Auto-Update: 2025-03-21T07:00:20.472365+00:00

This commit is contained in:
cad-safe-bot 2025-03-21 07:03:54 +00:00
parent 4bfc5758e5
commit 821a0ad9a7
8 changed files with 438 additions and 6 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-50053",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2025-03-21T06:15:25.003",
"lastModified": "2025-03-21T06:15:25.003",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zohocorp ManageEngine ServiceDesk Plus versions\u00a0below\u00a014920\u00a0, ServiceDesk Plus MSP and SupportCentre Plus versions below\u00a014910 are vulnerable to Stored XSS in the task feature."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.manageengine.com/products/service-desk/CVE-2024-50053.html",
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-2581",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-21T05:15:38.280",
"lastModified": "2025-03-21T05:15:38.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in xmedcon 0.25.0 and classified as problematic. Affected by this vulnerability is the function malloc of the component DICOM File Handler. The manipulation leads to integer underflow. The attack can be launched remotely. Upgrading to version 0.25.1 is able to address this issue. It is recommended to upgrade the affected component."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-189"
},
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.300541",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.300541",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.522216",
"source": "cna@vuldb.com"
},
{
"url": "https://xmedcon.sourceforge.io/Main/New",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30342",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-21T06:15:26.510",
"lastModified": "2025-03-21T06:15:26.510",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An XSS issue was discovered in OpenSlides before 4.2.5. When submitting descriptions such as Moderator Notes or Agenda Topics, an editor is shown that allows one to format the submitted text. This allows insertion of various HTML elements. When trying to insert a SCRIPT element, it is properly encoded when reflected; however, adding attributes to links is possible, which allows the injection of JavaScript via the onmouseover attribute and others. When a user moves the mouse over such a prepared link, JavaScript is executed in that user's session."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.x41-dsec.de/lab/advisories/x41-2025-001-OpenSlides",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30343",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-21T06:15:26.700",
"lastModified": "2025-03-21T06:15:26.700",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A directory traversal issue was discovered in OpenSlides before 4.2.5. Files can be uploaded to OpenSlides meetings and organized in folders. The interface allows users to download a ZIP archive that contains all files in a folder and its subfolders. If an attacker specifies the title of a file or folder as a relative or absolute path (e.g., ../../../etc/passwd), the ZIP archive generated for download converts that title into a path. Depending on the extraction tool used by the user, this might overwrite files locally outside of the chosen directory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N",
"baseScore": 3.0,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.3,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-24"
}
]
}
],
"references": [
{
"url": "https://www.x41-dsec.de/lab/advisories/x41-2025-001-OpenSlides",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30344",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-21T06:15:26.900",
"lastModified": "2025-03-21T06:15:26.900",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in OpenSlides before 4.2.5. During login at the /system/auth/login/ endpoint, the system's response times differ depending on whether a user exists in the system. The timing discrepancy stems from the omitted hashing of the password (e.g., more than 100 milliseconds)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-208"
}
]
}
],
"references": [
{
"url": "https://www.x41-dsec.de/lab/advisories/x41-2025-001-OpenSlides",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30345",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-21T06:15:27.090",
"lastModified": "2025-03-21T06:15:27.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in OpenSlides before 4.2.5. When creating new chats via the chat_group.create action, the user is able to specify the name of the chat. Some HTML elements such as SCRIPT are filtered, whereas others are not. In most cases, HTML entities are encoded properly, but not when deleting chats or deleting messages in these chats. This potentially allows attackers to interfere with the layout of the rendered website, but it is unlikely that victims would click on deleted chats or deleted messages."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
}
],
"references": [
{
"url": "https://www.x41-dsec.de/lab/advisories/x41-2025-001-OpenSlides",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-21T05:00:19.598651+00:00
2025-03-21T07:00:20.472365+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-21T03:15:12+00:00
2025-03-21T06:15:27.090000+00:00
```
### Last Data Feed Release
@ -33,14 +33,19 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
286128
286134
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `6`
- [CVE-2025-26336](CVE-2025/CVE-2025-263xx/CVE-2025-26336.json) (`2025-03-21T03:15:12.000`)
- [CVE-2024-50053](CVE-2024/CVE-2024-500xx/CVE-2024-50053.json) (`2025-03-21T06:15:25.003`)
- [CVE-2025-2581](CVE-2025/CVE-2025-25xx/CVE-2025-2581.json) (`2025-03-21T05:15:38.280`)
- [CVE-2025-30342](CVE-2025/CVE-2025-303xx/CVE-2025-30342.json) (`2025-03-21T06:15:26.510`)
- [CVE-2025-30343](CVE-2025/CVE-2025-303xx/CVE-2025-30343.json) (`2025-03-21T06:15:26.700`)
- [CVE-2025-30344](CVE-2025/CVE-2025-303xx/CVE-2025-30344.json) (`2025-03-21T06:15:26.900`)
- [CVE-2025-30345](CVE-2025/CVE-2025-303xx/CVE-2025-30345.json) (`2025-03-21T06:15:27.090`)
### CVEs modified in the last Commit

View File

@ -271695,6 +271695,7 @@ CVE-2024-5005,0,0,edffdae445ed03271277a1d7da4f3ef9e99a78c0f49c5b3d66f4f5e15bfe56
CVE-2024-50050,0,0,c772e99e0a240315b1aee2595b338c31c22eacc00e5698e6c99fc85138563b84,2024-10-24T19:35:08.107000
CVE-2024-50051,0,0,8192b632b8677c885b202d500a050be15f5802f63d850ce0a1700dc73462614e,2025-02-10T18:15:26.457000
CVE-2024-50052,0,0,8e1166b11b73a0cbc906f464db8f67520364e38f19292f66596c205740cd9ead,2024-10-29T14:34:04.427000
CVE-2024-50053,1,1,9b86c89006389a45fa501a6b489f4dc3c8c7fabadc3e54f251a40629c006a171,2025-03-21T06:15:25.003000
CVE-2024-50054,0,0,08baaf13bb0c7df4a1d400e49a73de2988f5185aee0ae70dc49353985a3374fa,2024-11-22T23:15:05.510000
CVE-2024-50055,0,0,9028163ae3316ad82ac4618afd3be3a51cc82bbdf53d38e6c862b63f5c1d1a6c,2025-03-13T13:15:41.767000
CVE-2024-50056,0,0,6e1878ca857c7740064b6e0cea5e8f40f7e2214667bdf3941548e6206395176a,2024-11-20T20:18:00.460000
@ -285205,6 +285206,7 @@ CVE-2025-25797,0,0,f1c9d0289c48d14cd4761a88c42f5574d41d53f72261c5d690874bbdc19cb
CVE-2025-25799,0,0,7e0e2b34e97de373b74e8a2a2d7160b9193cc9608515f6e42c488533a534cf1c,2025-03-06T18:15:42.587000
CVE-2025-25800,0,0,84c0703ad8895be752ba6115cd9ffe473c7260c43dbc52d30ca606520fed7ac5,2025-02-26T16:15:17.053000
CVE-2025-25802,0,0,d97088e007851ab933ca944783447ce692cfbd40d40b16934f0a6aa482cb1db0,2025-03-06T18:15:42.800000
CVE-2025-2581,1,1,c8c04934337a7a4e793b663364dd6e042a3930660f4eba48fbca9bab6cf0a655,2025-03-21T05:15:38.280000
CVE-2025-25813,0,0,29785da07b8f111218d1b9b58c66081665210db526a21defc9e5491fcec4ad0a,2025-03-06T18:15:43.027000
CVE-2025-25818,0,0,40ddbafdf9692bd0bb31a2e859c8e57e42e627fd7e19bb409eb5a4ac63b878d1,2025-03-03T17:15:15.230000
CVE-2025-25823,0,0,01cc00e46c57e1cd4b84caa1ec0705b698501680e84031ab252f0d5809c36fcf,2025-03-06T21:15:15.130000
@ -285309,7 +285311,7 @@ CVE-2025-26320,0,0,2c7c4543047844dc51d38a0e0844ae377a705f600f7e38264bf4c89a9fa42
CVE-2025-26325,0,0,f233a1914d47e95e53a6a85e3edce01b96b7b4e30f0938bdbc0790a0c40f83bd,2025-02-28T22:15:39.927000
CVE-2025-26326,0,0,a7b5315d9a8f318981baa1be6e3a967fc5e7b504545fab3a9d502474f652f3cd,2025-03-13T16:15:27.473000
CVE-2025-26331,0,0,40fd15c24d286e6245c507cb84784a759d8af1e37d77f53bdfddd636b05ec98b,2025-03-07T16:15:38.650000
CVE-2025-26336,1,1,2e4b5370c5973f6617d69fbf30dc726b921c63cd80dd107509f03386b549bcd5,2025-03-21T03:15:12
CVE-2025-26336,0,0,2e4b5370c5973f6617d69fbf30dc726b921c63cd80dd107509f03386b549bcd5,2025-03-21T03:15:12
CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000
CVE-2025-26340,0,0,ed188c0516bc2765f5549bbb8984d07bbadbda89d48c5e1878285cb21ac606ac,2025-02-12T14:15:33.650000
CVE-2025-26341,0,0,6ceabd274660df5a6e17e97d397989a301331c2fd9cb0d9b6d2622b35273a528,2025-02-12T14:15:33.857000
@ -286127,3 +286129,7 @@ CVE-2025-30236,0,0,f7e2d88c169654d0773448256afe181965f2a68264511db7f8bbd914eb958
CVE-2025-30258,0,0,b2050ad0522ca8186c25aaf6c75c9bc41a04ea2774b98c396ece174b26ef1552,2025-03-19T20:15:20.140000
CVE-2025-30259,0,0,d54c9c6314149ff81b40b391c2b1be03a54505a0c2b6ccd0ee4e34b08fc91550,2025-03-20T00:15:13.780000
CVE-2025-30334,0,0,70a58bfa94dee5ac9b80b2a13d93d68ec0fd6d4c2e22670672e09a015fc65a75,2025-03-20T22:15:14.453000
CVE-2025-30342,1,1,0903ff9f2a74017ec55a95a4feb2e3e74a2f51a140835603e88e33ec3a1f3668,2025-03-21T06:15:26.510000
CVE-2025-30343,1,1,c1148f8e147239755027f66b5cd5ff501a637a770e250c623b2bdfb05509a102,2025-03-21T06:15:26.700000
CVE-2025-30344,1,1,907b433de9c3db5d7acdcdfe947d5d9d2fe4303d13f429b509554e436bea2b2e,2025-03-21T06:15:26.900000
CVE-2025-30345,1,1,b3605ab6ece2ad8d642e6b9c4650d652f92a5fa2b4d6511be77929e06675f55b,2025-03-21T06:15:27.090000

Can't render this file because it is too large.