mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-06 18:53:08 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
f2da121383
commit
c7ce44475a
@ -5,127 +5,14 @@
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2025-21757",
|
||||
"ASSIGNER": "cve@kernel.org",
|
||||
"STATE": "PUBLIC"
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels\n\ndst_cache_get() gives us a reference, we need to release it.\n\nDiscovered by the ioam6.sh test, kmemleak was recently fixed\nto catch per-cpu memory leaks."
|
||||
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Linux",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Linux",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "b26f015dfb07b6be12d005a0ed0c5c43b7bedbf3",
|
||||
"version_value": "cb9950eaaf9cc76dfe490c06aa11f185b3c7f22b"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "634710a372ba65bee667c2f6e58a97658c639eab",
|
||||
"version_value": "bf500b0d0cfe92ee62dfd4c2ace7f6353cf3a4c8"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "8471e228448a818e4c27cab4b681b2e758e46cf5",
|
||||
"version_value": "2248b8145053eb2ae35ca4cf694b885a086719bb"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "c432cd18a07b623651ed15ea167bd303467004cc",
|
||||
"version_value": "d90f8f930c3053bb11f5def9aff5310a70429260"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "985ec6f5e6235242191370628acb73d7a9f0c0ea",
|
||||
"version_value": "c71a192976ded2f2f416d03c4f595cdd4478b825"
|
||||
},
|
||||
{
|
||||
"version_value": "not down converted",
|
||||
"x_cve_json_5_version_data": {
|
||||
"versions": [
|
||||
{
|
||||
"version": "6.14-rc1",
|
||||
"status": "affected"
|
||||
},
|
||||
{
|
||||
"version": "0",
|
||||
"lessThan": "6.14-rc1",
|
||||
"status": "unaffected",
|
||||
"versionType": "semver"
|
||||
},
|
||||
{
|
||||
"version": "6.14-rc2",
|
||||
"lessThanOrEqual": "*",
|
||||
"status": "unaffected",
|
||||
"versionType": "original_commit_for_fix"
|
||||
}
|
||||
],
|
||||
"defaultStatus": "affected"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cb9950eaaf9cc76dfe490c06aa11f185b3c7f22b",
|
||||
"refsource": "MISC",
|
||||
"name": "https://git.kernel.org/stable/c/cb9950eaaf9cc76dfe490c06aa11f185b3c7f22b"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bf500b0d0cfe92ee62dfd4c2ace7f6353cf3a4c8",
|
||||
"refsource": "MISC",
|
||||
"name": "https://git.kernel.org/stable/c/bf500b0d0cfe92ee62dfd4c2ace7f6353cf3a4c8"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2248b8145053eb2ae35ca4cf694b885a086719bb",
|
||||
"refsource": "MISC",
|
||||
"name": "https://git.kernel.org/stable/c/2248b8145053eb2ae35ca4cf694b885a086719bb"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d90f8f930c3053bb11f5def9aff5310a70429260",
|
||||
"refsource": "MISC",
|
||||
"name": "https://git.kernel.org/stable/c/d90f8f930c3053bb11f5def9aff5310a70429260"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c71a192976ded2f2f416d03c4f595cdd4478b825",
|
||||
"refsource": "MISC",
|
||||
"name": "https://git.kernel.org/stable/c/c71a192976ded2f2f416d03c4f595cdd4478b825"
|
||||
}
|
||||
]
|
||||
},
|
||||
"generator": {
|
||||
"engine": "bippy-5f407fcff5a0"
|
||||
}
|
||||
}
|
@ -1,17 +1,330 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2025-2723",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability was found in GNOME libgsf up to 1.14.53. It has been rated as critical. This issue affects the function gsf_property_settings_collec. The manipulation of the argument n_alloced_params leads to heap-based buffer overflow. Attacking locally is a requirement. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "Eine Schwachstelle wurde in GNOME libgsf bis 1.14.53 ausgemacht. Sie wurde als kritisch eingestuft. Betroffen davon ist die Funktion gsf_property_settings_collec. Durch die Manipulation des Arguments n_alloced_params mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Heap-based Buffer Overflow",
|
||||
"cweId": "CWE-122"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Memory Corruption",
|
||||
"cweId": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "GNOME",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "libgsf",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.0"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.1"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.2"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.3"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.4"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.5"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.6"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.7"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.8"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.9"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.10"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.11"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.12"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.13"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.14"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.15"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.16"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.17"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.18"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.19"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.20"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.21"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.22"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.23"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.24"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.25"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.26"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.27"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.28"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.29"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.30"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.31"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.32"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.33"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.34"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.35"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.36"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.37"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.38"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.39"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.40"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.41"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.42"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.43"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.44"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.45"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.46"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.47"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.48"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.49"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.50"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.51"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.52"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.53"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300743",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.300743"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300743",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.300743"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.520183",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?submit.520183"
|
||||
},
|
||||
{
|
||||
"url": "https://www.gnome.org/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.gnome.org/"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ninpwn (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 5.3,
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 5.3,
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 4.3,
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,330 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2025-2724",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability classified as problematic has been found in GNOME libgsf up to 1.14.53. Affected is the function sorting_key_copy. The manipulation of the argument Name leads to out-of-bounds read. It is possible to launch the attack on the local host. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "Es wurde eine problematische Schwachstelle in GNOME libgsf bis 1.14.53 entdeckt. Betroffen hiervon ist die Funktion sorting_key_copy. Durch Manipulation des Arguments Name mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Der Angriff hat dabei lokal zu erfolgen."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Out-of-Bounds Read",
|
||||
"cweId": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Memory Corruption",
|
||||
"cweId": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "GNOME",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "libgsf",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.0"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.1"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.2"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.3"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.4"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.5"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.6"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.7"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.8"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.9"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.10"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.11"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.12"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.13"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.14"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.15"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.16"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.17"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.18"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.19"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.20"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.21"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.22"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.23"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.24"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.25"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.26"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.27"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.28"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.29"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.30"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.31"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.32"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.33"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.34"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.35"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.36"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.37"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.38"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.39"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.40"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.41"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.42"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.43"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.44"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.45"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.46"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.47"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.48"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.49"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.50"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.51"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.52"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "1.14.53"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300744",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.300744"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300744",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.300744"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.520184",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?submit.520184"
|
||||
},
|
||||
{
|
||||
"url": "https://www.gnome.org/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.gnome.org/"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ninpwn (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 3.3,
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 3.3,
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 1.7,
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
18
2025/2xxx/CVE-2025-2783.json
Normal file
18
2025/2xxx/CVE-2025-2783.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2025-2783",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2025/2xxx/CVE-2025-2784.json
Normal file
18
2025/2xxx/CVE-2025-2784.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2025-2784",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user