From c313e4b7107cd918f1091ab75f91db4cfd1afee3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 14 Jan 2025 16:00:56 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/42xxx/CVE-2024-42444.json | 79 +++++++++++++++++++++++-- 2024/55xxx/CVE-2024-55000.json | 56 ++++++++++++++++-- 2025/0xxx/CVE-2025-0458.json | 104 +++++++++++++++++++++++++++++++-- 2025/0xxx/CVE-2025-0459.json | 99 +++++++++++++++++++++++++++++-- 2025/23xxx/CVE-2025-23366.json | 18 ++++++ 2025/23xxx/CVE-2025-23367.json | 18 ++++++ 2025/23xxx/CVE-2025-23368.json | 18 ++++++ 7 files changed, 374 insertions(+), 18 deletions(-) create mode 100644 2025/23xxx/CVE-2025-23366.json create mode 100644 2025/23xxx/CVE-2025-23367.json create mode 100644 2025/23xxx/CVE-2025-23368.json diff --git a/2024/42xxx/CVE-2024-42444.json b/2024/42xxx/CVE-2024-42444.json index a412145fa5a..e6e361f43e0 100644 --- a/2024/42xxx/CVE-2024-42444.json +++ b/2024/42xxx/CVE-2024-42444.json @@ -1,17 +1,88 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-42444", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "biossecurity@ami.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "APTIOV contains a vulnerability in BIOS where an attacker may cause a TOCTOU Race Condition by local means. Successful exploitation of this vulnerability may lead to execution of arbitrary code on the target device." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition", + "cweId": "CWE-367" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "AMI", + "product": { + "product_data": [ + { + "product_name": "AptioV", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "BKS_5.0", + "version_value": "BKS_5.38" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025001.pdf", + "refsource": "MISC", + "name": "https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025001.pdf" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/55xxx/CVE-2024-55000.json b/2024/55xxx/CVE-2024-55000.json index dc1787a05fb..5b2da753510 100644 --- a/2024/55xxx/CVE-2024-55000.json +++ b/2024/55xxx/CVE-2024-55000.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-55000", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-55000", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sourcecodester House Rental Management system v1.0 is vulnerable to Cross Site Scripting (XSS) in rental/manage_categories.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/tang-0717/VUL/blob/main/House%20Rental%20Management%20system%20-%20Storage%20XSS%20on%20(rentalmanage_categories.php).md", + "refsource": "MISC", + "name": "https://github.com/tang-0717/VUL/blob/main/House%20Rental%20Management%20system%20-%20Storage%20XSS%20on%20(rentalmanage_categories.php).md" } ] } diff --git a/2025/0xxx/CVE-2025-0458.json b/2025/0xxx/CVE-2025-0458.json index 9a229fe09a6..9378d59bafa 100644 --- a/2025/0xxx/CVE-2025-0458.json +++ b/2025/0xxx/CVE-2025-0458.json @@ -1,17 +1,113 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-0458", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as problematic was found in Virtual Computer Vysual RH Solution 2024.12.1. Affected by this vulnerability is an unknown functionality of the file /index.php of the component Login Panel. The manipulation of the argument page leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "In Virtual Computer Vysual RH Solution 2024.12.1 wurde eine problematische Schwachstelle entdeckt. Es geht um eine nicht n\u00e4her bekannte Funktion der Datei /index.php der Komponente Login Panel. Durch Manipulieren des Arguments page mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross Site Scripting", + "cweId": "CWE-79" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Code Injection", + "cweId": "CWE-94" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Virtual Computer", + "product": { + "product_data": [ + { + "product_name": "Vysual RH Solution", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2024.12.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.291475", + "refsource": "MISC", + "name": "https://vuldb.com/?id.291475" + }, + { + "url": "https://vuldb.com/?ctiid.291475", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.291475" + }, + { + "url": "https://vuldb.com/?submit.473865", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.473865" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Stux (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 4.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 4.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 5, + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N" } ] } diff --git a/2025/0xxx/CVE-2025-0459.json b/2025/0xxx/CVE-2025-0459.json index 71b4857c0a3..6b8a25346a0 100644 --- a/2025/0xxx/CVE-2025-0459.json +++ b/2025/0xxx/CVE-2025-0459.json @@ -1,17 +1,108 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-0459", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as problematic, has been found in libretro RetroArch up to 1.19.1 on Windows. Affected by this issue is some unknown functionality in the library profapi.dll of the component Startup. The manipulation leads to untrusted search path. An attack has to be approached locally. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Eine problematische Schwachstelle wurde in libretro RetroArch bis 1.19.1 f\u00fcr Windows entdeckt. Es geht hierbei um eine nicht n\u00e4her spezifizierte Funktion in der Bibliothek profapi.dll der Komponente Startup. Durch das Beeinflussen mit unbekannten Daten kann eine untrusted search path-Schwachstelle ausgenutzt werden. Der Angriff muss lokal passieren." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Untrusted Search Path", + "cweId": "CWE-426" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "libretro", + "product": { + "product_data": [ + { + "product_name": "RetroArch", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.19.0" + }, + { + "version_affected": "=", + "version_value": "1.19.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.291476", + "refsource": "MISC", + "name": "https://vuldb.com/?id.291476" + }, + { + "url": "https://vuldb.com/?ctiid.291476", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.291476" + }, + { + "url": "https://vuldb.com/?submit.474011", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.474011" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Havook (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5.3, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5.3, + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4.3, + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2025/23xxx/CVE-2025-23366.json b/2025/23xxx/CVE-2025-23366.json new file mode 100644 index 00000000000..8ac17cd0134 --- /dev/null +++ b/2025/23xxx/CVE-2025-23366.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23366", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23367.json b/2025/23xxx/CVE-2025-23367.json new file mode 100644 index 00000000000..bae5b425a91 --- /dev/null +++ b/2025/23xxx/CVE-2025-23367.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23367", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23368.json b/2025/23xxx/CVE-2025-23368.json new file mode 100644 index 00000000000..1046ae8d991 --- /dev/null +++ b/2025/23xxx/CVE-2025-23368.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23368", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file