Skip to content

Commit

Permalink
Publish Advisories
Browse files Browse the repository at this point in the history
  • Loading branch information
advisory-database[bot] committed Jan 4, 2025
1 parent 04c0fc3 commit a579628
Show file tree
Hide file tree
Showing 3 changed files with 164 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
{
"schema_version": "1.4.0",
"id": "GHSA-2wv9-jq79-5p63",
"modified": "2025-01-04T18:30:23Z",
"published": "2025-01-04T18:30:22Z",
"aliases": [
"CVE-2025-0212"
],
"details": "A vulnerability was found in Campcodes Student Grading System 1.0. It has been classified as critical. This affects an unknown part of the file /view_students.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
}
],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0212"
},
{
"type": "WEB",
"url": "https://github.com/shaturo1337/POCs/blob/main/SQL%20Injection%20in%20Student%20Grading%20System.md"
},
{
"type": "WEB",
"url": "https://vuldb.com/?ctiid.290157"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.290157"
},
{
"type": "WEB",
"url": "https://vuldb.com/?submit.474168"
},
{
"type": "WEB",
"url": "https://www.campcodes.com"
}
],
"database_specific": {
"cwe_ids": [
"CWE-74"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-04T16:15:23Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
{
"schema_version": "1.4.0",
"id": "GHSA-5jh2-6v7c-86vj",
"modified": "2025-01-04T18:30:23Z",
"published": "2025-01-04T18:30:23Z",
"aliases": [
"CVE-2025-0213"
],
"details": "A vulnerability was found in Campcodes Project Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /forms/update_forms.php?action=change_pic2&id=4. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
}
],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0213"
},
{
"type": "WEB",
"url": "https://github.com/shaturo1337/POCs/blob/main/Remote%20Code%20Execution%20via%20Arbitrary%20File%20Upload%20in%20Project%20Management%20System.md"
},
{
"type": "WEB",
"url": "https://vuldb.com/?ctiid.290158"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.290158"
},
{
"type": "WEB",
"url": "https://vuldb.com/?submit.474200"
},
{
"type": "WEB",
"url": "https://www.campcodes.com"
}
],
"database_specific": {
"cwe_ids": [
"CWE-284"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-04T17:15:06Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
{
"schema_version": "1.4.0",
"id": "GHSA-vj39-gwg7-6872",
"modified": "2025-01-04T18:30:23Z",
"published": "2025-01-04T18:30:22Z",
"aliases": [
"CVE-2025-0214"
],
"details": "A vulnerability was found in TMD Custom Header Menu 4.0.0.1 on OpenCart. It has been rated as problematic. This issue affects some unknown processing of the file /admin/index.php. The manipulation of the argument headermenu_id leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
}
],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0214"
},
{
"type": "WEB",
"url": "https://gist.github.com/mcdruid/ff4f29f4e7830e9e91988c7195d77039"
},
{
"type": "WEB",
"url": "https://vuldb.com/?ctiid.290159"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.290159"
},
{
"type": "WEB",
"url": "https://vuldb.com/?submit.474299"
}
],
"database_specific": {
"cwe_ids": [
"CWE-74"
],
"severity": "LOW",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-04T17:15:07Z"
}
}

0 comments on commit a579628

Please sign in to comment.