From 3213a0f90e5d1e5307ee2756ec7d8f16e6f09c64 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 31 Mar 2025 01:00:35 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/1xxx/CVE-2025-1268.json | 129 ++++++++++++++++++++++++++++++- 2025/2xxx/CVE-2025-2967.json | 145 ++++++++++++++++++++++++++++++++++- 2025/2xxx/CVE-2025-2968.json | 145 ++++++++++++++++++++++++++++++++++- 2025/2xxx/CVE-2025-2969.json | 145 ++++++++++++++++++++++++++++++++++- 4 files changed, 549 insertions(+), 15 deletions(-) diff --git a/2025/1xxx/CVE-2025-1268.json b/2025/1xxx/CVE-2025-1268.json index ce9edddbf41..5670c1c2174 100644 --- a/2025/1xxx/CVE-2025-1268.json +++ b/2025/1xxx/CVE-2025-1268.json @@ -1,17 +1,140 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1268", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Out-of-bounds vulnerability in EMF Recode processing of Generic Plus PCL6 Printer Driver / Generic Plus UFR II Printer Driver / Generic Plus LIPS4 Printer Driver / Generic Plus LIPSLX Printer Driver / Generic Plus PS Printer Driver" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-787: Out-of-bounds Write", + "cweId": "CWE-787" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Canon Inc.", + "product": { + "product_data": [ + { + "product_name": "Generic Plus PCL6 Printer Driver", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.12 and earlier" + } + ] + } + }, + { + "product_name": "Generic Plus UFR II Printer Driver", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.12 and earlier" + } + ] + } + }, + { + "product_name": "Generic Plus LIPS4 Printer Driver", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.12 and earlier" + } + ] + } + }, + { + "product_name": "Generic Plus LIPSLX Printer Driver", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.12 and earlier" + } + ] + } + }, + { + "product_name": "Generic Plus PS Printer Driver", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.12 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://psirt.canon/advisory-information/cp2025-003/", + "refsource": "MISC", + "name": "https://psirt.canon/advisory-information/cp2025-003/" + }, + { + "url": "https://canon.jp/support/support-info/250328vulnerability-response", + "refsource": "MISC", + "name": "https://canon.jp/support/support-info/250328vulnerability-response" + }, + { + "url": "https://www.usa.canon.com/about-us/to-our-customers/service-notice-vulnerability-remediation-for-certain-printer-drivers-for-production-printers-office-small-office-multifunction-printers-and-laser-printers", + "refsource": "MISC", + "name": "https://www.usa.canon.com/about-us/to-our-customers/service-notice-vulnerability-remediation-for-certain-printer-drivers-for-production-printers-office-small-office-multifunction-printers-and-laser-printers" + }, + { + "url": "https://www.canon-europe.com/support/product-security/", + "refsource": "MISC", + "name": "https://www.canon-europe.com/support/product-security/" + } + ] + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "version": "3.1" } ] } diff --git a/2025/2xxx/CVE-2025-2967.json b/2025/2xxx/CVE-2025-2967.json index 140adb0525b..ffa54313553 100644 --- a/2025/2xxx/CVE-2025-2967.json +++ b/2025/2xxx/CVE-2025-2967.json @@ -1,17 +1,154 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-2967", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in ConcreteCMS up to 9.3.9. It has been classified as problematic. This affects the function Save of the component HTML Block Handler. The manipulation of the argument content leads to HTML injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in ConcreteCMS bis 9.3.9 ausgemacht. Sie wurde als problematisch eingestuft. Betroffen hiervon ist die Funktion Save der Komponente HTML Block Handler. Durch die Manipulation des Arguments content mit unbekannten Daten kann eine HTML injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross Site Scripting", + "cweId": "CWE-79" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Code Injection", + "cweId": "CWE-94" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ConcreteCMS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "9.3.0" + }, + { + "version_affected": "=", + "version_value": "9.3.1" + }, + { + "version_affected": "=", + "version_value": "9.3.2" + }, + { + "version_affected": "=", + "version_value": "9.3.3" + }, + { + "version_affected": "=", + "version_value": "9.3.4" + }, + { + "version_affected": "=", + "version_value": "9.3.5" + }, + { + "version_affected": "=", + "version_value": "9.3.6" + }, + { + "version_affected": "=", + "version_value": "9.3.7" + }, + { + "version_affected": "=", + "version_value": "9.3.8" + }, + { + "version_affected": "=", + "version_value": "9.3.9" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.302019", + "refsource": "MISC", + "name": "https://vuldb.com/?id.302019" + }, + { + "url": "https://vuldb.com/?ctiid.302019", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.302019" + }, + { + "url": "https://vuldb.com/?submit.522417", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.522417" + }, + { + "url": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc5.md", + "refsource": "MISC", + "name": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc5.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "yaowenxiao (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.5, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N" } ] } diff --git a/2025/2xxx/CVE-2025-2968.json b/2025/2xxx/CVE-2025-2968.json index 4c156e3e354..e4deaad0204 100644 --- a/2025/2xxx/CVE-2025-2968.json +++ b/2025/2xxx/CVE-2025-2968.json @@ -1,17 +1,154 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-2968", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in ConcreteCMS up to 9.3.9. It has been declared as problematic. This vulnerability affects the function Save of the component Feature Block Handler. The manipulation of the argument Paragraph Source leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "In ConcreteCMS bis 9.3.9 wurde eine Schwachstelle ausgemacht. Sie wurde als problematisch eingestuft. Es geht um die Funktion Save der Komponente Feature Block Handler. Durch Manipulation des Arguments Paragraph Source mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross Site Scripting", + "cweId": "CWE-79" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Code Injection", + "cweId": "CWE-94" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ConcreteCMS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "9.3.0" + }, + { + "version_affected": "=", + "version_value": "9.3.1" + }, + { + "version_affected": "=", + "version_value": "9.3.2" + }, + { + "version_affected": "=", + "version_value": "9.3.3" + }, + { + "version_affected": "=", + "version_value": "9.3.4" + }, + { + "version_affected": "=", + "version_value": "9.3.5" + }, + { + "version_affected": "=", + "version_value": "9.3.6" + }, + { + "version_affected": "=", + "version_value": "9.3.7" + }, + { + "version_affected": "=", + "version_value": "9.3.8" + }, + { + "version_affected": "=", + "version_value": "9.3.9" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.302020", + "refsource": "MISC", + "name": "https://vuldb.com/?id.302020" + }, + { + "url": "https://vuldb.com/?ctiid.302020", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.302020" + }, + { + "url": "https://vuldb.com/?submit.522418", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.522418" + }, + { + "url": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc6.md", + "refsource": "MISC", + "name": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc6.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "yaowenxiao (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.5, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N" } ] } diff --git a/2025/2xxx/CVE-2025-2969.json b/2025/2xxx/CVE-2025-2969.json index 31a83819c03..7fa2789d3a8 100644 --- a/2025/2xxx/CVE-2025-2969.json +++ b/2025/2xxx/CVE-2025-2969.json @@ -1,17 +1,154 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-2969", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in ConcreteCMS up to 9.3.9. It has been rated as problematic. This issue affects the function Save of the component Feature Link Block Handler. The manipulation of the argument Title/Body Source/Button Text leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in ConcreteCMS bis 9.3.9 ausgemacht. Sie wurde als problematisch eingestuft. Es geht hierbei um die Funktion Save der Komponente Feature Link Block Handler. Mittels dem Manipulieren des Arguments Title/Body Source/Button Text mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross Site Scripting", + "cweId": "CWE-79" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Code Injection", + "cweId": "CWE-94" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ConcreteCMS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "9.3.0" + }, + { + "version_affected": "=", + "version_value": "9.3.1" + }, + { + "version_affected": "=", + "version_value": "9.3.2" + }, + { + "version_affected": "=", + "version_value": "9.3.3" + }, + { + "version_affected": "=", + "version_value": "9.3.4" + }, + { + "version_affected": "=", + "version_value": "9.3.5" + }, + { + "version_affected": "=", + "version_value": "9.3.6" + }, + { + "version_affected": "=", + "version_value": "9.3.7" + }, + { + "version_affected": "=", + "version_value": "9.3.8" + }, + { + "version_affected": "=", + "version_value": "9.3.9" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.302021", + "refsource": "MISC", + "name": "https://vuldb.com/?id.302021" + }, + { + "url": "https://vuldb.com/?ctiid.302021", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.302021" + }, + { + "url": "https://vuldb.com/?submit.522419", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.522419" + }, + { + "url": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc7.md", + "refsource": "MISC", + "name": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc7.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "yaowenxiao (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.5, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N" } ] }