From eea7c6b2cb67b981bd11cb2cde9ea116b4119b49 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 1 Mar 2025 15:00:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/41xxx/CVE-2024-41778.json | 83 +++++++++++++++++++++++-- 2025/1xxx/CVE-2025-1797.json | 109 +++++++++++++++++++++++++++++++-- 2025/1xxx/CVE-2025-1816.json | 18 ++++++ 2025/1xxx/CVE-2025-1817.json | 18 ++++++ 2025/1xxx/CVE-2025-1818.json | 18 ++++++ 2025/1xxx/CVE-2025-1819.json | 18 ++++++ 2025/1xxx/CVE-2025-1820.json | 18 ++++++ 2025/1xxx/CVE-2025-1821.json | 18 ++++++ 2025/1xxx/CVE-2025-1822.json | 18 ++++++ 2025/1xxx/CVE-2025-1823.json | 18 ++++++ 2025/1xxx/CVE-2025-1824.json | 18 ++++++ 2025/1xxx/CVE-2025-1825.json | 18 ++++++ 2025/1xxx/CVE-2025-1826.json | 18 ++++++ 2025/1xxx/CVE-2025-1827.json | 18 ++++++ 14 files changed, 400 insertions(+), 8 deletions(-) create mode 100644 2025/1xxx/CVE-2025-1816.json create mode 100644 2025/1xxx/CVE-2025-1817.json create mode 100644 2025/1xxx/CVE-2025-1818.json create mode 100644 2025/1xxx/CVE-2025-1819.json create mode 100644 2025/1xxx/CVE-2025-1820.json create mode 100644 2025/1xxx/CVE-2025-1821.json create mode 100644 2025/1xxx/CVE-2025-1822.json create mode 100644 2025/1xxx/CVE-2025-1823.json create mode 100644 2025/1xxx/CVE-2025-1824.json create mode 100644 2025/1xxx/CVE-2025-1825.json create mode 100644 2025/1xxx/CVE-2025-1826.json create mode 100644 2025/1xxx/CVE-2025-1827.json diff --git a/2024/41xxx/CVE-2024-41778.json b/2024/41xxx/CVE-2024-41778.json index 646faf81200..f135c8c3c53 100644 --- a/2024/41xxx/CVE-2024-41778.json +++ b/2024/41xxx/CVE-2024-41778.json @@ -1,17 +1,92 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-41778", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Controller 11.0.0 through 11.0.1 and 11.1.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-521 Weak Password Requirements", + "cweId": "CWE-521" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Controller", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "11.0.0", + "version_value": "11.0.1" + }, + { + "version_affected": "=", + "version_value": "11.1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/7184423", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/7184423" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2025/1xxx/CVE-2025-1797.json b/2025/1xxx/CVE-2025-1797.json index 9843aad3bbd..d66ad534baa 100644 --- a/2025/1xxx/CVE-2025-1797.json +++ b/2025/1xxx/CVE-2025-1797.json @@ -1,17 +1,118 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1797", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as critical, has been found in Hunan Zhonghe Baiyi Information Technology Baiyiyun Asset Management and Operations System up to 20250217. Affected by this issue is some unknown functionality of the file /wuser/anyUserBoundHouse.php. The manipulation of the argument huid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "deu", + "value": "Eine kritische Schwachstelle wurde in Hunan Zhonghe Baiyi Information Technology Baiyiyun Asset Management and Operations System bis 20250217 entdeckt. Betroffen davon ist ein unbekannter Prozess der Datei /wuser/anyUserBoundHouse.php. Mittels dem Manipulieren des Arguments huid mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL Injection", + "cweId": "CWE-89" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Injection", + "cweId": "CWE-74" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Hunan Zhonghe Baiyi Information Technology", + "product": { + "product_data": [ + { + "product_name": "Baiyiyun Asset Management and Operations System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "20250217" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.298028", + "refsource": "MISC", + "name": "https://vuldb.com/?id.298028" + }, + { + "url": "https://vuldb.com/?ctiid.298028", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.298028" + }, + { + "url": "https://vuldb.com/?submit.502649", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.502649" + }, + { + "url": "https://github.com/chichi24-ver/CVE/blob/main/CVE_1.md", + "refsource": "MISC", + "name": "https://github.com/chichi24-ver/CVE/blob/main/CVE_1.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "chichi16 (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2025/1xxx/CVE-2025-1816.json b/2025/1xxx/CVE-2025-1816.json new file mode 100644 index 00000000000..78b8573cc66 --- /dev/null +++ b/2025/1xxx/CVE-2025-1816.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1816", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1817.json b/2025/1xxx/CVE-2025-1817.json new file mode 100644 index 00000000000..25e9c2bdb94 --- /dev/null +++ b/2025/1xxx/CVE-2025-1817.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1817", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1818.json b/2025/1xxx/CVE-2025-1818.json new file mode 100644 index 00000000000..7a3e672b58d --- /dev/null +++ b/2025/1xxx/CVE-2025-1818.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1818", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1819.json b/2025/1xxx/CVE-2025-1819.json new file mode 100644 index 00000000000..9b647f66c1a --- /dev/null +++ b/2025/1xxx/CVE-2025-1819.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1819", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1820.json b/2025/1xxx/CVE-2025-1820.json new file mode 100644 index 00000000000..93c63b848b0 --- /dev/null +++ b/2025/1xxx/CVE-2025-1820.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1820", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1821.json b/2025/1xxx/CVE-2025-1821.json new file mode 100644 index 00000000000..f1539728fff --- /dev/null +++ b/2025/1xxx/CVE-2025-1821.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1821", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1822.json b/2025/1xxx/CVE-2025-1822.json new file mode 100644 index 00000000000..6df717fb1b0 --- /dev/null +++ b/2025/1xxx/CVE-2025-1822.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1822", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1823.json b/2025/1xxx/CVE-2025-1823.json new file mode 100644 index 00000000000..7793dec8e4f --- /dev/null +++ b/2025/1xxx/CVE-2025-1823.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1823", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1824.json b/2025/1xxx/CVE-2025-1824.json new file mode 100644 index 00000000000..cc5aac1a5cd --- /dev/null +++ b/2025/1xxx/CVE-2025-1824.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1824", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1825.json b/2025/1xxx/CVE-2025-1825.json new file mode 100644 index 00000000000..29bda28c32b --- /dev/null +++ b/2025/1xxx/CVE-2025-1825.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1825", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1826.json b/2025/1xxx/CVE-2025-1826.json new file mode 100644 index 00000000000..5aec8db8508 --- /dev/null +++ b/2025/1xxx/CVE-2025-1826.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1826", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1827.json b/2025/1xxx/CVE-2025-1827.json new file mode 100644 index 00000000000..93032020f08 --- /dev/null +++ b/2025/1xxx/CVE-2025-1827.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1827", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file