From bf08715fb392d0a4b9969ecd15589f4e02b37e25 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 21 May 2025 01:00:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/5xxx/CVE-2025-5011.json | 109 +++++++++++++++++++++++++++++++++-- 2025/5xxx/CVE-2025-5013.json | 104 +++++++++++++++++++++++++++++++-- 2 files changed, 205 insertions(+), 8 deletions(-) diff --git a/2025/5xxx/CVE-2025-5011.json b/2025/5xxx/CVE-2025-5011.json index 4ca594ad8b8..f14fd119c82 100644 --- a/2025/5xxx/CVE-2025-5011.json +++ b/2025/5xxx/CVE-2025-5011.json @@ -1,17 +1,118 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-5011", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as problematic was found in moonlightL hexo-boot 4.3.0. This vulnerability affects unknown code of the file /admin/home/index.html of the component Dynamic List Page. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "deu", + "value": "In moonlightL hexo-boot 4.3.0 wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Hierbei betrifft es unbekannten Programmcode der Datei /admin/home/index.html der Komponente Dynamic List Page. Durch die Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross Site Scripting", + "cweId": "CWE-79" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Code Injection", + "cweId": "CWE-94" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "moonlightL", + "product": { + "product_data": [ + { + "product_name": "hexo-boot", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.3.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.309664", + "refsource": "MISC", + "name": "https://vuldb.com/?id.309664" + }, + { + "url": "https://vuldb.com/?ctiid.309664", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.309664" + }, + { + "url": "https://vuldb.com/?submit.580588", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.580588" + }, + { + "url": "https://github.com/trengh222/hexo-boot-xss2.0", + "refsource": "MISC", + "name": "https://github.com/trengh222/hexo-boot-xss2.0" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "trengh (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 2.4, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 2.4, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 3.3, + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N" } ] } diff --git a/2025/5xxx/CVE-2025-5013.json b/2025/5xxx/CVE-2025-5013.json index 70c255213ea..de797894a57 100644 --- a/2025/5xxx/CVE-2025-5013.json +++ b/2025/5xxx/CVE-2025-5013.json @@ -1,17 +1,113 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-5013", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as problematic, was found in HkCms up to 2.3.2.240702. This affects an unknown part of the file /index.php/search/index.html of the component Search. The manipulation of the argument keyword leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "deu", + "value": "Es wurde eine problematische Schwachstelle in HkCms bis 2.3.2.240702 gefunden. Betroffen hiervon ist ein unbekannter Ablauf der Datei /index.php/search/index.html der Komponente Search. Mit der Manipulation des Arguments keyword mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross Site Scripting", + "cweId": "CWE-79" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Code Injection", + "cweId": "CWE-94" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "HkCms", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.3.2.240702" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.309729", + "refsource": "MISC", + "name": "https://vuldb.com/?id.309729" + }, + { + "url": "https://vuldb.com/?ctiid.309729", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.309729" + }, + { + "url": "https://gitee.com/Hk_Cms/HkCms/issues/IBZ2G7", + "refsource": "MISC", + "name": "https://gitee.com/Hk_Cms/HkCms/issues/IBZ2G7" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "VulDB Gitee Analyzer" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 4.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 4.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 5, + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N" } ] }