From 2765b9cbb7171d6b5cbc0b675f12f2e9266b3308 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 23 Feb 2025 16:00:31 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/1xxx/CVE-2025-1467.json | 95 +++++++++++++++++++++++++++-- 2025/1xxx/CVE-2025-1587.json | 114 +++++++++++++++++++++++++++++++++-- 2 files changed, 201 insertions(+), 8 deletions(-) diff --git a/2025/1xxx/CVE-2025-1467.json b/2025/1xxx/CVE-2025-1467.json index 900a61a399a..bb9909f5b47 100644 --- a/2025/1xxx/CVE-2025-1467.json +++ b/2025/1xxx/CVE-2025-1467.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1467", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "report@snyk.io", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Versions of the package tarteaucitronjs before 1.17.0 are vulnerable to Cross-site Scripting (XSS) via the getElemWidth() and getElemHeight(). This is related to [SNYK-JS-TARTEAUCITRONJS-8366541](https://security.snyk.io/vuln/SNYK-JS-TARTEAUCITRONJS-8366541)" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site Scripting (XSS)", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "tarteaucitronjs", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "1.17.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security.snyk.io/vuln/SNYK-JS-TARTEAUCITRONJS-8731160", + "refsource": "MISC", + "name": "https://security.snyk.io/vuln/SNYK-JS-TARTEAUCITRONJS-8731160" + }, + { + "url": "https://github.com/AmauriC/tarteaucitron.js/commit/12490579001d5caa187adcaecb01da570a12076b", + "refsource": "MISC", + "name": "https://github.com/AmauriC/tarteaucitron.js/commit/12490579001d5caa187adcaecb01da570a12076b" + }, + { + "url": "https://github.com/AmauriC/tarteaucitron.js/issues/1184", + "refsource": "MISC", + "name": "https://github.com/AmauriC/tarteaucitron.js/issues/1184" + }, + { + "url": "https://gist.github.com/Rudloff/d48f525215bd5426cbb076116c4422dd", + "refsource": "MISC", + "name": "https://gist.github.com/Rudloff/d48f525215bd5426cbb076116c4422dd" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Fran\u00e7ois (mably)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "exploitCodeMaturity": "PROOF_OF_CONCEPT", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P" } ] } diff --git a/2025/1xxx/CVE-2025-1587.json b/2025/1xxx/CVE-2025-1587.json index bf7a590ee9e..c7baba49bae 100644 --- a/2025/1xxx/CVE-2025-1587.json +++ b/2025/1xxx/CVE-2025-1587.json @@ -1,17 +1,123 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1587", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in SourceCodester Telecom Billing Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file main.cpp of the component Add New Record. The manipulation of the argument name leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in SourceCodester Telecom Billing Management System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Dies betrifft einen unbekannten Teil der Datei main.cpp der Komponente Add New Record. Durch das Manipulieren des Arguments name mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Overflow", + "cweId": "CWE-120" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Memory Corruption", + "cweId": "CWE-119" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SourceCodester", + "product": { + "product_data": [ + { + "product_name": "Telecom Billing Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.296567", + "refsource": "MISC", + "name": "https://vuldb.com/?id.296567" + }, + { + "url": "https://vuldb.com/?ctiid.296567", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.296567" + }, + { + "url": "https://vuldb.com/?submit.505363", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.505363" + }, + { + "url": "https://github.com/wshRE/CVE/issues/1", + "refsource": "MISC", + "name": "https://github.com/wshRE/CVE/issues/1" + }, + { + "url": "https://www.sourcecodester.com/", + "refsource": "MISC", + "name": "https://www.sourcecodester.com/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "wsh2023 (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5.3, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5.3, + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4.3, + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P" } ] }