"-Synchronized-Data."

This commit is contained in:
CVE Team 2025-04-14 19:00:31 +00:00
parent c73ac66d09
commit 10a2c7d399
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
6 changed files with 124 additions and 8 deletions

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-38427",
"STATE": "PUBLIC",
"TITLE": "RTI Connext DDS Professional and Connext DDS Secure Stack-based Buffer Overflow"

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-38433",
"STATE": "PUBLIC",
"TITLE": "RTI Connext DDS Professional and Connext DDS Secure Stack-based Buffer Overflow"

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-38435",
"STATE": "PUBLIC",
"TITLE": "RTI Connext DDS Professional and Connext DDS Secure Incorrect Calculation of Buffer Size"

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-38487",
"STATE": "PUBLIC",
"TITLE": "RTI Connext DDS Professional and Connext DDS Secure Network Amplification"

View File

@ -1,17 +1,115 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-1782",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In HylaFAX Enterprise Web Interface and AvantFAX, the language form element is not properly sanitized \nbefore being used and can be misused to include an arbitrary file in the\n PHP code allowing an attacker to do anything as the web server user. \nThis flaw requires the attacker to be authenticated with a valid user account."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-94 Improper Control of Generation of Code ('Code Injection')",
"cweId": "CWE-94"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "ifax",
"product": {
"product_data": [
{
"product_name": "HylaFAX",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "1.1.*"
},
{
"version_affected": "<",
"version_name": "1.2.0",
"version_value": "1.2.1"
},
{
"version_affected": "<",
"version_name": "1.3.0",
"version_value": "1.3.2"
}
]
}
},
{
"product_name": "AvantFAX",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "3.3.*"
},
{
"version_affected": "<",
"version_name": "3.4.0",
"version_value": "3.4.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.ifax.com/security/CVE-2025-1782.html",
"refsource": "MISC",
"name": "https://www.ifax.com/security/CVE-2025-1782.html"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"version": "3.1",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseSeverity": "CRITICAL",
"baseScore": 9.9,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-3602",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}