"-Synchronized-Data."

This commit is contained in:
CVE Team 2025-05-07 14:00:34 +00:00
parent 65183191a6
commit c627700c66
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
10 changed files with 453 additions and 28 deletions

View File

@ -1,18 +1,157 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36791",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: keep alloc_hash updated after hash allocation\n\nIn commit 599be01ee567 (\"net_sched: fix an OOB access in cls_tcindex\")\nI moved cp->hash calculation before the first\ntcindex_alloc_perfect_hash(), but cp->alloc_hash is left untouched.\nThis difference could lead to another out of bound access.\n\ncp->alloc_hash should always be the size allocated, we should\nupdate it after this tcindex_alloc_perfect_hash()."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "73c29d2f6f8ae731b1e09051b69ed3ba2319482b",
"version_value": "d6cdc5bb19b595486fb2e6661e5138d73a57f454"
},
{
"version_affected": "<",
"version_name": "b974ac51f5834a729de252fc5c1c9de9efd79b45",
"version_value": "c4453d2833671e3a9f6bd52f0f581056c3736386"
},
{
"version_affected": "<",
"version_name": "6cb448ee493c8a514c9afa0c346f3f5b3227de85",
"version_value": "9f8b6c44be178c2498a00b270872a6e30e7c8266"
},
{
"version_affected": "<",
"version_name": "478c4b2ffd44e5186c7e22ae7c38a86a5b9cfde5",
"version_value": "557d015ffb27b672e24e6ad141fd887783871dc2"
},
{
"version_affected": "<",
"version_name": "dd8142a6fa5270783d415292ec8169f4ea2a5468",
"version_value": "d23faf32e577922b6da20bf3740625c1105381bf"
},
{
"version_affected": "<",
"version_name": "2c66ff8d08f81bcf8e8cb22e31e39c051b15336a",
"version_value": "bd3ee8fb6371b45c71c9345cc359b94da2ddefa9"
},
{
"version_affected": "<",
"version_name": "599be01ee567b61f4471ee8078870847d0a11e8e",
"version_value": "0d1c3530e1bd38382edef72591b78e877e0edcd3"
},
{
"version_affected": "<",
"version_name": "4.4.214",
"version_value": "4.4.218"
},
{
"version_affected": "<",
"version_name": "4.9.214",
"version_value": "4.9.218"
},
{
"version_affected": "<",
"version_name": "4.14.171",
"version_value": "4.14.175"
},
{
"version_affected": "<",
"version_name": "4.19.103",
"version_value": "4.19.114"
},
{
"version_affected": "<",
"version_name": "5.4.19",
"version_value": "5.4.29"
},
{
"version_affected": "<",
"version_name": "5.5.3",
"version_value": "5.5.14"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/d6cdc5bb19b595486fb2e6661e5138d73a57f454",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/d6cdc5bb19b595486fb2e6661e5138d73a57f454"
},
{
"url": "https://git.kernel.org/stable/c/c4453d2833671e3a9f6bd52f0f581056c3736386",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/c4453d2833671e3a9f6bd52f0f581056c3736386"
},
{
"url": "https://git.kernel.org/stable/c/9f8b6c44be178c2498a00b270872a6e30e7c8266",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/9f8b6c44be178c2498a00b270872a6e30e7c8266"
},
{
"url": "https://git.kernel.org/stable/c/557d015ffb27b672e24e6ad141fd887783871dc2",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/557d015ffb27b672e24e6ad141fd887783871dc2"
},
{
"url": "https://git.kernel.org/stable/c/d23faf32e577922b6da20bf3740625c1105381bf",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/d23faf32e577922b6da20bf3740625c1105381bf"
},
{
"url": "https://git.kernel.org/stable/c/bd3ee8fb6371b45c71c9345cc359b94da2ddefa9",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/bd3ee8fb6371b45c71c9345cc359b94da2ddefa9"
},
{
"url": "https://git.kernel.org/stable/c/0d1c3530e1bd38382edef72591b78e877e0edcd3",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/0d1c3530e1bd38382edef72591b78e877e0edcd3"
}
]
},
"generator": {
"engine": "bippy-1.2.0"
}
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-29152",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2025-29152",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Cross-Site Scripting vulnerability in lemeconsultoria HCM galera.app v.4.58.0 allows an attacker to execute arbitrary code via multiple components, including Strategic Planning Perspective Registration, Training Request, Perspective Editing, Education Registration, Hierarchical Level Registration, Decision Level Registration, Perspective Registration, Company Group Registration, Company Registration, News Registration, Employee Editing, Goal Team Registration, Learning Resource Type Registration, Learning Resource Family Registration, Learning Resource Supplier Registration, and Cycle Maintenance."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://medium.com/@worzyus/poc-2fd1d2ec1eb9",
"refsource": "MISC",
"name": "https://medium.com/@worzyus/poc-2fd1d2ec1eb9"
},
{
"refsource": "MISC",
"name": "https://wellington-almeida.medium.com/poc-2fd1d2ec1eb9",
"url": "https://wellington-almeida.medium.com/poc-2fd1d2ec1eb9"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-29153",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2025-29153",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "SQL Injection vulnerability in lemeconsultoria HCM galera.app v.4.58.0 allows an attacker to execute arbitrary code via the Data export, filters functions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://worzyus.medium.com/391c437c3960",
"refsource": "MISC",
"name": "https://worzyus.medium.com/391c437c3960"
},
{
"refsource": "MISC",
"name": "https://wellington-almeida.medium.com/poc-sql-391c437c3960",
"url": "https://wellington-almeida.medium.com/poc-sql-391c437c3960"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-29154",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2025-29154",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "HTML injection vulnerability in lemeconsultoria HCM galera.app v.4.58.0 allows an attacker to execute arbitrary code via the .galera.app/ted/solicitacao_treinamento/, .galera.app/rh/metas/perspectiva_estrategica/edicao/, .galera.app/rh/cadastros/perspectivas/listagem/adc/, .galera.app/escolaridade/listagem/, .galera.app/estados_civis/cadastro/, .galera.app/nivel_hierarquico/listagem/, .galera.app/nivel_decisorio/cadastro/, .galera.app/escolaridade/cadastro/, .galera.app/nivel_decisorio/listagem/, .galera.app/rh/cadastros/perspectivas/listagem/, .galera.app/empresas_grupo/cadastro/, .galera.app/empresas/edicao/, .galera.app/liais/listagem/, .galera.app/noticias/listagem/, .galera.app/gerenciamento-de-ciclo/abertura/cadastrar, .galera.app/colaborador/cadastro/cursos/adc/edicao/, .galera.app/colaborador/cadastro/adc/, .galera.app/cads_aux/escalact/, .galera.app/ncf/tec/cadastro/ct/ .galera.app/rh/metas/painel/, .galera.app/rh/metas/equipe/edicao/, .galera.app/rh/pdi/tipo_recursos/edicao/, .galera.app/rh/pdi/familia_recursos/cadastro/, .galera.app/rh/pdi/fornecedores/edicao/, and .galera.app/rh/pdi/recursos/cadastro/ components."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://worzyus.medium.com/0f27e657c962",
"refsource": "MISC",
"name": "https://worzyus.medium.com/0f27e657c962"
},
{
"refsource": "MISC",
"name": "https://wellington-almeida.medium.com/poc-html-injection-0f27e657c962",
"url": "https://wellington-almeida.medium.com/poc-html-injection-0f27e657c962"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-29602",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2025-29602",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "flatpress 1.3.1 is vulnerable to Cross Site Scripting (XSS) in Administration area via Manage categories."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/flatpressblog/flatpress",
"refsource": "MISC",
"name": "https://github.com/flatpressblog/flatpress"
},
{
"refsource": "MISC",
"name": "https://harish0x.github.io/blog/CVE-2025-29602",
"url": "https://harish0x.github.io/blog/CVE-2025-29602"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-35980",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-46404",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-46705",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-46784",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-47151",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}