"-Synchronized-Data."

This commit is contained in:
CVE Team 2025-02-28 20:00:35 +00:00
parent 250895b5bf
commit fa4466d323
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
7 changed files with 345 additions and 9 deletions

View File

@ -1,17 +1,133 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-0159",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "psirt@us.ibm.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 through 8.5.0.13, 8.5.1.0, 8.5.2.0 through 8.5.2.3, 8.5.3.0 through 8.5.3.1, 8.5.4.0, 8.6.0.0 through 8.6.0.5, 8.6.1.0, 8.6.2.0 through 8.6.2.1, 8.6.3.0, 8.7.0.0 through 8.7.0.2, 8.7.1.0, 8.7.2.0 through 8.7.2.1) could allow a remote attacker to bypass RPCAdapter endpoint authentication by sending a specifically crafted HTTP request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-288 Authentication Bypass Using an Alternate Path or Channel",
"cweId": "CWE-288"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"product_name": "Storage Virtualize",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "8.5.0.0",
"version_value": "8.5.0.13"
},
{
"version_affected": "=",
"version_value": "8.5.1.0"
},
{
"version_affected": "<=",
"version_name": "8.5.2.0",
"version_value": "8.5.2.3"
},
{
"version_affected": "<=",
"version_name": "8.5.3.0",
"version_value": "8.5.3.1"
},
{
"version_affected": "=",
"version_value": "8.5.4.0"
},
{
"version_affected": "<=",
"version_name": "8.6.0.0",
"version_value": "8.6.0.5"
},
{
"version_affected": "=",
"version_value": "8.6.1.0"
},
{
"version_affected": "<=",
"version_name": "8.6.2.0",
"version_value": "8.6.2.1"
},
{
"version_affected": "=",
"version_value": "8.6.3.0"
},
{
"version_affected": "=",
"version_value": "8.7.1.0"
},
{
"version_affected": "<=",
"version_name": "8.7.2.0",
"version_value": "8.7.2.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.ibm.com/support/pages/node/7184182",
"refsource": "MISC",
"name": "https://www.ibm.com/support/pages/node/7184182"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,133 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-0160",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "psirt@us.ibm.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 through 8.5.0.13, 8.5.1.0, 8.5.2.0 through 8.5.2.3, 8.5.3.0 through 8.5.3.1, 8.5.4.0, 8.6.0.0 through 8.6.0.5, 8.6.1.0, 8.6.2.0 through 8.6.2.1, 8.6.3.0, 8.7.0.0 through 8.7.0.2, 8.7.1.0, 8.7.2.0 through 8.7.2.1) could allow a remote attacker with access to the system to execute arbitrary Java code due to improper restrictions in the RPCAdapter service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-114 Process Control",
"cweId": "CWE-114"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"product_name": "Storage Virtualize",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "8.5.0.0",
"version_value": "8.5.0.13"
},
{
"version_affected": "=",
"version_value": "8.5.1.0"
},
{
"version_affected": "<=",
"version_name": "8.5.2.0",
"version_value": "8.5.2.3"
},
{
"version_affected": "<=",
"version_name": "8.5.3.0",
"version_value": "8.5.3.1"
},
{
"version_affected": "=",
"version_value": "8.5.4.0"
},
{
"version_affected": "<=",
"version_name": "8.6.0.0",
"version_value": "8.6.0.5"
},
{
"version_affected": "=",
"version_value": "8.6.1.0"
},
{
"version_affected": "<=",
"version_name": "8.6.2.0",
"version_value": "8.6.2.1"
},
{
"version_affected": "=",
"version_value": "8.6.3.0"
},
{
"version_affected": "=",
"version_value": "8.7.1.0"
},
{
"version_affected": "<=",
"version_name": "8.7.2.0",
"version_value": "8.7.2.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.ibm.com/support/pages/node/7184182",
"refsource": "MISC",
"name": "https://www.ibm.com/support/pages/node/7184182"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -48,6 +48,11 @@
"version_affected": "<",
"version_name": "3.13.0",
"version_value": "3.13.2"
},
{
"version_affected": "<",
"version_name": "3.14.0a1",
"version_value": "3.14.0a5"
}
]
}
@ -89,6 +94,21 @@
"url": "https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568",
"refsource": "MISC",
"name": "https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568"
},
{
"url": "https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba",
"refsource": "MISC",
"name": "https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba"
},
{
"url": "https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab",
"refsource": "MISC",
"name": "https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab"
},
{
"url": "https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32",
"refsource": "MISC",
"name": "https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32"
}
]
},

View File

@ -41,7 +41,17 @@
{
"version_affected": "<",
"version_name": "0",
"version_value": "3.14.0"
"version_value": "3.11.9"
},
{
"version_affected": "<",
"version_name": "3.12.0",
"version_value": "3.12.3"
},
{
"version_affected": "<",
"version_name": "3.13.0a1",
"version_value": "3.13.0a5"
}
]
}
@ -68,6 +78,26 @@
"url": "https://github.com/python/cpython/pull/119099",
"refsource": "MISC",
"name": "https://github.com/python/cpython/pull/119099"
},
{
"url": "https://github.com/python/cpython/commit/09fab93c3d857496c0bd162797fab816c311ee48",
"refsource": "MISC",
"name": "https://github.com/python/cpython/commit/09fab93c3d857496c0bd162797fab816c311ee48"
},
{
"url": "https://github.com/python/cpython/commit/70754d21c288535e86070ca7a6e90dcb670b8593",
"refsource": "MISC",
"name": "https://github.com/python/cpython/commit/70754d21c288535e86070ca7a6e90dcb670b8593"
},
{
"url": "https://github.com/python/cpython/commit/9148b77e0af91cdacaa7fe3dfac09635c3fe9a74",
"refsource": "MISC",
"name": "https://github.com/python/cpython/commit/9148b77e0af91cdacaa7fe3dfac09635c3fe9a74"
},
{
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/MB62IZMEC3UM6SGHP5LET5JX2Y7H4ZUR/",
"refsource": "MISC",
"name": "https://mail.python.org/archives/list/security-announce@python.org/thread/MB62IZMEC3UM6SGHP5LET5JX2Y7H4ZUR/"
}
]
},

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-1796",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-1797",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-1798",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}