diff --git a/2025/0xxx/CVE-2025-0050.json b/2025/0xxx/CVE-2025-0050.json
index 929ad1bd10c..866ccdb205f 100644
--- a/2025/0xxx/CVE-2025-0050.json
+++ b/2025/0xxx/CVE-2025-0050.json
@@ -1,18 +1,150 @@
{
+ "data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
- "data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-0050",
- "ASSIGNER": "cve@mitre.org",
- "STATE": "RESERVED"
+ "ASSIGNER": "arm-security@arm.com",
+ "STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
- "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to make valid GPU processing operations, including via WebGL or WebGPU, to access a limited amount outside of buffer bounds.This issue affects Bifrost GPU Userspace Driver: from r0p0 through r49p2, from r50p0 through r51p0; Valhall GPU Userspace Driver: from r19p0 through r49p2, from r50p0 through r53p0; Arm 5th Gen GPU Architecture Userspace Driver: from r41p0 through r49p2, from r50p0 through r53p0."
}
]
- }
+ },
+ "problemtype": {
+ "problemtype_data": [
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
+ "cweId": "CWE-119"
+ }
+ ]
+ }
+ ]
+ },
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "vendor_name": "Arm Ltd",
+ "product": {
+ "product_data": [
+ {
+ "product_name": "Valhall GPU Userspace Driver",
+ "version": {
+ "version_data": [
+ {
+ "version_value": "not down converted",
+ "x_cve_json_5_version_data": {
+ "versions": [
+ {
+ "changes": [
+ {
+ "at": "r49p3",
+ "status": "unaffected"
+ }
+ ],
+ "lessThanOrEqual": "r49p2",
+ "status": "affected",
+ "version": "r19p0",
+ "versionType": "patch"
+ },
+ {
+ "changes": [
+ {
+ "at": "r54p0",
+ "status": "unaffected"
+ }
+ ],
+ "lessThanOrEqual": "r53p0",
+ "status": "affected",
+ "version": "r50p0",
+ "versionType": "patch"
+ }
+ ],
+ "defaultStatus": "unaffected"
+ }
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "Arm 5th Gen GPU Architecture Userspace Driver",
+ "version": {
+ "version_data": [
+ {
+ "version_value": "not down converted",
+ "x_cve_json_5_version_data": {
+ "versions": [
+ {
+ "changes": [
+ {
+ "at": "r49p3",
+ "status": "unaffected"
+ }
+ ],
+ "lessThanOrEqual": "r49p2",
+ "status": "affected",
+ "version": "r41p0",
+ "versionType": "patch"
+ },
+ {
+ "changes": [
+ {
+ "at": "r54p0",
+ "status": "unaffected"
+ }
+ ],
+ "lessThanOrEqual": "r53p0",
+ "status": "affected",
+ "version": "r50p0",
+ "versionType": "patch"
+ }
+ ],
+ "defaultStatus": "unaffected"
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ },
+ "references": {
+ "reference_data": [
+ {
+ "url": "https://developer.arm.com/documentation/110435/latest/",
+ "refsource": "MISC",
+ "name": "https://developer.arm.com/documentation/110435/latest/"
+ }
+ ]
+ },
+ "generator": {
+ "engine": "Vulnogram 0.2.0"
+ },
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "solution": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "This issue has been fixed in the following versions:
- Bifrost GPU Userspace Driver r49p3
- Valhall GPU Userspace Driver r49p3 and r54p0
- Arm 5th Gen GPU Architecture Userspace Driver r49p3 and r54p0
Arm recommends that affected users upgrade to the latest applicable version to protect against this issue.
"
+ }
+ ],
+ "value": "This issue has been fixed in the following versions:\n * Bifrost GPU Userspace Driver r49p3\n\n * Valhall GPU Userspace Driver r49p3 and r54p0\n\n * Arm 5th Gen GPU Architecture Userspace Driver r49p3 and r54p0\n\n\n\nArm recommends that affected users upgrade to the latest applicable version to protect against this issue."
+ }
+ ]
}
\ No newline at end of file
diff --git a/2025/3xxx/CVE-2025-3351.json b/2025/3xxx/CVE-2025-3351.json
index 833e9feffbb..d061708c0f8 100644
--- a/2025/3xxx/CVE-2025-3351.json
+++ b/2025/3xxx/CVE-2025-3351.json
@@ -1,17 +1,123 @@
{
+ "data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
- "data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-3351",
- "ASSIGNER": "cve@mitre.org",
- "STATE": "RESERVED"
+ "ASSIGNER": "cna@vuldb.com",
+ "STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
- "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ "value": "A vulnerability has been found in PHPGurukul Old Age Home Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "deu",
+ "value": "In PHPGurukul Old Age Home Management System 1.0 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Es geht um eine nicht n\u00e4her bekannte Funktion der Datei /admin/login.php. Durch das Beeinflussen des Arguments Username mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
+ }
+ ]
+ },
+ "problemtype": {
+ "problemtype_data": [
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "SQL Injection",
+ "cweId": "CWE-89"
+ }
+ ]
+ },
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "Injection",
+ "cweId": "CWE-74"
+ }
+ ]
+ }
+ ]
+ },
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "vendor_name": "PHPGurukul",
+ "product": {
+ "product_data": [
+ {
+ "product_name": "Old Age Home Management System",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "=",
+ "version_value": "1.0"
+ }
+ ]
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ },
+ "references": {
+ "reference_data": [
+ {
+ "url": "https://vuldb.com/?id.303565",
+ "refsource": "MISC",
+ "name": "https://vuldb.com/?id.303565"
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.303565",
+ "refsource": "MISC",
+ "name": "https://vuldb.com/?ctiid.303565"
+ },
+ {
+ "url": "https://vuldb.com/?submit.552130",
+ "refsource": "MISC",
+ "name": "https://vuldb.com/?submit.552130"
+ },
+ {
+ "url": "https://github.com/n0name-yang/myCVE/issues/2",
+ "refsource": "MISC",
+ "name": "https://github.com/n0name-yang/myCVE/issues/2"
+ },
+ {
+ "url": "https://phpgurukul.com/",
+ "refsource": "MISC",
+ "name": "https://phpgurukul.com/"
+ }
+ ]
+ },
+ "credits": [
+ {
+ "lang": "en",
+ "value": "n0name (VulDB User)"
+ }
+ ],
+ "impact": {
+ "cvss": [
+ {
+ "version": "3.1",
+ "baseScore": 7.3,
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "baseSeverity": "HIGH"
+ },
+ {
+ "version": "3.0",
+ "baseScore": 7.3,
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "baseSeverity": "HIGH"
+ },
+ {
+ "version": "2.0",
+ "baseScore": 7.5,
+ "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
}
]
}
diff --git a/2025/3xxx/CVE-2025-3352.json b/2025/3xxx/CVE-2025-3352.json
index a3ba6bde498..13e35fdc049 100644
--- a/2025/3xxx/CVE-2025-3352.json
+++ b/2025/3xxx/CVE-2025-3352.json
@@ -1,17 +1,123 @@
{
+ "data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
- "data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-3352",
- "ASSIGNER": "cve@mitre.org",
- "STATE": "RESERVED"
+ "ASSIGNER": "cna@vuldb.com",
+ "STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
- "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ "value": "A vulnerability was found in PHPGurukul Old Age Home Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/edit-scdetails.php. The manipulation of the argument contnum leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "deu",
+ "value": "Eine Schwachstelle wurde in PHPGurukul Old Age Home Management System 1.0 gefunden. Sie wurde als kritisch eingestuft. Es geht hierbei um eine nicht n\u00e4her spezifizierte Funktion der Datei /admin/edit-scdetails.php. Durch Beeinflussen des Arguments contnum mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
+ }
+ ]
+ },
+ "problemtype": {
+ "problemtype_data": [
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "SQL Injection",
+ "cweId": "CWE-89"
+ }
+ ]
+ },
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "Injection",
+ "cweId": "CWE-74"
+ }
+ ]
+ }
+ ]
+ },
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "vendor_name": "PHPGurukul",
+ "product": {
+ "product_data": [
+ {
+ "product_name": "Old Age Home Management System",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "=",
+ "version_value": "1.0"
+ }
+ ]
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ },
+ "references": {
+ "reference_data": [
+ {
+ "url": "https://vuldb.com/?id.303566",
+ "refsource": "MISC",
+ "name": "https://vuldb.com/?id.303566"
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.303566",
+ "refsource": "MISC",
+ "name": "https://vuldb.com/?ctiid.303566"
+ },
+ {
+ "url": "https://vuldb.com/?submit.552171",
+ "refsource": "MISC",
+ "name": "https://vuldb.com/?submit.552171"
+ },
+ {
+ "url": "https://github.com/n0name-yang/myCVE/issues/3",
+ "refsource": "MISC",
+ "name": "https://github.com/n0name-yang/myCVE/issues/3"
+ },
+ {
+ "url": "https://phpgurukul.com/",
+ "refsource": "MISC",
+ "name": "https://phpgurukul.com/"
+ }
+ ]
+ },
+ "credits": [
+ {
+ "lang": "en",
+ "value": "n0name (VulDB User)"
+ }
+ ],
+ "impact": {
+ "cvss": [
+ {
+ "version": "3.1",
+ "baseScore": 7.3,
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "baseSeverity": "HIGH"
+ },
+ {
+ "version": "3.0",
+ "baseScore": 7.3,
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "baseSeverity": "HIGH"
+ },
+ {
+ "version": "2.0",
+ "baseScore": 7.5,
+ "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
}
]
}
diff --git a/2025/3xxx/CVE-2025-3359.json b/2025/3xxx/CVE-2025-3359.json
index 7a29ba97f82..ecbb24d88ab 100644
--- a/2025/3xxx/CVE-2025-3359.json
+++ b/2025/3xxx/CVE-2025-3359.json
@@ -1,17 +1,126 @@
{
+ "data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
- "data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-3359",
- "ASSIGNER": "cve@mitre.org",
- "STATE": "RESERVED"
+ "ASSIGNER": "secalert@redhat.com",
+ "STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
- "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ "value": "A flaw was found in GNUPlot. A segmentation fault via IO_str_init_static_internal may jeopardize the environment."
+ }
+ ]
+ },
+ "problemtype": {
+ "problemtype_data": [
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "Improper Check for Unusual or Exceptional Conditions",
+ "cweId": "CWE-754"
+ }
+ ]
+ }
+ ]
+ },
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "vendor_name": "Red Hat",
+ "product": {
+ "product_data": [
+ {
+ "product_name": "Red Hat Enterprise Linux 6",
+ "version": {
+ "version_data": [
+ {
+ "version_value": "not down converted",
+ "x_cve_json_5_version_data": {
+ "defaultStatus": "affected"
+ }
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "Red Hat Enterprise Linux 7",
+ "version": {
+ "version_data": [
+ {
+ "version_value": "not down converted",
+ "x_cve_json_5_version_data": {
+ "defaultStatus": "affected"
+ }
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "Red Hat Enterprise Linux 8",
+ "version": {
+ "version_data": [
+ {
+ "version_value": "not down converted",
+ "x_cve_json_5_version_data": {
+ "defaultStatus": "affected"
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ },
+ "references": {
+ "reference_data": [
+ {
+ "url": "https://access.redhat.com/security/cve/CVE-2025-3359",
+ "refsource": "MISC",
+ "name": "https://access.redhat.com/security/cve/CVE-2025-3359"
+ },
+ {
+ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357749",
+ "refsource": "MISC",
+ "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2357749"
+ }
+ ]
+ },
+ "work_around": [
+ {
+ "lang": "en",
+ "value": "Currently, no mitigation is available for this vulnerability."
+ }
+ ],
+ "credits": [
+ {
+ "lang": "en",
+ "value": "Red Hat would like to thank ChenYiFan Liu for reporting this issue."
+ }
+ ],
+ "impact": {
+ "cvss": [
+ {
+ "attackComplexity": "LOW",
+ "attackVector": "LOCAL",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.2,
+ "baseSeverity": "MEDIUM",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "privilegesRequired": "NONE",
+ "scope": "UNCHANGED",
+ "userInteraction": "NONE",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "version": "3.1"
}
]
}
diff --git a/2025/3xxx/CVE-2025-3360.json b/2025/3xxx/CVE-2025-3360.json
index f29ba15baee..0660b3dace1 100644
--- a/2025/3xxx/CVE-2025-3360.json
+++ b/2025/3xxx/CVE-2025-3360.json
@@ -1,17 +1,163 @@
{
+ "data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
- "data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-3360",
- "ASSIGNER": "cve@mitre.org",
- "STATE": "RESERVED"
+ "ASSIGNER": "secalert@redhat.com",
+ "STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
- "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ "value": "A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function."
+ }
+ ]
+ },
+ "problemtype": {
+ "problemtype_data": [
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "Integer Overflow or Wraparound",
+ "cweId": "CWE-190"
+ }
+ ]
+ }
+ ]
+ },
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "vendor_name": "Red Hat",
+ "product": {
+ "product_data": [
+ {
+ "product_name": "Red Hat Enterprise Linux 6",
+ "version": {
+ "version_data": [
+ {
+ "version_value": "not down converted",
+ "x_cve_json_5_version_data": {
+ "defaultStatus": "unknown"
+ }
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "Red Hat Enterprise Linux 7",
+ "version": {
+ "version_data": [
+ {
+ "version_value": "not down converted",
+ "x_cve_json_5_version_data": {
+ "defaultStatus": "unknown"
+ }
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "Red Hat Enterprise Linux 8",
+ "version": {
+ "version_data": [
+ {
+ "version_value": "not down converted",
+ "x_cve_json_5_version_data": {
+ "defaultStatus": "affected"
+ }
+ },
+ {
+ "version_value": "not down converted",
+ "x_cve_json_5_version_data": {
+ "defaultStatus": "affected"
+ }
+ },
+ {
+ "version_value": "not down converted",
+ "x_cve_json_5_version_data": {
+ "defaultStatus": "affected"
+ }
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "Red Hat Enterprise Linux 9",
+ "version": {
+ "version_data": [
+ {
+ "version_value": "not down converted",
+ "x_cve_json_5_version_data": {
+ "defaultStatus": "affected"
+ }
+ },
+ {
+ "version_value": "not down converted",
+ "x_cve_json_5_version_data": {
+ "defaultStatus": "affected"
+ }
+ },
+ {
+ "version_value": "not down converted",
+ "x_cve_json_5_version_data": {
+ "defaultStatus": "affected"
+ }
+ },
+ {
+ "version_value": "not down converted",
+ "x_cve_json_5_version_data": {
+ "defaultStatus": "affected"
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ },
+ "references": {
+ "reference_data": [
+ {
+ "url": "https://access.redhat.com/security/cve/CVE-2025-3360",
+ "refsource": "MISC",
+ "name": "https://access.redhat.com/security/cve/CVE-2025-3360"
+ },
+ {
+ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357754",
+ "refsource": "MISC",
+ "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2357754"
+ }
+ ]
+ },
+ "work_around": [
+ {
+ "lang": "en",
+ "value": "Currently, no mitigation is available for this vulnerability."
+ }
+ ],
+ "impact": {
+ "cvss": [
+ {
+ "attackComplexity": "HIGH",
+ "attackVector": "NETWORK",
+ "availabilityImpact": "LOW",
+ "baseScore": 3.7,
+ "baseSeverity": "LOW",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "privilegesRequired": "NONE",
+ "scope": "UNCHANGED",
+ "userInteraction": "NONE",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
+ "version": "3.1"
}
]
}
diff --git a/2025/3xxx/CVE-2025-3414.json b/2025/3xxx/CVE-2025-3414.json
new file mode 100644
index 00000000000..d20c08f5cfc
--- /dev/null
+++ b/2025/3xxx/CVE-2025-3414.json
@@ -0,0 +1,18 @@
+{
+ "data_type": "CVE",
+ "data_format": "MITRE",
+ "data_version": "4.0",
+ "CVE_data_meta": {
+ "ID": "CVE-2025-3414",
+ "ASSIGNER": "cve@mitre.org",
+ "STATE": "RESERVED"
+ },
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ }
+ ]
+ }
+}
\ No newline at end of file