From ddccdefc39e1ed606b27eb3ca10f7c3eb8457c65 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 27 Feb 2025 13:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/13xxx/CVE-2024-13402.json | 76 ++++++++++++++++++++-- 2024/50xxx/CVE-2024-50146.json | 11 ++++ 2024/52xxx/CVE-2024-52559.json | 13 +++- 2024/57xxx/CVE-2024-57977.json | 114 +++++++++++++++++++++++++++++++-- 2025/1xxx/CVE-2025-1691.json | 92 ++++++++++++++++++++++++-- 2025/1xxx/CVE-2025-1692.json | 79 +++++++++++++++++++++-- 2025/1xxx/CVE-2025-1693.json | 92 ++++++++++++++++++++++++-- 2025/1xxx/CVE-2025-1738.json | 109 +++++++++++++++++++++++++++++-- 2025/1xxx/CVE-2025-1739.json | 109 +++++++++++++++++++++++++++++-- 2025/1xxx/CVE-2025-1751.json | 97 ++++++++++++++++++++++++++-- 10 files changed, 759 insertions(+), 33 deletions(-) diff --git a/2024/13xxx/CVE-2024-13402.json b/2024/13xxx/CVE-2024-13402.json index 566e7b7772d..f6692826d76 100644 --- a/2024/13xxx/CVE-2024-13402.json +++ b/2024/13xxx/CVE-2024-13402.json @@ -1,17 +1,85 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-13402", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Buddyboss Platform plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018link_title\u2019 parameter in all versions up to, and including, 2.7.70 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Boss Media", + "product": { + "product_data": [ + { + "product_name": "Buddyboss Platform", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "2.7.70" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/42743c2f-053b-4f14-bf11-865f978ec017?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/42743c2f-053b-4f14-bf11-865f978ec017?source=cve" + }, + { + "url": "https://www.buddyboss.com/resources/buddyboss-platform-releases/2-8-00/", + "refsource": "MISC", + "name": "https://www.buddyboss.com/resources/buddyboss-platform-releases/2-8-00/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Michael Mazzolini" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/50xxx/CVE-2024-50146.json b/2024/50xxx/CVE-2024-50146.json index 56fc5964655..08f7c57de7a 100644 --- a/2024/50xxx/CVE-2024-50146.json +++ b/2024/50xxx/CVE-2024-50146.json @@ -63,6 +63,12 @@ "status": "unaffected", "versionType": "semver" }, + { + "version": "6.6.80", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, { "version": "6.11.6", "lessThanOrEqual": "6.11.*", @@ -95,6 +101,11 @@ "refsource": "MISC", "name": "https://git.kernel.org/stable/c/db84cb4c8c565e6d4de84b23c2818b63991adfdd" }, + { + "url": "https://git.kernel.org/stable/c/d6fe973c8873c998734a050f366b28facc03d32a", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/d6fe973c8873c998734a050f366b28facc03d32a" + }, { "url": "https://git.kernel.org/stable/c/3955b77494c3c7d14873b1db67e7e00c46a714db", "refsource": "MISC", diff --git a/2024/52xxx/CVE-2024-52559.json b/2024/52xxx/CVE-2024-52559.json index e63bc8fcf0a..15ef830bde0 100644 --- a/2024/52xxx/CVE-2024-52559.json +++ b/2024/52xxx/CVE-2024-52559.json @@ -41,7 +41,7 @@ { "version_affected": "<", "version_name": "198725337ef1f73b73e7dc953c6ffb0799f26ffe", - "version_value": "2f1845e46c41ed500789d53dc45b383b7745c96c" + "version_value": "2b99b2c4621d13bd4374ef384e8f1fc188d0a5df" }, { "version_value": "not down converted", @@ -57,6 +57,12 @@ "status": "unaffected", "versionType": "semver" }, + { + "version": "6.6.80", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, { "version": "6.12.16", "lessThanOrEqual": "6.12.*", @@ -90,6 +96,11 @@ }, "references": { "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/2b99b2c4621d13bd4374ef384e8f1fc188d0a5df", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/2b99b2c4621d13bd4374ef384e8f1fc188d0a5df" + }, { "url": "https://git.kernel.org/stable/c/2f1845e46c41ed500789d53dc45b383b7745c96c", "refsource": "MISC", diff --git a/2024/57xxx/CVE-2024-57977.json b/2024/57xxx/CVE-2024-57977.json index 43241e6c103..1dbb4c01bd3 100644 --- a/2024/57xxx/CVE-2024-57977.json +++ b/2024/57xxx/CVE-2024-57977.json @@ -1,18 +1,124 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-57977", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemcg: fix soft lockup in the OOM process\n\nA soft lockup issue was found in the product with about 56,000 tasks were\nin the OOM cgroup, it was traversing them when the soft lockup was\ntriggered.\n\nwatchdog: BUG: soft lockup - CPU#2 stuck for 23s! [VM Thread:1503066]\nCPU: 2 PID: 1503066 Comm: VM Thread Kdump: loaded Tainted: G\nHardware name: Huawei Cloud OpenStack Nova, BIOS\nRIP: 0010:console_unlock+0x343/0x540\nRSP: 0000:ffffb751447db9a0 EFLAGS: 00000247 ORIG_RAX: ffffffffffffff13\nRAX: 0000000000000001 RBX: 0000000000000000 RCX: 00000000ffffffff\nRDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000247\nRBP: ffffffffafc71f90 R08: 0000000000000000 R09: 0000000000000040\nR10: 0000000000000080 R11: 0000000000000000 R12: ffffffffafc74bd0\nR13: ffffffffaf60a220 R14: 0000000000000247 R15: 0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f2fe6ad91f0 CR3: 00000004b2076003 CR4: 0000000000360ee0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n vprintk_emit+0x193/0x280\n printk+0x52/0x6e\n dump_task+0x114/0x130\n mem_cgroup_scan_tasks+0x76/0x100\n dump_header+0x1fe/0x210\n oom_kill_process+0xd1/0x100\n out_of_memory+0x125/0x570\n mem_cgroup_out_of_memory+0xb5/0xd0\n try_charge+0x720/0x770\n mem_cgroup_try_charge+0x86/0x180\n mem_cgroup_try_charge_delay+0x1c/0x40\n do_anonymous_page+0xb5/0x390\n handle_mm_fault+0xc4/0x1f0\n\nThis is because thousands of processes are in the OOM cgroup, it takes a\nlong time to traverse all of them. As a result, this lead to soft lockup\nin the OOM process.\n\nTo fix this issue, call 'cond_resched' in the 'mem_cgroup_scan_tasks'\nfunction per 1000 iterations. For global OOM, call\n'touch_softlockup_watchdog' per 1000 iterations to avoid this issue." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9cbb78bb314360a860a8b23723971cb6fcb54176", + "version_value": "972486d37169fe85035e81b8c5dff21f70df1173" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "3.6", + "status": "affected" + }, + { + "version": "0", + "lessThan": "3.6", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.6.80", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.12.13", + "lessThanOrEqual": "6.12.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.13.2", + "lessThanOrEqual": "6.13.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.14-rc1", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/972486d37169fe85035e81b8c5dff21f70df1173", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/972486d37169fe85035e81b8c5dff21f70df1173" + }, + { + "url": "https://git.kernel.org/stable/c/c3a3741db8c1202aa959c77df3a4c361612d1eb1", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/c3a3741db8c1202aa959c77df3a4c361612d1eb1" + }, + { + "url": "https://git.kernel.org/stable/c/46576834291869457d4772bb7df72d7c2bb3d57f", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/46576834291869457d4772bb7df72d7c2bb3d57f" + }, + { + "url": "https://git.kernel.org/stable/c/ade81479c7dda1ce3eedb215c78bc615bbd04f06", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ade81479c7dda1ce3eedb215c78bc615bbd04f06" + } + ] + }, + "generator": { + "engine": "bippy-5f407fcff5a0" } } \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1691.json b/2025/1xxx/CVE-2025-1691.json index 6684da04720..dc38cf2f949 100644 --- a/2025/1xxx/CVE-2025-1691.json +++ b/2025/1xxx/CVE-2025-1691.json @@ -1,17 +1,101 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1691", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@mongodb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The MongoDB Shell may be susceptible to control character injection where an attacker with control of the mongosh autocomplete feature, can use the autocompletion feature to input and run obfuscated malicious text. This requires user interaction in the form of the user using \u2018tab\u2019 to autocomplete text that is a prefix of the attacker\u2019s prepared autocompletion. This issue affects mongosh versions prior to\u00a02.3.9.\u00a0\n\n\n\n\nThe vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')", + "cweId": "CWE-74" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "MongoDB Inc", + "product": { + "product_data": [ + { + "product_name": "mongosh", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "2.3.9" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://jira.mongodb.org/browse/MONGOSH-2024", + "refsource": "MISC", + "name": "https://jira.mongodb.org/browse/MONGOSH-2024" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker.
" + } + ], + "value": "The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2025/1xxx/CVE-2025-1692.json b/2025/1xxx/CVE-2025-1692.json index 0c8cfb84de5..0fad5467912 100644 --- a/2025/1xxx/CVE-2025-1692.json +++ b/2025/1xxx/CVE-2025-1692.json @@ -1,17 +1,88 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1692", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@mongodb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The MongoDB Shell may be susceptible to control character injection where an attacker with control of the user\u2019s clipboard could manipulate them to paste text into mongosh that evaluates arbitrary code. Control characters in the pasted text can be used to obfuscate malicious code. This issue affects mongosh versions prior to 2.3.9" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences", + "cweId": "CWE-150" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "MongoDB Inc", + "product": { + "product_data": [ + { + "product_name": "mongosh", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "2.3.9" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://jira.mongodb.org/browse/MONGOSH-2025", + "refsource": "MISC", + "name": "https://jira.mongodb.org/browse/MONGOSH-2025" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2025/1xxx/CVE-2025-1693.json b/2025/1xxx/CVE-2025-1693.json index c67ba482c5b..058f802feb4 100644 --- a/2025/1xxx/CVE-2025-1693.json +++ b/2025/1xxx/CVE-2025-1693.json @@ -1,17 +1,101 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1693", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@mongodb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The MongoDB Shell may be susceptible to control character injection where an attacker with control over the database cluster contents can inject control characters into the shell output. This may result in the display of falsified messages that appear to originate from mongosh or the underlying operating system, potentially misleading users into executing unsafe actions.\n\n\nThe vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker.\n\n\nThis issue affects mongosh versions prior to 2.3.9" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences", + "cweId": "CWE-150" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "MongoDB Inc", + "product": { + "product_data": [ + { + "product_name": "mongosh", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "2.3.9" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://jira.mongodb.org/browse/MONGOSH-2026", + "refsource": "MISC", + "name": "https://jira.mongodb.org/browse/MONGOSH-2026" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker.

" + } + ], + "value": "The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 3.9, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2025/1xxx/CVE-2025-1738.json b/2025/1xxx/CVE-2025-1738.json index 8cc0283612a..5247013af25 100644 --- a/2025/1xxx/CVE-2025-1738.json +++ b/2025/1xxx/CVE-2025-1738.json @@ -1,17 +1,118 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1738", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-coordination@incibe.es", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Password Transmitted over Query String vulnerability has been found in Trivision Camera NC227WF v5.8.0 from TrivisionSecurity, exposing this sensitive information to a third party." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-598", + "cweId": "CWE-598" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Trivision", + "product": { + "product_data": [ + { + "product_name": "Camera NC227WF", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "5.8.0" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-trivision-camera-nc227wf", + "refsource": "MISC", + "name": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-trivision-camera-nc227wf" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "There is no reported solution at this time.
" + } + ], + "value": "There is no reported solution at this time." + } + ], + "credits": [ + { + "lang": "en", + "value": "Andrea Brosio" + }, + { + "lang": "en", + "value": "Andris Raugulis" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2025/1xxx/CVE-2025-1739.json b/2025/1xxx/CVE-2025-1739.json index ae9277a7c53..d9ad9fc7ebd 100644 --- a/2025/1xxx/CVE-2025-1739.json +++ b/2025/1xxx/CVE-2025-1739.json @@ -1,17 +1,118 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1739", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-coordination@incibe.es", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Authentication Bypass vulnerability has been found in Trivision Camera NC227WF v5.8.0 from TrivisionSecurity. This vulnerability allows an attacker to retrieve administrator's credentials in cleartext by sending a request against the server using curl with random credentials to \"/en/player/activex_pal.asp\" and successfully authenticating the application." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-288", + "cweId": "CWE-288" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Trivision", + "product": { + "product_data": [ + { + "product_name": "Camera NC227WF", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "5.8.0" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-trivision-camera-nc227wf", + "refsource": "MISC", + "name": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-trivision-camera-nc227wf" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "There is no reported solution at this time.
" + } + ], + "value": "There is no reported solution at this time." + } + ], + "credits": [ + { + "lang": "en", + "value": "Andrea Brosio" + }, + { + "lang": "en", + "value": "Andris Raugulis" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "version": "3.1" } ] } diff --git a/2025/1xxx/CVE-2025-1751.json b/2025/1xxx/CVE-2025-1751.json index f739c45d5e7..fd39285d29c 100644 --- a/2025/1xxx/CVE-2025-1751.json +++ b/2025/1xxx/CVE-2025-1751.json @@ -1,17 +1,106 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1751", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@atisoluciones.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A SQL Injection vulnerability has been found in Ciges 2.15.5 from ATISoluciones. This vulnerability allows an attacker to retrieve, create, update and delete database via $idServicio parameter in /modules/ajaxBloqueaCita.php endpoint." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "ATISoluciones", + "product": { + "product_data": [ + { + "product_name": "CIGES", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.15.5" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.atisoluciones.com/incidentes-cve", + "refsource": "MISC", + "name": "https://www.atisoluciones.com/incidentes-cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "All functions involved in ajaxBloqueoCita.php are reviewed, and some queries that cause this vulnerability are found. Prepared statements are then implemented in all of them.\n\nA new version of the software, v2.15.6, has been released to address the detected vulnerabilities.\n\n
" + } + ], + "value": "All functions involved in ajaxBloqueoCita.php are reviewed, and some queries that cause this vulnerability are found. Prepared statements are then implemented in all of them.\n\nA new version of the software, v2.15.6, has been released to address the detected vulnerabilities." + } + ], + "credits": [ + { + "lang": "en", + "value": "Gonzalo Aguilar Garcia (6h4ack)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] }