From 5c3e33d80a7cd0476ea0a9fa8057d739d0f098af Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 8 Mar 2025 23:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/52xxx/CVE-2023-52968.json | 76 ++++++++++++++++++++++++++++++++++ 2023/52xxx/CVE-2023-52969.json | 76 ++++++++++++++++++++++++++++++++++ 2023/52xxx/CVE-2023-52970.json | 76 ++++++++++++++++++++++++++++++++++ 2023/52xxx/CVE-2023-52971.json | 76 ++++++++++++++++++++++++++++++++++ 2025/2xxx/CVE-2025-2128.json | 18 ++++++++ 5 files changed, 322 insertions(+) create mode 100644 2023/52xxx/CVE-2023-52968.json create mode 100644 2023/52xxx/CVE-2023-52969.json create mode 100644 2023/52xxx/CVE-2023-52970.json create mode 100644 2023/52xxx/CVE-2023-52971.json create mode 100644 2025/2xxx/CVE-2025-2128.json diff --git a/2023/52xxx/CVE-2023-52968.json b/2023/52xxx/CVE-2023-52968.json new file mode 100644 index 00000000000..889127ce039 --- /dev/null +++ b/2023/52xxx/CVE-2023-52968.json @@ -0,0 +1,76 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-52968", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "MariaDB Server 10.4 before 10.4.33, 10.5 before 10.5.24, 10.6 before 10.6.17, 10.7 through 10.11 before 10.11.7, 11.0 before 11.0.5, and 11.1 before 11.1.4 calls fix_fields_if_needed under mysql_derived_prepare when derived is not yet prepared, leading to a find_field_in_table crash." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://jira.mariadb.org/browse/MDEV-32082", + "refsource": "MISC", + "name": "https://jira.mariadb.org/browse/MDEV-32082" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:H/S:U/UI:N", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2023/52xxx/CVE-2023-52969.json b/2023/52xxx/CVE-2023-52969.json new file mode 100644 index 00000000000..4b6a255d508 --- /dev/null +++ b/2023/52xxx/CVE-2023-52969.json @@ -0,0 +1,76 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-52969", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "MariaDB Server 10.4 through 10.5.*, 10.6 through 10.6.*, 10.7 through 10.11.*, and 11.0 through 11.0.* can sometimes crash with an empty backtrace log. This may be related to make_aggr_tables_info and optimize_stage2." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://jira.mariadb.org/browse/MDEV-32083", + "refsource": "MISC", + "name": "https://jira.mariadb.org/browse/MDEV-32083" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:H/S:U/UI:N", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2023/52xxx/CVE-2023-52970.json b/2023/52xxx/CVE-2023-52970.json new file mode 100644 index 00000000000..a562dbc7a59 --- /dev/null +++ b/2023/52xxx/CVE-2023-52970.json @@ -0,0 +1,76 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-52970", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "MariaDB Server 10.4 through 10.5.*, 10.6 through 10.6.*, 10.7 through 10.11.*, 11.0 through 11.0.*, and 11.1 through 11.4.* crashes in Item_direct_view_ref::derived_field_transformer_for_where." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://jira.mariadb.org/browse/MDEV-32086", + "refsource": "MISC", + "name": "https://jira.mariadb.org/browse/MDEV-32086" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:H/S:U/UI:N", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2023/52xxx/CVE-2023-52971.json b/2023/52xxx/CVE-2023-52971.json new file mode 100644 index 00000000000..f2ebf44c695 --- /dev/null +++ b/2023/52xxx/CVE-2023-52971.json @@ -0,0 +1,76 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-52971", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "MariaDB Server 10.10 through 10.11.* and 11.0 through 11.4.* crashes in JOIN::fix_all_splittings_in_plan." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://jira.mariadb.org/browse/MDEV-32084", + "refsource": "MISC", + "name": "https://jira.mariadb.org/browse/MDEV-32084" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:H/S:U/UI:N", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2128.json b/2025/2xxx/CVE-2025-2128.json new file mode 100644 index 00000000000..d07875d3a88 --- /dev/null +++ b/2025/2xxx/CVE-2025-2128.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-2128", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file