diff --git a/2024/56xxx/CVE-2024-56113.json b/2024/56xxx/CVE-2024-56113.json index 822ea5f2a5b..8b7aa47491a 100644 --- a/2024/56xxx/CVE-2024-56113.json +++ b/2024/56xxx/CVE-2024-56113.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://smarttoilet.pratt.duke.edu", - "refsource": "MISC", - "name": "https://smarttoilet.pratt.duke.edu" - }, { "refsource": "MISC", "name": "https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2024-56113", diff --git a/2024/56xxx/CVE-2024-56310.json b/2024/56xxx/CVE-2024-56310.json index ba56056c535..314d50aaf2a 100644 --- a/2024/56xxx/CVE-2024-56310.json +++ b/2024/56xxx/CVE-2024-56310.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "REDCap through 15.0.0 has a security flaw in the Project Dashboards name, exposing users to a Cross-Site Request Forgery (CSRF) attack. An attacker can exploit this by luring users into clicking on a Project Dashboards name that contains the malicious payload, which triggers a logout request and terminates their session. This vulnerability stems from the absence of CSRF protections on the logout functionality, allowing malicious actions to be executed without user consent." + "value": "REDCap through 14.9.6 has a security flaw in the Project Dashboards name, exposing users to a Cross-Site Request Forgery (CSRF) attack. An attacker can exploit this by luring users into clicking on a Project Dashboards name that contains the malicious payload, which triggers a logout request and terminates their session. This vulnerability stems from the absence of CSRF protections on the logout functionality, allowing malicious actions to be executed without user consent." } ] }, diff --git a/2024/56xxx/CVE-2024-56311.json b/2024/56xxx/CVE-2024-56311.json index 5c0fbbd5afe..4e3d4f5576e 100644 --- a/2024/56xxx/CVE-2024-56311.json +++ b/2024/56xxx/CVE-2024-56311.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "REDCap through 15.0.0 has a security flaw in the Notes section of calendar events, exposing users to a Cross-Site Request Forgery (CSRF) attack. An attacker can exploit this by luring users into accessing a calendar event's notes, which triggers a logout request and terminates their session. This vulnerability stems from the absence of CSRF protections on the logout functionality, allowing malicious actions to be executed without user consent." + "value": "REDCap through 14.9.6 has a security flaw in the Notes section of calendar events, exposing users to a Cross-Site Request Forgery (CSRF) attack. An attacker can exploit this by luring users into accessing a calendar event's notes, which triggers a logout request and terminates their session. This vulnerability stems from the absence of CSRF protections on the logout functionality, allowing malicious actions to be executed without user consent." } ] }, diff --git a/2024/56xxx/CVE-2024-56312.json b/2024/56xxx/CVE-2024-56312.json index be8f7629693..8dbfd2f0636 100644 --- a/2024/56xxx/CVE-2024-56312.json +++ b/2024/56xxx/CVE-2024-56312.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "A stored cross-site scripting (XSS) vulnerability in the Project Dashboard name of REDCap through 15.0.0 allows authenticated users to inject malicious scripts into the name field of a Project Dashboard. When a user clicks on the project Dashboard name, the crafted payload is executed, potentially enabling the execution of arbitrary web scripts." + "value": "A stored cross-site scripting (XSS) vulnerability in the Project Dashboard name of REDCap through 14.9.6 allows authenticated users to inject malicious scripts into the name field of a Project Dashboard. When a user clicks on the project Dashboard name, the crafted payload is executed, potentially enabling the execution of arbitrary web scripts." } ] }, diff --git a/2024/56xxx/CVE-2024-56313.json b/2024/56xxx/CVE-2024-56313.json index 6f1287950ff..dbd2bf7dfd0 100644 --- a/2024/56xxx/CVE-2024-56313.json +++ b/2024/56xxx/CVE-2024-56313.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "A stored cross-site scripting (XSS) vulnerability in the Calendar feature of REDCap through 15.0.0 allows authenticated users to inject malicious scripts into the Notes field of a calendar event. When the event is viewed, the crafted payload is executed, potentially enabling the execution of arbitrary web scripts." + "value": "A stored cross-site scripting (XSS) vulnerability in the Calendar feature of REDCap through 14.9.6 allows authenticated users to inject malicious scripts into the Notes field of a calendar event. When the event is viewed, the crafted payload is executed, potentially enabling the execution of arbitrary web scripts." } ] }, diff --git a/2024/56xxx/CVE-2024-56314.json b/2024/56xxx/CVE-2024-56314.json index 72158ee5114..1ee1e3206a7 100644 --- a/2024/56xxx/CVE-2024-56314.json +++ b/2024/56xxx/CVE-2024-56314.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "A stored cross-site scripting (XSS) vulnerability in the Project name of REDCap through 15.0.0 allows authenticated users to inject malicious scripts into the name field of a Project. When a user clicks on the project name to access it, the crafted payload is executed, potentially enabling the execution of arbitrary web scripts." + "value": "A stored cross-site scripting (XSS) vulnerability in the Project name of REDCap through 14.9.6 allows authenticated users to inject malicious scripts into the name field of a Project. When a user clicks on the project name to access it, the crafted payload is executed, potentially enabling the execution of arbitrary web scripts." } ] }, diff --git a/2025/0xxx/CVE-2025-0375.json b/2025/0xxx/CVE-2025-0375.json new file mode 100644 index 00000000000..2c62e2c19e2 --- /dev/null +++ b/2025/0xxx/CVE-2025-0375.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0375", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0376.json b/2025/0xxx/CVE-2025-0376.json new file mode 100644 index 00000000000..bcb80707fcb --- /dev/null +++ b/2025/0xxx/CVE-2025-0376.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0376", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file