From f5d2953180296132c33cbe105cc69af13ed49b1e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 25 Apr 2025 06:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/2xxx/CVE-2025-2580.json | 81 +++++- 2025/3xxx/CVE-2025-3511.json | 452 ++++++++++++++++++++++++++++++++- 2025/3xxx/CVE-2025-3861.json | 81 +++++- 2025/3xxx/CVE-2025-3923.json | 81 +++++- 2025/46xxx/CVE-2025-46600.json | 18 ++ 2025/46xxx/CVE-2025-46601.json | 18 ++ 2025/46xxx/CVE-2025-46602.json | 18 ++ 2025/46xxx/CVE-2025-46603.json | 18 ++ 2025/46xxx/CVE-2025-46604.json | 18 ++ 2025/46xxx/CVE-2025-46605.json | 18 ++ 2025/46xxx/CVE-2025-46606.json | 18 ++ 2025/46xxx/CVE-2025-46607.json | 18 ++ 2025/46xxx/CVE-2025-46608.json | 18 ++ 2025/46xxx/CVE-2025-46609.json | 18 ++ 2025/46xxx/CVE-2025-46610.json | 18 ++ 2025/46xxx/CVE-2025-46611.json | 18 ++ 2025/46xxx/CVE-2025-46612.json | 18 ++ 2025/46xxx/CVE-2025-46613.json | 62 +++++ 2025/46xxx/CVE-2025-46614.json | 18 ++ 19 files changed, 993 insertions(+), 16 deletions(-) create mode 100644 2025/46xxx/CVE-2025-46600.json create mode 100644 2025/46xxx/CVE-2025-46601.json create mode 100644 2025/46xxx/CVE-2025-46602.json create mode 100644 2025/46xxx/CVE-2025-46603.json create mode 100644 2025/46xxx/CVE-2025-46604.json create mode 100644 2025/46xxx/CVE-2025-46605.json create mode 100644 2025/46xxx/CVE-2025-46606.json create mode 100644 2025/46xxx/CVE-2025-46607.json create mode 100644 2025/46xxx/CVE-2025-46608.json create mode 100644 2025/46xxx/CVE-2025-46609.json create mode 100644 2025/46xxx/CVE-2025-46610.json create mode 100644 2025/46xxx/CVE-2025-46611.json create mode 100644 2025/46xxx/CVE-2025-46612.json create mode 100644 2025/46xxx/CVE-2025-46613.json create mode 100644 2025/46xxx/CVE-2025-46614.json diff --git a/2025/2xxx/CVE-2025-2580.json b/2025/2xxx/CVE-2025-2580.json index 6204d5ac47d..115a3ca719d 100644 --- a/2025/2xxx/CVE-2025-2580.json +++ b/2025/2xxx/CVE-2025-2580.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-2580", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Contact Form by Bit Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.18.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "bitpressadmin", + "product": { + "product_data": [ + { + "product_name": "Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "2.18.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1f3b5d85-a8b0-43ac-b593-a61e20b9a4ca?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1f3b5d85-a8b0-43ac-b593-a61e20b9a4ca?source=cve" + }, + { + "url": "https://wordpress.org/plugins/bit-form/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/bit-form/#developers" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3271396/", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3271396/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Avraham Shemesh" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" } ] } diff --git a/2025/3xxx/CVE-2025-3511.json b/2025/3xxx/CVE-2025-3511.json index d89d57c71a0..63c7c7af684 100644 --- a/2025/3xxx/CVE-2025-3511.json +++ b/2025/3xxx/CVE-2025-3511.json @@ -1,17 +1,461 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-3511", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric Corporation CC-Link IE TSN Remote I/O module, CC-Link IE TSN Analog-Digital Converter module, CC-Link IE TSN Digital-Analog Converter module, CC-Link IE TSN FPGA module and CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY allows a remote unauthenticated attacker to cause a Denial of Service condition in the products by sending specially crafted UDP packets." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1284 Improper Validation of Specified Quantity in Input", + "cweId": "CWE-1284" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Mitsubishi Electric Corporation", + "product": { + "product_data": [ + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN2S1-32D", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN2S1-32T", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN2S1-32TE", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN2S1-32DT", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN2S1-32DTE", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN2B1-32D", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN2B1-32T", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN2B1-32TE", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN2B1-32DT", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN2B1-32DTE", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GNCF1-32D", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GNCF1-32T", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GNCE3-32D", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GNCE3-32DT", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN12A4-16D", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN12A4-16DE", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN12A2-16T", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN12A2-16TE", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN12A42-16DT", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN12A42-16DTE", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN2S1-16D", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN2S1-16T", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN2S1-16TE", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN2B1-16D", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN2B1-16T", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote I/O module NZ2GN2B1-16TE", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "09 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Analog-Digital Converter module NZ2GN2S-60AD4", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "07 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Analog-Digital Converter module NZ2GN2B-60AD4", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "07 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Digital-Analog Converter module NZ2GN2S-60DA4", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "07 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Digital-Analog Converter module NZ2GN2B-60DA4", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "07 and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN FPGA module NZ2GN2S-D41P01", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "01" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN FPGA module NZ2GN2S-D41D01", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "01" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN FPGA module NZ2GN2S-D41PD02", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "01" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY NZ2GACP620-300", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.08J and prior" + } + ] + } + }, + { + "product_name": "CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY NZ2GACP620-60", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.08J and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf", + "refsource": "MISC", + "name": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2025/3xxx/CVE-2025-3861.json b/2025/3xxx/CVE-2025-3861.json index 62a0e758a55..2fa610a8277 100644 --- a/2025/3xxx/CVE-2025-3861.json +++ b/2025/3xxx/CVE-2025-3861.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-3861", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Prevent Direct Access \u2013 Protect WordPress Files plugin for WordPress is vulnerable to unauthorized access and modification of data| due to a misconfigured capability check on the 'pda_lite_custom_permission_check' function in versions 2.8.6 to 2.8.8.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to access and change the protection status of media." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-863 Incorrect Authorization", + "cweId": "CWE-863" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "buildwps", + "product": { + "product_data": [ + { + "product_name": "Prevent Direct Access \u2013 Protect WordPress Files", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2.8.6", + "version_value": "2.8.8.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2ed83916-3cf7-4fc6-a16f-45b40cedc721?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2ed83916-3cf7-4fc6-a16f-45b40cedc721?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/prevent-direct-access/tags/2.8.8.2/includes/pda_lite_api.php#L71", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/prevent-direct-access/tags/2.8.8.2/includes/pda_lite_api.php#L71" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3279923/", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3279923/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Mattia Brollo" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" } ] } diff --git a/2025/3xxx/CVE-2025-3923.json b/2025/3xxx/CVE-2025-3923.json index 91e02890b02..0d40215ca6b 100644 --- a/2025/3xxx/CVE-2025-3923.json +++ b/2025/3xxx/CVE-2025-3923.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-3923", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Prevent Direct Access \u2013 Protect WordPress Files plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.8.8 via the 'generate_unique_string' due to insufficient randomness of the generated file name. This makes it possible for unauthenticated attackers to extract sensitive data including files protected by the plugin if the attacker can determine the file name." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", + "cweId": "CWE-200" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "buildwps", + "product": { + "product_data": [ + { + "product_name": "Prevent Direct Access \u2013 Protect WordPress Files", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "2.8.8" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f648a9ca-a72f-418e-bf1b-ad4ecc27d365?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f648a9ca-a72f-418e-bf1b-ad4ecc27d365?source=cve" + }, + { + "url": "https://plugins.svn.wordpress.org/prevent-direct-access/tags/2.8.8/includes/helper.php", + "refsource": "MISC", + "name": "https://plugins.svn.wordpress.org/prevent-direct-access/tags/2.8.8/includes/helper.php" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/prevent-direct-access/trunk/includes/helper.php#L16", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/prevent-direct-access/trunk/includes/helper.php#L16" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Tom Broucke" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" } ] } diff --git a/2025/46xxx/CVE-2025-46600.json b/2025/46xxx/CVE-2025-46600.json new file mode 100644 index 00000000000..b7d08366304 --- /dev/null +++ b/2025/46xxx/CVE-2025-46600.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-46600", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/46xxx/CVE-2025-46601.json b/2025/46xxx/CVE-2025-46601.json new file mode 100644 index 00000000000..54531e13c7f --- /dev/null +++ b/2025/46xxx/CVE-2025-46601.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-46601", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/46xxx/CVE-2025-46602.json b/2025/46xxx/CVE-2025-46602.json new file mode 100644 index 00000000000..132a46e3908 --- /dev/null +++ b/2025/46xxx/CVE-2025-46602.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-46602", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/46xxx/CVE-2025-46603.json b/2025/46xxx/CVE-2025-46603.json new file mode 100644 index 00000000000..8aa66fe2e68 --- /dev/null +++ b/2025/46xxx/CVE-2025-46603.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-46603", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/46xxx/CVE-2025-46604.json b/2025/46xxx/CVE-2025-46604.json new file mode 100644 index 00000000000..39b7b55e84f --- /dev/null +++ b/2025/46xxx/CVE-2025-46604.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-46604", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/46xxx/CVE-2025-46605.json b/2025/46xxx/CVE-2025-46605.json new file mode 100644 index 00000000000..14a1f4285e5 --- /dev/null +++ b/2025/46xxx/CVE-2025-46605.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-46605", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/46xxx/CVE-2025-46606.json b/2025/46xxx/CVE-2025-46606.json new file mode 100644 index 00000000000..3dffae3d141 --- /dev/null +++ b/2025/46xxx/CVE-2025-46606.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-46606", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/46xxx/CVE-2025-46607.json b/2025/46xxx/CVE-2025-46607.json new file mode 100644 index 00000000000..bcf97802b81 --- /dev/null +++ b/2025/46xxx/CVE-2025-46607.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-46607", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/46xxx/CVE-2025-46608.json b/2025/46xxx/CVE-2025-46608.json new file mode 100644 index 00000000000..c1768a4e25b --- /dev/null +++ b/2025/46xxx/CVE-2025-46608.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-46608", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/46xxx/CVE-2025-46609.json b/2025/46xxx/CVE-2025-46609.json new file mode 100644 index 00000000000..73b78d1b256 --- /dev/null +++ b/2025/46xxx/CVE-2025-46609.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-46609", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/46xxx/CVE-2025-46610.json b/2025/46xxx/CVE-2025-46610.json new file mode 100644 index 00000000000..1723da5901a --- /dev/null +++ b/2025/46xxx/CVE-2025-46610.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-46610", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/46xxx/CVE-2025-46611.json b/2025/46xxx/CVE-2025-46611.json new file mode 100644 index 00000000000..7fb840d4679 --- /dev/null +++ b/2025/46xxx/CVE-2025-46611.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-46611", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/46xxx/CVE-2025-46612.json b/2025/46xxx/CVE-2025-46612.json new file mode 100644 index 00000000000..72cb46b1bd5 --- /dev/null +++ b/2025/46xxx/CVE-2025-46612.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-46612", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/46xxx/CVE-2025-46613.json b/2025/46xxx/CVE-2025-46613.json new file mode 100644 index 00000000000..c579743b1bc --- /dev/null +++ b/2025/46xxx/CVE-2025-46613.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2025-46613", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "OpenPLC 3 through 64f9c11 has server.cpp Memory Corruption because a thread may access handleConnections arguments after the parent stack frame becomes unavailable." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/thiagoralves/OpenPLC_v3/issues/273", + "refsource": "MISC", + "name": "https://github.com/thiagoralves/OpenPLC_v3/issues/273" + } + ] + } +} \ No newline at end of file diff --git a/2025/46xxx/CVE-2025-46614.json b/2025/46xxx/CVE-2025-46614.json new file mode 100644 index 00000000000..2d798ea0d8e --- /dev/null +++ b/2025/46xxx/CVE-2025-46614.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-46614", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file