From d43c33c9f39e28fa04765a3bda074e6ea5082b5d Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 20 Apr 2025 08:03:52 +0000 Subject: [PATCH] Auto-Update: 2025-04-20T08:00:19.838179+00:00 --- CVE-2025/CVE-2025-38xx/CVE-2025-3822.json | 141 ++++++++++++++++++++++ README.md | 8 +- _state.csv | 3 +- 3 files changed, 147 insertions(+), 5 deletions(-) create mode 100644 CVE-2025/CVE-2025-38xx/CVE-2025-3822.json diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3822.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3822.json new file mode 100644 index 00000000000..e793d7b9fcb --- /dev/null +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3822.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-3822", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-20T07:15:28.407", + "lastModified": "2025-04-20T07:15:28.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Web-based Pharmacy Product Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file changepassword.php. The manipulation of the argument txtconfirm_password/txtnew_password/txtold_password leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "baseScore": 3.3, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/xss_from_input_with_post.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.305729", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.305729", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index e8c13326fb3..c9db3777fdd 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-20T06:00:19.971780+00:00 +2025-04-20T08:00:19.838179+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-20T04:15:20.610000+00:00 +2025-04-20T07:15:28.407000+00:00 ``` ### Last Data Feed Release @@ -33,14 +33,14 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -290931 +290932 ``` ### CVEs added in the last Commit Recently added CVEs: `1` -- [CVE-2025-3821](CVE-2025/CVE-2025-38xx/CVE-2025-3821.json) (`2025-04-20T04:15:20.610`) +- [CVE-2025-3822](CVE-2025/CVE-2025-38xx/CVE-2025-3822.json) (`2025-04-20T07:15:28.407`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 1ef8c5b825f..3580ac1efdd 100644 --- a/_state.csv +++ b/_state.csv @@ -290760,7 +290760,8 @@ CVE-2025-3817,0,0,f43ec164ae30066f99f1b2718e141a59aea2f074c379769d6e8a68efe6a53d CVE-2025-3818,0,0,becc0d92806ccaaa15c607aa85c5ec6443bc3617d8777f2f23a8a11191e6c7c3,2025-04-19T20:15:15.037000 CVE-2025-3819,0,0,364377ad54d70df860fc9ec00ab9e1d4d8eb233351a7f92ce1289b9b90b3f645,2025-04-19T20:15:15.720000 CVE-2025-3820,0,0,bd63f641be19cb790a0f0ceb45fc52d02a8f7828a89af0f8ffc659042a7d1628,2025-04-19T21:15:45.660000 -CVE-2025-3821,1,1,d858b31c07c0d51da5c674b08505aa8e0806ebde89ea307526d32e0a41895c21,2025-04-20T04:15:20.610000 +CVE-2025-3821,0,0,d858b31c07c0d51da5c674b08505aa8e0806ebde89ea307526d32e0a41895c21,2025-04-20T04:15:20.610000 +CVE-2025-3822,1,1,ea516a66da392b94100ba03e49146fb36805f8eb91db2f30ea934b47f2e75a27,2025-04-20T07:15:28.407000 CVE-2025-38240,0,0,55c3c53507175385d390f4e5f0701155663d7d45488ce3854f0ce48d67d704f4,2025-04-18T07:15:43.510000 CVE-2025-38479,0,0,b2b6ea65e240d4ffeed782b9d037d3b3cf1f0ae1e3ce4a6e40a815527e135169,2025-04-18T07:15:43.613000 CVE-2025-38575,0,0,fc45fd45a431f685538b4001e1e87131d23faf0a16a9209a56843479513a7e70,2025-04-18T07:15:43.717000