diff --git a/2025/0xxx/CVE-2025-0285.json b/2025/0xxx/CVE-2025-0285.json index ba863cac959..899b2c11e26 100644 --- a/2025/0xxx/CVE-2025-0285.json +++ b/2025/0xxx/CVE-2025-0285.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory mapping vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to perform privilege escalation exploits." + "value": "Paragon Partition Manager version 17.9.1 contains an arbitrary kernel memory mapping vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to perform privilege escalation exploits." } ] }, @@ -48,7 +48,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "7.9.1" + "version_value": "17.9.1" } ] } @@ -79,7 +79,7 @@ ] }, "generator": { - "engine": "VINCE 3.0.13", + "engine": "VINCE 3.0.14", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2025-0285" }, diff --git a/2025/0xxx/CVE-2025-0286.json b/2025/0xxx/CVE-2025-0286.json index 4da3c36857f..5f7ea9dffa4 100644 --- a/2025/0xxx/CVE-2025-0286.json +++ b/2025/0xxx/CVE-2025-0286.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory write vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to execute arbitrary code on the victim machine." + "value": "Paragon Partition Manager version 17.9.1 contains an arbitrary kernel memory write vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to execute arbitrary code on the victim machine." } ] }, @@ -48,7 +48,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "7.9.1" + "version_value": "17.9.1" } ] } @@ -70,11 +70,16 @@ "url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys", "refsource": "MISC", "name": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys" + }, + { + "url": "https://www.paragon-software.com/support/#patches", + "refsource": "MISC", + "name": "https://www.paragon-software.com/support/#patches" } ] }, "generator": { - "engine": "VINCE 3.0.13", + "engine": "VINCE 3.0.14", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2025-0286" }, diff --git a/2025/0xxx/CVE-2025-0287.json b/2025/0xxx/CVE-2025-0287.json index 6e75bfc61be..cd3acc4c8cc 100644 --- a/2025/0xxx/CVE-2025-0287.json +++ b/2025/0xxx/CVE-2025-0287.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Paragon Partition Manager version 7.9.1 contains a null pointer dereference vulnerability within biontdrv.sys that is caused by a lack of a valid MasterLrp structure in the input buffer, allowing an attacker to execute arbitrary code in the kernel, facilitating privilege escalation." + "value": "Paragon Partition Manager version 17.9.1 contains a null pointer dereference vulnerability within biontdrv.sys that is caused by a lack of a valid MasterLrp structure in the input buffer, allowing an attacker to execute arbitrary code in the kernel, facilitating privilege escalation." } ] }, @@ -40,7 +40,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "7.9.1" + "version_value": "17.9.1" } ] } @@ -71,7 +71,7 @@ ] }, "generator": { - "engine": "VINCE 3.0.13", + "engine": "VINCE 3.0.14", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2025-0287" }, diff --git a/2025/0xxx/CVE-2025-0288.json b/2025/0xxx/CVE-2025-0288.json index b79018218a5..6efb7dfcfed 100644 --- a/2025/0xxx/CVE-2025-0288.json +++ b/2025/0xxx/CVE-2025-0288.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory vulnerability facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation." + "value": "Paragon Partition Manager version 17.9.1 contains an arbitrary kernel memory vulnerability facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation." } ] }, @@ -48,7 +48,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "7.9.1" + "version_value": "17.9.1" } ] } @@ -79,7 +79,7 @@ ] }, "generator": { - "engine": "VINCE 3.0.13", + "engine": "VINCE 3.0.14", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2025-0288" }, diff --git a/2025/2xxx/CVE-2025-2878.json b/2025/2xxx/CVE-2025-2878.json new file mode 100644 index 00000000000..24756b7cda7 --- /dev/null +++ b/2025/2xxx/CVE-2025-2878.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-2878", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2879.json b/2025/2xxx/CVE-2025-2879.json new file mode 100644 index 00000000000..3b28aecf441 --- /dev/null +++ b/2025/2xxx/CVE-2025-2879.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-2879", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30093.json b/2025/30xxx/CVE-2025-30093.json index cab98f3f75f..6c43eafc7b6 100644 --- a/2025/30xxx/CVE-2025-30093.json +++ b/2025/30xxx/CVE-2025-30093.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-30093", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-30093", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "HTCondor 23.0.x before 23.0.22, 23.10.x before 23.10.22, 24.0.x before 24.0.6, and 24.6.x before 24.6.1 allows authenticated attackers to bypass authorization restrictions." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0001.html", + "refsource": "MISC", + "name": "https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0001.html" } ] }