From 442400c7a02a227fa5ddb2a860f4c67f4c8568a9 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 14 Apr 2025 02:00:36 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/32xxx/CVE-2025-32902.json | 18 ++++ 2025/32xxx/CVE-2025-32903.json | 18 ++++ 2025/32xxx/CVE-2025-32904.json | 18 ++++ 2025/32xxx/CVE-2025-32905.json | 18 ++++ 2025/32xxx/CVE-2025-32906.json | 18 ++++ 2025/32xxx/CVE-2025-32907.json | 18 ++++ 2025/32xxx/CVE-2025-32908.json | 18 ++++ 2025/32xxx/CVE-2025-32909.json | 18 ++++ 2025/32xxx/CVE-2025-32910.json | 18 ++++ 2025/32xxx/CVE-2025-32911.json | 18 ++++ 2025/32xxx/CVE-2025-32912.json | 18 ++++ 2025/32xxx/CVE-2025-32913.json | 18 ++++ 2025/32xxx/CVE-2025-32914.json | 18 ++++ 2025/3xxx/CVE-2025-3545.json | 163 ++++++++++++++++++++++++++++++++- 2025/3xxx/CVE-2025-3546.json | 163 ++++++++++++++++++++++++++++++++- 2025/3xxx/CVE-2025-3547.json | 95 ++++++++++++++++++- 2025/3xxx/CVE-2025-3572.json | 108 ++++++++++++++++++++++ 17 files changed, 751 insertions(+), 12 deletions(-) create mode 100644 2025/32xxx/CVE-2025-32902.json create mode 100644 2025/32xxx/CVE-2025-32903.json create mode 100644 2025/32xxx/CVE-2025-32904.json create mode 100644 2025/32xxx/CVE-2025-32905.json create mode 100644 2025/32xxx/CVE-2025-32906.json create mode 100644 2025/32xxx/CVE-2025-32907.json create mode 100644 2025/32xxx/CVE-2025-32908.json create mode 100644 2025/32xxx/CVE-2025-32909.json create mode 100644 2025/32xxx/CVE-2025-32910.json create mode 100644 2025/32xxx/CVE-2025-32911.json create mode 100644 2025/32xxx/CVE-2025-32912.json create mode 100644 2025/32xxx/CVE-2025-32913.json create mode 100644 2025/32xxx/CVE-2025-32914.json create mode 100644 2025/3xxx/CVE-2025-3572.json diff --git a/2025/32xxx/CVE-2025-32902.json b/2025/32xxx/CVE-2025-32902.json new file mode 100644 index 00000000000..5a3c71a3283 --- /dev/null +++ b/2025/32xxx/CVE-2025-32902.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32902", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32903.json b/2025/32xxx/CVE-2025-32903.json new file mode 100644 index 00000000000..8903d212626 --- /dev/null +++ b/2025/32xxx/CVE-2025-32903.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32903", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32904.json b/2025/32xxx/CVE-2025-32904.json new file mode 100644 index 00000000000..969c602d8c0 --- /dev/null +++ b/2025/32xxx/CVE-2025-32904.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32904", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32905.json b/2025/32xxx/CVE-2025-32905.json new file mode 100644 index 00000000000..dcdc1fca73d --- /dev/null +++ b/2025/32xxx/CVE-2025-32905.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32905", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32906.json b/2025/32xxx/CVE-2025-32906.json new file mode 100644 index 00000000000..b4fe553fed0 --- /dev/null +++ b/2025/32xxx/CVE-2025-32906.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32906", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32907.json b/2025/32xxx/CVE-2025-32907.json new file mode 100644 index 00000000000..1d8a3bf8895 --- /dev/null +++ b/2025/32xxx/CVE-2025-32907.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32907", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32908.json b/2025/32xxx/CVE-2025-32908.json new file mode 100644 index 00000000000..1a3a88e88a5 --- /dev/null +++ b/2025/32xxx/CVE-2025-32908.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32908", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32909.json b/2025/32xxx/CVE-2025-32909.json new file mode 100644 index 00000000000..c2d19d5e69d --- /dev/null +++ b/2025/32xxx/CVE-2025-32909.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32909", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32910.json b/2025/32xxx/CVE-2025-32910.json new file mode 100644 index 00000000000..72e49094ec7 --- /dev/null +++ b/2025/32xxx/CVE-2025-32910.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32910", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32911.json b/2025/32xxx/CVE-2025-32911.json new file mode 100644 index 00000000000..084f04c7f9e --- /dev/null +++ b/2025/32xxx/CVE-2025-32911.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32911", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32912.json b/2025/32xxx/CVE-2025-32912.json new file mode 100644 index 00000000000..3fe38f99586 --- /dev/null +++ b/2025/32xxx/CVE-2025-32912.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32912", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32913.json b/2025/32xxx/CVE-2025-32913.json new file mode 100644 index 00000000000..05428a45e1b --- /dev/null +++ b/2025/32xxx/CVE-2025-32913.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32913", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32914.json b/2025/32xxx/CVE-2025-32914.json new file mode 100644 index 00000000000..fdf1f1e740a --- /dev/null +++ b/2025/32xxx/CVE-2025-32914.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32914", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3545.json b/2025/3xxx/CVE-2025-3545.json index fb225328bf3..8255d4d0a5a 100644 --- a/2025/3xxx/CVE-2025-3545.json +++ b/2025/3xxx/CVE-2025-3545.json @@ -1,17 +1,172 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-3545", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. It has been classified as critical. Affected is the function FCGI_CheckStringIfContainsSemicolon of the file /api/wizard/setLanguage of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack needs to be approached within the local network. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component." + }, + { + "lang": "deu", + "value": "Es wurde eine kritische Schwachstelle in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 bis V100R014 ausgemacht. Betroffen hiervon ist die Funktion FCGI_CheckStringIfContainsSemicolon der Datei /api/wizard/setLanguage der Komponente HTTP POST Request Handler. Mittels dem Manipulieren mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff im lokalen Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Command Injection", + "cweId": "CWE-77" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Injection", + "cweId": "CWE-74" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "H3C", + "product": { + "product_data": [ + { + "product_name": "Magic NX15", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V100R014" + } + ] + } + }, + { + "product_name": "Magic NX30 Pro", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V100R014" + } + ] + } + }, + { + "product_name": "Magic NX400", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V100R014" + } + ] + } + }, + { + "product_name": "Magic R3010", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V100R014" + } + ] + } + }, + { + "product_name": "Magic BE18000", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V100R014" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.304584", + "refsource": "MISC", + "name": "https://vuldb.com/?id.304584" + }, + { + "url": "https://vuldb.com/?ctiid.304584", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.304584" + }, + { + "url": "https://vuldb.com/?submit.524744", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.524744" + }, + { + "url": "https://gist.github.com/isstabber/cc7bc3281c0f0d6659d2f9934e1c57c1", + "refsource": "MISC", + "name": "https://gist.github.com/isstabber/cc7bc3281c0f0d6659d2f9934e1c57c1" + }, + { + "url": "https://zhiliao.h3c.com/theme/details/229784", + "refsource": "MISC", + "name": "https://zhiliao.h3c.com/theme/details/229784" + }, + { + "url": "https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/", + "refsource": "MISC", + "name": "https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "mono7s (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 8, + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 8, + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.7, + "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C" } ] } diff --git a/2025/3xxx/CVE-2025-3546.json b/2025/3xxx/CVE-2025-3546.json index 50f7865b5ba..1e8d7f80c6a 100644 --- a/2025/3xxx/CVE-2025-3546.json +++ b/2025/3xxx/CVE-2025-3546.json @@ -1,17 +1,172 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-3546", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. It has been declared as critical. Affected by this vulnerability is the function FCGI_CheckStringIfContainsSemicolon of the file /api/wizard/getLanguage of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack can only be done within the local network. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component." + }, + { + "lang": "deu", + "value": "In H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 bis V100R014 wurde eine kritische Schwachstelle ausgemacht. Es geht um die Funktion FCGI_CheckStringIfContainsSemicolon der Datei /api/wizard/getLanguage der Komponente HTTP POST Request Handler. Mittels Manipulieren mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann im lokalen Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Command Injection", + "cweId": "CWE-77" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Injection", + "cweId": "CWE-74" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "H3C", + "product": { + "product_data": [ + { + "product_name": "Magic NX15", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V100R014" + } + ] + } + }, + { + "product_name": "Magic NX30 Pro", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V100R014" + } + ] + } + }, + { + "product_name": "Magic NX400", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V100R014" + } + ] + } + }, + { + "product_name": "Magic R3010", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V100R014" + } + ] + } + }, + { + "product_name": "Magic BE18000", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V100R014" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.304585", + "refsource": "MISC", + "name": "https://vuldb.com/?id.304585" + }, + { + "url": "https://vuldb.com/?ctiid.304585", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.304585" + }, + { + "url": "https://vuldb.com/?submit.524745", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.524745" + }, + { + "url": "https://gist.github.com/isstabber/154661f329e4ae6bfe15dcdc0b932ff3", + "refsource": "MISC", + "name": "https://gist.github.com/isstabber/154661f329e4ae6bfe15dcdc0b932ff3" + }, + { + "url": "https://zhiliao.h3c.com/theme/details/229784", + "refsource": "MISC", + "name": "https://zhiliao.h3c.com/theme/details/229784" + }, + { + "url": "https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/", + "refsource": "MISC", + "name": "https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "mono7s (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 8, + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 8, + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.7, + "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C" } ] } diff --git a/2025/3xxx/CVE-2025-3547.json b/2025/3xxx/CVE-2025-3547.json index 22e40765ca3..8257d80a2ec 100644 --- a/2025/3xxx/CVE-2025-3547.json +++ b/2025/3xxx/CVE-2025-3547.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-3547", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical was found in frdel Agent-Zero 0.8.1.2. This vulnerability affects unknown code of the file /get_work_dir_files. The manipulation of the argument path leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "deu", + "value": "In frdel Agent-Zero 0.8.1.2 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /get_work_dir_files. Durch das Beeinflussen des Arguments path mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Path Traversal", + "cweId": "CWE-22" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "frdel", + "product": { + "product_data": [ + { + "product_name": "Agent-Zero", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "0.8.1.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.304588", + "refsource": "MISC", + "name": "https://vuldb.com/?id.304588" + }, + { + "url": "https://vuldb.com/?ctiid.304588", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.304588" + }, + { + "url": "https://vuldb.com/?submit.546220", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.546220" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "ekkoo (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2025/3xxx/CVE-2025-3572.json b/2025/3xxx/CVE-2025-3572.json new file mode 100644 index 00000000000..c076c25848e --- /dev/null +++ b/2025/3xxx/CVE-2025-3572.json @@ -0,0 +1,108 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2025-3572", + "ASSIGNER": "cve@cert.org.tw", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SmartRobot from INTUMIT has a Server-Side Request Forgery vulnerability, allowing unauthenticated remote attackers to probe internal network and even access arbitrary local files on the server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-918 Server-Side Request Forgery (SSRF)", + "cweId": "CWE-918" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "INTUMIT", + "product": { + "product_data": [ + { + "product_name": "SmartRobot", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "8.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.twcert.org.tw/tw/cp-132-10064-6346a-1.html", + "refsource": "MISC", + "name": "https://www.twcert.org.tw/tw/cp-132-10064-6346a-1.html" + }, + { + "url": "https://www.twcert.org.tw/en/cp-139-10065-2494c-2.html", + "refsource": "MISC", + "name": "https://www.twcert.org.tw/en/cp-139-10065-2494c-2.html" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "advisory": "TVN-202504005", + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Contact the vendor for repairs.
" + } + ], + "value": "Contact the vendor for repairs." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + ] + } +} \ No newline at end of file