Skip to content

Commit 6fc937f

Browse files
committed
Auto-Update: 2025-03-16T05:00:19.183394+00:00
1 parent 7ab230f commit 6fc937f

File tree

8 files changed

+3512
-3093
lines changed

8 files changed

+3512
-3093
lines changed
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"id": "CVE-2024-58103",
3+
"sourceIdentifier": "[email protected]",
4+
"published": "2025-03-16T04:15:12.313",
5+
"lastModified": "2025-03-16T04:15:12.313",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "Square Wire before 5.2.0 does not enforce a recursion limit on nested groups in ByteArrayProtoReader32.kt and ProtoReader.kt."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "[email protected]",
18+
"type": "Secondary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
22+
"baseScore": 5.8,
23+
"baseSeverity": "MEDIUM",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "LOW",
26+
"privilegesRequired": "NONE",
27+
"userInteraction": "NONE",
28+
"scope": "CHANGED",
29+
"confidentialityImpact": "NONE",
30+
"integrityImpact": "NONE",
31+
"availabilityImpact": "LOW"
32+
},
33+
"exploitabilityScore": 3.9,
34+
"impactScore": 1.4
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "[email protected]",
41+
"type": "Secondary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-674"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://github.com/square/wire/commit/b90e60c09befaff836a2fc2ee4d678451b2ec75d",
53+
"source": "[email protected]"
54+
},
55+
{
56+
"url": "https://github.com/square/wire/compare/5.1.0...5.2.0",
57+
"source": "[email protected]"
58+
}
59+
]
60+
}
Lines changed: 141 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,141 @@
1+
{
2+
"id": "CVE-2025-2335",
3+
"sourceIdentifier": "[email protected]",
4+
"published": "2025-03-16T03:15:37.907",
5+
"lastModified": "2025-03-16T03:15:37.907",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "A vulnerability classified as problematic was found in Drivin Solu\u00e7\u00f5es up to 20250226. This vulnerability affects unknown code of the file /api/school/registerSchool of the component API Handler. The manipulation of the argument message leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV40": [
16+
{
17+
"source": "[email protected]",
18+
"type": "Secondary",
19+
"cvssData": {
20+
"version": "4.0",
21+
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
22+
"baseScore": 5.1,
23+
"baseSeverity": "MEDIUM",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "LOW",
26+
"attackRequirements": "NONE",
27+
"privilegesRequired": "LOW",
28+
"userInteraction": "PASSIVE",
29+
"vulnConfidentialityImpact": "NONE",
30+
"vulnIntegrityImpact": "LOW",
31+
"vulnAvailabilityImpact": "NONE",
32+
"subConfidentialityImpact": "NONE",
33+
"subIntegrityImpact": "NONE",
34+
"subAvailabilityImpact": "NONE",
35+
"exploitMaturity": "NOT_DEFINED",
36+
"confidentialityRequirement": "NOT_DEFINED",
37+
"integrityRequirement": "NOT_DEFINED",
38+
"availabilityRequirement": "NOT_DEFINED",
39+
"modifiedAttackVector": "NOT_DEFINED",
40+
"modifiedAttackComplexity": "NOT_DEFINED",
41+
"modifiedAttackRequirements": "NOT_DEFINED",
42+
"modifiedPrivilegesRequired": "NOT_DEFINED",
43+
"modifiedUserInteraction": "NOT_DEFINED",
44+
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
45+
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
46+
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
47+
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
48+
"modifiedSubIntegrityImpact": "NOT_DEFINED",
49+
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
50+
"Safety": "NOT_DEFINED",
51+
"Automatable": "NOT_DEFINED",
52+
"Recovery": "NOT_DEFINED",
53+
"valueDensity": "NOT_DEFINED",
54+
"vulnerabilityResponseEffort": "NOT_DEFINED",
55+
"providerUrgency": "NOT_DEFINED"
56+
}
57+
}
58+
],
59+
"cvssMetricV31": [
60+
{
61+
"source": "[email protected]",
62+
"type": "Primary",
63+
"cvssData": {
64+
"version": "3.1",
65+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
66+
"baseScore": 3.5,
67+
"baseSeverity": "LOW",
68+
"attackVector": "NETWORK",
69+
"attackComplexity": "LOW",
70+
"privilegesRequired": "LOW",
71+
"userInteraction": "REQUIRED",
72+
"scope": "UNCHANGED",
73+
"confidentialityImpact": "NONE",
74+
"integrityImpact": "LOW",
75+
"availabilityImpact": "NONE"
76+
},
77+
"exploitabilityScore": 2.1,
78+
"impactScore": 1.4
79+
}
80+
],
81+
"cvssMetricV2": [
82+
{
83+
"source": "[email protected]",
84+
"type": "Secondary",
85+
"cvssData": {
86+
"version": "2.0",
87+
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
88+
"baseScore": 4.0,
89+
"accessVector": "NETWORK",
90+
"accessComplexity": "LOW",
91+
"authentication": "SINGLE",
92+
"confidentialityImpact": "NONE",
93+
"integrityImpact": "PARTIAL",
94+
"availabilityImpact": "NONE"
95+
},
96+
"baseSeverity": "MEDIUM",
97+
"exploitabilityScore": 8.0,
98+
"impactScore": 2.9,
99+
"acInsufInfo": false,
100+
"obtainAllPrivilege": false,
101+
"obtainUserPrivilege": false,
102+
"obtainOtherPrivilege": false,
103+
"userInteractionRequired": false
104+
}
105+
]
106+
},
107+
"weaknesses": [
108+
{
109+
"source": "[email protected]",
110+
"type": "Primary",
111+
"description": [
112+
{
113+
"lang": "en",
114+
"value": "CWE-79"
115+
},
116+
{
117+
"lang": "en",
118+
"value": "CWE-94"
119+
}
120+
]
121+
}
122+
],
123+
"references": [
124+
{
125+
"url": "https://github.com/yago3008/cves",
126+
"source": "[email protected]"
127+
},
128+
{
129+
"url": "https://vuldb.com/?ctiid.299800",
130+
"source": "[email protected]"
131+
},
132+
{
133+
"url": "https://vuldb.com/?id.299800",
134+
"source": "[email protected]"
135+
},
136+
{
137+
"url": "https://vuldb.com/?submit.509834",
138+
"source": "[email protected]"
139+
}
140+
]
141+
}
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"id": "CVE-2025-24856",
3+
"sourceIdentifier": "[email protected]",
4+
"published": "2025-03-16T04:15:14.517",
5+
"lastModified": "2025-03-16T04:15:14.517",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "An issue was discovered in the oidc (aka OpenID Connect Authentication) extension before 4.0.0 for TYPO3. The account linking logic allows a pre-hijacking attack, leading to Account Takeover. The attack can only be exploited if the following requirements are met: (1) an attacker can anticipate the e-mail address of the user, (2) an attacker can register a public frontend user account using that e-mail address before the user's first OIDC login, and (3) the IDP returns an email field containing the e-mail address of the user,"
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "[email protected]",
18+
"type": "Secondary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
22+
"baseScore": 4.2,
23+
"baseSeverity": "MEDIUM",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "HIGH",
26+
"privilegesRequired": "NONE",
27+
"userInteraction": "REQUIRED",
28+
"scope": "UNCHANGED",
29+
"confidentialityImpact": "LOW",
30+
"integrityImpact": "LOW",
31+
"availabilityImpact": "NONE"
32+
},
33+
"exploitabilityScore": 1.6,
34+
"impactScore": 2.5
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "[email protected]",
41+
"type": "Secondary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-348"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://github.com/xperseguers/t3ext-oidc/commit/877e09f6faf4c87bbb41233112ec7e30d3c902b3",
53+
"source": "[email protected]"
54+
},
55+
{
56+
"url": "https://typo3.org/security/advisory/typo3-ext-sa-2025-001",
57+
"source": "[email protected]"
58+
}
59+
]
60+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"id": "CVE-2025-30074",
3+
"sourceIdentifier": "[email protected]",
4+
"published": "2025-03-16T03:15:39.117",
5+
"lastModified": "2025-03-16T03:15:39.117",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "Alludo Parallels Desktop before 19.4.2 and 20.x before 20.2.2 for macOS on Intel platforms allows privilege escalation to root via the VM creation routine."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "[email protected]",
18+
"type": "Secondary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
22+
"baseScore": 7.8,
23+
"baseSeverity": "HIGH",
24+
"attackVector": "LOCAL",
25+
"attackComplexity": "HIGH",
26+
"privilegesRequired": "LOW",
27+
"userInteraction": "NONE",
28+
"scope": "CHANGED",
29+
"confidentialityImpact": "HIGH",
30+
"integrityImpact": "HIGH",
31+
"availabilityImpact": "HIGH"
32+
},
33+
"exploitabilityScore": 1.1,
34+
"impactScore": 6.0
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "[email protected]",
41+
"type": "Secondary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-863"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://kb.parallels.com/en/130944",
53+
"source": "[email protected]"
54+
}
55+
]
56+
}
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"id": "CVE-2025-30076",
3+
"sourceIdentifier": "[email protected]",
4+
"published": "2025-03-16T03:15:39.273",
5+
"lastModified": "2025-03-16T03:15:39.273",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "Koha before 24.11.02 allows admins to execute arbitrary commands via shell metacharacters in the tools/scheduler.pl report parameter."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "[email protected]",
18+
"type": "Secondary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N",
22+
"baseScore": 7.7,
23+
"baseSeverity": "HIGH",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "HIGH",
26+
"privilegesRequired": "HIGH",
27+
"userInteraction": "NONE",
28+
"scope": "CHANGED",
29+
"confidentialityImpact": "HIGH",
30+
"integrityImpact": "HIGH",
31+
"availabilityImpact": "NONE"
32+
},
33+
"exploitabilityScore": 1.3,
34+
"impactScore": 5.8
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "[email protected]",
41+
"type": "Secondary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-78"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=39170",
53+
"source": "[email protected]"
54+
},
55+
{
56+
"url": "https://github.com/gl0wyy/koha-task-scheduler-rce",
57+
"source": "[email protected]"
58+
}
59+
]
60+
}

0 commit comments

Comments
 (0)