From 182ded6788fdae931d0bbe2585633ded23c57096 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 27 Feb 2025 19:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/0xxx/CVE-2025-0767.json | 65 +++++++++++++++++++++++++++++++--- 2025/22xxx/CVE-2025-22624.json | 65 +++++++++++++++++++++++++++++++--- 2 files changed, 122 insertions(+), 8 deletions(-) diff --git a/2025/0xxx/CVE-2025-0767.json b/2025/0xxx/CVE-2025-0767.json index 8f315906731..c274f58a4df 100644 --- a/2025/0xxx/CVE-2025-0767.json +++ b/2025/0xxx/CVE-2025-0767.json @@ -1,18 +1,75 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-0767", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "help@fluidattacks.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WP Activity Log 5.3.2 was found to be vulnerable. Unvalidated user input is used directly in an unserialize function in myapp/classes/Writers/class-csv-writer.php." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-502 Deserialization of Untrusted Data", + "cweId": "CWE-502" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Melapress", + "product": { + "product_data": [ + { + "product_name": "WP Activity Log", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "5.3.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fluidattacks.com/advisories/skims-9/", + "refsource": "MISC", + "name": "https://fluidattacks.com/advisories/skims-9/" + }, + { + "url": "https://co.wordpress.org/plugins/wp-security-audit-log/", + "refsource": "MISC", + "name": "https://co.wordpress.org/plugins/wp-security-audit-log/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22624.json b/2025/22xxx/CVE-2025-22624.json index 7f8c13f977f..de6176746a2 100644 --- a/2025/22xxx/CVE-2025-22624.json +++ b/2025/22xxx/CVE-2025-22624.json @@ -1,18 +1,75 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-22624", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "help@fluidattacks.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FooGallery \u2013 Responsive Photo Gallery, Image Viewer, Justified, Masonry and Carousel 2.4.29 was found to be vulnerable. The web application dynamically generates web content without validating the source of the potentially untrusted data in myapp/extensions/albums/admin/class-meta boxes.php." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "bradvin", + "product": { + "product_data": [ + { + "product_name": "FooGallery - Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.4.29" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fluidattacks.com/advisories/skims-10/", + "refsource": "MISC", + "name": "https://fluidattacks.com/advisories/skims-10/" + }, + { + "url": "https://wordpress.org/plugins/foogallery/", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/foogallery/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file