From f50846caa36515c20587bad0670b956ac2da5e4b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 8 Jan 2025 20:01:04 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/13xxx/CVE-2024-13188.json | 109 +++++++++++++++++++++++++++++-- 2024/13xxx/CVE-2024-13189.json | 114 +++++++++++++++++++++++++++++++-- 2024/13xxx/CVE-2024-13218.json | 18 ++++++ 2024/13xxx/CVE-2024-13219.json | 18 ++++++ 2024/13xxx/CVE-2024-13220.json | 18 ++++++ 2024/13xxx/CVE-2024-13221.json | 18 ++++++ 2024/13xxx/CVE-2024-13222.json | 18 ++++++ 2024/13xxx/CVE-2024-13223.json | 18 ++++++ 2024/13xxx/CVE-2024-13224.json | 18 ++++++ 2024/13xxx/CVE-2024-13225.json | 18 ++++++ 2024/13xxx/CVE-2024-13226.json | 18 ++++++ 2024/45xxx/CVE-2024-45342.json | 8 +-- 2024/45xxx/CVE-2024-45343.json | 8 +-- 2024/45xxx/CVE-2024-45344.json | 8 +-- 2024/45xxx/CVE-2024-45345.json | 8 +-- 2025/20xxx/CVE-2025-20126.json | 5 -- 2025/22xxx/CVE-2025-22143.json | 58 +++++++++++++++-- 2025/22xxx/CVE-2025-22865.json | 18 ++++++ 2025/22xxx/CVE-2025-22866.json | 18 ++++++ 2025/22xxx/CVE-2025-22867.json | 18 ++++++ 2025/22xxx/CVE-2025-22868.json | 18 ++++++ 2025/22xxx/CVE-2025-22869.json | 18 ++++++ 2025/22xxx/CVE-2025-22870.json | 18 ++++++ 2025/22xxx/CVE-2025-22871.json | 18 ++++++ 2025/22xxx/CVE-2025-22872.json | 18 ++++++ 2025/22xxx/CVE-2025-22873.json | 18 ++++++ 2025/22xxx/CVE-2025-22874.json | 18 ++++++ 27 files changed, 627 insertions(+), 33 deletions(-) create mode 100644 2024/13xxx/CVE-2024-13218.json create mode 100644 2024/13xxx/CVE-2024-13219.json create mode 100644 2024/13xxx/CVE-2024-13220.json create mode 100644 2024/13xxx/CVE-2024-13221.json create mode 100644 2024/13xxx/CVE-2024-13222.json create mode 100644 2024/13xxx/CVE-2024-13223.json create mode 100644 2024/13xxx/CVE-2024-13224.json create mode 100644 2024/13xxx/CVE-2024-13225.json create mode 100644 2024/13xxx/CVE-2024-13226.json create mode 100644 2025/22xxx/CVE-2025-22865.json create mode 100644 2025/22xxx/CVE-2025-22866.json create mode 100644 2025/22xxx/CVE-2025-22867.json create mode 100644 2025/22xxx/CVE-2025-22868.json create mode 100644 2025/22xxx/CVE-2025-22869.json create mode 100644 2025/22xxx/CVE-2025-22870.json create mode 100644 2025/22xxx/CVE-2025-22871.json create mode 100644 2025/22xxx/CVE-2025-22872.json create mode 100644 2025/22xxx/CVE-2025-22873.json create mode 100644 2025/22xxx/CVE-2025-22874.json diff --git a/2024/13xxx/CVE-2024-13188.json b/2024/13xxx/CVE-2024-13188.json index b7539e5ef80..48fd229a841 100644 --- a/2024/13xxx/CVE-2024-13188.json +++ b/2024/13xxx/CVE-2024-13188.json @@ -1,17 +1,118 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-13188", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linux. It has been rated as critical. Affected by this issue is some unknown functionality of the file /opt/MicroWorld/var/ of the component Installation Handler. The manipulation leads to incorrect default permissions. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Eine kritische Schwachstelle wurde in MicroWorld eScan Antivirus 7.0.32 f\u00fcr Linux ausgemacht. Davon betroffen ist unbekannter Code der Datei /opt/MicroWorld/var/ der Komponente Installation Handler. Mittels Manipulieren mit unbekannten Daten kann eine incorrect default permissions-Schwachstelle ausgenutzt werden. Der Angriff muss lokal passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Incorrect Default Permissions", + "cweId": "CWE-276" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Incorrect Privilege Assignment", + "cweId": "CWE-266" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "MicroWorld", + "product": { + "product_data": [ + { + "product_name": "eScan Antivirus", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.0.32" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.290780", + "refsource": "MISC", + "name": "https://vuldb.com/?id.290780" + }, + { + "url": "https://vuldb.com/?ctiid.290780", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.290780" + }, + { + "url": "https://vuldb.com/?submit.468796", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.468796" + }, + { + "url": "https://github.com/hawkteam404/RnD_Public/blob/main/escan_incorrect_default_perm.md", + "refsource": "MISC", + "name": "https://github.com/hawkteam404/RnD_Public/blob/main/escan_incorrect_default_perm.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "FPT IS Security (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5.3, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5.3, + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4.3, + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2024/13xxx/CVE-2024-13189.json b/2024/13xxx/CVE-2024-13189.json index c9f6874d341..a385bfb4280 100644 --- a/2024/13xxx/CVE-2024-13189.json +++ b/2024/13xxx/CVE-2024-13189.json @@ -1,17 +1,123 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-13189", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical has been found in ZeroWdd myblog 1.0. This affects an unknown part of the file src/main/java/com/wdd/myblog/config/MyBlogMvcConfig.java. The manipulation leads to permission issues. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in ZeroWdd myblog 1.0 entdeckt. Sie wurde als kritisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei src/main/java/com/wdd/myblog/config/MyBlogMvcConfig.java. Durch das Manipulieren mit unbekannten Daten kann eine permission issues-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Permission Issues", + "cweId": "CWE-275" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Incorrect Privilege Assignment", + "cweId": "CWE-266" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "ZeroWdd", + "product": { + "product_data": [ + { + "product_name": "myblog", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.290781", + "refsource": "MISC", + "name": "https://vuldb.com/?id.290781" + }, + { + "url": "https://vuldb.com/?ctiid.290781", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.290781" + }, + { + "url": "https://vuldb.com/?submit.469223", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.469223" + }, + { + "url": "https://github.com/ZeroWdd/myblog/issues/1", + "refsource": "MISC", + "name": "https://github.com/ZeroWdd/myblog/issues/1" + }, + { + "url": "https://github.com/ZeroWdd/myblog/issues/1#issue-2759828006", + "refsource": "MISC", + "name": "https://github.com/ZeroWdd/myblog/issues/1#issue-2759828006" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "LVZC1 (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 7.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ] } diff --git a/2024/13xxx/CVE-2024-13218.json b/2024/13xxx/CVE-2024-13218.json new file mode 100644 index 00000000000..d019de50160 --- /dev/null +++ b/2024/13xxx/CVE-2024-13218.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13218", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/13xxx/CVE-2024-13219.json b/2024/13xxx/CVE-2024-13219.json new file mode 100644 index 00000000000..ae3461bd431 --- /dev/null +++ b/2024/13xxx/CVE-2024-13219.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13219", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/13xxx/CVE-2024-13220.json b/2024/13xxx/CVE-2024-13220.json new file mode 100644 index 00000000000..ede8f93aaf9 --- /dev/null +++ b/2024/13xxx/CVE-2024-13220.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13220", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/13xxx/CVE-2024-13221.json b/2024/13xxx/CVE-2024-13221.json new file mode 100644 index 00000000000..5e33936b119 --- /dev/null +++ b/2024/13xxx/CVE-2024-13221.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13221", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/13xxx/CVE-2024-13222.json b/2024/13xxx/CVE-2024-13222.json new file mode 100644 index 00000000000..338e008d437 --- /dev/null +++ b/2024/13xxx/CVE-2024-13222.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13222", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/13xxx/CVE-2024-13223.json b/2024/13xxx/CVE-2024-13223.json new file mode 100644 index 00000000000..ce3fffb29d7 --- /dev/null +++ b/2024/13xxx/CVE-2024-13223.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13223", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/13xxx/CVE-2024-13224.json b/2024/13xxx/CVE-2024-13224.json new file mode 100644 index 00000000000..74f5a3771b8 --- /dev/null +++ b/2024/13xxx/CVE-2024-13224.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13224", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/13xxx/CVE-2024-13225.json b/2024/13xxx/CVE-2024-13225.json new file mode 100644 index 00000000000..2f67ba3a9ef --- /dev/null +++ b/2024/13xxx/CVE-2024-13225.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13225", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/13xxx/CVE-2024-13226.json b/2024/13xxx/CVE-2024-13226.json new file mode 100644 index 00000000000..5302615a3e2 --- /dev/null +++ b/2024/13xxx/CVE-2024-13226.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13226", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/45xxx/CVE-2024-45342.json b/2024/45xxx/CVE-2024-45342.json index 53e08924e36..9b0bc4cdd0c 100644 --- a/2024/45xxx/CVE-2024-45342.json +++ b/2024/45xxx/CVE-2024-45342.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-45342", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@golang.org", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** reserved but not needed" } ] } diff --git a/2024/45xxx/CVE-2024-45343.json b/2024/45xxx/CVE-2024-45343.json index 3f2f4959d8c..813ee1ef2a0 100644 --- a/2024/45xxx/CVE-2024-45343.json +++ b/2024/45xxx/CVE-2024-45343.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-45343", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@golang.org", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** reserved but not needed" } ] } diff --git a/2024/45xxx/CVE-2024-45344.json b/2024/45xxx/CVE-2024-45344.json index 71428e6b4ec..4bd92d7e37c 100644 --- a/2024/45xxx/CVE-2024-45344.json +++ b/2024/45xxx/CVE-2024-45344.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-45344", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@golang.org", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** reserved but not needed" } ] } diff --git a/2024/45xxx/CVE-2024-45345.json b/2024/45xxx/CVE-2024-45345.json index 4744f5d3a4d..7e2fdeb4c33 100644 --- a/2024/45xxx/CVE-2024-45345.json +++ b/2024/45xxx/CVE-2024-45345.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-45345", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@golang.org", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** reserved but not needed" } ] } diff --git a/2025/20xxx/CVE-2025-20126.json b/2025/20xxx/CVE-2025-20126.json index 9874401daee..9e56bd7f74d 100644 --- a/2025/20xxx/CVE-2025-20126.json +++ b/2025/20xxx/CVE-2025-20126.json @@ -58,11 +58,6 @@ "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-thousandeyes-cert-pqtJUv9N", "refsource": "MISC", "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-thousandeyes-cert-pqtJUv9N" - }, - { - "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU", - "refsource": "MISC", - "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU" } ] }, diff --git a/2025/22xxx/CVE-2025-22143.json b/2025/22xxx/CVE-2025-22143.json index d4c26fb096f..fde808a3bec 100644 --- a/2025/22xxx/CVE-2025-22143.json +++ b/2025/22xxx/CVE-2025-22143.json @@ -1,18 +1,68 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-22143", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the listar_permissoes.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the msg_e parameter. This vulnerability is fixed in 3.2.8." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "LabRedesCefetRJ", + "product": { + "product_data": [ + { + "product_name": "WeGIA", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 3.2.8" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-gxh2-8jxp-m59h", + "refsource": "MISC", + "name": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-gxh2-8jxp-m59h" + } + ] + }, + "source": { + "advisory": "GHSA-gxh2-8jxp-m59h", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22865.json b/2025/22xxx/CVE-2025-22865.json new file mode 100644 index 00000000000..6e82493c554 --- /dev/null +++ b/2025/22xxx/CVE-2025-22865.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22865", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22866.json b/2025/22xxx/CVE-2025-22866.json new file mode 100644 index 00000000000..d6e3e6e2d43 --- /dev/null +++ b/2025/22xxx/CVE-2025-22866.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22866", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22867.json b/2025/22xxx/CVE-2025-22867.json new file mode 100644 index 00000000000..db96617cbcf --- /dev/null +++ b/2025/22xxx/CVE-2025-22867.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22867", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22868.json b/2025/22xxx/CVE-2025-22868.json new file mode 100644 index 00000000000..8bdd6e400ff --- /dev/null +++ b/2025/22xxx/CVE-2025-22868.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22868", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22869.json b/2025/22xxx/CVE-2025-22869.json new file mode 100644 index 00000000000..7da73263822 --- /dev/null +++ b/2025/22xxx/CVE-2025-22869.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22869", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22870.json b/2025/22xxx/CVE-2025-22870.json new file mode 100644 index 00000000000..ff255517b4a --- /dev/null +++ b/2025/22xxx/CVE-2025-22870.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22870", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22871.json b/2025/22xxx/CVE-2025-22871.json new file mode 100644 index 00000000000..383d08d735c --- /dev/null +++ b/2025/22xxx/CVE-2025-22871.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22871", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22872.json b/2025/22xxx/CVE-2025-22872.json new file mode 100644 index 00000000000..600af25bcb7 --- /dev/null +++ b/2025/22xxx/CVE-2025-22872.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22872", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22873.json b/2025/22xxx/CVE-2025-22873.json new file mode 100644 index 00000000000..6a0674f2e9e --- /dev/null +++ b/2025/22xxx/CVE-2025-22873.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22873", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22874.json b/2025/22xxx/CVE-2025-22874.json new file mode 100644 index 00000000000..10f488baef3 --- /dev/null +++ b/2025/22xxx/CVE-2025-22874.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22874", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file