Skip to content

Commit

Permalink
5 changes (5 new | 0 updated):
Browse files Browse the repository at this point in the history
  • Loading branch information
cvelistV5 Github Action committed Jan 29, 2025
1 parent bab1b28 commit 71e3ef6
Show file tree
Hide file tree
Showing 7 changed files with 771 additions and 34 deletions.
157 changes: 157 additions & 0 deletions cves/2025/0xxx/CVE-2025-0798.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,157 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2025-0798",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"state": "PUBLISHED",
"assignerShortName": "VulDB",
"dateReserved": "2025-01-28T14:41:58.531Z",
"datePublished": "2025-01-29T01:31:03.976Z",
"dateUpdated": "2025-01-29T01:31:03.976Z"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2025-01-29T01:31:03.976Z"
},
"title": "MicroWorld eScan Antivirus Quarantine rtscanner os command injection",
"problemTypes": [
{
"descriptions": [
{
"type": "CWE",
"cweId": "CWE-78",
"lang": "en",
"description": "OS Command Injection"
}
]
},
{
"descriptions": [
{
"type": "CWE",
"cweId": "CWE-77",
"lang": "en",
"description": "Command Injection"
}
]
}
],
"affected": [
{
"vendor": "MicroWorld",
"product": "eScan Antivirus",
"versions": [
{
"version": "7.0.32",
"status": "affected"
}
],
"modules": [
"Quarantine Handler"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linux. It has been rated as critical. This issue affects some unknown processing of the file rtscanner of the component Quarantine Handler. The manipulation leads to os command injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Eine Schwachstelle wurde in MicroWorld eScan Antivirus 7.0.32 für Linux ausgemacht. Sie wurde als kritisch eingestuft. Es geht hierbei um eine nicht näher spezifizierte Funktion der Datei rtscanner der Komponente Quarantine Handler. Dank Manipulation mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Die Komplexität eines Angriffs ist eher hoch. Die Ausnutzbarkeit gilt als schwierig. Der Exploit steht zur öffentlichen Verfügung."
}
],
"metrics": [
{
"cvssV4_0": {
"version": "4.0",
"baseScore": 9.2,
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"baseSeverity": "CRITICAL"
}
},
{
"cvssV3_1": {
"version": "3.1",
"baseScore": 8.1,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseSeverity": "HIGH"
}
},
{
"cvssV3_0": {
"version": "3.0",
"baseScore": 8.1,
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseSeverity": "HIGH"
}
},
{
"cvssV2_0": {
"version": "2.0",
"baseScore": 7.6,
"vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
}
}
],
"timeline": [
{
"time": "2025-01-28T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2025-01-28T01:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2025-01-28T15:47:05.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "FPT IS Security (VulDB User)",
"type": "reporter"
}
],
"references": [
{
"url": "https://vuldb.com/?id.293921",
"name": "VDB-293921 | MicroWorld eScan Antivirus Quarantine rtscanner os command injection",
"tags": [
"vdb-entry"
]
},
{
"url": "https://vuldb.com/?ctiid.293921",
"name": "VDB-293921 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/?submit.484718",
"name": "Submit #484718 | Microword Escan Antivirus For Linux 7.0.32 OS Command Injection",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://github.com/dmknght/FIS_RnD/blob/main/escan_rtscanner_rce.md",
"tags": [
"exploit"
]
}
]
}
}
}
158 changes: 158 additions & 0 deletions cves/2025/0xxx/CVE-2025-0800.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,158 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2025-0800",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"state": "PUBLISHED",
"assignerShortName": "VulDB",
"dateReserved": "2025-01-28T14:44:13.721Z",
"datePublished": "2025-01-29T01:31:05.836Z",
"dateUpdated": "2025-01-29T01:31:05.836Z"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2025-01-29T01:31:05.836Z"
},
"title": "SourceCodester Online Courseware Edit Teacher saveeditt.php cross site scripting",
"problemTypes": [
{
"descriptions": [
{
"type": "CWE",
"cweId": "CWE-79",
"lang": "en",
"description": "Cross Site Scripting"
}
]
},
{
"descriptions": [
{
"type": "CWE",
"cweId": "CWE-94",
"lang": "en",
"description": "Code Injection"
}
]
}
],
"affected": [
{
"vendor": "SourceCodester",
"product": "Online Courseware",
"versions": [
{
"version": "1.0",
"status": "affected"
}
],
"modules": [
"Edit Teacher"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in SourceCodester Online Courseware 1.0. Affected is an unknown function of the file /pcci/admin/saveeditt.php of the component Edit Teacher. The manipulation of the argument fname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "de",
"value": "Es wurde eine problematische Schwachstelle in SourceCodester Online Courseware 1.0 entdeckt. Es geht dabei um eine nicht klar definierte Funktion der Datei /pcci/admin/saveeditt.php der Komponente Edit Teacher. Mit der Manipulation des Arguments fname mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."
}
],
"metrics": [
{
"cvssV4_0": {
"version": "4.0",
"baseScore": 5.1,
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"baseSeverity": "MEDIUM"
}
},
{
"cvssV3_1": {
"version": "3.1",
"baseScore": 2.4,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
}
},
{
"cvssV3_0": {
"version": "3.0",
"baseScore": 2.4,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
}
},
{
"cvssV2_0": {
"version": "2.0",
"baseScore": 3.3,
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N"
}
}
],
"timeline": [
{
"time": "2025-01-28T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2025-01-28T01:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2025-01-28T15:49:17.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "ayush8816 (VulDB User)",
"type": "reporter"
}
],
"references": [
{
"url": "https://vuldb.com/?id.293922",
"name": "VDB-293922 | SourceCodester Online Courseware Edit Teacher saveeditt.php cross site scripting",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/?ctiid.293922",
"name": "VDB-293922 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/?submit.484935",
"name": "Submit #484935 | Sourcecodester Online Courseware 1 Cross Site Scripting",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://www.sourcecodester.com/",
"tags": [
"product"
]
}
]
}
}
}
Loading

0 comments on commit 71e3ef6

Please sign in to comment.