"-Synchronized-Data."

This commit is contained in:
CVE Team 2025-04-28 14:00:33 +00:00
parent 6f6cf988c4
commit a8d722abf2
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
9 changed files with 335 additions and 24 deletions

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "** UNSUPPPORTED WHEN ASSIGNED ** Improper sanitization of the value of the '[srcset]' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .\n\nThis issue affects AngularJS versions 1.3.0-rc.4 and greater.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status ."
"value": "** UNSUPPPORTED WHEN ASSIGNED ** Improper sanitization of the value of the 'srcset' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .\n\nThis issue affects AngularJS versions 1.3.0-rc.4 and greater.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status ."
}
]
},
@ -40,9 +40,8 @@
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1.3.0-rc.4",
"version_value": "*"
"version_affected": "=",
"version_value": ">=1.3.0-rc.4"
}
]
}

View File

@ -40,9 +40,8 @@
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0.0.0",
"version_value": "*"
"version_affected": "=",
"version_value": ">=0.0.0"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter."
"value": "** DISPUTED ** GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used."
}
]
},
@ -61,6 +61,16 @@
"refsource": "MISC",
"name": "https://github.com/0NYX-MY7H/CVE-2025-43919",
"url": "https://github.com/0NYX-MY7H/CVE-2025-43919"
},
{
"refsource": "MISC",
"name": "https://github.com/cpanel/mailman2-python3",
"url": "https://github.com/cpanel/mailman2-python3"
},
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2025/04/21/6",
"url": "https://www.openwall.com/lists/oss-security/2025/04/21/6"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line."
"value": "** DISPUTED ** GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used."
}
]
},
@ -61,6 +61,16 @@
"refsource": "MISC",
"name": "https://github.com/0NYX-MY7H/CVE-2025-43920",
"url": "https://github.com/0NYX-MY7H/CVE-2025-43920"
},
{
"refsource": "MISC",
"name": "https://github.com/cpanel/mailman2-python3",
"url": "https://github.com/cpanel/mailman2-python3"
},
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2025/04/21/6",
"url": "https://www.openwall.com/lists/oss-security/2025/04/21/6"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to create lists via the /mailman/create endpoint."
"value": "** DISPUTED ** GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to create lists via the /mailman/create endpoint. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used."
}
]
},
@ -61,6 +61,16 @@
"refsource": "MISC",
"name": "https://github.com/0NYX-MY7H/CVE-2025-43921",
"url": "https://github.com/0NYX-MY7H/CVE-2025-43921"
},
{
"refsource": "MISC",
"name": "https://github.com/cpanel/mailman2-python3",
"url": "https://github.com/cpanel/mailman2-python3"
},
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2025/04/21/6",
"url": "https://www.openwall.com/lists/oss-security/2025/04/21/6"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-46661",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2025-46661",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "IPW Systems Metazo through 8.1.3 allows unauthenticated Remote Code Execution because smartyValidator.php enables the attacker to provide template expressions, aka Server-Side Template-Injection. All instances have been patched by the Supplier."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://code-white.com/public-vulnerability-list/",
"refsource": "MISC",
"name": "https://code-white.com/public-vulnerability-list/"
},
{
"url": "https://www.ipwsystems.com/",
"refsource": "MISC",
"name": "https://www.ipwsystems.com/"
}
]
}

View File

@ -1,17 +1,123 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-4021",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in code-projects Patient Record Management System 1.0. It has been classified as critical. This affects an unknown part of the file /edit_spatient.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "deu",
"value": "Es wurde eine Schwachstelle in code-projects Patient Record Management System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Es betrifft eine unbekannte Funktion der Datei /edit_spatient.php. Durch die Manipulation des Arguments ID mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "SQL Injection",
"cweId": "CWE-89"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Injection",
"cweId": "CWE-74"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "code-projects",
"product": {
"product_data": [
{
"product_name": "Patient Record Management System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.306375",
"refsource": "MISC",
"name": "https://vuldb.com/?id.306375"
},
{
"url": "https://vuldb.com/?ctiid.306375",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.306375"
},
{
"url": "https://vuldb.com/?submit.558402",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.558402"
},
{
"url": "https://github.com/plj-sudo/cve/blob/main/README.md",
"refsource": "MISC",
"name": "https://github.com/plj-sudo/cve/blob/main/README.md"
},
{
"url": "https://code-projects.org/",
"refsource": "MISC",
"name": "https://code-projects.org/"
}
]
},
"credits": [
{
"lang": "en",
"value": "plj1055 (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
}
]
}

View File

@ -1,17 +1,127 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-4022",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in web-arena-x webarena up to 0.2.0. It has been declared as critical. This vulnerability affects the function HTMLContentEvaluator of the file webarena/evaluation_harness/evaluators.py. The manipulation of the argument target[\"url\"] leads to code injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "deu",
"value": "In web-arena-x webarena bis 0.2.0 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Das betrifft die Funktion HTMLContentEvaluator der Datei webarena/evaluation_harness/evaluators.py. Durch Manipulation des Arguments target[\"url\"] mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Code Injection",
"cweId": "CWE-94"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Injection",
"cweId": "CWE-74"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "web-arena-x",
"product": {
"product_data": [
{
"product_name": "webarena",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "0.1"
},
{
"version_affected": "=",
"version_value": "0.2.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.306376",
"refsource": "MISC",
"name": "https://vuldb.com/?id.306376"
},
{
"url": "https://vuldb.com/?ctiid.306376",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.306376"
},
{
"url": "https://vuldb.com/?submit.558415",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.558415"
},
{
"url": "https://github.com/web-arena-x/webarena/issues/194",
"refsource": "MISC",
"name": "https://github.com/web-arena-x/webarena/issues/194"
},
{
"url": "https://github.com/web-arena-x/webarena/issues/194#issuecomment-2796165922",
"refsource": "MISC",
"name": "https://github.com/web-arena-x/webarena/issues/194#issuecomment-2796165922"
}
]
},
"credits": [
{
"lang": "en",
"value": "ybdesire (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-4040",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}