From 650057f1c5ff76a61d460d2eab8b73c5774da1ea Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 13 Jan 2025 22:00:54 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/42xxx/CVE-2023-42233.json | 56 +++++++++++++++++++--- 2023/42xxx/CVE-2023-42234.json | 56 +++++++++++++++++++--- 2023/42xxx/CVE-2023-42235.json | 56 +++++++++++++++++++--- 2023/42xxx/CVE-2023-42236.json | 56 +++++++++++++++++++--- 2023/42xxx/CVE-2023-42237.json | 56 +++++++++++++++++++--- 2023/42xxx/CVE-2023-42238.json | 56 +++++++++++++++++++--- 2023/42xxx/CVE-2023-42239.json | 56 +++++++++++++++++++--- 2023/42xxx/CVE-2023-42240.json | 56 +++++++++++++++++++--- 2023/42xxx/CVE-2023-42241.json | 56 +++++++++++++++++++--- 2023/42xxx/CVE-2023-42242.json | 56 +++++++++++++++++++--- 2023/42xxx/CVE-2023-42243.json | 56 +++++++++++++++++++--- 2023/42xxx/CVE-2023-42244.json | 56 +++++++++++++++++++--- 2023/42xxx/CVE-2023-42245.json | 56 +++++++++++++++++++--- 2023/42xxx/CVE-2023-42246.json | 56 +++++++++++++++++++--- 2023/42xxx/CVE-2023-42247.json | 56 +++++++++++++++++++--- 2023/42xxx/CVE-2023-42248.json | 56 +++++++++++++++++++--- 2023/42xxx/CVE-2023-42249.json | 56 +++++++++++++++++++--- 2023/42xxx/CVE-2023-42250.json | 56 +++++++++++++++++++--- 2024/11xxx/CVE-2024-11128.json | 76 ++++++++++++++++++++++++++++-- 2024/13xxx/CVE-2024-13375.json | 18 +++++++ 2024/13xxx/CVE-2024-13376.json | 18 +++++++ 2024/13xxx/CVE-2024-13377.json | 18 +++++++ 2024/13xxx/CVE-2024-13378.json | 18 +++++++ 2024/51xxx/CVE-2024-51491.json | 86 ++++++++++++++++++++++++++++++++-- 2024/55xxx/CVE-2024-55494.json | 2 +- 2024/56xxx/CVE-2024-56138.json | 81 ++++++++++++++++++++++++++++++-- 2024/56xxx/CVE-2024-56323.json | 58 +++++++++++++++++++++-- 2024/57xxx/CVE-2024-57811.json | 48 ++++++++++++++++++- 2025/0xxx/CVE-2025-0237.json | 14 +----- 2025/0xxx/CVE-2025-0238.json | 14 +----- 2025/0xxx/CVE-2025-0239.json | 14 +----- 2025/0xxx/CVE-2025-0240.json | 14 +----- 2025/0xxx/CVE-2025-0241.json | 14 +----- 2025/0xxx/CVE-2025-0242.json | 14 +----- 2025/0xxx/CVE-2025-0243.json | 14 +----- 2025/0xxx/CVE-2025-0432.json | 18 +++++++ 2025/0xxx/CVE-2025-0433.json | 18 +++++++ 37 files changed, 1346 insertions(+), 219 deletions(-) create mode 100644 2024/13xxx/CVE-2024-13375.json create mode 100644 2024/13xxx/CVE-2024-13376.json create mode 100644 2024/13xxx/CVE-2024-13377.json create mode 100644 2024/13xxx/CVE-2024-13378.json create mode 100644 2025/0xxx/CVE-2025-0432.json create mode 100644 2025/0xxx/CVE-2025-0433.json diff --git a/2023/42xxx/CVE-2023-42233.json b/2023/42xxx/CVE-2023-42233.json index 8adadbd110a..7e86c66b404 100644 --- a/2023/42xxx/CVE-2023-42233.json +++ b/2023/42xxx/CVE-2023-42233.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42233", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42233", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Cross Site Scripting (XSS) via the Filter/FilterEditor function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md" } ] } diff --git a/2023/42xxx/CVE-2023-42234.json b/2023/42xxx/CVE-2023-42234.json index 47469aebcae..04ba4ca8255 100644 --- a/2023/42xxx/CVE-2023-42234.json +++ b/2023/42xxx/CVE-2023-42234.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42234", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42234", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Cross Site Request Forgery (CSRF) via the WSCView function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md" } ] } diff --git a/2023/42xxx/CVE-2023-42235.json b/2023/42xxx/CVE-2023-42235.json index 23ffd15d6c3..742645a3c9c 100644 --- a/2023/42xxx/CVE-2023-42235.json +++ b/2023/42xxx/CVE-2023-42235.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42235", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42235", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple parameters of /monitor/s_normalizedtrans.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md" } ] } diff --git a/2023/42xxx/CVE-2023-42236.json b/2023/42xxx/CVE-2023-42236.json index c8f1960f160..4917a0be695 100644 --- a/2023/42xxx/CVE-2023-42236.json +++ b/2023/42xxx/CVE-2023-42236.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42236", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42236", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in a GET parameter of /common/ajaxfunction.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md" } ] } diff --git a/2023/42xxx/CVE-2023-42237.json b/2023/42xxx/CVE-2023-42237.json index 15e7f82d966..1cf86657345 100644 --- a/2023/42xxx/CVE-2023-42237.json +++ b/2023/42xxx/CVE-2023-42237.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42237", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42237", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple GET parameters of /vam/vam_i_command.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md" } ] } diff --git a/2023/42xxx/CVE-2023-42238.json b/2023/42xxx/CVE-2023-42238.json index 63ce163a012..4ac355383f9 100644 --- a/2023/42xxx/CVE-2023-42238.json +++ b/2023/42xxx/CVE-2023-42238.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42238", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42238", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_eps.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md" } ] } diff --git a/2023/42xxx/CVE-2023-42239.json b/2023/42xxx/CVE-2023-42239.json index 1ca5c4979db..31147298d21 100644 --- a/2023/42xxx/CVE-2023-42239.json +++ b/2023/42xxx/CVE-2023-42239.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42239", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42239", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_ep.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md" } ] } diff --git a/2023/42xxx/CVE-2023-42240.json b/2023/42xxx/CVE-2023-42240.json index 6c7cb34cc62..3e40366a557 100644 --- a/2023/42xxx/CVE-2023-42240.json +++ b/2023/42xxx/CVE-2023-42240.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42240", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42240", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /monitor/s_scheduledfile.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md/", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md/" } ] } diff --git a/2023/42xxx/CVE-2023-42241.json b/2023/42xxx/CVE-2023-42241.json index 03d66f3091d..90e26962d0c 100644 --- a/2023/42xxx/CVE-2023-42241.json +++ b/2023/42xxx/CVE-2023-42241.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42241", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42241", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_anagraphic.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md" } ] } diff --git a/2023/42xxx/CVE-2023-42242.json b/2023/42xxx/CVE-2023-42242.json index 1608ce03e90..ad83fabda66 100644 --- a/2023/42xxx/CVE-2023-42242.json +++ b/2023/42xxx/CVE-2023-42242.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42242", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42242", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in a GET parameter of /monitor/s_terminal.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md" } ] } diff --git a/2023/42xxx/CVE-2023-42243.json b/2023/42xxx/CVE-2023-42243.json index 6f7f0a44b28..c4e213462d7 100644 --- a/2023/42xxx/CVE-2023-42243.json +++ b/2023/42xxx/CVE-2023-42243.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42243", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42243", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Selesta Visual Access Manager < 4.42.2, an authenticated user can access the administrative page /common/vam_Sql.php, which allows for arbitrary SQL queries." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md" } ] } diff --git a/2023/42xxx/CVE-2023-42244.json b/2023/42xxx/CVE-2023-42244.json index d588f544fca..c41a75c9635 100644 --- a/2023/42xxx/CVE-2023-42244.json +++ b/2023/42xxx/CVE-2023-42244.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42244", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42244", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_visits.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md" } ] } diff --git a/2023/42xxx/CVE-2023-42245.json b/2023/42xxx/CVE-2023-42245.json index db0136ad383..da784014da1 100644 --- a/2023/42xxx/CVE-2023-42245.json +++ b/2023/42xxx/CVE-2023-42245.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42245", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42245", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Selesta Visual Access Manager < 4.42.2 is vulnerable to Cross Site Scripting (XSS) via monitor/s_scheduledfile.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md" } ] } diff --git a/2023/42xxx/CVE-2023-42246.json b/2023/42xxx/CVE-2023-42246.json index 8d48025da9c..722f53d709b 100644 --- a/2023/42xxx/CVE-2023-42246.json +++ b/2023/42xxx/CVE-2023-42246.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42246", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42246", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Selesta Visual Access Manager < 4.42.2 is vulnerable to Cross Site Scripting (XSS) via /vam/vam_ep.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md" } ] } diff --git a/2023/42xxx/CVE-2023-42247.json b/2023/42xxx/CVE-2023-42247.json index 0e2e3c985f4..56679385d29 100644 --- a/2023/42xxx/CVE-2023-42247.json +++ b/2023/42xxx/CVE-2023-42247.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42247", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42247", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Selesta Visual Access Manager < 4.42.2 is vulnerable to Cross Site Scripting (XSS) via monitor/s_monitor_map.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md" } ] } diff --git a/2023/42xxx/CVE-2023-42248.json b/2023/42xxx/CVE-2023-42248.json index 7066f96b851..7df53b3e9d0 100644 --- a/2023/42xxx/CVE-2023-42248.json +++ b/2023/42xxx/CVE-2023-42248.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42248", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42248", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can write arbitrary files by manipulating POST parameters of the page \"common/vam_Sql.php\"." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md" } ] } diff --git a/2023/42xxx/CVE-2023-42249.json b/2023/42xxx/CVE-2023-42249.json index ffe9337ee5d..aa5d9a04ae0 100644 --- a/2023/42xxx/CVE-2023-42249.json +++ b/2023/42xxx/CVE-2023-42249.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42249", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42249", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Selesta Visual Access Manager < 4.42.2 is vulnerable to Cross Site Scripting (XSS) via vam/vam_visits.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md" } ] } diff --git a/2023/42xxx/CVE-2023-42250.json b/2023/42xxx/CVE-2023-42250.json index fe3f32c0760..43c97420460 100644 --- a/2023/42xxx/CVE-2023-42250.json +++ b/2023/42xxx/CVE-2023-42250.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-42250", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-42250", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Selesta Visual Access Manager < 4.42.2 is vulnerable to Cross Site Scripting (XSS) via /common/autocomplete.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md" } ] } diff --git a/2024/11xxx/CVE-2024-11128.json b/2024/11xxx/CVE-2024-11128.json index b7f1200f0fb..3cf9086776a 100644 --- a/2024/11xxx/CVE-2024-11128.json +++ b/2024/11xxx/CVE-2024-11128.json @@ -1,18 +1,84 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-11128", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-requests@bitdefender.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the BitdefenderVirusScanner binary as used in\u00a0Bitdefender Virus Scanner for MacOS may allow .dynamic library injection\u00a0(DYLD injection) without being blocked by AppleMobileFileIntegrity (AMFI). This issue is caused by the absence of Hardened Runtime or Library Validation signing. This issue affects Bitdefender Virus Scanner versions before 3.18." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-269 Improper Privilege Management", + "cweId": "CWE-269" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Bitdefender", + "product": { + "product_data": [ + { + "product_name": "Virus Scanner", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "3.18" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.bitdefender.com/support/security-advisories/insufficient-hardened-runtime-or-library-validation-signing-in-bitdefender-virus-scanner-for-macos/", + "refsource": "MISC", + "name": "https://www.bitdefender.com/support/security-advisories/insufficient-hardened-runtime-or-library-validation-signing-in-bitdefender-virus-scanner-for-macos/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "An automatic update to version 3.18 fixes the issue." + } + ], + "value": "An automatic update to version 3.18 fixes the issue." + } + ] } \ No newline at end of file diff --git a/2024/13xxx/CVE-2024-13375.json b/2024/13xxx/CVE-2024-13375.json new file mode 100644 index 00000000000..12bd2416d90 --- /dev/null +++ b/2024/13xxx/CVE-2024-13375.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13375", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/13xxx/CVE-2024-13376.json b/2024/13xxx/CVE-2024-13376.json new file mode 100644 index 00000000000..8393beccc93 --- /dev/null +++ b/2024/13xxx/CVE-2024-13376.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13376", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/13xxx/CVE-2024-13377.json b/2024/13xxx/CVE-2024-13377.json new file mode 100644 index 00000000000..b51d5dd8b22 --- /dev/null +++ b/2024/13xxx/CVE-2024-13377.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13377", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/13xxx/CVE-2024-13378.json b/2024/13xxx/CVE-2024-13378.json new file mode 100644 index 00000000000..2cc5aa58a72 --- /dev/null +++ b/2024/13xxx/CVE-2024-13378.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13378", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51491.json b/2024/51xxx/CVE-2024-51491.json index 2b66e5680d0..c6f5486a76e 100644 --- a/2024/51xxx/CVE-2024-51491.json +++ b/2024/51xxx/CVE-2024-51491.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-51491", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "notion-go is a collection of libraries for supporting sign and verify OCI artifacts. Based on Notary Project specifications. The issue was identified during Quarkslab's security audit on the Certificate Revocation List (CRL) based revocation check feature.\nAfter retrieving the CRL, notation-go attempts to update the CRL cache using the os.Rename method. However, this operation may fail due to operating system-specific limitations, particularly when the source and destination paths are on different mount points. This failure could lead to an unexpected program termination. In method `crl.(*FileCache).Set`, a temporary file is created in the OS dedicated area (like /tmp for, usually, Linux/Unix). The file is written and then it is tried to move it to the dedicated `notation` cache directory thanks `os.Rename`. As specified in Go documentation, OS specific restriction may apply. When used with Linux OS, it is relying on rename syscall from the libc and as per the documentation, moving a file to a different mountpoint raises an EXDEV error, interpreted as Cross device link not permitted error. Some Linux distribution, like RedHat use a dedicated filesystem (tmpfs), mounted on a specific mountpoint (usually /tmp) for temporary files. When using such OS, revocation check based on CRL will repeatedly crash notation. As a result the signature verification process is aborted as process crashes. This issue has been addressed in version 1.3.0-rc.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-703: Improper Check or Handling of Exceptional Conditions", + "cweId": "CWE-703" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "notaryproject", + "product": { + "product_data": [ + { + "product_name": "notation-go", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "= 1.3.0-rc.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/notaryproject/notation-go/security/advisories/GHSA-qjh3-4j3h-vmwp", + "refsource": "MISC", + "name": "https://github.com/notaryproject/notation-go/security/advisories/GHSA-qjh3-4j3h-vmwp" + }, + { + "url": "https://github.com/notaryproject/notation-go/commit/3c3302258ad510fbca2f8a73731569d91f07d196", + "refsource": "MISC", + "name": "https://github.com/notaryproject/notation-go/commit/3c3302258ad510fbca2f8a73731569d91f07d196" + }, + { + "url": "https://man7.org/linux/man-pages/man2/rename.2.html", + "refsource": "MISC", + "name": "https://man7.org/linux/man-pages/man2/rename.2.html" + } + ] + }, + "source": { + "advisory": "GHSA-qjh3-4j3h-vmwp", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "version": "3.1" } ] } diff --git a/2024/55xxx/CVE-2024-55494.json b/2024/55xxx/CVE-2024-55494.json index 0af9b7789be..ac3b579df19 100644 --- a/2024/55xxx/CVE-2024-55494.json +++ b/2024/55xxx/CVE-2024-55494.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "A cross-site scripting (XSS) vulnerability in Opencode Mobile Collect Call v5.4.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the op_func parameter at /occontrolpanel/index.php." + "value": "A PHP Code Injection vulnerability that can lead to Remote Code Execution (RCE) and XSS in Opencode Mobile Collect Call v5.4.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the op_func parameter at /occontrolpanel/index.php." } ] }, diff --git a/2024/56xxx/CVE-2024-56138.json b/2024/56xxx/CVE-2024-56138.json index c8bc19b9b13..52c6a5eb2b8 100644 --- a/2024/56xxx/CVE-2024-56138.json +++ b/2024/56xxx/CVE-2024-56138.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-56138", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "notion-go is a collection of libraries for supporting sign and verify OCI artifacts. Based on Notary Project specifications. This issue was identified during Quarkslab's audit of the timestamp feature. During the timestamp signature generation, the revocation status of the certificate(s) used to generate the timestamp signature was not verified. During timestamp signature generation, notation-go did not check the revocation status of the certificate chain used by the TSA. This oversight creates a vulnerability that could be exploited through a Man-in-The-Middle attack. An attacker could potentially use a compromised, intermediate, or revoked leaf certificate to generate a malicious countersignature, which would then be accepted and stored by `notation`. This could lead to denial of service scenarios, particularly in CI/CD environments during signature verification processes because timestamp signature would fail due to the presence of a revoked certificate(s) potentially disrupting operations. This issue has been addressed in release version 1.3.0-rc.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-299: Improper Check for Certificate Revocation", + "cweId": "CWE-299" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "notaryproject", + "product": { + "product_data": [ + { + "product_name": "notation-go", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 1.3.0-rc.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/notaryproject/notation-go/security/advisories/GHSA-45v3-38pc-874v", + "refsource": "MISC", + "name": "https://github.com/notaryproject/notation-go/security/advisories/GHSA-45v3-38pc-874v" + }, + { + "url": "https://github.com/notaryproject/notation-go/commit/e7005a6d13e5ba472d4e166fbb085152f909e102", + "refsource": "MISC", + "name": "https://github.com/notaryproject/notation-go/commit/e7005a6d13e5ba472d4e166fbb085152f909e102" + } + ] + }, + "source": { + "advisory": "GHSA-45v3-38pc-874v", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" } ] } diff --git a/2024/56xxx/CVE-2024-56323.json b/2024/56xxx/CVE-2024-56323.json index 48cc3361352..fc891a6cd5c 100644 --- a/2024/56xxx/CVE-2024-56323.json +++ b/2024/56xxx/CVE-2024-56323.json @@ -1,18 +1,68 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-56323", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OpenFGA is an authorization/permission engine. IN OpenFGA v1.3.8 to v1.8.2 (Helm chart openfga-0.1.38 to openfga-0.2.19, docker v1.3.8 to v.1.8.2) are vulnerable to authorization bypass under the following conditions: 1. calling Check API or ListObjects with a model that uses [conditions](https://openfga.dev/docs/modeling/conditions), and 2. calling Check API or ListObjects API with [contextual tuples](https://openfga.dev/docs/concepts#what-are-contextual-tuples) that include conditions and 3. OpenFGA is configured with caching enabled (`OPENFGA_CHECK_QUERY_CACHE_ENABLED`). Users are advised to upgrade to v1.8.3. There are no known workarounds for this vulnerability." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285: Improper Authorization", + "cweId": "CWE-285" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "openfga", + "product": { + "product_data": [ + { + "product_name": "openfga", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": ">=1.3.8, <1.8.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/openfga/openfga/security/advisories/GHSA-32q6-rr98-cjqv", + "refsource": "MISC", + "name": "https://github.com/openfga/openfga/security/advisories/GHSA-32q6-rr98-cjqv" + } + ] + }, + "source": { + "advisory": "GHSA-32q6-rr98-cjqv", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2024/57xxx/CVE-2024-57811.json b/2024/57xxx/CVE-2024-57811.json index bbc60813f3a..57b4205bfc5 100644 --- a/2024/57xxx/CVE-2024-57811.json +++ b/2024/57xxx/CVE-2024-57811.json @@ -5,13 +5,57 @@ "CVE_data_meta": { "ID": "CVE-2024-57811", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/google/security-research/security/advisories/GHSA-xf7j-4x67-6h93", + "url": "https://github.com/google/security-research/security/advisories/GHSA-xf7j-4x67-6h93" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** UNSUPPORTED WHEN ASSIGNED ** In Eaton X303 3.5.16 - X303 3.5.17 Build 712, an attacker with network access to a XC-303 PLC can login as root over SSH. The root password is hardcoded in the firmware. NOTE: This vulnerability appears in versions that are no longer supported by Eaton." } ] } diff --git a/2025/0xxx/CVE-2025-0237.json b/2025/0xxx/CVE-2025-0237.json index 8dde74f2d59..6713656a9e0 100644 --- a/2025/0xxx/CVE-2025-0237.json +++ b/2025/0xxx/CVE-2025-0237.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6." + "value": "The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6." } ] }, @@ -69,18 +69,6 @@ } ] } - }, - { - "product_name": "Thunderbird ESR", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "unspecified", - "version_value": "128.6" - } - ] - } } ] } diff --git a/2025/0xxx/CVE-2025-0238.json b/2025/0xxx/CVE-2025-0238.json index 66f9eecc457..3f58ece9827 100644 --- a/2025/0xxx/CVE-2025-0238.json +++ b/2025/0xxx/CVE-2025-0238.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird ESR < 128.6." + "value": "Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird < 128.6." } ] }, @@ -69,18 +69,6 @@ } ] } - }, - { - "product_name": "Thunderbird ESR", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "unspecified", - "version_value": "128.6" - } - ] - } } ] } diff --git a/2025/0xxx/CVE-2025-0239.json b/2025/0xxx/CVE-2025-0239.json index 8d78da3cac9..793396f370f 100644 --- a/2025/0xxx/CVE-2025-0239.json +++ b/2025/0xxx/CVE-2025-0239.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6." + "value": "When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6." } ] }, @@ -69,18 +69,6 @@ } ] } - }, - { - "product_name": "Thunderbird ESR", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "unspecified", - "version_value": "128.6" - } - ] - } } ] } diff --git a/2025/0xxx/CVE-2025-0240.json b/2025/0xxx/CVE-2025-0240.json index 8cc76e9f457..e81664c18cc 100644 --- a/2025/0xxx/CVE-2025-0240.json +++ b/2025/0xxx/CVE-2025-0240.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Parsing a JavaScript module as JSON could, under some circumstances, cause cross-compartment access, which may result in a use-after-free. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6." + "value": "Parsing a JavaScript module as JSON could under some circumstances cause cross-compartment access, which may result in a use-after-free. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6." } ] }, @@ -69,18 +69,6 @@ } ] } - }, - { - "product_name": "Thunderbird ESR", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "unspecified", - "version_value": "128.6" - } - ] - } } ] } diff --git a/2025/0xxx/CVE-2025-0241.json b/2025/0xxx/CVE-2025-0241.json index 6a4e9d8dcfc..89bd49ad599 100644 --- a/2025/0xxx/CVE-2025-0241.json +++ b/2025/0xxx/CVE-2025-0241.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6." + "value": "When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6." } ] }, @@ -69,18 +69,6 @@ } ] } - }, - { - "product_name": "Thunderbird ESR", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "unspecified", - "version_value": "128.6" - } - ] - } } ] } diff --git a/2025/0xxx/CVE-2025-0242.json b/2025/0xxx/CVE-2025-0242.json index b77142a7f0d..458f2a00b06 100644 --- a/2025/0xxx/CVE-2025-0242.json +++ b/2025/0xxx/CVE-2025-0242.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird ESR < 128.6." + "value": "Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird < 128.6." } ] }, @@ -69,18 +69,6 @@ } ] } - }, - { - "product_name": "Thunderbird ESR", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "unspecified", - "version_value": "128.6" - } - ] - } } ] } diff --git a/2025/0xxx/CVE-2025-0243.json b/2025/0xxx/CVE-2025-0243.json index e37b8151261..ffaa7d0042d 100644 --- a/2025/0xxx/CVE-2025-0243.json +++ b/2025/0xxx/CVE-2025-0243.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6." + "value": "Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6." } ] }, @@ -69,18 +69,6 @@ } ] } - }, - { - "product_name": "Thunderbird ESR", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "unspecified", - "version_value": "128.6" - } - ] - } } ] } diff --git a/2025/0xxx/CVE-2025-0432.json b/2025/0xxx/CVE-2025-0432.json new file mode 100644 index 00000000000..42ffa8b8104 --- /dev/null +++ b/2025/0xxx/CVE-2025-0432.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0432", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0433.json b/2025/0xxx/CVE-2025-0433.json new file mode 100644 index 00000000000..78147633fe6 --- /dev/null +++ b/2025/0xxx/CVE-2025-0433.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0433", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file