From 4a2406fb31674dc6b53c52353e9a017ec31f38f8 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 17 Jan 2025 14:01:02 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/36xxx/CVE-2022-36109.json | 136 +++++++++++++++++---------------- 2024/13xxx/CVE-2024-13503.json | 100 ++++++++++++++++++++++-- 2024/13xxx/CVE-2024-13506.json | 18 +++++ 2024/13xxx/CVE-2024-13507.json | 18 +++++ 2024/13xxx/CVE-2024-13508.json | 18 +++++ 2024/40xxx/CVE-2024-40917.json | 22 +++++- 2024/47xxx/CVE-2024-47736.json | 17 ++++- 2024/50xxx/CVE-2024-50164.json | 17 ++++- 2024/53xxx/CVE-2024-53128.json | 13 +++- 2024/53xxx/CVE-2024-53221.json | 13 +++- 2024/53xxx/CVE-2024-53685.json | 104 ++++++++++++++++++++++++- 2024/56xxx/CVE-2024-56664.json | 13 +++- 2024/57xxx/CVE-2024-57883.json | 13 +++- 2024/57xxx/CVE-2024-57887.json | 13 +++- 2024/57xxx/CVE-2024-57888.json | 13 +++- 2024/57xxx/CVE-2024-57892.json | 13 +++- 2025/0xxx/CVE-2025-0527.json | 114 ++++++++++++++++++++++++++- 2025/0xxx/CVE-2025-0545.json | 18 +++++ 2025/0xxx/CVE-2025-0546.json | 18 +++++ 2025/0xxx/CVE-2025-0547.json | 18 +++++ 20 files changed, 616 insertions(+), 93 deletions(-) create mode 100644 2024/13xxx/CVE-2024-13506.json create mode 100644 2024/13xxx/CVE-2024-13507.json create mode 100644 2024/13xxx/CVE-2024-13508.json create mode 100644 2025/0xxx/CVE-2025-0545.json create mode 100644 2025/0xxx/CVE-2025-0546.json create mode 100644 2025/0xxx/CVE-2025-0547.json diff --git a/2022/36xxx/CVE-2022-36109.json b/2022/36xxx/CVE-2022-36109.json index c87ca571f65..798d8acb29d 100644 --- a/2022/36xxx/CVE-2022-36109.json +++ b/2022/36xxx/CVE-2022-36109.json @@ -1,103 +1,111 @@ { - "CVE_data_meta": { - "ASSIGNER": "security-advisories@github.com", - "ID": "CVE-2022-36109", - "STATE": "PUBLIC", - "TITLE": "Moby vulnerability relating to supplementary group permissions" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "moby", - "version": { - "version_data": [ - { - "version_value": "< 20.10.18" - } - ] - } - } - ] - }, - "vendor_name": "moby" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2022-36109", + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" + }, "description": { "description_data": [ { "lang": "eng", - "value": "Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where supplementary groups are not set up properly. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. This bug is fixed in Moby (Docker Engine) 20.10.18. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade, this problem can be worked around by not using the `\"USER $USERNAME\"` Dockerfile instruction. Instead by calling `ENTRYPOINT [\"su\", \"-\", \"user\"]` the supplementary groups will be set up properly." + "value": "Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where supplementary groups are not set up properly. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. This bug is fixed in Moby (Docker Engine) 20.10.18. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade, this problem can be worked around by not using the `\"USER $USERNAME\"` Dockerfile instruction. Instead by calling `ENTRYPOINT [\"su\", \"-\", \"user\"]` the supplementary groups will be set up properly." } ] }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "LOW", - "baseScore": 6.3, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "version": "3.1" - } - }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", - "value": "CWE-863: Incorrect Authorization" + "value": "CWE-863: Incorrect Authorization", + "cweId": "CWE-863" } ] } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "moby", + "product": { + "product_data": [ + { + "product_name": "moby", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 20.10.18" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4", - "refsource": "CONFIRM", - "url": "https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4" - }, - { - "name": "https://github.com/moby/moby/commit/de7af816e76a7fd3fbf06bffa6832959289fba32", + "url": "https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4", "refsource": "MISC", - "url": "https://github.com/moby/moby/commit/de7af816e76a7fd3fbf06bffa6832959289fba32" + "name": "https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4" }, { - "name": "https://github.com/moby/moby/releases/tag/v20.10.18", + "url": "https://github.com/moby/moby/commit/de7af816e76a7fd3fbf06bffa6832959289fba32", "refsource": "MISC", - "url": "https://github.com/moby/moby/releases/tag/v20.10.18" + "name": "https://github.com/moby/moby/commit/de7af816e76a7fd3fbf06bffa6832959289fba32" }, { - "refsource": "FEDORA", - "name": "FEDORA-2022-b027a13a39", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQQ4E3JBXVR3VK5FIZVJ3QS2TAOOXXTQ/" + "url": "https://github.com/moby/moby/releases/tag/v20.10.18", + "refsource": "MISC", + "name": "https://github.com/moby/moby/releases/tag/v20.10.18" }, { - "refsource": "FEDORA", - "name": "FEDORA-2022-8298607490", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7JL2QA3RB732MLJ3RMUXB3IB7AA22YU/" + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7JL2QA3RB732MLJ3RMUXB3IB7AA22YU", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7JL2QA3RB732MLJ3RMUXB3IB7AA22YU" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQQ4E3JBXVR3VK5FIZVJ3QS2TAOOXXTQ", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQQ4E3JBXVR3VK5FIZVJ3QS2TAOOXXTQ" + }, + { + "url": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation", + "refsource": "MISC", + "name": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation" } ] }, "source": { "advisory": "GHSA-rc4r-wh2q-q6c4", "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" + } + ] } } \ No newline at end of file diff --git a/2024/13xxx/CVE-2024-13503.json b/2024/13xxx/CVE-2024-13503.json index 18431a704e4..7da5c25d187 100644 --- a/2024/13xxx/CVE-2024-13503.json +++ b/2024/13xxx/CVE-2024-13503.json @@ -1,18 +1,108 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-13503", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnerability@ncsc.ch", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Newtec NTC2218, NTC2250, NTC2299 on Linux, PowerPC, ARM (Updating signaling process in the swdownload binary modules) allows Local Execution of Code, Remote Code Inclusion.\nThis issue affects NTC2218, NTC2250, NTC2299: from 1.0.1.1 through 2.2.6.19. The issue is both present on the PowerPC versions of the modem and the ARM versions.\n\nA stack buffer buffer overflow in the swdownload binary allows attackers to execute arbitrary code. The parse_INFO function uses an unrestricted `sscanf` to read a string of an incoming network packet into a statically sized buffer." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Newtec/iDirect", + "product": { + "product_data": [ + { + "product_name": "NTC2218, NTC2250, NTC2299", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThanOrEqual": "2.2.6.19", + "status": "affected", + "version": "1.0.1.1", + "versionType": "semver" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://doi.org/10.1145/3643833.3656139", + "refsource": "MISC", + "name": "https://doi.org/10.1145/3643833.3656139" + }, + { + "url": "https://www.youtube.com/watch?v=-pxmly8xeas", + "refsource": "MISC", + "name": "https://www.youtube.com/watch?v=-pxmly8xeas" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Exploitable with publicly demonstrated exploit.
" + } + ], + "value": "Exploitable with publicly demonstrated exploit." + } + ], + "credits": [ + { + "lang": "en", + "value": "Johannes Willbold, johannes.willbold@rub.de" + }, + { + "lang": "en", + "value": "Martin Strohmeier, martin.strohmeier@armasuisse.ch" + } + ] } \ No newline at end of file diff --git a/2024/13xxx/CVE-2024-13506.json b/2024/13xxx/CVE-2024-13506.json new file mode 100644 index 00000000000..831e49e80f0 --- /dev/null +++ b/2024/13xxx/CVE-2024-13506.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13506", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/13xxx/CVE-2024-13507.json b/2024/13xxx/CVE-2024-13507.json new file mode 100644 index 00000000000..9263581b071 --- /dev/null +++ b/2024/13xxx/CVE-2024-13507.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13507", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/13xxx/CVE-2024-13508.json b/2024/13xxx/CVE-2024-13508.json new file mode 100644 index 00000000000..e370e9ae521 --- /dev/null +++ b/2024/13xxx/CVE-2024-13508.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13508", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/40xxx/CVE-2024-40917.json b/2024/40xxx/CVE-2024-40917.json index 5e651833620..403bd980205 100644 --- a/2024/40xxx/CVE-2024-40917.json +++ b/2024/40xxx/CVE-2024-40917.json @@ -40,8 +40,13 @@ "version_data": [ { "version_affected": "<", - "version_name": "ff6c3d81f2e8", - "version_value": "22f742b8f738" + "version_name": "6fdc770506eb8379bf68a49d4e193c8364ac64e0", + "version_value": "4ddb7f966f3d06fcf1ba5ee298af6714b593584b" + }, + { + "version_affected": "<", + "version_name": "ff6c3d81f2e86b63a3a530683f89ef393882782a", + "version_value": "22f742b8f738918f683198a18ec3c691acda14c4" }, { "version_value": "not down converted", @@ -57,6 +62,12 @@ "status": "unaffected", "versionType": "semver" }, + { + "version": "6.6.72", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, { "version": "6.9.6", "lessThanOrEqual": "6.9.*", @@ -84,6 +95,11 @@ }, "references": { "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/4ddb7f966f3d06fcf1ba5ee298af6714b593584b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/4ddb7f966f3d06fcf1ba5ee298af6714b593584b" + }, { "url": "https://git.kernel.org/stable/c/22f742b8f738918f683198a18ec3c691acda14c4", "refsource": "MISC", @@ -97,6 +113,6 @@ ] }, "generator": { - "engine": "bippy-9e1c9544281a" + "engine": "bippy-5f407fcff5a0" } } \ No newline at end of file diff --git a/2024/47xxx/CVE-2024-47736.json b/2024/47xxx/CVE-2024-47736.json index fcae0b4a1e5..107262bc0d9 100644 --- a/2024/47xxx/CVE-2024-47736.json +++ b/2024/47xxx/CVE-2024-47736.json @@ -40,8 +40,8 @@ "version_data": [ { "version_affected": "<", - "version_name": "8e6c8fa9f2e9", - "version_value": "b9b30af0e86f" + "version_name": "8e6c8fa9f2e95c88a642521a5da19a8e31748846", + "version_value": "1bf7e414cac303c9aec1be67872e19be8b64980c" }, { "version_value": "not down converted", @@ -57,6 +57,12 @@ "status": "unaffected", "versionType": "semver" }, + { + "version": "6.6.72", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, { "version": "6.10.13", "lessThanOrEqual": "6.10.*", @@ -90,6 +96,11 @@ }, "references": { "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/1bf7e414cac303c9aec1be67872e19be8b64980c", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/1bf7e414cac303c9aec1be67872e19be8b64980c" + }, { "url": "https://git.kernel.org/stable/c/b9b30af0e86ffb485301ecd83b9129c9dfb7ebf8", "refsource": "MISC", @@ -108,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-8e903de6a542" + "engine": "bippy-5f407fcff5a0" } } \ No newline at end of file diff --git a/2024/50xxx/CVE-2024-50164.json b/2024/50xxx/CVE-2024-50164.json index 948a5088b8a..c53da1eb3cb 100644 --- a/2024/50xxx/CVE-2024-50164.json +++ b/2024/50xxx/CVE-2024-50164.json @@ -40,8 +40,8 @@ "version_data": [ { "version_affected": "<", - "version_name": "7b3552d3f9f6", - "version_value": "48068ccaea95" + "version_name": "7b3552d3f9f6897851fc453b5131a967167e43c2", + "version_value": "43f4df339a4d375bedcad29a61ae6f0ee7a048f8" }, { "version_value": "not down converted", @@ -57,6 +57,12 @@ "status": "unaffected", "versionType": "semver" }, + { + "version": "6.1.125", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, { "version": "6.6.59", "lessThanOrEqual": "6.6.*", @@ -90,6 +96,11 @@ }, "references": { "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/43f4df339a4d375bedcad29a61ae6f0ee7a048f8", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/43f4df339a4d375bedcad29a61ae6f0ee7a048f8" + }, { "url": "https://git.kernel.org/stable/c/48068ccaea957469f1adf78dfd2c1c9a7e18f0fe", "refsource": "MISC", @@ -108,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-8e903de6a542" + "engine": "bippy-5f407fcff5a0" } } \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53128.json b/2024/53xxx/CVE-2024-53128.json index 560399e8504..e1ed55bc974 100644 --- a/2024/53xxx/CVE-2024-53128.json +++ b/2024/53xxx/CVE-2024-53128.json @@ -41,12 +41,18 @@ { "version_affected": "<", "version_name": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "version_value": "2d2b19ed4169c38dc6c61a186c5f7bdafc709691" + "version_value": "397383db9c69470642ac95beb04f2150928d663b" }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "versions": [ + { + "version": "6.1.125", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, { "version": "6.6.69", "lessThanOrEqual": "6.6.*", @@ -80,6 +86,11 @@ }, "references": { "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/397383db9c69470642ac95beb04f2150928d663b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/397383db9c69470642ac95beb04f2150928d663b" + }, { "url": "https://git.kernel.org/stable/c/2d2b19ed4169c38dc6c61a186c5f7bdafc709691", "refsource": "MISC", diff --git a/2024/53xxx/CVE-2024-53221.json b/2024/53xxx/CVE-2024-53221.json index d60df25a835..5ad4de46bfa 100644 --- a/2024/53xxx/CVE-2024-53221.json +++ b/2024/53xxx/CVE-2024-53221.json @@ -41,7 +41,7 @@ { "version_affected": "<", "version_name": "f543805fcd60f3f9a491cfa2f2dc9284d2569c28", - "version_value": "32f5e291b7677495f98246eec573767430321c08" + "version_value": "8dddc12d03248755d9f709bc1eb9e3ea2bf1b322" }, { "version_value": "not down converted", @@ -57,6 +57,12 @@ "status": "unaffected", "versionType": "semver" }, + { + "version": "6.6.72", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, { "version": "6.11.11", "lessThanOrEqual": "6.11.*", @@ -90,6 +96,11 @@ }, "references": { "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/8dddc12d03248755d9f709bc1eb9e3ea2bf1b322", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/8dddc12d03248755d9f709bc1eb9e3ea2bf1b322" + }, { "url": "https://git.kernel.org/stable/c/32f5e291b7677495f98246eec573767430321c08", "refsource": "MISC", diff --git a/2024/53xxx/CVE-2024-53685.json b/2024/53xxx/CVE-2024-53685.json index be5da7f565a..ff155730f16 100644 --- a/2024/53xxx/CVE-2024-53685.json +++ b/2024/53xxx/CVE-2024-53685.json @@ -1,18 +1,114 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-53685", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: give up on paths longer than PATH_MAX\n\nIf the full path to be built by ceph_mdsc_build_path() happens to be\nlonger than PATH_MAX, then this function will enter an endless (retry)\nloop, effectively blocking the whole task. Most of the machine\nbecomes unusable, making this a very simple and effective DoS\nvulnerability.\n\nI cannot imagine why this retry was ever implemented, but it seems\nrather useless and harmful to me. Let's remove it and fail with\nENAMETOOLONG instead." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "version_value": "e4b168c64da06954be5d520f6c16469b1cadc069" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "6.1.125", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.6.70", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.12.7", + "lessThanOrEqual": "6.12.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.13-rc4", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/e4b168c64da06954be5d520f6c16469b1cadc069", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/e4b168c64da06954be5d520f6c16469b1cadc069" + }, + { + "url": "https://git.kernel.org/stable/c/c47ed91156daf328601d02b58d52d9804da54108", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/c47ed91156daf328601d02b58d52d9804da54108" + }, + { + "url": "https://git.kernel.org/stable/c/99a37ab76a315c8307eb5b0dc095d8ad9d8efeaa", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/99a37ab76a315c8307eb5b0dc095d8ad9d8efeaa" + }, + { + "url": "https://git.kernel.org/stable/c/550f7ca98ee028a606aa75705a7e77b1bd11720f", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/550f7ca98ee028a606aa75705a7e77b1bd11720f" + } + ] + }, + "generator": { + "engine": "bippy-5f407fcff5a0" } } \ No newline at end of file diff --git a/2024/56xxx/CVE-2024-56664.json b/2024/56xxx/CVE-2024-56664.json index 953410d5079..6118b12933f 100644 --- a/2024/56xxx/CVE-2024-56664.json +++ b/2024/56xxx/CVE-2024-56664.json @@ -41,7 +41,7 @@ { "version_affected": "<", "version_name": "604326b41a6fb9b4a78b6179335decee0365cd8c", - "version_value": "b015f19fedd2e12283a8450dd0aefce49ec57015" + "version_value": "b79a0d1e9a374d1b376933a354c4fcd01fce0365" }, { "version_value": "not down converted", @@ -57,6 +57,12 @@ "status": "unaffected", "versionType": "semver" }, + { + "version": "6.1.125", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, { "version": "6.6.67", "lessThanOrEqual": "6.6.*", @@ -90,6 +96,11 @@ }, "references": { "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/b79a0d1e9a374d1b376933a354c4fcd01fce0365", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/b79a0d1e9a374d1b376933a354c4fcd01fce0365" + }, { "url": "https://git.kernel.org/stable/c/b015f19fedd2e12283a8450dd0aefce49ec57015", "refsource": "MISC", diff --git a/2024/57xxx/CVE-2024-57883.json b/2024/57xxx/CVE-2024-57883.json index f77a5ce0377..879df36b789 100644 --- a/2024/57xxx/CVE-2024-57883.json +++ b/2024/57xxx/CVE-2024-57883.json @@ -41,7 +41,7 @@ { "version_affected": "<", "version_name": "39dde65c9940c97fcd178a3d2b1c57ed8b7b68aa", - "version_value": "2e31443a0d18ae43b9d29e02bf0563f07772193d" + "version_value": "56b274473d6e7e7375f2d0a2b4aca11d67c6b52f" }, { "version_value": "not down converted", @@ -57,6 +57,12 @@ "status": "unaffected", "versionType": "semver" }, + { + "version": "6.6.72", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, { "version": "6.12.9", "lessThanOrEqual": "6.12.*", @@ -84,6 +90,11 @@ }, "references": { "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/56b274473d6e7e7375f2d0a2b4aca11d67c6b52f", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/56b274473d6e7e7375f2d0a2b4aca11d67c6b52f" + }, { "url": "https://git.kernel.org/stable/c/2e31443a0d18ae43b9d29e02bf0563f07772193d", "refsource": "MISC", diff --git a/2024/57xxx/CVE-2024-57887.json b/2024/57xxx/CVE-2024-57887.json index 2e56aa2fe7d..087e97acc92 100644 --- a/2024/57xxx/CVE-2024-57887.json +++ b/2024/57xxx/CVE-2024-57887.json @@ -41,7 +41,7 @@ { "version_affected": "<", "version_name": "1e4d58cd7f888522d16f221d628356befbb08468", - "version_value": "1f49aaf55652580ae63ab83d67211fe6a55d83dc" + "version_value": "d208571943ffddc438a7ce533d5d0b9219806242" }, { "version_value": "not down converted", @@ -57,6 +57,12 @@ "status": "unaffected", "versionType": "semver" }, + { + "version": "6.1.125", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, { "version": "6.6.70", "lessThanOrEqual": "6.6.*", @@ -90,6 +96,11 @@ }, "references": { "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/d208571943ffddc438a7ce533d5d0b9219806242", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/d208571943ffddc438a7ce533d5d0b9219806242" + }, { "url": "https://git.kernel.org/stable/c/1f49aaf55652580ae63ab83d67211fe6a55d83dc", "refsource": "MISC", diff --git a/2024/57xxx/CVE-2024-57888.json b/2024/57xxx/CVE-2024-57888.json index e6bef14277b..3ec122d706a 100644 --- a/2024/57xxx/CVE-2024-57888.json +++ b/2024/57xxx/CVE-2024-57888.json @@ -41,7 +41,7 @@ { "version_affected": "<", "version_name": "fca839c00a12d682cb59b3b620d109a1d850b262", - "version_value": "ffb231471a407c96e114070bf828cd2378fdf431" + "version_value": "1fd2a57dcb4de3cb40844a29c71b5d7b46a84334" }, { "version_value": "not down converted", @@ -57,6 +57,12 @@ "status": "unaffected", "versionType": "semver" }, + { + "version": "6.6.72", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, { "version": "6.12.9", "lessThanOrEqual": "6.12.*", @@ -84,6 +90,11 @@ }, "references": { "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/1fd2a57dcb4de3cb40844a29c71b5d7b46a84334", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/1fd2a57dcb4de3cb40844a29c71b5d7b46a84334" + }, { "url": "https://git.kernel.org/stable/c/ffb231471a407c96e114070bf828cd2378fdf431", "refsource": "MISC", diff --git a/2024/57xxx/CVE-2024-57892.json b/2024/57xxx/CVE-2024-57892.json index 4e754714543..e1857b523fa 100644 --- a/2024/57xxx/CVE-2024-57892.json +++ b/2024/57xxx/CVE-2024-57892.json @@ -41,7 +41,7 @@ { "version_affected": "<", "version_name": "8f9e8f5fcc059a3cba87ce837c88316797ef3645", - "version_value": "2e3d203b1adede46bbba049e497765d67865be18" + "version_value": "2d431192486367eee03cc28d0b53b97dafcb8e63" }, { "version_value": "not down converted", @@ -57,6 +57,12 @@ "status": "unaffected", "versionType": "semver" }, + { + "version": "6.1.125", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, { "version": "6.6.70", "lessThanOrEqual": "6.6.*", @@ -90,6 +96,11 @@ }, "references": { "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/2d431192486367eee03cc28d0b53b97dafcb8e63", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/2d431192486367eee03cc28d0b53b97dafcb8e63" + }, { "url": "https://git.kernel.org/stable/c/2e3d203b1adede46bbba049e497765d67865be18", "refsource": "MISC", diff --git a/2025/0xxx/CVE-2025-0527.json b/2025/0xxx/CVE-2025-0527.json index e84b2742b84..da35a227aba 100644 --- a/2025/0xxx/CVE-2025-0527.json +++ b/2025/0xxx/CVE-2025-0527.json @@ -1,17 +1,123 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-0527", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical was found in code-projects Admission Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /signupconfirm.php. The manipulation of the argument in_eml leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "deu", + "value": "In code-projects Admission Management System 1.0 wurde eine kritische Schwachstelle entdeckt. Das betrifft eine unbekannte Funktionalit\u00e4t der Datei /signupconfirm.php. Durch das Beeinflussen des Arguments in_eml mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL Injection", + "cweId": "CWE-89" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Injection", + "cweId": "CWE-74" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "code-projects", + "product": { + "product_data": [ + { + "product_name": "Admission Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.292411", + "refsource": "MISC", + "name": "https://vuldb.com/?id.292411" + }, + { + "url": "https://vuldb.com/?ctiid.292411", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.292411" + }, + { + "url": "https://vuldb.com/?submit.477899", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.477899" + }, + { + "url": "https://github.com/Curious-L/-/issues/4", + "refsource": "MISC", + "name": "https://github.com/Curious-L/-/issues/4" + }, + { + "url": "https://code-projects.org/", + "refsource": "MISC", + "name": "https://code-projects.org/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Zwdtk (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 7.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ] } diff --git a/2025/0xxx/CVE-2025-0545.json b/2025/0xxx/CVE-2025-0545.json new file mode 100644 index 00000000000..5f2af9ef6cb --- /dev/null +++ b/2025/0xxx/CVE-2025-0545.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0545", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0546.json b/2025/0xxx/CVE-2025-0546.json new file mode 100644 index 00000000000..eb98c4b7fa7 --- /dev/null +++ b/2025/0xxx/CVE-2025-0546.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0546", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0547.json b/2025/0xxx/CVE-2025-0547.json new file mode 100644 index 00000000000..f2862f8439f --- /dev/null +++ b/2025/0xxx/CVE-2025-0547.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0547", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file