diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1589.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1589.json new file mode 100644 index 00000000000..018d3ff1bff --- /dev/null +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1589.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-1589", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-23T18:15:08.427", + "lastModified": "2025-02-23T18:15:08.427", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester E-Learning System 1.0 and classified as problematic. This issue affects some unknown processing of the file /register.php of the component User Registration Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.296573", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.296573", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.504039", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 869d6b54bc0..1a1100e8e0a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-23T17:00:19.585933+00:00 +2025-02-23T19:00:20.501928+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-23T16:15:08.637000+00:00 +2025-02-23T18:15:08.427000+00:00 ``` ### Last Data Feed Release @@ -33,17 +33,14 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -282104 +282105 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `1` -- [CVE-2025-1467](CVE-2025/CVE-2025-14xx/CVE-2025-1467.json) (`2025-02-23T16:15:08.400`) -- [CVE-2025-1586](CVE-2025/CVE-2025-15xx/CVE-2025-1586.json) (`2025-02-23T15:15:09.407`) -- [CVE-2025-1587](CVE-2025/CVE-2025-15xx/CVE-2025-1587.json) (`2025-02-23T15:15:10.107`) -- [CVE-2025-1588](CVE-2025/CVE-2025-15xx/CVE-2025-1588.json) (`2025-02-23T16:15:08.637`) +- [CVE-2025-1589](CVE-2025/CVE-2025-15xx/CVE-2025-1589.json) (`2025-02-23T18:15:08.427`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index afc2d4b90d4..2236610f753 100644 --- a/_state.csv +++ b/_state.csv @@ -279676,7 +279676,7 @@ CVE-2025-1447,0,0,94d813a2a765cca7833281fda7977d5974397f1e3ddfd630be22d2387da03e CVE-2025-1448,0,0,c01bebc87ceda949e53960d4081cc94f0b041bbdc7b484616330316226fc1342,2025-02-19T02:15:08.833000 CVE-2025-1464,0,0,d9cc73e2e9d26228c790e8ecd2213add7d739452f4a19e301a068d9caaa20e2b,2025-02-19T14:15:30.337000 CVE-2025-1465,0,0,bdcf9bfa7fd1e0af82a5b56b58aad79a5298458b671a31685b7f60de618bf01a,2025-02-19T16:15:40.667000 -CVE-2025-1467,1,1,99bec188621b4f3c82d0a861b6edcc4884e90fd13d70d81596ba505623ec4172,2025-02-23T16:15:08.400000 +CVE-2025-1467,0,0,99bec188621b4f3c82d0a861b6edcc4884e90fd13d70d81596ba505623ec4172,2025-02-23T16:15:08.400000 CVE-2025-1470,0,0,c431c34122bd455693ae857da134c11078dd424d889a110192af0d8789781c00,2025-02-21T10:15:11.243000 CVE-2025-1471,0,0,5f2308ef243e2997d93c627b7cee213af79efe1fdd8602f268a3ff3acb063cf9,2025-02-21T10:15:11.413000 CVE-2025-1483,0,0,ce3e2374c8ceeb73bbc31bdc8dbf6b8de9bfef289bdc35ff175139154a83c52b,2025-02-20T10:15:12.537000 @@ -279708,9 +279708,10 @@ CVE-2025-1582,0,0,eccc3f96b055af4e00c42f9af627cf47b694897b13522be44dbdeded6bc83e CVE-2025-1583,0,0,e334029a00ce9698f70adf6d79ebbc5aa7ca8d5e8f2c14e2cccc3372b741a131,2025-02-23T12:15:09.550000 CVE-2025-1584,0,0,37fcd8b8518ac69af859e6aafbe4aed7ba4463b3713232299f7e413d63714d3e,2025-02-23T13:15:09.253000 CVE-2025-1585,0,0,07b81c4e240b6600cc73e2859ab1ee15472f06c39704fce5e3aa1ba0724b1eba,2025-02-23T14:15:09.110000 -CVE-2025-1586,1,1,2e1988f52d595a1d9d9f6b46c7e86dfce63fd00ec8e302d63927e1f91f2ed471,2025-02-23T15:15:09.407000 -CVE-2025-1587,1,1,549a7c2656a2ae2fbc91f2512a9c195c906f315a63875bedbfb98906fe2b2d89,2025-02-23T15:15:10.107000 -CVE-2025-1588,1,1,276dd8268245c9486b93f77f6f34e5eeb8a013f4706e2808775c4a29407629d1,2025-02-23T16:15:08.637000 +CVE-2025-1586,0,0,2e1988f52d595a1d9d9f6b46c7e86dfce63fd00ec8e302d63927e1f91f2ed471,2025-02-23T15:15:09.407000 +CVE-2025-1587,0,0,549a7c2656a2ae2fbc91f2512a9c195c906f315a63875bedbfb98906fe2b2d89,2025-02-23T15:15:10.107000 +CVE-2025-1588,0,0,276dd8268245c9486b93f77f6f34e5eeb8a013f4706e2808775c4a29407629d1,2025-02-23T16:15:08.637000 +CVE-2025-1589,1,1,d59fc53f1317cf37da767c9f2425cbb5d54c2378befb855f03beb5810fb4efb2,2025-02-23T18:15:08.427000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000