Skip to content

Commit

Permalink
1 changes (1 new | 0 updated):
Browse files Browse the repository at this point in the history
      - 1 new CVEs:  CVE-2025-0219
      - 0 updated CVEs:
  • Loading branch information
cvelistV5 Github Action committed Jan 5, 2025
1 parent 2694b8d commit 429d26a
Show file tree
Hide file tree
Showing 3 changed files with 171 additions and 19 deletions.
152 changes: 152 additions & 0 deletions cves/2025/0xxx/CVE-2025-0219.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,152 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2025-0219",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"state": "PUBLISHED",
"assignerShortName": "VulDB",
"dateReserved": "2025-01-04T08:47:38.864Z",
"datePublished": "2025-01-05T05:31:04.064Z",
"dateUpdated": "2025-01-05T05:31:04.064Z"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2025-01-05T05:31:04.064Z"
},
"title": "Trimble SPS851 Receiver Status Identity Tab cross site scripting",
"problemTypes": [
{
"descriptions": [
{
"type": "CWE",
"cweId": "CWE-79",
"lang": "en",
"description": "Cross Site Scripting"
}
]
},
{
"descriptions": [
{
"type": "CWE",
"cweId": "CWE-94",
"lang": "en",
"description": "Code Injection"
}
]
}
],
"affected": [
{
"vendor": "Trimble",
"product": "SPS851",
"versions": [
{
"version": "488.01",
"status": "affected"
}
],
"modules": [
"Receiver Status Identity Tab"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in Trimble SPS851 488.01. Affected by this issue is some unknown functionality of the component Receiver Status Identity Tab. The manipulation of the argument System Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Eine problematische Schwachstelle wurde in Trimble SPS851 488.01 entdeckt. Betroffen davon ist ein unbekannter Prozess der Komponente Receiver Status Identity Tab. Durch das Manipulieren des Arguments System Name mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."
}
],
"metrics": [
{
"cvssV4_0": {
"version": "4.0",
"baseScore": 5.1,
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"baseSeverity": "MEDIUM"
}
},
{
"cvssV3_1": {
"version": "3.1",
"baseScore": 2.4,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
}
},
{
"cvssV3_0": {
"version": "3.0",
"baseScore": 2.4,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
}
},
{
"cvssV2_0": {
"version": "2.0",
"baseScore": 3.3,
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N"
}
}
],
"timeline": [
{
"time": "2025-01-04T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2025-01-04T01:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2025-01-04T09:52:46.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "Fergod (VulDB User)",
"type": "reporter"
}
],
"references": [
{
"url": "https://vuldb.com/?id.290198",
"name": "VDB-290198 | Trimble SPS851 Receiver Status Identity Tab cross site scripting",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/?ctiid.290198",
"name": "VDB-290198 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/?submit.464906",
"name": "Submit #464906 | Trimble SPS851 488.01 Cross Site Scripting",
"tags": [
"third-party-advisory"
]
}
]
}
}
}
10 changes: 5 additions & 5 deletions cves/delta.json
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
{
"fetchTime": "2025-01-05T05:03:53.846Z",
"fetchTime": "2025-01-05T05:31:11.371Z",
"numberOfChanges": 1,
"new": [
{
"cveId": "CVE-2024-13133",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-13133",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/13xxx/CVE-2024-13133.json",
"dateUpdated": "2025-01-05T05:00:11.551Z"
"cveId": "CVE-2025-0219",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2025-0219",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2025/0xxx/CVE-2025-0219.json",
"dateUpdated": "2025-01-05T05:31:04.064Z"
}
],
"updated": [],
Expand Down
28 changes: 14 additions & 14 deletions cves/deltaLog.json
Original file line number Diff line number Diff line change
@@ -1,4 +1,18 @@
[
{
"fetchTime": "2025-01-05T05:31:11.371Z",
"numberOfChanges": 1,
"new": [
{
"cveId": "CVE-2025-0219",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2025-0219",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2025/0xxx/CVE-2025-0219.json",
"dateUpdated": "2025-01-05T05:31:04.064Z"
}
],
"updated": [],
"error": []
},
{
"fetchTime": "2025-01-05T05:03:53.846Z",
"numberOfChanges": 1,
Expand Down Expand Up @@ -119011,19 +119025,5 @@
}
],
"error": []
},
{
"fetchTime": "2024-12-06T05:20:35.644Z",
"numberOfChanges": 1,
"new": [],
"updated": [
{
"cveId": "CVE-2024-8299",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8299",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8299.json",
"dateUpdated": "2024-12-06T05:18:03.652Z"
}
],
"error": []
}
]

0 comments on commit 429d26a

Please sign in to comment.