From a432189b60e593b33070b143d9f91ecffb78a566 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 27 Apr 2025 08:00:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/52xxx/CVE-2024-52887.json | 72 ++++++++++++++++++++-- 2024/52xxx/CVE-2024-52888.json | 72 ++++++++++++++++++++-- 2025/3xxx/CVE-2025-3963.json | 109 +++++++++++++++++++++++++++++++-- 3 files changed, 241 insertions(+), 12 deletions(-) diff --git a/2024/52xxx/CVE-2024-52887.json b/2024/52xxx/CVE-2024-52887.json index 9c4b9a325e5..1ccbef934eb 100644 --- a/2024/52xxx/CVE-2024-52887.json +++ b/2024/52xxx/CVE-2024-52887.json @@ -1,17 +1,81 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-52887", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@checkpoint.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Authenticated end-user may set a specially crafted SNX bookmark that can make their browser run a script while accessing their own bookmark list." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "checkpoint", + "product": { + "product_data": [ + { + "product_name": "Check Point Mobile Access", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Check Point Mobile Access versions R81.10, R81.20, R82" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.checkpoint.com/results/sk/sk183054", + "refsource": "MISC", + "name": "https://support.checkpoint.com/results/sk/sk183054" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" } ] } diff --git a/2024/52xxx/CVE-2024-52888.json b/2024/52xxx/CVE-2024-52888.json index c0f41d79ecc..5087dd451d3 100644 --- a/2024/52xxx/CVE-2024-52888.json +++ b/2024/52xxx/CVE-2024-52888.json @@ -1,17 +1,81 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-52888", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@checkpoint.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "For an authenticated end-user the portal may run a script while attempting to display a directory or some file's properties." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "checkpoint", + "product": { + "product_data": [ + { + "product_name": "Check Point Mobile Access", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Check Point Mobile Access versions R81.10, R81.20, R82" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.checkpoint.com/results/sk/sk183055", + "refsource": "MISC", + "name": "https://support.checkpoint.com/results/sk/sk183055" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" } ] } diff --git a/2025/3xxx/CVE-2025-3963.json b/2025/3xxx/CVE-2025-3963.json index 60bcd8328fa..17cf59b63a9 100644 --- a/2025/3xxx/CVE-2025-3963.json +++ b/2025/3xxx/CVE-2025-3963.json @@ -1,17 +1,118 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-3963", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** UNSUPPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in withstars Books-Management-System 1.0. This issue affects some unknown processing of the file /admin/article/list of the component Background Interface. The manipulation leads to missing authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "deu", + "value": "** UNSUPPPORTED WHEN ASSIGNED ** Eine Schwachstelle wurde in withstars Books-Management-System 1.0 entdeckt. Sie wurde als kritisch eingestuft. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /admin/article/list der Komponente Background Interface. Durch Manipulation mit unbekannten Daten kann eine missing authorization-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Missing Authorization", + "cweId": "CWE-862" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Incorrect Authorization", + "cweId": "CWE-863" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "withstars", + "product": { + "product_data": [ + { + "product_name": "Books-Management-System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.306299", + "refsource": "MISC", + "name": "https://vuldb.com/?id.306299" + }, + { + "url": "https://vuldb.com/?ctiid.306299", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.306299" + }, + { + "url": "https://vuldb.com/?submit.557237", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.557237" + }, + { + "url": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md", + "refsource": "MISC", + "name": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Caigosec (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 7.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ] }