diff --git a/cves/2025/0xxx/CVE-2025-0200.json b/cves/2025/0xxx/CVE-2025-0200.json new file mode 100644 index 000000000000..e485011bb07b --- /dev/null +++ b/cves/2025/0xxx/CVE-2025-0200.json @@ -0,0 +1,161 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2025-0200", + "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", + "state": "PUBLISHED", + "assignerShortName": "VulDB", + "dateReserved": "2025-01-03T10:46:36.068Z", + "datePublished": "2025-01-04T03:00:16.975Z", + "dateUpdated": "2025-01-04T03:00:16.975Z" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", + "shortName": "VulDB", + "dateUpdated": "2025-01-04T03:00:16.975Z" + }, + "title": "code-projects Point of Sales and Inventory Management System search_num.php sql injection", + "problemTypes": [ + { + "descriptions": [ + { + "type": "CWE", + "cweId": "CWE-89", + "lang": "en", + "description": "SQL Injection" + } + ] + }, + { + "descriptions": [ + { + "type": "CWE", + "cweId": "CWE-74", + "lang": "en", + "description": "Injection" + } + ] + } + ], + "affected": [ + { + "vendor": "code-projects", + "product": "Point of Sales and Inventory Management System", + "versions": [ + { + "version": "1.0", + "status": "affected" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in code-projects Point of Sales and Inventory Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /user/search_num.php. The manipulation of the argument search leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "de", + "value": "In code-projects Point of Sales and Inventory Management System 1.0 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Betroffen ist eine unbekannte Verarbeitung der Datei /user/search_num.php. Dank Manipulation des Arguments search mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung." + } + ], + "metrics": [ + { + "cvssV4_0": { + "version": "4.0", + "baseScore": 5.3, + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", + "baseSeverity": "MEDIUM" + } + }, + { + "cvssV3_1": { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + } + }, + { + "cvssV3_0": { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + } + }, + { + "cvssV2_0": { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" + } + } + ], + "timeline": [ + { + "time": "2025-01-03T00:00:00.000Z", + "lang": "en", + "value": "Advisory disclosed" + }, + { + "time": "2025-01-03T01:00:00.000Z", + "lang": "en", + "value": "VulDB entry created" + }, + { + "time": "2025-01-03T11:51:51.000Z", + "lang": "en", + "value": "VulDB entry last update" + } + ], + "credits": [ + { + "lang": "en", + "value": "masamune (VulDB User)", + "type": "reporter" + } + ], + "references": [ + { + "url": "https://vuldb.com/?id.290137", + "name": "VDB-290137 | code-projects Point of Sales and Inventory Management System search_num.php sql injection", + "tags": [ + "vdb-entry", + "technical-description" + ] + }, + { + "url": "https://vuldb.com/?ctiid.290137", + "name": "VDB-290137 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required" + ] + }, + { + "url": "https://vuldb.com/?submit.473386", + "name": "Submit #473386 | code-projects POS(point of sales) and Inventory System 1.0 SQL Injection", + "tags": [ + "third-party-advisory" + ] + }, + { + "url": "https://gist.github.com/Masamuneee/f238db57d8b1947d000cadf634a8387e", + "tags": [ + "exploit" + ] + }, + { + "url": "https://code-projects.org/", + "tags": [ + "product" + ] + } + ] + } + } +} \ No newline at end of file diff --git a/cves/delta.json b/cves/delta.json index 4d3a33d848cd..5da8c1208d2a 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,38 +1,14 @@ { - "fetchTime": "2025-01-04T02:29:44.692Z", - "numberOfChanges": 5, - "new": [], - "updated": [ - { - "cveId": "CVE-2025-22386", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2025-22386", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2025/22xxx/CVE-2025-22386.json", - "dateUpdated": "2025-01-04T02:04:58.516Z" - }, - { - "cveId": "CVE-2025-22387", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2025-22387", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2025/22xxx/CVE-2025-22387.json", - "dateUpdated": "2025-01-04T02:06:18.617Z" - }, - { - "cveId": "CVE-2025-22388", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2025-22388", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2025/22xxx/CVE-2025-22388.json", - "dateUpdated": "2025-01-04T02:06:49.019Z" - }, - { - "cveId": "CVE-2025-22389", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2025-22389", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2025/22xxx/CVE-2025-22389.json", - "dateUpdated": "2025-01-04T02:09:16.461Z" - }, - { - "cveId": "CVE-2025-22390", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2025-22390", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2025/22xxx/CVE-2025-22390.json", - "dateUpdated": "2025-01-04T02:11:01.919Z" + "fetchTime": "2025-01-04T03:01:31.471Z", + "numberOfChanges": 1, + "new": [ + { + "cveId": "CVE-2025-0200", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2025-0200", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2025/0xxx/CVE-2025-0200.json", + "dateUpdated": "2025-01-04T03:00:16.975Z" } ], + "updated": [], "error": [] } \ No newline at end of file diff --git a/cves/deltaLog.json b/cves/deltaLog.json index d349b5d6b152..02f1758a0315 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,18 @@ [ + { + "fetchTime": "2025-01-04T03:01:31.471Z", + "numberOfChanges": 1, + "new": [ + { + "cveId": "CVE-2025-0200", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2025-0200", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2025/0xxx/CVE-2025-0200.json", + "dateUpdated": "2025-01-04T03:00:16.975Z" + } + ], + "updated": [], + "error": [] + }, { "fetchTime": "2025-01-04T02:29:44.692Z", "numberOfChanges": 5,