"-Synchronized-Data."

This commit is contained in:
CVE Team 2025-02-06 10:00:32 +00:00
parent 8c956a07b4
commit 89470f7cc7
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
4 changed files with 352 additions and 85 deletions

View File

@ -70,6 +70,27 @@
]
}
},
{
"product_name": "Red Hat OpenShift Container Platform 4.17",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "5:5.2.2-2.rhaos4.17.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
@ -99,12 +120,6 @@
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
@ -122,6 +137,11 @@
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2025:0878",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:0878"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:0922",
"refsource": "MISC",

View File

@ -36,24 +36,90 @@
"product": {
"product_data": [
{
"product_name": "Fast Datapath for RHEL 7",
"product_name": "Fast Datapath for Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:22.03.7-11.el8fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:22.06.0-273.el8fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:22.09.2-86.el8fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:22.12.1-107.el8fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:23.03.3-22.el8fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:23.06.4-26.el8fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
@ -61,133 +127,132 @@
}
},
{
"product_name": "Fast Datapath for RHEL 8",
"product_name": "Fast Datapath for Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:22.03.7-11.el9fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:22.06.0-273.el9fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:22.09.2-86.el9fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:22.12.1-107.el9fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:23.03.3-22.el9fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:23.06.4-26.el9fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:23.09.6-12.el9fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:24.03.4-53.el9fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Fast Datapath for RHEL 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:24.09.1-66.el9fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
@ -257,6 +322,81 @@
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2025:1083",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:1083"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:1084",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:1084"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:1085",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:1085"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:1086",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:1086"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:1087",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:1087"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:1088",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:1088"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:1089",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:1089"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:1090",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:1090"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:1091",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:1091"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:1092",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:1092"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:1093",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:1093"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:1094",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:1094"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:1095",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:1095"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:1096",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:1096"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:1097",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2025:1097"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2025-0650",
"refsource": "MISC",
@ -274,6 +414,12 @@
}
]
},
"work_around": [
{
"lang": "en",
"value": "Red Hat Product Security has not identified any mitigations at this time. We recommend updating to a known patched version of OVN."
}
],
"impact": {
"cvss": [
{

View File

@ -1,17 +1,100 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-0859",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@wordfence.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The Post and Page Builder by BoldGrid \u2013 Visual Drag and Drop Editor plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.27.6 via the template_via_url() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
"cweId": "CWE-22"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "boldgrid",
"product": {
"product_data": [
{
"product_name": "Post and Page Builder by BoldGrid \u2013 Visual Drag and Drop Editor",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "*",
"version_value": "1.27.6"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/111a1e7f-bc87-4130-a0b2-422d0f98afb6?source=cve",
"refsource": "MISC",
"name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/111a1e7f-bc87-4130-a0b2-422d0f98afb6?source=cve"
},
{
"url": "https://wordpress.org/plugins/post-and-page-builder/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/post-and-page-builder/#developers"
},
{
"url": "https://plugins.trac.wordpress.org/browser/post-and-page-builder/trunk/includes/class-boldgrid-editor-preview.php#L178",
"refsource": "MISC",
"name": "https://plugins.trac.wordpress.org/browser/post-and-page-builder/trunk/includes/class-boldgrid-editor-preview.php#L178"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?old=3234175&old_path=post-and-page-builder%2Ftags%2F1.27.7%2Fincludes%2Fclass-boldgrid-editor-preview.php&new=3234175&new_path=post-and-page-builder%2Ftags%2F1.27.7%2Fincludes%2Fclass-boldgrid-editor-preview.php",
"refsource": "MISC",
"name": "https://plugins.trac.wordpress.org/changeset?old=3234175&old_path=post-and-page-builder%2Ftags%2F1.27.7%2Fincludes%2Fclass-boldgrid-editor-preview.php&new=3234175&new_path=post-and-page-builder%2Ftags%2F1.27.7%2Fincludes%2Fclass-boldgrid-editor-preview.php"
},
{
"url": "https://github.com/BoldGrid/post-and-page-builder/pull/638/commits/10e4d1d96fd2735379049259d15896fa6dd35471",
"refsource": "MISC",
"name": "https://github.com/BoldGrid/post-and-page-builder/pull/638/commits/10e4d1d96fd2735379049259d15896fa6dd35471"
}
]
},
"credits": [
{
"lang": "en",
"value": "Michael Mazzolini"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-1075",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}