"-Synchronized-Data."

This commit is contained in:
CVE Team 2025-03-28 20:00:32 +00:00
parent 7c86c92bf5
commit 51483c9caf
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
3 changed files with 351 additions and 12 deletions

View File

@ -1,17 +1,118 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-2922",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as problematic was found in Netis WF-2404 1.1.124EN. Affected by this vulnerability is an unknown functionality of the component BusyBox Shell. The manipulation leads to cleartext storage of sensitive information. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "In Netis WF-2404 1.1.124EN wurde eine problematische Schwachstelle entdeckt. Betroffen ist eine unbekannte Verarbeitung der Komponente BusyBox Shell. Mit der Manipulation mit unbekannten Daten kann eine cleartext storage of sensitive information-Schwachstelle ausgenutzt werden. Ein Angriff setzt physischen Zugriff auf dem Zielobjekt voraus. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie gilt als schwierig ausnutzbar. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cleartext Storage of Sensitive Information",
"cweId": "CWE-312"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Cryptographic Issues",
"cweId": "CWE-310"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Netis",
"product": {
"product_data": [
{
"product_name": "WF-2404",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.1.124EN"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.301897",
"refsource": "MISC",
"name": "https://vuldb.com/?id.301897"
},
{
"url": "https://vuldb.com/?ctiid.301897",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.301897"
},
{
"url": "https://vuldb.com/?submit.521039",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.521039"
},
{
"url": "https://scoozi.substack.com/p/hacking-a-netis-wf-2404-router-with",
"refsource": "MISC",
"name": "https://scoozi.substack.com/p/hacking-a-netis-wf-2404-router-with"
}
]
},
"credits": [
{
"lang": "en",
"value": "scoozi (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 2,
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 2,
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 1.2,
"vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N"
}
]
}

View File

@ -1,17 +1,136 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-2923",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability, which was classified as problematic, has been found in HDF5 up to 1.14.6. Affected by this issue is the function H5F_addr_encode_len of the file src/H5Fint.c. The manipulation of the argument pp leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used."
},
{
"lang": "deu",
"value": "Eine problematische Schwachstelle wurde in HDF5 bis 1.14.6 entdeckt. Betroffen davon ist die Funktion H5F_addr_encode_len der Datei src/H5Fint.c. Durch die Manipulation des Arguments pp mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff muss lokal passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Memory Corruption",
"cweId": "CWE-119"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "HDF5",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.14.0"
},
{
"version_affected": "=",
"version_value": "1.14.1"
},
{
"version_affected": "=",
"version_value": "1.14.2"
},
{
"version_affected": "=",
"version_value": "1.14.3"
},
{
"version_affected": "=",
"version_value": "1.14.4"
},
{
"version_affected": "=",
"version_value": "1.14.5"
},
{
"version_affected": "=",
"version_value": "1.14.6"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.301898",
"refsource": "MISC",
"name": "https://vuldb.com/?id.301898"
},
{
"url": "https://vuldb.com/?ctiid.301898",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.301898"
},
{
"url": "https://vuldb.com/?submit.521151",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.521151"
},
{
"url": "https://github.com/HDFGroup/hdf5/issues/5381",
"refsource": "MISC",
"name": "https://github.com/HDFGroup/hdf5/issues/5381"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.3,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.3,
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 1.7,
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P"
}
]
}

View File

@ -1,17 +1,136 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-2924",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability, which was classified as problematic, was found in HDF5 up to 1.14.6. This affects the function H5HL__fl_deserialize of the file src/H5HLcache.c. The manipulation of the argument free_block leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used."
},
{
"lang": "deu",
"value": "Es wurde eine problematische Schwachstelle in HDF5 bis 1.14.6 gefunden. Betroffen hiervon ist die Funktion H5HL__fl_deserialize der Datei src/H5HLcache.c. Durch Manipulation des Arguments free_block mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff muss lokal erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Memory Corruption",
"cweId": "CWE-119"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "HDF5",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.14.0"
},
{
"version_affected": "=",
"version_value": "1.14.1"
},
{
"version_affected": "=",
"version_value": "1.14.2"
},
{
"version_affected": "=",
"version_value": "1.14.3"
},
{
"version_affected": "=",
"version_value": "1.14.4"
},
{
"version_affected": "=",
"version_value": "1.14.5"
},
{
"version_affected": "=",
"version_value": "1.14.6"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.301899",
"refsource": "MISC",
"name": "https://vuldb.com/?id.301899"
},
{
"url": "https://vuldb.com/?ctiid.301899",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.301899"
},
{
"url": "https://vuldb.com/?submit.521170",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.521170"
},
{
"url": "https://github.com/HDFGroup/hdf5/issues/5382",
"refsource": "MISC",
"name": "https://github.com/HDFGroup/hdf5/issues/5382"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.3,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.3,
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 1.7,
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P"
}
]
}