diff --git a/2023/25xxx/CVE-2023-25829.json b/2023/25xxx/CVE-2023-25829.json index 50e0c210720..d07783b4e6c 100644 --- a/2023/25xxx/CVE-2023-25829.json +++ b/2023/25xxx/CVE-2023-25829.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11.0 and 10.9.1 that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks." + "value": "There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11.0 and below that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks." } ] }, @@ -40,12 +40,9 @@ "version": { "version_data": [ { - "version_affected": "=", + "version_affected": "<=", + "version_name": "all", "version_value": "11.0" - }, - { - "version_affected": "=", - "version_value": "10.9.1" } ] } diff --git a/2023/25xxx/CVE-2023-25830.json b/2023/25xxx/CVE-2023-25830.json index abe6f73b6c7..9d5c5349a77 100644 --- a/2023/25xxx/CVE-2023-25830.json +++ b/2023/25xxx/CVE-2023-25830.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1, 10.8.1 and 10.7.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser." + "value": "There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1and before which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser." } ] }, @@ -41,8 +41,8 @@ "version_data": [ { "version_affected": "<=", - "version_name": "10.9.1", - "version_value": "<=10.7.1" + "version_name": "all", + "version_value": "10.9.1" } ] } @@ -86,7 +86,7 @@ "value": "Mitigation: Leverage a WAF to filter JavaScript from URL query parameters
" } ], - "value": "Mitigation: Leverage a WAF to filter JavaScript from URL query parameters\n" + "value": "Mitigation: Leverage a WAF to filter JavaScript from URL query parameters" } ], "solution": [ @@ -99,7 +99,7 @@ "value": "https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8...
" } ], - "value": " https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8... https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8095 \n" + "value": "https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8... https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8095" } ], "credits": [ diff --git a/2023/25xxx/CVE-2023-25831.json b/2023/25xxx/CVE-2023-25831.json index 0d144a64db1..43c8f778c82 100644 --- a/2023/25xxx/CVE-2023-25831.json +++ b/2023/25xxx/CVE-2023-25831.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1, 10.8.1 and 10.7.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser.\n" + "value": "There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1and below which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser." } ] }, @@ -41,8 +41,8 @@ "version_data": [ { "version_affected": "<=", - "version_name": "10.9.1", - "version_value": "<=" + "version_name": "All", + "version_value": "10.9.1" } ] } diff --git a/2023/25xxx/CVE-2023-25832.json b/2023/25xxx/CVE-2023-25832.json index 4ba75fa160d..9e916174f9a 100644 --- a/2023/25xxx/CVE-2023-25832.json +++ b/2023/25xxx/CVE-2023-25832.json @@ -44,8 +44,10 @@ "x_cve_json_5_version_data": { "versions": [ { + "lessThanOrEqual": "11.0", "status": "affected", - "version": "11.0" + "version": "All", + "versionType": "Portal for ArcGIS" } ], "defaultStatus": "affected" @@ -95,8 +97,8 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", - "baseScore": 6.8, - "baseSeverity": "MEDIUM", + "baseScore": 8.8, + "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", diff --git a/2023/25xxx/CVE-2023-25833.json b/2023/25xxx/CVE-2023-25833.json index 7748e9f9b38..1725d6b943e 100644 --- a/2023/25xxx/CVE-2023-25833.json +++ b/2023/25xxx/CVE-2023-25833.json @@ -44,8 +44,10 @@ "x_cve_json_5_version_data": { "versions": [ { + "lessThanOrEqual": "11.0", "status": "affected", - "version": "11.0" + "version": "All", + "versionType": "Portal for ArcGIS" } ], "defaultStatus": "affected" @@ -93,7 +95,7 @@ "value": "https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8...
" } ], - "value": " https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8... https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8095 \n" + "value": "https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8... https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8095" } ], "credits": [ @@ -108,7 +110,7 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 4.1, + "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", @@ -120,4 +122,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25834.json b/2023/25xxx/CVE-2023-25834.json index cddcc655f70..56536660487 100644 --- a/2023/25xxx/CVE-2023-25834.json +++ b/2023/25xxx/CVE-2023-25834.json @@ -41,7 +41,7 @@ "version_data": [ { "version_affected": "<=", - "version_name": "10.7.1", + "version_name": "all", "version_value": "10.9.1" } ] @@ -86,7 +86,7 @@ "value": "Install Portal for ArcGIS Security 2023 Update 1
" } ], - "value": "Install P ortal for ArcGIS Security 2023 Update 1 https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/ \n" + "value": "Install P ortal for ArcGIS Security 2023 Update 1 https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/" } ], "impact": { @@ -95,16 +95,16 @@ "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", - "baseScore": 4.6, + "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", - "userInteraction": "None", + "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } ] } -} +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25835.json b/2023/25xxx/CVE-2023-25835.json index e214eefe567..bff6159b65a 100644 --- a/2023/25xxx/CVE-2023-25835.json +++ b/2023/25xxx/CVE-2023-25835.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "There is a stored Cross-site Scripting vulnerability\u00a0in Esri Portal for ArcGIS Enterprise Sites versions 10.8.1 \u2013 11.1 that may allow a remote, authenticated attacker to create a crafted link that is stored in the site configuration which when clicked could potentially execute arbitrary JavaScript code in the victims browser. \u00a0The privileges required to execute this attack are high. The impact to Confidentiality, Integrity and Availability are High." + "value": "There is a stored Cross-site Scripting vulnerability\u00a0in Esri Portal for ArcGIS Sites versions 11.1 and below that may allow a remote, authenticated attacker to create a crafted link that is stored in the site configuration which when clicked could potentially execute arbitrary JavaScript code in the victims browser. \u00a0The privileges required to execute this attack are high. The impact to Confidentiality, Integrity and Availability are High." } ] }, @@ -41,7 +41,7 @@ "version_data": [ { "version_affected": "<=", - "version_name": "10.8.1", + "version_name": "All", "version_value": "11.1" } ] diff --git a/2023/25xxx/CVE-2023-25836.json b/2023/25xxx/CVE-2023-25836.json index 897a8ebcc5d..f08b032f3ab 100644 --- a/2023/25xxx/CVE-2023-25836.json +++ b/2023/25xxx/CVE-2023-25836.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "There is a Cross-site Scripting vulnerability\u00a0in Esri Portal Sites in versions 10.8.1 \u2013 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victims browser. \u00a0The privileges required to execute this attack are low." + "value": "There is a Cross-site Scripting vulnerability\u00a0in Esri Portal for ArcGIS Sites in versions 10.9 and below that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victims browser. \u00a0The privileges required to execute this attack are low." } ] }, @@ -41,7 +41,7 @@ "version_data": [ { "version_affected": "<=", - "version_name": "10.8.1", + "version_name": "All", "version_value": "10.9" } ] diff --git a/2023/25xxx/CVE-2023-25837.json b/2023/25xxx/CVE-2023-25837.json index 876663d1129..003bdd824ba 100644 --- a/2023/25xxx/CVE-2023-25837.json +++ b/2023/25xxx/CVE-2023-25837.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "There is a Cross-site Scripting vulnerability\u00a0in Esri ArcGIS Enterprise Sites versions 10.8.1 \u2013 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked by a victim could potentially execute arbitrary JavaScript code in the target's browser. \u00a0The privileges required to execute this attack are high.\u00a0 \u00a0\n\nThe impact to Confidentiality, Integrity and Availability are High." + "value": "There is a Cross-site Scripting vulnerability\u00a0in Esri ArcGIS Enterprise Sites versions 10.9 and below that may allow a remote, authenticated attacker to create a crafted link which when clicked by a victim could potentially execute arbitrary JavaScript code in the target's browser. \u00a0The privileges required to execute this attack are high.\u00a0 \u00a0\n\nThe impact to Confidentiality, Integrity and Availability are High." } ] }, @@ -41,7 +41,7 @@ "version_data": [ { "version_affected": "<=", - "version_name": "10.8.1", + "version_name": "All", "version_value": "10.9" } ] diff --git a/2023/25xxx/CVE-2023-25840.json b/2023/25xxx/CVE-2023-25840.json index 1af65abf996..2589cbdf61a 100644 --- a/2023/25xxx/CVE-2023-25840.json +++ b/2023/25xxx/CVE-2023-25840.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "There is a Cross-site Scripting vulnerability\u00a0in ArcGIS Server in versions 10.8.1 \u2013 11.1 that may allow a remote, authenticated attacker to create a crafted link which onmouseover wont execute but could potentially render an image in the victims browser. \u00a0The privileges required to execute this attack are high." + "value": "There is a Cross-site Scripting vulnerability\u00a0in ArcGIS Server in versions 11.1 and below that may allow a remote, authenticated attacker to create a crafted link which onmouseover wont execute but could potentially render an image in the victims browser. \u00a0The privileges required to execute this attack are high." } ] }, @@ -46,8 +46,8 @@ { "lessThanOrEqual": "11.1", "status": "affected", - "version": "10.8.1", - "versionType": "ArcGIS Server" + "version": "All", + "versionType": "ArcGIS Enterprise Server" } ], "defaultStatus": "affected" diff --git a/2023/25xxx/CVE-2023-25841.json b/2023/25xxx/CVE-2023-25841.json index 4f53cf65cef..13e388e3e54 100644 --- a/2023/25xxx/CVE-2023-25841.json +++ b/2023/25xxx/CVE-2023-25841.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "There is a stored Cross-site Scripting vulnerability in Esri ArcGIS Server versions 10.8.1 \u2013 11.0 on Windows and Linux platforms that may allow a remote, unauthenticated attacker to create crafted content which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser.\n\nMitigation: Disable anonymous access to ArcGIS Feature services with edit capabilities." + "value": "There is a stored Cross-site Scripting vulnerability in Esri ArcGIS Server versions 11.0 and below on Windows and Linux platforms that may allow a remote, unauthenticated attacker to create crafted content which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser.\n\nMitigation: Disable anonymous access to ArcGIS Feature services with edit capabilities." } ] }, @@ -46,8 +46,8 @@ { "lessThanOrEqual": "11.1", "status": "affected", - "version": "10.8.1", - "versionType": "ArcGIS Server" + "version": "All", + "versionType": "ArcGIS Enterprise Server" } ], "defaultStatus": "affected" diff --git a/2024/25xxx/CVE-2024-25708.json b/2024/25xxx/CVE-2024-25708.json index e26ff9ae5af..692a2b7e068 100644 --- a/2024/25xxx/CVE-2024-25708.json +++ b/2024/25xxx/CVE-2024-25708.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions 10.8.1 \u2013 10.9.1 that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high.\u00a0" + "value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions 10.9.1 and below that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high." } ] }, @@ -39,14 +39,10 @@ "product_name": "ArcGIS Enterprise Web App Builder", "version": { "version_data": [ - { - "version_affected": "=", - "version_value": "10.8.1" - }, { "version_affected": "<=", - "version_name": "10.9.1", - "version_value": "<=10.9.1" + "version_name": "All", + "version_value": "10.9.1" } ] } diff --git a/2024/25xxx/CVE-2024-25709.json b/2024/25xxx/CVE-2024-25709.json index c7a6a72f4d0..8e9a5faf901 100644 --- a/2024/25xxx/CVE-2024-25709.json +++ b/2024/25xxx/CVE-2024-25709.json @@ -5,13 +5,93 @@ "CVE_data_meta": { "ID": "CVE-2024-25709", "ASSIGNER": "psirt@esri.com", - "STATE": "REJECT" + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** REJECT ** There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 10.8.1 \u2013 1121 that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high." + "value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 11.2 and below that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Esri", + "product": { + "product_data": [ + { + "product_name": "Portal for ArcGIS", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "All", + "version_value": "11.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/", + "refsource": "MISC", + "name": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "defect": [ + "BUG-000165286" + ], + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Miguel Fal\u00e9" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/38xxx/CVE-2024-38040.json b/2024/38xxx/CVE-2024-38040.json index 5db434f2ab0..fd19dd43d27 100644 --- a/2024/38xxx/CVE-2024-38040.json +++ b/2024/38xxx/CVE-2024-38040.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "There is a local file inclusion vulnerability in Esri Portal for ArcGIS 11.2. 11.1, 11.0 and 10.9.1 that may allow a remote, unauthenticated attacker to craft a URL that could potentially disclose sensitive configuration information by reading internal files." + "value": "There is a local file inclusion vulnerability in Esri Portal for ArcGIS 11.2 and below that may allow a remote, unauthenticated attacker to craft a URL that could potentially disclose sensitive configuration information by reading internal files." } ] }, @@ -36,23 +36,12 @@ "product": { "product_data": [ { - "product_name": "Portal", + "product_name": "Portal for ArcGIS", "version": { "version_data": [ { - "version_affected": "=", - "version_value": "10.8.1" - }, - { - "version_affected": "=", - "version_value": "10.9.1" - }, - { - "version_affected": "=", - "version_value": "11.1" - }, - { - "version_affected": "=", + "version_affected": "<=", + "version_name": "All", "version_value": "11.2" } ] diff --git a/2025/23xxx/CVE-2025-23008.json b/2025/23xxx/CVE-2025-23008.json index a39cd1ffb4f..f6e0bef7dfb 100644 --- a/2025/23xxx/CVE-2025-23008.json +++ b/2025/23xxx/CVE-2025-23008.json @@ -1,18 +1,71 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-23008", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "PSIRT@sonicwall.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper privilege management vulnerability in the SonicWall NetExtender Windows (32 and 64 bit) client allows a low privileged attacker to modify configurations." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-250 Execution with Unnecessary Privileges", + "cweId": "CWE-250" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SonicWall", + "product": { + "product_data": [ + { + "product_name": "NetExtender", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "10.3.1 and earlier versions" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0006", + "refsource": "MISC", + "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0006" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "advisory": "SNWLID-2025-0006", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23009.json b/2025/23xxx/CVE-2025-23009.json index ff12bdde560..cd82c9e8b36 100644 --- a/2025/23xxx/CVE-2025-23009.json +++ b/2025/23xxx/CVE-2025-23009.json @@ -1,18 +1,71 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-23009", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "PSIRT@sonicwall.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A local privilege escalation vulnerability in SonicWall NetExtender Windows (32 and 64 bit) client which allows an attacker to trigger an arbitrary file deletion." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-250 Execution with Unnecessary Privileges", + "cweId": "CWE-250" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SonicWall", + "product": { + "product_data": [ + { + "product_name": "NetExtender", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "10.3.1 and earlier versions" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0006", + "refsource": "MISC", + "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0006" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "advisory": "SNWLID-2025-0006", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23010.json b/2025/23xxx/CVE-2025-23010.json index 6587074fa65..e1635d0b3ba 100644 --- a/2025/23xxx/CVE-2025-23010.json +++ b/2025/23xxx/CVE-2025-23010.json @@ -1,18 +1,71 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-23010", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "PSIRT@sonicwall.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Improper Link Resolution Before File Access ('Link Following') vulnerability in SonicWall NetExtender Windows (32 and 64 bit) client which allows an attacker to manipulate file paths." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-59 Improper Link Resolution Before File Access ('Link Following')", + "cweId": "CWE-59" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SonicWall", + "product": { + "product_data": [ + { + "product_name": "NetExtender", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "10.3.1 and earlier versions" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0006", + "refsource": "MISC", + "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0006" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "advisory": "SNWLID-2025-0006", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32696.json b/2025/32xxx/CVE-2025-32696.json index a1dd0cacb44..bee48409dad 100644 --- a/2025/32xxx/CVE-2025-32696.json +++ b/2025/32xxx/CVE-2025-32696.json @@ -1,18 +1,84 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-32696", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Preservation of Permissions vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program files includes/actions/RevertAction.Php, includes/api/ApiFileRevert.Php.\n\nThis issue affects MediaWiki: before 1.39.12, 1.42.6, 1.43.1." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-281 Improper Preservation of Permissions", + "cweId": "CWE-281" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Wikimedia Foundation", + "product": { + "product_data": [ + { + "product_name": "MediaWiki", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "1.39.12, 1.42.6, 1.43.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://phabricator.wikimedia.org/T304474", + "refsource": "MISC", + "name": "https://phabricator.wikimedia.org/T304474" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "defect": [ + "https://phabricator.wikimedia.org/T304474" + ], + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Porplemontage" + }, + { + "lang": "en", + "value": "Bartosz Dziewo\u0144ski" + } + ] } \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32697.json b/2025/32xxx/CVE-2025-32697.json index 9c164384cb9..c56f192bab8 100644 --- a/2025/32xxx/CVE-2025-32697.json +++ b/2025/32xxx/CVE-2025-32697.json @@ -1,18 +1,84 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-32697", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Preservation of Permissions vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program files includes/editpage/IntroMessageBuilder.Php, includes/Permissions/PermissionManager.Php, includes/Permissions/RestrictionStore.Php.\n\nThis issue affects MediaWiki: before 1.42.6, 1.43.1." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-281 Improper Preservation of Permissions", + "cweId": "CWE-281" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Wikimedia Foundation", + "product": { + "product_data": [ + { + "product_name": "MediaWiki", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "1.42.6, 1.43.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://phabricator.wikimedia.org/T140010", + "refsource": "MISC", + "name": "https://phabricator.wikimedia.org/T140010" + }, + { + "url": "https://phabricator.wikimedia.org/T62109", + "refsource": "MISC", + "name": "https://phabricator.wikimedia.org/T62109" + }, + { + "url": "https://phabricator.wikimedia.org/T24521", + "refsource": "MISC", + "name": "https://phabricator.wikimedia.org/T24521" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "defect": [ + "https://phabricator.wikimedia.org/T140010" + ], + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32698.json b/2025/32xxx/CVE-2025-32698.json index 8f04105e1f7..ff3b5cb82be 100644 --- a/2025/32xxx/CVE-2025-32698.json +++ b/2025/32xxx/CVE-2025-32698.json @@ -1,18 +1,84 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-32698", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program files includes/logging/LogPager.Php.\n\nThis issue affects MediaWiki: before 1.39.12, 1.42.6, 1.43.1." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", + "cweId": "CWE-200" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Wikimedia Foundation", + "product": { + "product_data": [ + { + "product_name": "MediaWiki", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "1.39.12, 1.42.6, 1.43.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://phabricator.wikimedia.org/T385958", + "refsource": "MISC", + "name": "https://phabricator.wikimedia.org/T385958" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "defect": [ + "https://phabricator.wikimedia.org/T385958" + ], + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "A_smart_kitten" + }, + { + "lang": "en", + "value": "Bartosz Dziewo\u0144ski" + } + ] } \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32699.json b/2025/32xxx/CVE-2025-32699.json index 42a26b46ee4..c1e0ebc780e 100644 --- a/2025/32xxx/CVE-2025-32699.json +++ b/2025/32xxx/CVE-2025-32699.json @@ -1,18 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-32699", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vulnerability in Wikimedia Foundation MediaWiki, Wikimedia Foundation Parsoid.This issue affects MediaWiki: before 1.39.12, 1.42.6, 1.43.1; Parsoid: before 0.16.5, 0.19.2, 0.20.2." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')", + "cweId": "CWE-74" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Wikimedia Foundation", + "product": { + "product_data": [ + { + "product_name": "MediaWiki", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "1.39.12, 1.42.6, 1.43.1" + } + ] + } + }, + { + "product_name": "Parsoid", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "0.16.5, 0.19.2, 0.20.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://phabricator.wikimedia.org/T387130", + "refsource": "MISC", + "name": "https://phabricator.wikimedia.org/T387130" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "defect": [ + "https://phabricator.wikimedia.org/T387130" + ], + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32700.json b/2025/32xxx/CVE-2025-32700.json index 95efac8beaa..9c769f197f7 100644 --- a/2025/32xxx/CVE-2025-32700.json +++ b/2025/32xxx/CVE-2025-32700.json @@ -1,18 +1,84 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-32700", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation AbuseFilter. This vulnerability is associated with program files includes/Api/QueryAbuseLog.Php, includes/Pager/AbuseLogPager.Php, includes/Special/SpecialAbuseLog.Php, includes/View/AbuseFilterViewExamine.Php.\n\nThis issue affects AbuseFilter: from >= 1.43.0 before 1.43.1." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", + "cweId": "CWE-200" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Wikimedia Foundation", + "product": { + "product_data": [ + { + "product_name": "MediaWiki", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": ">= 1.43.0", + "version_value": "1.43.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://phabricator.wikimedia.org/T389235", + "refsource": "MISC", + "name": "https://phabricator.wikimedia.org/T389235" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "defect": [ + "https://phabricator.wikimedia.org/T389235" + ], + "discovery": "INTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Dreamy_Jazz" + }, + { + "lang": "en", + "value": "Dreamy_Jazz" + } + ] } \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3469.json b/2025/3xxx/CVE-2025-3469.json index 79d6e67d501..8d0f0bf8778 100644 --- a/2025/3xxx/CVE-2025-3469.json +++ b/2025/3xxx/CVE-2025-3469.json @@ -1,18 +1,88 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-3469", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program files includes/htmlform/fields/HTMLMultiSelectField.Php.\n\nThis issue affects MediaWiki: before 1.39.12, 1.42.6, 1.43.1." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Wikimedia Foundation", + "product": { + "product_data": [ + { + "product_name": "MediaWiki", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "1.39.12, 1.42.6, 1.43.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://phabricator.wikimedia.org/T358689", + "refsource": "MISC", + "name": "https://phabricator.wikimedia.org/T358689" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "defect": [ + "https://phabricator.wikimedia.org/T358689" + ], + "discovery": "INTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Daimona" + }, + { + "lang": "en", + "value": "Daimona" + }, + { + "lang": "en", + "value": "Daimona" + } + ] } \ No newline at end of file