diff --git a/2025/32xxx/CVE-2025-32907.json b/2025/32xxx/CVE-2025-32907.json index 0cdfb29e1bd..0b9c578b2d6 100644 --- a/2025/32xxx/CVE-2025-32907.json +++ b/2025/32xxx/CVE-2025-32907.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory." + "value": "A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory. This does not allow for a full denial of service." } ] }, @@ -118,15 +118,15 @@ { "attackComplexity": "LOW", "attackVector": "NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } ] diff --git a/2025/32xxx/CVE-2025-32911.json b/2025/32xxx/CVE-2025-32911.json index 9238669d5b2..1c15f1b7e9b 100644 --- a/2025/32xxx/CVE-2025-32911.json +++ b/2025/32xxx/CVE-2025-32911.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was found in libsoup, which is vulnerable to a use-after-free memory issue not on the heap in the soup_message_headers_get_content_disposition() function. This flaw allows a malicious HTTP client to cause memory corruption in the libsoup server." + "value": "A use-after-free type vulnerability was found in libsoup, in the soup_message_headers_get_content_disposition() function. This flaw allows a malicious HTTP client to cause memory corruption in the libsoup server." } ] }, diff --git a/2025/4xxx/CVE-2025-4015.json b/2025/4xxx/CVE-2025-4015.json index c96e7b1203e..b56c193bb29 100644 --- a/2025/4xxx/CVE-2025-4015.json +++ b/2025/4xxx/CVE-2025-4015.json @@ -1,17 +1,118 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-4015", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in 20120630 Novel-Plus up to 0e156c04b4b7ce0563bef6c97af4476fcda8f160. It has been rated as critical. Affected by this issue is the function list of the file novel-system/src/main/java/com/java2nb/system/controller/SessionController.java. The manipulation leads to missing authentication. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Eine kritische Schwachstelle wurde in 20120630 Novel-Plus bis 0e156c04b4b7ce0563bef6c97af4476fcda8f160 ausgemacht. Betroffen davon ist die Funktion list der Datei novel-system/src/main/java/com/java2nb/system/controller/SessionController.java. Durch das Manipulieren mit unbekannten Daten kann eine missing authentication-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Missing Authentication", + "cweId": "CWE-306" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Improper Authentication", + "cweId": "CWE-287" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "20120630", + "product": { + "product_data": [ + { + "product_name": "Novel-Plus", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "0e156c04b4b7ce0563bef6c97af4476fcda8f160" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.306368", + "refsource": "MISC", + "name": "https://vuldb.com/?id.306368" + }, + { + "url": "https://vuldb.com/?ctiid.306368", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.306368" + }, + { + "url": "https://vuldb.com/?submit.558367", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.558367" + }, + { + "url": "https://www.cnblogs.com/aibot/p/18827501", + "refsource": "MISC", + "name": "https://www.cnblogs.com/aibot/p/18827501" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "aibot88 (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ] } diff --git a/2025/4xxx/CVE-2025-4016.json b/2025/4xxx/CVE-2025-4016.json index b5d9f42dcbe..b1c71779321 100644 --- a/2025/4xxx/CVE-2025-4016.json +++ b/2025/4xxx/CVE-2025-4016.json @@ -1,17 +1,118 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-4016", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical has been found in 20120630 Novel-Plus up to 0e156c04b4b7ce0563bef6c97af4476fcda8f160. This affects the function deleteIndex of the file novel-admin/src/main/java/com/java2nb/common/controller/LogController.java. The manipulation leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in 20120630 Novel-Plus bis 0e156c04b4b7ce0563bef6c97af4476fcda8f160 entdeckt. Sie wurde als kritisch eingestuft. Betroffen hiervon ist die Funktion deleteIndex der Datei novel-admin/src/main/java/com/java2nb/common/controller/LogController.java. Durch Manipulieren mit unbekannten Daten kann eine improper authorization-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Authorization", + "cweId": "CWE-285" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Incorrect Privilege Assignment", + "cweId": "CWE-266" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "20120630", + "product": { + "product_data": [ + { + "product_name": "Novel-Plus", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "0e156c04b4b7ce0563bef6c97af4476fcda8f160" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.306369", + "refsource": "MISC", + "name": "https://vuldb.com/?id.306369" + }, + { + "url": "https://vuldb.com/?ctiid.306369", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.306369" + }, + { + "url": "https://vuldb.com/?submit.558375", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.558375" + }, + { + "url": "https://www.cnblogs.com/aibot/p/18827506", + "refsource": "MISC", + "name": "https://www.cnblogs.com/aibot/p/18827506" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "aibot88 (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5.4, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5.4, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 5.5, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P" } ] } diff --git a/2025/4xxx/CVE-2025-4017.json b/2025/4xxx/CVE-2025-4017.json index f36b64900fa..3ae6b3c0a68 100644 --- a/2025/4xxx/CVE-2025-4017.json +++ b/2025/4xxx/CVE-2025-4017.json @@ -1,17 +1,118 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-4017", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as problematic was found in 20120630 Novel-Plus up to 0e156c04b4b7ce0563bef6c97af4476fcda8f160. This vulnerability affects the function list of the file nnovel-admin/src/main/java/com/java2nb/common/controller/LogController.java. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "In 20120630 Novel-Plus bis 0e156c04b4b7ce0563bef6c97af4476fcda8f160 wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Es geht um die Funktion list der Datei nnovel-admin/src/main/java/com/java2nb/common/controller/LogController.java. Durch das Beeinflussen mit unbekannten Daten kann eine improper authorization-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Authorization", + "cweId": "CWE-285" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Incorrect Privilege Assignment", + "cweId": "CWE-266" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "20120630", + "product": { + "product_data": [ + { + "product_name": "Novel-Plus", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "0e156c04b4b7ce0563bef6c97af4476fcda8f160" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.306370", + "refsource": "MISC", + "name": "https://vuldb.com/?id.306370" + }, + { + "url": "https://vuldb.com/?ctiid.306370", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.306370" + }, + { + "url": "https://vuldb.com/?submit.558376", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.558376" + }, + { + "url": "https://www.cnblogs.com/aibot/p/18827507", + "refsource": "MISC", + "name": "https://www.cnblogs.com/aibot/p/18827507" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "aibot88 (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 4.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 4.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N" } ] }