From 9f05d42f155cfbb47502d8637f771cc40f47ff56 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 20 Apr 2025 12:03:56 +0000 Subject: [PATCH] Auto-Update: 2025-04-20T12:00:21.971474+00:00 --- CVE-2025/CVE-2025-38xx/CVE-2025-3823.json | 141 ++++++++++++++++++++++ CVE-2025/CVE-2025-38xx/CVE-2025-3824.json | 141 ++++++++++++++++++++++ README.md | 14 +-- _state.csv | 6 +- 4 files changed, 293 insertions(+), 9 deletions(-) create mode 100644 CVE-2025/CVE-2025-38xx/CVE-2025-3823.json create mode 100644 CVE-2025/CVE-2025-38xx/CVE-2025-3824.json diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3823.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3823.json new file mode 100644 index 00000000000..6d5ef47dac7 --- /dev/null +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3823.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-3823", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-20T11:15:44.057", + "lastModified": "2025-04-20T11:15:44.057", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in SourceCodester Web-based Pharmacy Product Management System 1.0. Affected is an unknown function of the file add-stock.php. The manipulation of the argument txttotalcost/txtproductID/txtprice/txtexpirydate leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "baseScore": 3.3, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/xss_from_input_with_post.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.305730", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.305730", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3824.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3824.json new file mode 100644 index 00000000000..1a4cd3d3ed1 --- /dev/null +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3824.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-3824", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-20T11:15:44.937", + "lastModified": "2025-04-20T11:15:44.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in SourceCodester Web-based Pharmacy Product Management System 1.0. Affected by this vulnerability is an unknown functionality of the file add-product.php. The manipulation of the argument txtprice/txtproduct_name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "baseScore": 3.3, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/xss_from_input_with_post.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.305731", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.305731", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 176e4a434bb..470ec99b0ca 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-20T10:00:19.920732+00:00 +2025-04-20T12:00:21.971474+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-20T09:15:14.010000+00:00 +2025-04-20T11:15:44.937000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -290933 +290935 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `2` -- [CVE-2025-37838](CVE-2025/CVE-2025-378xx/CVE-2025-37838.json) (`2025-04-18T15:15:59.090`) +- [CVE-2025-3823](CVE-2025/CVE-2025-38xx/CVE-2025-3823.json) (`2025-04-20T11:15:44.057`) +- [CVE-2025-3824](CVE-2025/CVE-2025-38xx/CVE-2025-3824.json) (`2025-04-20T11:15:44.937`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -- [CVE-2025-22026](CVE-2025/CVE-2025-220xx/CVE-2025-22026.json) (`2025-04-20T09:15:13.753`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 248f5975703..caa221eb3c5 100644 --- a/_state.csv +++ b/_state.csv @@ -283909,7 +283909,7 @@ CVE-2025-22022,0,0,b0b2a4f36ca18aafe7086db06e42627cd041ca4416e5acd924bba4ad965a4 CVE-2025-22023,0,0,3b6cd95ee61722f71d40c3efcbcb19a8146f1840e01fc126c70623b0dacf8288,2025-04-16T13:25:37.340000 CVE-2025-22024,0,0,e8dac82476abeaf332c305f17247a4393a5f469d14e8a6131ed28a6b5095cb6e,2025-04-17T20:22:16.240000 CVE-2025-22025,0,0,c7c9fd4898dd8e1f247adeb18f8ad976ae8855aaa7a3a0a826a5edd191f0fdef,2025-04-17T20:22:16.240000 -CVE-2025-22026,0,1,77c6715bd31e1530cf370dce65fcf3768219ef0d6106056bf5ec0f56ae1f8546,2025-04-20T09:15:13.753000 +CVE-2025-22026,0,0,77c6715bd31e1530cf370dce65fcf3768219ef0d6106056bf5ec0f56ae1f8546,2025-04-20T09:15:13.753000 CVE-2025-22027,0,0,0abcb6f036ec1dd8f2ea4b88550d7b1a15d373b7663a559bcb6ecf09c222fb61,2025-04-17T20:22:16.240000 CVE-2025-22028,0,0,fb670058b3af52f22ed9980eceb6b87da3f2db1b42eafdf76394c7bf27e0b4b4,2025-04-17T20:22:16.240000 CVE-2025-22029,0,0,b95b9e68f8da175bfc9d87f9425b5097e66d98e23c3297f2b7442fbc56fd621b,2025-04-17T20:22:16.240000 @@ -290728,7 +290728,7 @@ CVE-2025-3764,0,0,192085e50203a378873b0fba70930bdb42ca705b402010a5434576b8a6b54b CVE-2025-3765,0,0,1013acbb24b428a59ff55984fd6a510ede3b7a74d0f6249931765b20d6806ee3,2025-04-17T20:21:05.203000 CVE-2025-37785,0,0,d1677744e4fd24c8bd92b8a55f4c8d0bec09cee0605b6a9d6cda47a6bcc25038,2025-04-18T07:15:42.693000 CVE-2025-3783,0,0,ddbcb921161bf63cec3f579eaec58f70f8a8dfa643f04e0ce7a8486882dcde94,2025-04-18T12:15:16.090000 -CVE-2025-37838,1,1,8021aa0afe7d4fcb835302b91b542c1c6f0037fab1ccdee5e207f25f1347dc0f,2025-04-20T09:15:14.010000 +CVE-2025-37838,0,0,8021aa0afe7d4fcb835302b91b542c1c6f0037fab1ccdee5e207f25f1347dc0f,2025-04-20T09:15:14.010000 CVE-2025-3785,0,0,236ad99200e5878fdb9f3e18ec24b6c983e775ad5235198974342d132d554d98,2025-04-18T09:15:15.440000 CVE-2025-3786,0,0,b16fc5c7479e78a8d815be2276f6ba56296c72c52af6d9dc2764fd0661c7c4cf,2025-04-18T12:15:16.293000 CVE-2025-37860,0,0,ca02d2514d9266bbb11e2189aebda900299cc4fe894a8aee0917673becd019cc,2025-04-18T07:15:42.883000 @@ -290763,6 +290763,8 @@ CVE-2025-3819,0,0,364377ad54d70df860fc9ec00ab9e1d4d8eb233351a7f92ce1289b9b90b3f6 CVE-2025-3820,0,0,bd63f641be19cb790a0f0ceb45fc52d02a8f7828a89af0f8ffc659042a7d1628,2025-04-19T21:15:45.660000 CVE-2025-3821,0,0,d858b31c07c0d51da5c674b08505aa8e0806ebde89ea307526d32e0a41895c21,2025-04-20T04:15:20.610000 CVE-2025-3822,0,0,ea516a66da392b94100ba03e49146fb36805f8eb91db2f30ea934b47f2e75a27,2025-04-20T07:15:28.407000 +CVE-2025-3823,1,1,141c2a6394d1599e8fed2233e745b9ee1081c6312aaffd891cb6374d6bba4603,2025-04-20T11:15:44.057000 +CVE-2025-3824,1,1,b965e5d32afe683a75f0838637bd08ae64a757afc4446e12179b507fbbeaf656,2025-04-20T11:15:44.937000 CVE-2025-38240,0,0,55c3c53507175385d390f4e5f0701155663d7d45488ce3854f0ce48d67d704f4,2025-04-18T07:15:43.510000 CVE-2025-38479,0,0,b2b6ea65e240d4ffeed782b9d037d3b3cf1f0ae1e3ce4a6e40a815527e135169,2025-04-18T07:15:43.613000 CVE-2025-38575,0,0,fc45fd45a431f685538b4001e1e87131d23faf0a16a9209a56843479513a7e70,2025-04-18T07:15:43.717000