5678|CVE-2024-0727|EA-12071", "First_Vulnerable_Version": "1.1.1.23", "Patched_Version": "1.1.1.24", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-php81", "CVE_ID": "CVE-2024-4577|CVE-2024-5458|CVE-2024-5585|EA-12192", "First_Vulnerable_Version": "8.1.28", "Patched_Version": "8.1.29", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php82", "CVE_ID": "CVE-2024-4577|CVE-2024-5458|CVE-2024-5585|EA-12194", "First_Vulnerable_Version": "8.2.18", "Patched_Version": "8.2.20", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php83", "CVE_ID": "CVE-2024-4577|CVE-2024-5458|CVE-2024-5585|EA-12193", "First_Vulnerable_Version": "8.3.7", "Patched_Version": "8.3.8", "OS_Vulnerable": "ALL"},{ "Package_Name": "openssh-server", "CVE_ID": "CVE-2024-6387", "First_Vulnerable_Version": "8.5", "Patched_Version": "8.7", "OS_Vulnerable": "rocky-9 almalinux-9"},{ "Package_Name": "openssh-server", "CVE_ID": "CVE-2024-6387", "First_Vulnerable_Version": "8.8", "Patched_Version": "8.9", "OS_Vulnerable": "ubuntu-22"},{ "Package_Name": "ea-nodejs18", "CVE_ID": "CVE-2024-36138|CVE-2024-22020|EA-12274", "First_Vulnerable_Version": "18.20.3", "Patched_Version": "18.20.4", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nodejs20", "CVE_ID": "CVE-2024-36138|CVE-2024-22020|CVE-2024-22018|CVE-2024-36137|CVE-2024-37372|EA-12264", "First_Vulnerable_Version": "20.15.0", "Patched_Version": "20.15.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nodejs22", "CVE_ID": "CVE-2024-36138|CVE-2024-22020|CVE-2024-22018|CVE-2024-36137|CVE-2024-37372|EA-12265", "First_Vulnerable_Version": "22.3.0", "Patched_Version": "22.4.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2024-39884|CVE-2024-36387|CVE-2024-38472|CVE-2024-38473|CVE-2024-38474|CVE-2024-38475|CVE-2024-38476|CVE-2024-38477|CVE-2024-39573|EA-12261", "First_Vulnerable_Version": "2.4.59", "Patched_Version": "2.4.61", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-openssl11", "CVE_ID": "CVE-2024-4741|EA-12205", "First_Vulnerable_Version": "1.1.1.22", "Patched_Version": "1.1.1.23", "OS_Vulnerable": "centos-7 cloudlinux-7 cloudlinux-8"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2024-39929|CVE-2023-51766", "First_Vulnerable_Version": "4.97.1.1", "Patched_Version": "4.97.1.3", "OS_Vulnerable": "ubuntu-22 almalinux-8 almalinux-9 rocky-8 rocky-9"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2024-39929|CVE-2023-51766", "First_Vulnerable_Version": "4.96.1.1", "Patched_Version": "4.96.2.2", "OS_Vulnerable": "ubuntu-20 centos-7 cloudlinux-7"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2024-40725", "First_Vulnerable_Version": "2.4.61", "Patched_Version": "2.4.62", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-roundcubemail", "CVE_ID": "CVE-2024-42008|CVE-2024-42009|CVE-2024-42010", "First_Vulnerable_Version": "1.6.66.1", "Patched_Version": "1.6.80.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nginx", "CVE_ID": "CVE-2024-7347", "First_Vulnerable_Version": "1.26.1", "Patched_Version": "1.26.2", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php81", "CVE_ID": "CVE-2024-8925|CVE-2024-8926|CVE-2024-8927|CVE-2024-9026", "First_Vulnerable_Version": "8.1.29", "Patched_Version": "8.1.30", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php82", "CVE_ID": "CVE-2024-8925|CVE-2024-8926|CVE-2024-8927|CVE-2024-9026", "First_Vulnerable_Version": "8.2.23", "Patched_Version": "8.2.24", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php83", "CVE_ID": "CVE-2024-8925|CVE-2024-8926|CVE-2024-8927|CVE-2024-9026", "First_Vulnerable_Version": "8.3.11", "Patched_Version": "8.3.12", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-unbound", "CVE_ID": "CVE-2024-8508", "First_Vulnerable_Version": "1.21.0.1", "Patched_Version": "1.21.1.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-dovecot-solr", "CVE_ID": "CVE-2024-45216|CVE-2024-45217", "First_Vulnerable_Version": "8.11.3", "Patched_Version": "8.11.4", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-perl-536-cpanel-json-xs", "CVE_ID": "CVE-2022-48623", "First_Vulnerable_Version": "4.30", "Patched_Version": "4.38", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-pure-ftpd", "CVE_ID": "CVE-2024-48208", "First_Vulnerable_Version": "1.0.51", "Patched_Version": "1.0.52", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-libcurl", "CVE_ID": "CVE-2024-9681", "First_Vulnerable_Version": "8.10.1", "Patched_Version": "8.11.0", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-php81", "CVE_ID": "CVE-2024-11233|CVE-2024-11234|CVE-2024-11236|CVE-2024-11236|CVE-2024-8929|CVE-2024-8932", "First_Vulnerable_Version": "8.1.30", "Patched_Version": "8.1.31", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php82", "CVE_ID": "CVE-2024-11233|CVE-2024-11234|CVE-2024-11236|CVE-2024-11236|CVE-2024-8929|CVE-2024-8932", "First_Vulnerable_Version": "8.2.25", "Patched_Version": "8.2.26", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php83", "CVE_ID": "CVE-2024-11233|CVE-2024-11234|CVE-2024-11236|CVE-2024-11236|CVE-2024-8929|CVE-2024-8932", "First_Vulnerable_Version": "8.3.13", "Patched_Version": "8.3.14", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-libcurl", "CVE_ID": "CVE-2024-11053", "First_Vulnerable_Version": "8.11.0", "Patched_Version": "8.11.1", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-redis62", "CVE_ID": "CVE-2024-46981", "First_Vulnerable_Version": "6.2.16.1.3.1", "Patched_Version": "6.2.17.1.1.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-dovecot", "CVE_ID": "CVE-2024-23184|CVE-2024-23185", "First_Vulnerable_Version": "2.3.21.0", "Patched_Version": "2.3.21.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php81", "CVE_ID": "CVE-2025-1736|CVE-2025-1861|CVE-2025-1734|CVE-2025-1217|CVE-2025-1219|CVE-2024-11235", "First_Vulnerable_Version": "8.1.31", "Patched_Version": "8.1.32", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php82", "CVE_ID": "CVE-2025-1736|CVE-2025-1861|CVE-2025-1734|CVE-2025-1217|CVE-2025-1219|CVE-2024-11235", "First_Vulnerable_Version": "8.2.27", "Patched_Version": "8.2.28", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php83", "CVE_ID": "CVE-2025-1736|CVE-2025-1861|CVE-2025-1734|CVE-2025-1217|CVE-2025-1219|CVE-2024-11235", "First_Vulnerable_Version": "8.3.17", "Patched_Version": "8.3.19", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-exim", "CVE_ID": "CVE-2025-30232", "First_Vulnerable_Version": "4.98.1.1", "Patched_Version": "4.98.1.2", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-perl-536", "CVE_ID": "CVE-2024-56406", "First_Vulnerable_Version": "5.36.0.4", "Patched_Version": "5.36.0.5", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-tomcat101", "CVE_ID": "CVE-2025-31650|CVE-2025-31651", "First_Vulnerable_Version": "10.1.39.0", "Patched_Version": "10.1.40.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-libxml2", "CVE_ID": "CVE-2025-32415|CVE-2025-32414", "First_Vulnerable_Version": "2.13.6.1", "Patched_Version": "2.13.8.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-valkey72", "CVE_ID": "CVE-2025-21605", "First_Vulnerable_Version": "7.2.8", "Patched_Version": "7.2.9", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-roundcubemail", "CVE_ID": "CVE-2025-49113", "First_Vulnerable_Version": "1.6.10.0.1", "Patched_Version": "1.6.11.0.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24-mod_security2", "CVE_ID": "CVE-2025-52891", "First_Vulnerable_Version": "2.9.10", "Patched_Version": "2.9.11", "OS_Vulnerable": "almalinux-8 almalinux-9 almalinux-10 cloudlinux-8 cloudlinux-9 cloudlinux-10"},{ "Package_Name": "ea-apache24-mod-security2", "CVE_ID": "CVE-2025-52891", "First_Vulnerable_Version": "2.9.10", "Patched_Version": "2.9.11", "OS_Vulnerable": "ubuntu-22 ubuntu-24"},{ "Package_Name": "ea-php84", "CVE_ID": "CVE-2025-1735|CVE-2025-6491|CVE-2025-1220|EA-12995", "First_Vulnerable_Version": "8.4.8", "Patched_Version": "8.4.10", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php83", "CVE_ID": "CVE-2025-1735|CVE-2025-6491|CVE-2025-1220|EA-13000", "First_Vulnerable_Version": "8.3.22", "Patched_Version": "8.3.23", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php82", "CVE_ID": "CVE-2025-1735|CVE-2025-6491|CVE-2025-1220|EA-12996", "First_Vulnerable_Version": "8.2.28", "Patched_Version": "8.2.29", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php81", "CVE_ID": "CVE-2025-1735|CVE-2025-6491|CVE-2025-1220|EA-13001", "First_Vulnerable_Version": "8.1.32", "Patched_Version": "8.1.33", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2025-53020|CVE-2025-49812|CVE-2025-49630|CVE-2025-23048|CVE-2024-47252|CVE-2024-43394|CVE-2024-43204|CVE-2024-42516|EA-13014", "First_Vulnerable_Version": "2.4.63", "Patched_Version": "2.4.64", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nginx", "CVE_ID": "CVE-2025-53859", "First_Vulnerable_Version": "1.28.9", "Patched_Version": "1.29.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-apache24-mod_security2", "CVE_ID": "CVE-2025-54571", "First_Vulnerable_Version": "2.9.11", "Patched_Version": "2.9.12", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nodejs20", "CVE_ID": "CVE-2025-27210", "First_Vulnerable_Version": "20.19.3", "Patched_Version": "20.19.4", "OS_Vulnerable": "almalinux-8 almalinux-9 cloudlinux-8 cloudlinux-9"},{ "Package_Name": "cpanel-unbound", "CVE_ID": "CVE-2025-11411", "First_Vulnerable_Version": "1.24.1", "Patched_Version": "1.24.2", "OS_Vulnerable": "ALL"},{ "Package_Name": "cpanel-phppgadmin", "CVE_ID": "CVE-2025-60796|CVE-2025-60797|CVE-2025-60798|CVE-2025-60799", "First_Vulnerable_Version": "7.13.0", "Patched_Version": "7.14.0", "OS_Vulnerable": "centos-7 cloudlinux-7"},{ "Package_Name": "ea-apache24", "CVE_ID": "CVE-2025-55753|CVE-2025-58098|CVE-2025-59775|CVE-2025-65082|CVE-2025-66200", "First_Vulnerable_Version": "2.4.65", "Patched_Version": "2.4.66", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php84", "CVE_ID": "CVE-2025-14177|CVE-2025-14178|CVE-2025-14180", "First_Vulnerable_Version": "8.4.15", "Patched_Version": "8.4.16", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php85", "CVE_ID": "CVE-2025-14177|CVE-2025-14178|CVE-2025-14180", "First_Vulnerable_Version": "8.5.0", "Patched_Version": "8.5.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php83", "CVE_ID": "CVE-2025-14177|CVE-2025-14178|CVE-2025-14180", "First_Vulnerable_Version": "8.3.28", "Patched_Version": "8.3.29", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php82", "CVE_ID": "CVE-2025-14177|CVE-2025-14178|CVE-2025-14180", "First_Vulnerable_Version": "8.2.29", "Patched_Version": "8.2.30", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-php81", "CVE_ID": "CVE-2025-14177|CVE-2025-14178|CVE-2025-14180", "First_Vulnerable_Version": "8.1.33", "Patched_Version": "8.1.34", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-modsec2-rules-owasp-crs", "CVE_ID": "CVE-2026-21876", "First_Vulnerable_Version": "3.3.7", "Patched_Version": "3.3.8", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nginx", "CVE_ID": "CVE-2026-1642", "First_Vulnerable_Version": "1.29.4", "Patched_Version": "1.29.5", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nodejs22", "CVE_ID": "CVE-2026-21637|CVE-2026-21710|CVE-2026-21713|CVE-2026-21714|CVE-2026-21715|CVE-2026-21716|CVE-2026-21717", "First_Vulnerable_Version": "22.22.1", "Patched_Version": "22.22.2", "OS_Vulnerable": "almalinux-8 almalinux-9 almalinux-10 cloudlinux-8 cloudlinux-9 cloudlinux-10"},{ "Package_Name": "ea-nodejs20", "CVE_ID": "CVE-2026-21637|CVE-2026-21710|CVE-2026-21713|CVE-2026-21714|CVE-2026-21715|CVE-2026-21716|CVE-2026-21717", "First_Vulnerable_Version": "20.20.1", "Patched_Version": "20.20.2", "OS_Vulnerable": "almalinux-8 almalinux-9 almalinux-10 cloudlinux-8 cloudlinux-9 cloudlinux-10"},{ "Package_Name": "ea-nghttp2", "CVE_ID": "CVE-2026-27135", "First_Vulnerable_Version": "1.68.0", "Patched_Version": "1.68.1", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-nginx", "CVE_ID": "CVE-2026-27654|CVE-2026-27784|CVE-2026-32647|CVE-2026-27651|CVE-2026-28753|CVE-2026-28755", "First_Vulnerable_Version": "1.29.6", "Patched_Version": "1.29.7", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-ruby27-rubygem-rack", "CVE_ID": "CVE-2026-34830|CVE-2026-34785", "First_Vulnerable_Version": "2.2.22", "Patched_Version": "2.2.23", "OS_Vulnerable": "ALL"},{ "Package_Name": "ea-modsec2-rules-owasp-crs", "CVE_ID": "CVE-2026-33691", "First_Vulnerable_Version": "3.3.8", "Patched_Version": "3.3.9", "OS_Vulnerable": "ALL"}]