From 1c433e3a0121a3e6f2e2cf82a6de686cd6b04b49 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 18 Feb 2025 14:00:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/1xxx/CVE-2025-1269.json | 98 ++++++++++++++++++++++++++++++++++-- 2025/1xxx/CVE-2025-1414.json | 75 +++++++++++++++++++++++++++ 2025/1xxx/CVE-2025-1415.json | 18 +++++++ 2025/1xxx/CVE-2025-1416.json | 18 +++++++ 2025/1xxx/CVE-2025-1417.json | 18 +++++++ 2025/1xxx/CVE-2025-1418.json | 18 +++++++ 2025/1xxx/CVE-2025-1419.json | 18 +++++++ 2025/1xxx/CVE-2025-1420.json | 18 +++++++ 2025/1xxx/CVE-2025-1421.json | 18 +++++++ 2025/1xxx/CVE-2025-1422.json | 18 +++++++ 2025/1xxx/CVE-2025-1423.json | 18 +++++++ 11 files changed, 331 insertions(+), 4 deletions(-) create mode 100644 2025/1xxx/CVE-2025-1414.json create mode 100644 2025/1xxx/CVE-2025-1415.json create mode 100644 2025/1xxx/CVE-2025-1416.json create mode 100644 2025/1xxx/CVE-2025-1417.json create mode 100644 2025/1xxx/CVE-2025-1418.json create mode 100644 2025/1xxx/CVE-2025-1419.json create mode 100644 2025/1xxx/CVE-2025-1420.json create mode 100644 2025/1xxx/CVE-2025-1421.json create mode 100644 2025/1xxx/CVE-2025-1422.json create mode 100644 2025/1xxx/CVE-2025-1423.json diff --git a/2025/1xxx/CVE-2025-1269.json b/2025/1xxx/CVE-2025-1269.json index 731c6411f0c..01445f7c20c 100644 --- a/2025/1xxx/CVE-2025-1269.json +++ b/2025/1xxx/CVE-2025-1269.json @@ -1,17 +1,107 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1269", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@usom.gov.tr", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in HAVELSAN Liman MYS allows Cross-Site Flashing.This issue affects Liman MYS: before 2.1.1 - 1010." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-601 URL Redirection to Untrusted Site ('Open Redirect')", + "cweId": "CWE-601" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "HAVELSAN", + "product": { + "product_data": [ + { + "product_name": "Liman MYS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "2.1.1 - 1010" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/limanmys/core/releases/tag/release.master.1010", + "refsource": "MISC", + "name": "https://github.com/limanmys/core/releases/tag/release.master.1010" + }, + { + "url": "https://www.usom.gov.tr/bildirim/tr-25-0038", + "refsource": "MISC", + "name": "https://www.usom.gov.tr/bildirim/tr-25-0038" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "advisory": "TR-25-0038", + "defect": [ + "TR-25-0038" + ], + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Yagiz BILGILI" + }, + { + "lang": "en", + "value": "Privia Security" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "LOW", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:L", + "version": "3.1" } ] } diff --git a/2025/1xxx/CVE-2025-1414.json b/2025/1xxx/CVE-2025-1414.json new file mode 100644 index 00000000000..2fe75964f8c --- /dev/null +++ b/2025/1xxx/CVE-2025-1414.json @@ -0,0 +1,75 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2025-1414", + "ASSIGNER": "security@mozilla.org", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Memory safety bugs present in Firefox 135. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 135.0.1." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Memory safety bugs fixed in Firefox 135.0.1" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Mozilla", + "product": { + "product_data": [ + { + "product_name": "Firefox", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "135.0.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1943179", + "refsource": "MISC", + "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1943179" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-12/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2025-12/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Andrew McCreight" + } + ] +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1415.json b/2025/1xxx/CVE-2025-1415.json new file mode 100644 index 00000000000..4ec17d05f18 --- /dev/null +++ b/2025/1xxx/CVE-2025-1415.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1415", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1416.json b/2025/1xxx/CVE-2025-1416.json new file mode 100644 index 00000000000..fae09f12dc0 --- /dev/null +++ b/2025/1xxx/CVE-2025-1416.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1416", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1417.json b/2025/1xxx/CVE-2025-1417.json new file mode 100644 index 00000000000..5c8f6b01b2a --- /dev/null +++ b/2025/1xxx/CVE-2025-1417.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1417", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1418.json b/2025/1xxx/CVE-2025-1418.json new file mode 100644 index 00000000000..f188fd137e7 --- /dev/null +++ b/2025/1xxx/CVE-2025-1418.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1418", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1419.json b/2025/1xxx/CVE-2025-1419.json new file mode 100644 index 00000000000..20580f3397c --- /dev/null +++ b/2025/1xxx/CVE-2025-1419.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1419", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1420.json b/2025/1xxx/CVE-2025-1420.json new file mode 100644 index 00000000000..4b6a76a89bf --- /dev/null +++ b/2025/1xxx/CVE-2025-1420.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1420", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1421.json b/2025/1xxx/CVE-2025-1421.json new file mode 100644 index 00000000000..580428055e8 --- /dev/null +++ b/2025/1xxx/CVE-2025-1421.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1421", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1422.json b/2025/1xxx/CVE-2025-1422.json new file mode 100644 index 00000000000..c5a810ec19d --- /dev/null +++ b/2025/1xxx/CVE-2025-1422.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1422", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1423.json b/2025/1xxx/CVE-2025-1423.json new file mode 100644 index 00000000000..8a3e1af765f --- /dev/null +++ b/2025/1xxx/CVE-2025-1423.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1423", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file