"-Synchronized-Data."

This commit is contained in:
CVE Team 2025-04-04 01:00:36 +00:00
parent d7c06c79c0
commit 7ffa575524
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
15 changed files with 400 additions and 1129 deletions

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "A heap buffer overflow vulnerability has been identified in thesmooth2() in cmsgamma.c in lcms2-2.16 which allows a remote attacker to cause a denial of service."
"value": "** DISPUTED ** A heap buffer overflow vulnerability has been identified in thesmooth2() in cmsgamma.c in lcms2-2.16 which allows a remote attacker to cause a denial of service. NOTE: the Supplier disputes this because \"this is not exploitable as this function is never called on normal color management, is there only as a helper for low-level programming and investigation.\""
}
]
},
@ -56,6 +56,11 @@
"url": "https://github.com/mm2/Little-CMS/issues/475",
"refsource": "MISC",
"name": "https://github.com/mm2/Little-CMS/issues/475"
},
{
"refsource": "MISC",
"name": "https://github.com/mm2/Little-CMS/issues/475#issuecomment-2696785063",
"url": "https://github.com/mm2/Little-CMS/issues/475#issuecomment-2696785063"
}
]
}

View File

@ -1,17 +1,74 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-29796",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@microsoft.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "User interface (ui) misrepresentation of critical information in Microsoft Edge for iOS allows an unauthorized attacker to perform spoofing over a network."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-451: User Interface (UI) Misrepresentation of Critical Information",
"cweId": "CWE-451"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Microsoft",
"product": {
"product_data": [
{
"product_name": "Microsoft Edge for iOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1.0.0.0",
"version_value": "135.0.3179.54"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29796",
"refsource": "MISC",
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29796"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseSeverity": "MEDIUM",
"baseScore": 4.7,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:P/RL:O/RC:C"
}
]
}

View File

@ -1,17 +1,74 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-29815",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@microsoft.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Use after free in Microsoft Edge (Chromium-based) allows an authorized attacker to execute code over a network."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-416: Use After Free",
"cweId": "CWE-416"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Microsoft",
"product": {
"product_data": [
{
"product_name": "Microsoft Edge (Chromium-based)",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1.0.0.0",
"version_value": "134.0.3124.66"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29815",
"refsource": "MISC",
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29815"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseSeverity": "HIGH",
"baseScore": 7.6,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C"
}
]
}

View File

@ -5,150 +5,13 @@
"CVE_data_meta": {
"ID": "CVE-2025-2964",
"ASSIGNER": "security@concretecms.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability, which was classified as problematic, was found in ConcreteCMS up to 9.3.9. Affected is the function Save of the component FAQ Block Handler. The manipulation of the argument Navigation/Title Text/Description Source leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "Es wurde eine Schwachstelle in ConcreteCMS bis 9.3.9 gefunden. Sie wurde als problematisch eingestuft. Hiervon betroffen ist die Funktion Save der Komponente FAQ Block Handler. Dank der Manipulation des Arguments Navigation/Title Text/Description Source mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross Site Scripting",
"cweId": "CWE-79"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Code Injection",
"cweId": "CWE-94"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "ConcreteCMS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "9.3.0"
},
{
"version_affected": "=",
"version_value": "9.3.1"
},
{
"version_affected": "=",
"version_value": "9.3.2"
},
{
"version_affected": "=",
"version_value": "9.3.3"
},
{
"version_affected": "=",
"version_value": "9.3.4"
},
{
"version_affected": "=",
"version_value": "9.3.5"
},
{
"version_affected": "=",
"version_value": "9.3.6"
},
{
"version_affected": "=",
"version_value": "9.3.7"
},
{
"version_affected": "=",
"version_value": "9.3.8"
},
{
"version_affected": "=",
"version_value": "9.3.9"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.302016",
"refsource": "MISC",
"name": "https://vuldb.com/?id.302016"
},
{
"url": "https://vuldb.com/?ctiid.302016",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.302016"
},
{
"url": "https://vuldb.com/?submit.522414",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.522414"
},
{
"url": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc2.md",
"refsource": "MISC",
"name": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc2.md"
}
]
},
"credits": [
{
"lang": "en",
"value": "yaowenxiao (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.5,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N"
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
}

View File

@ -5,150 +5,13 @@
"CVE_data_meta": {
"ID": "CVE-2025-2965",
"ASSIGNER": "security@concretecms.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been found in ConcreteCMS up to 9.3.9 and classified as problematic. Affected by this vulnerability is the function Save of the component Accordion Block Handler. The manipulation of the argument Title/Body Source leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "In ConcreteCMS bis 9.3.9 wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Betroffen ist die Funktion Save der Komponente Accordion Block Handler. Dank Manipulation des Arguments Title/Body Source mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross Site Scripting",
"cweId": "CWE-79"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Code Injection",
"cweId": "CWE-94"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "ConcreteCMS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "9.3.0"
},
{
"version_affected": "=",
"version_value": "9.3.1"
},
{
"version_affected": "=",
"version_value": "9.3.2"
},
{
"version_affected": "=",
"version_value": "9.3.3"
},
{
"version_affected": "=",
"version_value": "9.3.4"
},
{
"version_affected": "=",
"version_value": "9.3.5"
},
{
"version_affected": "=",
"version_value": "9.3.6"
},
{
"version_affected": "=",
"version_value": "9.3.7"
},
{
"version_affected": "=",
"version_value": "9.3.8"
},
{
"version_affected": "=",
"version_value": "9.3.9"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.302017",
"refsource": "MISC",
"name": "https://vuldb.com/?id.302017"
},
{
"url": "https://vuldb.com/?ctiid.302017",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.302017"
},
{
"url": "https://vuldb.com/?submit.522415",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.522415"
},
{
"url": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc3.md",
"refsource": "MISC",
"name": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc3.md"
}
]
},
"credits": [
{
"lang": "en",
"value": "yaowenxiao (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.5,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N"
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
}

View File

@ -5,150 +5,13 @@
"CVE_data_meta": {
"ID": "CVE-2025-2966",
"ASSIGNER": "security@concretecms.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in ConcreteCMS up to 9.3.9 and classified as problematic. Affected by this issue is the function Save of the component Content Block Handler. The manipulation of the argument Source leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "Eine Schwachstelle wurde in ConcreteCMS bis 9.3.9 gefunden. Sie wurde als problematisch eingestuft. Betroffen davon ist die Funktion Save der Komponente Content Block Handler. Mit der Manipulation des Arguments Source mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross Site Scripting",
"cweId": "CWE-79"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Code Injection",
"cweId": "CWE-94"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "ConcreteCMS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "9.3.0"
},
{
"version_affected": "=",
"version_value": "9.3.1"
},
{
"version_affected": "=",
"version_value": "9.3.2"
},
{
"version_affected": "=",
"version_value": "9.3.3"
},
{
"version_affected": "=",
"version_value": "9.3.4"
},
{
"version_affected": "=",
"version_value": "9.3.5"
},
{
"version_affected": "=",
"version_value": "9.3.6"
},
{
"version_affected": "=",
"version_value": "9.3.7"
},
{
"version_affected": "=",
"version_value": "9.3.8"
},
{
"version_affected": "=",
"version_value": "9.3.9"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.302018",
"refsource": "MISC",
"name": "https://vuldb.com/?id.302018"
},
{
"url": "https://vuldb.com/?ctiid.302018",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.302018"
},
{
"url": "https://vuldb.com/?submit.522416",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.522416"
},
{
"url": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc4.md",
"refsource": "MISC",
"name": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc4.md"
}
]
},
"credits": [
{
"lang": "en",
"value": "yaowenxiao (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.5,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N"
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
}

View File

@ -5,150 +5,13 @@
"CVE_data_meta": {
"ID": "CVE-2025-2967",
"ASSIGNER": "security@concretecms.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in ConcreteCMS up to 9.3.9. It has been classified as problematic. This affects the function Save of the component HTML Block Handler. The manipulation of the argument content leads to HTML injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "Es wurde eine Schwachstelle in ConcreteCMS bis 9.3.9 ausgemacht. Sie wurde als problematisch eingestuft. Betroffen hiervon ist die Funktion Save der Komponente HTML Block Handler. Durch die Manipulation des Arguments content mit unbekannten Daten kann eine HTML injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross Site Scripting",
"cweId": "CWE-79"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Code Injection",
"cweId": "CWE-94"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "ConcreteCMS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "9.3.0"
},
{
"version_affected": "=",
"version_value": "9.3.1"
},
{
"version_affected": "=",
"version_value": "9.3.2"
},
{
"version_affected": "=",
"version_value": "9.3.3"
},
{
"version_affected": "=",
"version_value": "9.3.4"
},
{
"version_affected": "=",
"version_value": "9.3.5"
},
{
"version_affected": "=",
"version_value": "9.3.6"
},
{
"version_affected": "=",
"version_value": "9.3.7"
},
{
"version_affected": "=",
"version_value": "9.3.8"
},
{
"version_affected": "=",
"version_value": "9.3.9"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.302019",
"refsource": "MISC",
"name": "https://vuldb.com/?id.302019"
},
{
"url": "https://vuldb.com/?ctiid.302019",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.302019"
},
{
"url": "https://vuldb.com/?submit.522417",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.522417"
},
{
"url": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc5.md",
"refsource": "MISC",
"name": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc5.md"
}
]
},
"credits": [
{
"lang": "en",
"value": "yaowenxiao (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.5,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N"
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
}

View File

@ -5,150 +5,13 @@
"CVE_data_meta": {
"ID": "CVE-2025-2968",
"ASSIGNER": "security@concretecms.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in ConcreteCMS up to 9.3.9. It has been declared as problematic. This vulnerability affects the function Save of the component Feature Block Handler. The manipulation of the argument Paragraph Source leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "In ConcreteCMS bis 9.3.9 wurde eine Schwachstelle ausgemacht. Sie wurde als problematisch eingestuft. Es geht um die Funktion Save der Komponente Feature Block Handler. Durch Manipulation des Arguments Paragraph Source mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross Site Scripting",
"cweId": "CWE-79"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Code Injection",
"cweId": "CWE-94"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "ConcreteCMS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "9.3.0"
},
{
"version_affected": "=",
"version_value": "9.3.1"
},
{
"version_affected": "=",
"version_value": "9.3.2"
},
{
"version_affected": "=",
"version_value": "9.3.3"
},
{
"version_affected": "=",
"version_value": "9.3.4"
},
{
"version_affected": "=",
"version_value": "9.3.5"
},
{
"version_affected": "=",
"version_value": "9.3.6"
},
{
"version_affected": "=",
"version_value": "9.3.7"
},
{
"version_affected": "=",
"version_value": "9.3.8"
},
{
"version_affected": "=",
"version_value": "9.3.9"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.302020",
"refsource": "MISC",
"name": "https://vuldb.com/?id.302020"
},
{
"url": "https://vuldb.com/?ctiid.302020",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.302020"
},
{
"url": "https://vuldb.com/?submit.522418",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.522418"
},
{
"url": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc6.md",
"refsource": "MISC",
"name": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc6.md"
}
]
},
"credits": [
{
"lang": "en",
"value": "yaowenxiao (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.5,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N"
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
}

View File

@ -5,150 +5,13 @@
"CVE_data_meta": {
"ID": "CVE-2025-2969",
"ASSIGNER": "security@concretecms.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in ConcreteCMS up to 9.3.9. It has been rated as problematic. This issue affects the function Save of the component Feature Link Block Handler. The manipulation of the argument Title/Body Source/Button Text leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "Eine Schwachstelle wurde in ConcreteCMS bis 9.3.9 ausgemacht. Sie wurde als problematisch eingestuft. Es geht hierbei um die Funktion Save der Komponente Feature Link Block Handler. Mittels dem Manipulieren des Arguments Title/Body Source/Button Text mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross Site Scripting",
"cweId": "CWE-79"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Code Injection",
"cweId": "CWE-94"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "ConcreteCMS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "9.3.0"
},
{
"version_affected": "=",
"version_value": "9.3.1"
},
{
"version_affected": "=",
"version_value": "9.3.2"
},
{
"version_affected": "=",
"version_value": "9.3.3"
},
{
"version_affected": "=",
"version_value": "9.3.4"
},
{
"version_affected": "=",
"version_value": "9.3.5"
},
{
"version_affected": "=",
"version_value": "9.3.6"
},
{
"version_affected": "=",
"version_value": "9.3.7"
},
{
"version_affected": "=",
"version_value": "9.3.8"
},
{
"version_affected": "=",
"version_value": "9.3.9"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.302021",
"refsource": "MISC",
"name": "https://vuldb.com/?id.302021"
},
{
"url": "https://vuldb.com/?ctiid.302021",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.302021"
},
{
"url": "https://vuldb.com/?submit.522419",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.522419"
},
{
"url": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc7.md",
"refsource": "MISC",
"name": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc7.md"
}
]
},
"credits": [
{
"lang": "en",
"value": "yaowenxiao (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.5,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N"
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
}

View File

@ -5,150 +5,13 @@
"CVE_data_meta": {
"ID": "CVE-2025-2970",
"ASSIGNER": "security@concretecms.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability classified as problematic has been found in ConcreteCMS up to 9.3.9. Affected is an unknown function of the component Switch Language Block Handler. The manipulation of the argument Label leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "Es wurde eine problematische Schwachstelle in ConcreteCMS bis 9.3.9 entdeckt. Es geht dabei um eine nicht klar definierte Funktion der Komponente Switch Language Block Handler. Mittels Manipulieren des Arguments Label mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross Site Scripting",
"cweId": "CWE-79"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Code Injection",
"cweId": "CWE-94"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "ConcreteCMS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "9.3.0"
},
{
"version_affected": "=",
"version_value": "9.3.1"
},
{
"version_affected": "=",
"version_value": "9.3.2"
},
{
"version_affected": "=",
"version_value": "9.3.3"
},
{
"version_affected": "=",
"version_value": "9.3.4"
},
{
"version_affected": "=",
"version_value": "9.3.5"
},
{
"version_affected": "=",
"version_value": "9.3.6"
},
{
"version_affected": "=",
"version_value": "9.3.7"
},
{
"version_affected": "=",
"version_value": "9.3.8"
},
{
"version_affected": "=",
"version_value": "9.3.9"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.302022",
"refsource": "MISC",
"name": "https://vuldb.com/?id.302022"
},
{
"url": "https://vuldb.com/?ctiid.302022",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.302022"
},
{
"url": "https://vuldb.com/?submit.522420",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.522420"
},
{
"url": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc8.md",
"refsource": "MISC",
"name": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc8.md"
}
]
},
"credits": [
{
"lang": "en",
"value": "yaowenxiao (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.5,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N"
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
}

View File

@ -5,150 +5,13 @@
"CVE_data_meta": {
"ID": "CVE-2025-2972",
"ASSIGNER": "security@concretecms.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability, which was classified as problematic, has been found in ConcreteCMS up to 9.3.9. Affected by this issue is some unknown functionality of the component Page Attribute Display Block Handler. The manipulation of the argument Title leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "Eine problematische Schwachstelle wurde in ConcreteCMS bis 9.3.9 entdeckt. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Komponente Page Attribute Display Block Handler. Durch Manipulieren des Arguments Title mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross Site Scripting",
"cweId": "CWE-79"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Code Injection",
"cweId": "CWE-94"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "ConcreteCMS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "9.3.0"
},
{
"version_affected": "=",
"version_value": "9.3.1"
},
{
"version_affected": "=",
"version_value": "9.3.2"
},
{
"version_affected": "=",
"version_value": "9.3.3"
},
{
"version_affected": "=",
"version_value": "9.3.4"
},
{
"version_affected": "=",
"version_value": "9.3.5"
},
{
"version_affected": "=",
"version_value": "9.3.6"
},
{
"version_affected": "=",
"version_value": "9.3.7"
},
{
"version_affected": "=",
"version_value": "9.3.8"
},
{
"version_affected": "=",
"version_value": "9.3.9"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.302024",
"refsource": "MISC",
"name": "https://vuldb.com/?id.302024"
},
{
"url": "https://vuldb.com/?ctiid.302024",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.302024"
},
{
"url": "https://vuldb.com/?submit.522423",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.522423"
},
{
"url": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc10.md",
"refsource": "MISC",
"name": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc10.md"
}
]
},
"credits": [
{
"lang": "en",
"value": "yaowenxiao (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.5,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N"
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
}

View File

@ -1,17 +1,123 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-3187",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in PHPGurukul e-Diary Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /login.php. The manipulation of the argument logindetail leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "deu",
"value": "Eine kritische Schwachstelle wurde in PHPGurukul e-Diary Management System 1.0 ausgemacht. Es geht hierbei um eine nicht n\u00e4her spezifizierte Funktion der Datei /login.php. Durch Manipulieren des Arguments logindetail mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "SQL Injection",
"cweId": "CWE-89"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Injection",
"cweId": "CWE-74"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "PHPGurukul",
"product": {
"product_data": [
{
"product_name": "e-Diary Management System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.303146",
"refsource": "MISC",
"name": "https://vuldb.com/?id.303146"
},
{
"url": "https://vuldb.com/?ctiid.303146",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.303146"
},
{
"url": "https://vuldb.com/?submit.544098",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.544098"
},
{
"url": "https://github.com/TiggerT/MyCVE/issues/1",
"refsource": "MISC",
"name": "https://github.com/TiggerT/MyCVE/issues/1"
},
{
"url": "https://phpgurukul.com/",
"refsource": "MISC",
"name": "https://phpgurukul.com/"
}
]
},
"credits": [
{
"lang": "en",
"value": "Loki.T (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 7.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "HIGH"
},
{
"version": "3.0",
"baseScore": 7.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "HIGH"
},
{
"version": "2.0",
"baseScore": 7.5,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
}
]
}

View File

@ -1,17 +1,123 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-3188",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as critical has been found in PHPGurukul e-Diary Management System 1.0. This affects an unknown part of the file /add-notes.php. The manipulation of the argument Category leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "deu",
"value": "Es wurde eine Schwachstelle in PHPGurukul e-Diary Management System 1.0 entdeckt. Sie wurde als kritisch eingestuft. Es geht dabei um eine nicht klar definierte Funktion der Datei /add-notes.php. Durch das Beeinflussen des Arguments Category mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "SQL Injection",
"cweId": "CWE-89"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Injection",
"cweId": "CWE-74"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "PHPGurukul",
"product": {
"product_data": [
{
"product_name": "e-Diary Management System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.303147",
"refsource": "MISC",
"name": "https://vuldb.com/?id.303147"
},
{
"url": "https://vuldb.com/?ctiid.303147",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.303147"
},
{
"url": "https://vuldb.com/?submit.544110",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.544110"
},
{
"url": "https://github.com/TiggerT/MyCVE/issues/2",
"refsource": "MISC",
"name": "https://github.com/TiggerT/MyCVE/issues/2"
},
{
"url": "https://phpgurukul.com/",
"refsource": "MISC",
"name": "https://phpgurukul.com/"
}
]
},
"credits": [
{
"lang": "en",
"value": "Loki.T (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 7.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "HIGH"
},
{
"version": "3.0",
"baseScore": 7.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "HIGH"
},
{
"version": "2.0",
"baseScore": 7.5,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-3247",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-3248",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}