diff --git a/2024/13xxx/CVE-2024-13408.json b/2024/13xxx/CVE-2024-13408.json
new file mode 100644
index 00000000000..70b71e06d4f
--- /dev/null
+++ b/2024/13xxx/CVE-2024-13408.json
@@ -0,0 +1,18 @@
+{
+ "data_type": "CVE",
+ "data_format": "MITRE",
+ "data_version": "4.0",
+ "CVE_data_meta": {
+ "ID": "CVE-2024-13408",
+ "ASSIGNER": "cve@mitre.org",
+ "STATE": "RESERVED"
+ },
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ }
+ ]
+ }
+}
\ No newline at end of file
diff --git a/2024/13xxx/CVE-2024-13409.json b/2024/13xxx/CVE-2024-13409.json
new file mode 100644
index 00000000000..eb8aa7706d6
--- /dev/null
+++ b/2024/13xxx/CVE-2024-13409.json
@@ -0,0 +1,18 @@
+{
+ "data_type": "CVE",
+ "data_format": "MITRE",
+ "data_version": "4.0",
+ "CVE_data_meta": {
+ "ID": "CVE-2024-13409",
+ "ASSIGNER": "cve@mitre.org",
+ "STATE": "RESERVED"
+ },
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ }
+ ]
+ }
+}
\ No newline at end of file
diff --git a/2024/13xxx/CVE-2024-13410.json b/2024/13xxx/CVE-2024-13410.json
new file mode 100644
index 00000000000..d16491532de
--- /dev/null
+++ b/2024/13xxx/CVE-2024-13410.json
@@ -0,0 +1,18 @@
+{
+ "data_type": "CVE",
+ "data_format": "MITRE",
+ "data_version": "4.0",
+ "CVE_data_meta": {
+ "ID": "CVE-2024-13410",
+ "ASSIGNER": "cve@mitre.org",
+ "STATE": "RESERVED"
+ },
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ }
+ ]
+ }
+}
\ No newline at end of file
diff --git a/2024/13xxx/CVE-2024-13411.json b/2024/13xxx/CVE-2024-13411.json
new file mode 100644
index 00000000000..a44fbcce71d
--- /dev/null
+++ b/2024/13xxx/CVE-2024-13411.json
@@ -0,0 +1,18 @@
+{
+ "data_type": "CVE",
+ "data_format": "MITRE",
+ "data_version": "4.0",
+ "CVE_data_meta": {
+ "ID": "CVE-2024-13411",
+ "ASSIGNER": "cve@mitre.org",
+ "STATE": "RESERVED"
+ },
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ }
+ ]
+ }
+}
\ No newline at end of file
diff --git a/2024/13xxx/CVE-2024-13412.json b/2024/13xxx/CVE-2024-13412.json
new file mode 100644
index 00000000000..2972cc086f8
--- /dev/null
+++ b/2024/13xxx/CVE-2024-13412.json
@@ -0,0 +1,18 @@
+{
+ "data_type": "CVE",
+ "data_format": "MITRE",
+ "data_version": "4.0",
+ "CVE_data_meta": {
+ "ID": "CVE-2024-13412",
+ "ASSIGNER": "cve@mitre.org",
+ "STATE": "RESERVED"
+ },
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ }
+ ]
+ }
+}
\ No newline at end of file
diff --git a/2024/13xxx/CVE-2024-13413.json b/2024/13xxx/CVE-2024-13413.json
new file mode 100644
index 00000000000..d0bd4d63300
--- /dev/null
+++ b/2024/13xxx/CVE-2024-13413.json
@@ -0,0 +1,18 @@
+{
+ "data_type": "CVE",
+ "data_format": "MITRE",
+ "data_version": "4.0",
+ "CVE_data_meta": {
+ "ID": "CVE-2024-13413",
+ "ASSIGNER": "cve@mitre.org",
+ "STATE": "RESERVED"
+ },
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ }
+ ]
+ }
+}
\ No newline at end of file
diff --git a/2024/52xxx/CVE-2024-52005.json b/2024/52xxx/CVE-2024-52005.json
index ad36b07155c..d38015620e0 100644
--- a/2024/52xxx/CVE-2024-52005.json
+++ b/2024/52xxx/CVE-2024-52005.json
@@ -1,18 +1,114 @@
{
+ "data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
- "data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-52005",
- "ASSIGNER": "cve@mitre.org",
- "STATE": "RESERVED"
+ "ASSIGNER": "security-advisories@github.com",
+ "STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
- "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ "value": "Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called \"sideband channel\". These messages will be prefixed with \"remote:\" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources."
}
]
+ },
+ "problemtype": {
+ "problemtype_data": [
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "CWE-116: Improper Encoding or Escaping of Output",
+ "cweId": "CWE-116"
+ }
+ ]
+ },
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences",
+ "cweId": "CWE-150"
+ }
+ ]
+ }
+ ]
+ },
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "vendor_name": "git",
+ "product": {
+ "product_data": [
+ {
+ "product_name": "git",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "=",
+ "version_value": ">= 2.48.0, <= 2.48.1"
+ },
+ {
+ "version_affected": "=",
+ "version_value": ">= 2.47.0, <= 2.47.1"
+ },
+ {
+ "version_affected": "=",
+ "version_value": ">= 2.46.0, <= 2.46.3"
+ },
+ {
+ "version_affected": "=",
+ "version_value": ">= 2.45.0, <= 2.45.3"
+ },
+ {
+ "version_affected": "=",
+ "version_value": ">= 2.44.0, <= 2.44.3"
+ },
+ {
+ "version_affected": "=",
+ "version_value": ">= 2.43.0, <= 2.43.6"
+ },
+ {
+ "version_affected": "=",
+ "version_value": ">= 2.42.0, <= 2.42.4"
+ },
+ {
+ "version_affected": "=",
+ "version_value": ">= 2.41.0, <= 2.41.3"
+ },
+ {
+ "version_affected": "=",
+ "version_value": "<= 2.40.4"
+ }
+ ]
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ },
+ "references": {
+ "reference_data": [
+ {
+ "url": "https://github.com/git/git/security/advisories/GHSA-7jjc-gg6m-3329",
+ "refsource": "MISC",
+ "name": "https://github.com/git/git/security/advisories/GHSA-7jjc-gg6m-3329"
+ },
+ {
+ "url": "https://lore.kernel.org/git/1M9FnZ-1taoNo1wwh-00ESSd@mail.gmx.net",
+ "refsource": "MISC",
+ "name": "https://lore.kernel.org/git/1M9FnZ-1taoNo1wwh-00ESSd@mail.gmx.net"
+ }
+ ]
+ },
+ "source": {
+ "advisory": "GHSA-7jjc-gg6m-3329",
+ "discovery": "UNKNOWN"
}
}
\ No newline at end of file
diff --git a/2025/0xxx/CVE-2025-0480.json b/2025/0xxx/CVE-2025-0480.json
index ac790f1fdf0..5dd41ee0f6c 100644
--- a/2025/0xxx/CVE-2025-0480.json
+++ b/2025/0xxx/CVE-2025-0480.json
@@ -1,17 +1,114 @@
{
+ "data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
- "data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-0480",
- "ASSIGNER": "cve@mitre.org",
- "STATE": "RESERVED"
+ "ASSIGNER": "cna@vuldb.com",
+ "STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
- "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ "value": "A vulnerability classified as problematic has been found in wuzhicms 4.1.0. This affects the function test of the file coreframe/app/search/admin/config.php. The manipulation of the argument sphinxhost/sphinxport leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "deu",
+ "value": "Es wurde eine Schwachstelle in wuzhicms 4.1.0 entdeckt. Sie wurde als problematisch eingestuft. Es betrifft die Funktion test der Datei coreframe/app/search/admin/config.php. Durch Manipulieren des Arguments sphinxhost/sphinxport mit unbekannten Daten kann eine server-side request forgery-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
+ }
+ ]
+ },
+ "problemtype": {
+ "problemtype_data": [
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "Server-Side Request Forgery",
+ "cweId": "CWE-918"
+ }
+ ]
+ }
+ ]
+ },
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "vendor_name": "n/a",
+ "product": {
+ "product_data": [
+ {
+ "product_name": "wuzhicms",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "=",
+ "version_value": "4.1.0"
+ }
+ ]
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ },
+ "references": {
+ "reference_data": [
+ {
+ "url": "https://vuldb.com/?id.291915",
+ "refsource": "MISC",
+ "name": "https://vuldb.com/?id.291915"
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.291915",
+ "refsource": "MISC",
+ "name": "https://vuldb.com/?ctiid.291915"
+ },
+ {
+ "url": "https://vuldb.com/?submit.474965",
+ "refsource": "MISC",
+ "name": "https://vuldb.com/?submit.474965"
+ },
+ {
+ "url": "https://github.com/wuzhicms/wuzhicms/issues/212",
+ "refsource": "MISC",
+ "name": "https://github.com/wuzhicms/wuzhicms/issues/212"
+ },
+ {
+ "url": "https://github.com/wuzhicms/wuzhicms/issues/212#issue-2769226216",
+ "refsource": "MISC",
+ "name": "https://github.com/wuzhicms/wuzhicms/issues/212#issue-2769226216"
+ }
+ ]
+ },
+ "credits": [
+ {
+ "lang": "en",
+ "value": "LVZC (VulDB User)"
+ }
+ ],
+ "impact": {
+ "cvss": [
+ {
+ "version": "3.1",
+ "baseScore": 4.3,
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "baseSeverity": "MEDIUM"
+ },
+ {
+ "version": "3.0",
+ "baseScore": 4.3,
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "baseSeverity": "MEDIUM"
+ },
+ {
+ "version": "2.0",
+ "baseScore": 4,
+ "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N"
}
]
}
diff --git a/2025/0xxx/CVE-2025-0499.json b/2025/0xxx/CVE-2025-0499.json
new file mode 100644
index 00000000000..4e29ba1bf95
--- /dev/null
+++ b/2025/0xxx/CVE-2025-0499.json
@@ -0,0 +1,18 @@
+{
+ "data_type": "CVE",
+ "data_format": "MITRE",
+ "data_version": "4.0",
+ "CVE_data_meta": {
+ "ID": "CVE-2025-0499",
+ "ASSIGNER": "cve@mitre.org",
+ "STATE": "RESERVED"
+ },
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ }
+ ]
+ }
+}
\ No newline at end of file
diff --git a/2025/0xxx/CVE-2025-0500.json b/2025/0xxx/CVE-2025-0500.json
new file mode 100644
index 00000000000..75e32c9c9dc
--- /dev/null
+++ b/2025/0xxx/CVE-2025-0500.json
@@ -0,0 +1,18 @@
+{
+ "data_type": "CVE",
+ "data_format": "MITRE",
+ "data_version": "4.0",
+ "CVE_data_meta": {
+ "ID": "CVE-2025-0500",
+ "ASSIGNER": "cve@mitre.org",
+ "STATE": "RESERVED"
+ },
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ }
+ ]
+ }
+}
\ No newline at end of file
diff --git a/2025/0xxx/CVE-2025-0501.json b/2025/0xxx/CVE-2025-0501.json
new file mode 100644
index 00000000000..3dc7b73427b
--- /dev/null
+++ b/2025/0xxx/CVE-2025-0501.json
@@ -0,0 +1,18 @@
+{
+ "data_type": "CVE",
+ "data_format": "MITRE",
+ "data_version": "4.0",
+ "CVE_data_meta": {
+ "ID": "CVE-2025-0501",
+ "ASSIGNER": "cve@mitre.org",
+ "STATE": "RESERVED"
+ },
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ }
+ ]
+ }
+}
\ No newline at end of file
diff --git a/2025/0xxx/CVE-2025-0502.json b/2025/0xxx/CVE-2025-0502.json
new file mode 100644
index 00000000000..7a826e2aaa4
--- /dev/null
+++ b/2025/0xxx/CVE-2025-0502.json
@@ -0,0 +1,95 @@
+{
+ "data_version": "4.0",
+ "data_type": "CVE",
+ "data_format": "MITRE",
+ "CVE_data_meta": {
+ "ID": "CVE-2025-0502",
+ "ASSIGNER": "security@craftersoftware.com",
+ "STATE": "PUBLIC"
+ },
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "Transmission of Private Resources into a New Sphere ('Resource Leak') vulnerability in CrafterCMS Engine on Linux, MacOS, x86, Windows, 64 bit, ARM allows Directory Indexing, Resource Leak Exposure.This issue affects CrafterCMS: from 4.0.0 before 4.0.8, from 4.1.0 before 4.1.6."
+ }
+ ]
+ },
+ "problemtype": {
+ "problemtype_data": [
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "CWE-402: Transmission of Private Resources into a New Sphere ('Resource Leak')",
+ "cweId": "CWE-402"
+ }
+ ]
+ }
+ ]
+ },
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "vendor_name": "CrafterCMS",
+ "product": {
+ "product_data": [
+ {
+ "product_name": "CrafterCMS",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<",
+ "version_name": "4.0.0",
+ "version_value": "4.0.8"
+ },
+ {
+ "version_affected": "<",
+ "version_name": "4.1.0",
+ "version_value": "4.1.6"
+ }
+ ]
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ },
+ "references": {
+ "reference_data": [
+ {
+ "url": "https://craftercms.com/docs/4.2/security/advisory.html#cv-2025011501",
+ "refsource": "MISC",
+ "name": "https://craftercms.com/docs/4.2/security/advisory.html#cv-2025011501"
+ }
+ ]
+ },
+ "generator": {
+ "engine": "Vulnogram 0.2.0"
+ },
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "work_around": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "Block external access to the two APIs: