From 4116a0d69513d592ebd8e2ae6049e199060f8ae8 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 14 Apr 2025 22:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2010/5xxx/CVE-2010-5305.json | 60 ++++++++++------- 2025/32xxx/CVE-2025-32943.json | 18 ++++++ 2025/32xxx/CVE-2025-32944.json | 18 ++++++ 2025/32xxx/CVE-2025-32945.json | 18 ++++++ 2025/32xxx/CVE-2025-32946.json | 18 ++++++ 2025/32xxx/CVE-2025-32947.json | 18 ++++++ 2025/32xxx/CVE-2025-32948.json | 18 ++++++ 2025/32xxx/CVE-2025-32949.json | 18 ++++++ 2025/32xxx/CVE-2025-32950.json | 18 ++++++ 2025/32xxx/CVE-2025-32951.json | 18 ++++++ 2025/32xxx/CVE-2025-32952.json | 18 ++++++ 2025/32xxx/CVE-2025-32953.json | 18 ++++++ 2025/32xxx/CVE-2025-32954.json | 18 ++++++ 2025/32xxx/CVE-2025-32955.json | 18 ++++++ 2025/32xxx/CVE-2025-32956.json | 18 ++++++ 2025/32xxx/CVE-2025-32957.json | 18 ++++++ 2025/32xxx/CVE-2025-32958.json | 18 ++++++ 2025/32xxx/CVE-2025-32959.json | 18 ++++++ 2025/32xxx/CVE-2025-32960.json | 18 ++++++ 2025/32xxx/CVE-2025-32961.json | 18 ++++++ 2025/32xxx/CVE-2025-32962.json | 18 ++++++ 2025/32xxx/CVE-2025-32963.json | 18 ++++++ 2025/32xxx/CVE-2025-32964.json | 18 ++++++ 2025/32xxx/CVE-2025-32965.json | 18 ++++++ 2025/32xxx/CVE-2025-32966.json | 18 ++++++ 2025/32xxx/CVE-2025-32967.json | 18 ++++++ 2025/32xxx/CVE-2025-32968.json | 18 ++++++ 2025/32xxx/CVE-2025-32969.json | 18 ++++++ 2025/32xxx/CVE-2025-32970.json | 18 ++++++ 2025/32xxx/CVE-2025-32971.json | 18 ++++++ 2025/32xxx/CVE-2025-32972.json | 18 ++++++ 2025/32xxx/CVE-2025-32973.json | 18 ++++++ 2025/32xxx/CVE-2025-32974.json | 18 ++++++ 2025/3xxx/CVE-2025-3589.json | 114 +++++++++++++++++++++++++++++++-- 2025/3xxx/CVE-2025-3590.json | 109 +++++++++++++++++++++++++++++-- 2025/3xxx/CVE-2025-3612.json | 18 ++++++ 2025/3xxx/CVE-2025-3613.json | 18 ++++++ 2025/3xxx/CVE-2025-3614.json | 18 ++++++ 2025/3xxx/CVE-2025-3615.json | 18 ++++++ 2025/3xxx/CVE-2025-3616.json | 18 ++++++ 40 files changed, 919 insertions(+), 30 deletions(-) create mode 100644 2025/32xxx/CVE-2025-32943.json create mode 100644 2025/32xxx/CVE-2025-32944.json create mode 100644 2025/32xxx/CVE-2025-32945.json create mode 100644 2025/32xxx/CVE-2025-32946.json create mode 100644 2025/32xxx/CVE-2025-32947.json create mode 100644 2025/32xxx/CVE-2025-32948.json create mode 100644 2025/32xxx/CVE-2025-32949.json create mode 100644 2025/32xxx/CVE-2025-32950.json create mode 100644 2025/32xxx/CVE-2025-32951.json create mode 100644 2025/32xxx/CVE-2025-32952.json create mode 100644 2025/32xxx/CVE-2025-32953.json create mode 100644 2025/32xxx/CVE-2025-32954.json create mode 100644 2025/32xxx/CVE-2025-32955.json create mode 100644 2025/32xxx/CVE-2025-32956.json create mode 100644 2025/32xxx/CVE-2025-32957.json create mode 100644 2025/32xxx/CVE-2025-32958.json create mode 100644 2025/32xxx/CVE-2025-32959.json create mode 100644 2025/32xxx/CVE-2025-32960.json create mode 100644 2025/32xxx/CVE-2025-32961.json create mode 100644 2025/32xxx/CVE-2025-32962.json create mode 100644 2025/32xxx/CVE-2025-32963.json create mode 100644 2025/32xxx/CVE-2025-32964.json create mode 100644 2025/32xxx/CVE-2025-32965.json create mode 100644 2025/32xxx/CVE-2025-32966.json create mode 100644 2025/32xxx/CVE-2025-32967.json create mode 100644 2025/32xxx/CVE-2025-32968.json create mode 100644 2025/32xxx/CVE-2025-32969.json create mode 100644 2025/32xxx/CVE-2025-32970.json create mode 100644 2025/32xxx/CVE-2025-32971.json create mode 100644 2025/32xxx/CVE-2025-32972.json create mode 100644 2025/32xxx/CVE-2025-32973.json create mode 100644 2025/32xxx/CVE-2025-32974.json create mode 100644 2025/3xxx/CVE-2025-3612.json create mode 100644 2025/3xxx/CVE-2025-3613.json create mode 100644 2025/3xxx/CVE-2025-3614.json create mode 100644 2025/3xxx/CVE-2025-3615.json create mode 100644 2025/3xxx/CVE-2025-3616.json diff --git a/2010/5xxx/CVE-2010-5305.json b/2010/5xxx/CVE-2010-5305.json index 342ace6c706..b58fbcb2326 100644 --- a/2010/5xxx/CVE-2010-5305.json +++ b/2010/5xxx/CVE-2010-5305.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2010-5305", "ASSIGNER": "ics-cert@hq.dhs.gov", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The potential exists for exposure of the product's password used to restrict unauthorized access to Rockwell PLC5/SLC5/0x/RSLogix 1785-Lx and 1747-L5x controllers. The potential exists for an unauthorized programming and configuration client to gain access to the product and allow changes to the product\u2019s configuration or program. When applicable, upgrade product firmware to a version that includes enhanced security functionality compatible with Rockwell Automation's FactoryTalk Security services." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Credentials management CWE-255", + "cweId": "CWE-255" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,9 +40,11 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "1785-Lx" }, { + "version_affected": "=", "version_value": "1747-L5x" } ] @@ -32,6 +55,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "n/a" } ] @@ -42,6 +66,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "n/a" } ] @@ -53,33 +78,24 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Credentials management CWE-255" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-10-070-02", "refsource": "MISC", - "name": "https://ics-cert.us-cert.gov/advisories/ICSA-10-070-02", - "url": "https://ics-cert.us-cert.gov/advisories/ICSA-10-070-02" + "name": "https://ics-cert.us-cert.gov/advisories/ICSA-10-070-02" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-10-070-02", + "refsource": "MISC", + "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-10-070-02" } ] }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "The potential exists for exposure of the product's password used to restrict unauthorized access to Rockwell PLC5/SLC5/0x/RSLogix 1785-Lx and 1747-L5x controllers. The potential exists for an unauthorized programming and configuration client to gain access to the product and allow changes to the product\u2019s configuration or program. When applicable, upgrade product firmware to a version that includes enhanced security functionality compatible with Rockwell Automation's FactoryTalk Security services." - } - ] + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32943.json b/2025/32xxx/CVE-2025-32943.json new file mode 100644 index 00000000000..67680c2a7af --- /dev/null +++ b/2025/32xxx/CVE-2025-32943.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32943", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32944.json b/2025/32xxx/CVE-2025-32944.json new file mode 100644 index 00000000000..95be0233514 --- /dev/null +++ b/2025/32xxx/CVE-2025-32944.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32944", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32945.json b/2025/32xxx/CVE-2025-32945.json new file mode 100644 index 00000000000..e248907a050 --- /dev/null +++ b/2025/32xxx/CVE-2025-32945.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32945", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32946.json b/2025/32xxx/CVE-2025-32946.json new file mode 100644 index 00000000000..8dda9ba62ed --- /dev/null +++ b/2025/32xxx/CVE-2025-32946.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32946", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32947.json b/2025/32xxx/CVE-2025-32947.json new file mode 100644 index 00000000000..c317996ed7f --- /dev/null +++ b/2025/32xxx/CVE-2025-32947.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32947", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32948.json b/2025/32xxx/CVE-2025-32948.json new file mode 100644 index 00000000000..0310a509a94 --- /dev/null +++ b/2025/32xxx/CVE-2025-32948.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32948", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32949.json b/2025/32xxx/CVE-2025-32949.json new file mode 100644 index 00000000000..3f4ab276dfa --- /dev/null +++ b/2025/32xxx/CVE-2025-32949.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32949", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32950.json b/2025/32xxx/CVE-2025-32950.json new file mode 100644 index 00000000000..853385d3d73 --- /dev/null +++ b/2025/32xxx/CVE-2025-32950.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32950", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32951.json b/2025/32xxx/CVE-2025-32951.json new file mode 100644 index 00000000000..317112139c3 --- /dev/null +++ b/2025/32xxx/CVE-2025-32951.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32951", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32952.json b/2025/32xxx/CVE-2025-32952.json new file mode 100644 index 00000000000..285416f8767 --- /dev/null +++ b/2025/32xxx/CVE-2025-32952.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32952", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32953.json b/2025/32xxx/CVE-2025-32953.json new file mode 100644 index 00000000000..4cde03d09dd --- /dev/null +++ b/2025/32xxx/CVE-2025-32953.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32953", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32954.json b/2025/32xxx/CVE-2025-32954.json new file mode 100644 index 00000000000..18a619ed263 --- /dev/null +++ b/2025/32xxx/CVE-2025-32954.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32954", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32955.json b/2025/32xxx/CVE-2025-32955.json new file mode 100644 index 00000000000..5ccc8e26a50 --- /dev/null +++ b/2025/32xxx/CVE-2025-32955.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32955", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32956.json b/2025/32xxx/CVE-2025-32956.json new file mode 100644 index 00000000000..bf0d194cfa3 --- /dev/null +++ b/2025/32xxx/CVE-2025-32956.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32956", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32957.json b/2025/32xxx/CVE-2025-32957.json new file mode 100644 index 00000000000..d15f52e6f5f --- /dev/null +++ b/2025/32xxx/CVE-2025-32957.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32957", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32958.json b/2025/32xxx/CVE-2025-32958.json new file mode 100644 index 00000000000..6fcbebb3be6 --- /dev/null +++ b/2025/32xxx/CVE-2025-32958.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32958", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32959.json b/2025/32xxx/CVE-2025-32959.json new file mode 100644 index 00000000000..eb810464246 --- /dev/null +++ b/2025/32xxx/CVE-2025-32959.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32959", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32960.json b/2025/32xxx/CVE-2025-32960.json new file mode 100644 index 00000000000..04388a2b063 --- /dev/null +++ b/2025/32xxx/CVE-2025-32960.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32960", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32961.json b/2025/32xxx/CVE-2025-32961.json new file mode 100644 index 00000000000..c2a98733b29 --- /dev/null +++ b/2025/32xxx/CVE-2025-32961.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32961", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32962.json b/2025/32xxx/CVE-2025-32962.json new file mode 100644 index 00000000000..9ca5d971ef7 --- /dev/null +++ b/2025/32xxx/CVE-2025-32962.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32962", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32963.json b/2025/32xxx/CVE-2025-32963.json new file mode 100644 index 00000000000..79ffaf3092d --- /dev/null +++ b/2025/32xxx/CVE-2025-32963.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32963", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32964.json b/2025/32xxx/CVE-2025-32964.json new file mode 100644 index 00000000000..3ad7cd267cb --- /dev/null +++ b/2025/32xxx/CVE-2025-32964.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32964", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32965.json b/2025/32xxx/CVE-2025-32965.json new file mode 100644 index 00000000000..e50c26b2beb --- /dev/null +++ b/2025/32xxx/CVE-2025-32965.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32965", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32966.json b/2025/32xxx/CVE-2025-32966.json new file mode 100644 index 00000000000..d09c1e9e479 --- /dev/null +++ b/2025/32xxx/CVE-2025-32966.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32966", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32967.json b/2025/32xxx/CVE-2025-32967.json new file mode 100644 index 00000000000..c9b93b69dff --- /dev/null +++ b/2025/32xxx/CVE-2025-32967.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32967", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32968.json b/2025/32xxx/CVE-2025-32968.json new file mode 100644 index 00000000000..75fd3bc9c58 --- /dev/null +++ b/2025/32xxx/CVE-2025-32968.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32968", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32969.json b/2025/32xxx/CVE-2025-32969.json new file mode 100644 index 00000000000..c8a9aa99efc --- /dev/null +++ b/2025/32xxx/CVE-2025-32969.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32969", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32970.json b/2025/32xxx/CVE-2025-32970.json new file mode 100644 index 00000000000..993787336d8 --- /dev/null +++ b/2025/32xxx/CVE-2025-32970.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32970", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32971.json b/2025/32xxx/CVE-2025-32971.json new file mode 100644 index 00000000000..31a6aa2eb67 --- /dev/null +++ b/2025/32xxx/CVE-2025-32971.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32971", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32972.json b/2025/32xxx/CVE-2025-32972.json new file mode 100644 index 00000000000..af10976d433 --- /dev/null +++ b/2025/32xxx/CVE-2025-32972.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32972", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32973.json b/2025/32xxx/CVE-2025-32973.json new file mode 100644 index 00000000000..5a022319997 --- /dev/null +++ b/2025/32xxx/CVE-2025-32973.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32973", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32974.json b/2025/32xxx/CVE-2025-32974.json new file mode 100644 index 00000000000..f085e6c442a --- /dev/null +++ b/2025/32xxx/CVE-2025-32974.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32974", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3589.json b/2025/3xxx/CVE-2025-3589.json index df4b293e527..250b8a076aa 100644 --- a/2025/3xxx/CVE-2025-3589.json +++ b/2025/3xxx/CVE-2025-3589.json @@ -1,17 +1,123 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-3589", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as critical, was found in SourceCodester Music Class Enrollment System 1.0. Affected is an unknown function of the file /manage_class.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in SourceCodester Music Class Enrollment System 1.0 gefunden. Sie wurde als kritisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Datei /manage_class.php. Durch Beeinflussen des Arguments ID mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL Injection", + "cweId": "CWE-89" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Injection", + "cweId": "CWE-74" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SourceCodester", + "product": { + "product_data": [ + { + "product_name": "Music Class Enrollment System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.304644", + "refsource": "MISC", + "name": "https://vuldb.com/?id.304644" + }, + { + "url": "https://vuldb.com/?ctiid.304644", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.304644" + }, + { + "url": "https://vuldb.com/?submit.550267", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.550267" + }, + { + "url": "https://github.com/byxs0x0/SQL/blob/main/SQL6.md", + "refsource": "MISC", + "name": "https://github.com/byxs0x0/SQL/blob/main/SQL6.md" + }, + { + "url": "https://www.sourcecodester.com/", + "refsource": "MISC", + "name": "https://www.sourcecodester.com/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "wanglun (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2025/3xxx/CVE-2025-3590.json b/2025/3xxx/CVE-2025-3590.json index 3d501b65fa2..8f67b44752c 100644 --- a/2025/3xxx/CVE-2025-3590.json +++ b/2025/3xxx/CVE-2025-3590.json @@ -1,17 +1,118 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-3590", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been found in Adianti Framework up to 8.0 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 8.1 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "deu", + "value": "In Adianti Framework bis 8.0 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Es geht um eine nicht n\u00e4her bekannte Funktion. Dank der Manipulation mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Ein Aktualisieren auf die Version 8.1 vermag dieses Problem zu l\u00f6sen. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Deserialization", + "cweId": "CWE-502" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Adianti", + "product": { + "product_data": [ + { + "product_name": "Framework", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "8.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.304645", + "refsource": "MISC", + "name": "https://vuldb.com/?id.304645" + }, + { + "url": "https://vuldb.com/?ctiid.304645", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.304645" + }, + { + "url": "https://vuldb.com/?submit.550296", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.550296" + }, + { + "url": "https://gist.github.com/mcdruid/8412cfb55f443a1344ff41af0ce1b215", + "refsource": "MISC", + "name": "https://gist.github.com/mcdruid/8412cfb55f443a1344ff41af0ce1b215" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "mcdruid (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2025/3xxx/CVE-2025-3612.json b/2025/3xxx/CVE-2025-3612.json new file mode 100644 index 00000000000..bd5d19c17ea --- /dev/null +++ b/2025/3xxx/CVE-2025-3612.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3612", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3613.json b/2025/3xxx/CVE-2025-3613.json new file mode 100644 index 00000000000..d3417e52b0a --- /dev/null +++ b/2025/3xxx/CVE-2025-3613.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3613", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3614.json b/2025/3xxx/CVE-2025-3614.json new file mode 100644 index 00000000000..1b54deed584 --- /dev/null +++ b/2025/3xxx/CVE-2025-3614.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3614", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3615.json b/2025/3xxx/CVE-2025-3615.json new file mode 100644 index 00000000000..23d014a73df --- /dev/null +++ b/2025/3xxx/CVE-2025-3615.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3615", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3616.json b/2025/3xxx/CVE-2025-3616.json new file mode 100644 index 00000000000..f0c45c00c0e --- /dev/null +++ b/2025/3xxx/CVE-2025-3616.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3616", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file