From 8c89b50f73acb01380f82ba90a2cd26880a377b0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 9 Apr 2025 13:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/1xxx/CVE-2025-1337.json | 2 +- 2025/1xxx/CVE-2025-1806.json | 2 +- 2025/1xxx/CVE-2025-1807.json | 2 +- 2025/32xxx/CVE-2025-32696.json | 18 ++++++++++++++++++ 2025/32xxx/CVE-2025-32697.json | 18 ++++++++++++++++++ 2025/32xxx/CVE-2025-32698.json | 18 ++++++++++++++++++ 2025/32xxx/CVE-2025-32699.json | 18 ++++++++++++++++++ 2025/32xxx/CVE-2025-32700.json | 18 ++++++++++++++++++ 8 files changed, 93 insertions(+), 3 deletions(-) create mode 100644 2025/32xxx/CVE-2025-32696.json create mode 100644 2025/32xxx/CVE-2025-32697.json create mode 100644 2025/32xxx/CVE-2025-32698.json create mode 100644 2025/32xxx/CVE-2025-32699.json create mode 100644 2025/32xxx/CVE-2025-32700.json diff --git a/2025/1xxx/CVE-2025-1337.json b/2025/1xxx/CVE-2025-1337.json index 9a8523ee098..15d8d0a9c0c 100644 --- a/2025/1xxx/CVE-2025-1337.json +++ b/2025/1xxx/CVE-2025-1337.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in Eastnets PaymentSafe 2.5.26.0. It has been classified as problematic. This affects an unknown part of the component BIC Search. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.5.27.0 is able to address this issue. The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability was found in Eastnets PaymentSafe 2.5.26.0. It has been classified as problematic. This affects an unknown part of the component BIC Search. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.5.27.0 is able to address this issue." }, { "lang": "deu", diff --git a/2025/1xxx/CVE-2025-1806.json b/2025/1xxx/CVE-2025-1806.json index 3ac52f52db6..c3858b5c556 100644 --- a/2025/1xxx/CVE-2025-1806.json +++ b/2025/1xxx/CVE-2025-1806.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability, which was classified as problematic, has been found in Eastnets PaymentSafe 2.5.26.0. Affected by this issue is some unknown functionality of the file /Default.aspx of the component URL Handler. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.5.27.0 is able to address this issue. The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability, which was classified as problematic, has been found in Eastnets PaymentSafe 2.5.26.0. Affected by this issue is some unknown functionality of the file /Default.aspx of the component URL Handler. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.5.27.0 is able to address this issue." }, { "lang": "deu", diff --git a/2025/1xxx/CVE-2025-1807.json b/2025/1xxx/CVE-2025-1807.json index 1c87daff4c4..beff6c5029f 100644 --- a/2025/1xxx/CVE-2025-1807.json +++ b/2025/1xxx/CVE-2025-1807.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability, which was classified as problematic, was found in Eastnets PaymentSafe 2.5.26.0. This affects an unknown part of the file /directRouter.rfc of the component Edit Manual Reply Handler. The manipulation of the argument Title leads to basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.5.27.0 is able to address this issue. The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability, which was classified as problematic, was found in Eastnets PaymentSafe 2.5.26.0. This affects an unknown part of the file /directRouter.rfc of the component Edit Manual Reply Handler. The manipulation of the argument Title leads to basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.5.27.0 is able to address this issue." }, { "lang": "deu", diff --git a/2025/32xxx/CVE-2025-32696.json b/2025/32xxx/CVE-2025-32696.json new file mode 100644 index 00000000000..a1dd0cacb44 --- /dev/null +++ b/2025/32xxx/CVE-2025-32696.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32696", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32697.json b/2025/32xxx/CVE-2025-32697.json new file mode 100644 index 00000000000..9c164384cb9 --- /dev/null +++ b/2025/32xxx/CVE-2025-32697.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32697", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32698.json b/2025/32xxx/CVE-2025-32698.json new file mode 100644 index 00000000000..8f04105e1f7 --- /dev/null +++ b/2025/32xxx/CVE-2025-32698.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32698", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32699.json b/2025/32xxx/CVE-2025-32699.json new file mode 100644 index 00000000000..42a26b46ee4 --- /dev/null +++ b/2025/32xxx/CVE-2025-32699.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32699", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32700.json b/2025/32xxx/CVE-2025-32700.json new file mode 100644 index 00000000000..95efac8beaa --- /dev/null +++ b/2025/32xxx/CVE-2025-32700.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32700", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file