"-Synchronized-Data."

This commit is contained in:
CVE Team 2025-04-14 01:00:31 +00:00
parent 16916ed427
commit c04d3623f4
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
6 changed files with 379 additions and 8 deletions

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-32898",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-32899",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-32900",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-32901",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -1,17 +1,161 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-3543",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been found in H3C Magic NX15, Magic NX30 Pro, Magic NX400 and Magic R3010 up to V100R014 and classified as critical. This vulnerability affects the function FCGI_WizardProtoProcess of the file /api/wizard/setsyncpppoecfg of the component HTTP POST Request Handler. The manipulation leads to command injection. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component."
},
{
"lang": "deu",
"value": "In H3C Magic NX15, Magic NX30 Pro, Magic NX400 and Magic R3010 bis V100R014 wurde eine kritische Schwachstelle gefunden. Betroffen ist die Funktion FCGI_WizardProtoProcess der Datei /api/wizard/setsyncpppoecfg der Komponente HTTP POST Request Handler. Durch die Manipulation mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann im lokalen Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Command Injection",
"cweId": "CWE-77"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Injection",
"cweId": "CWE-74"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "H3C",
"product": {
"product_data": [
{
"product_name": "Magic NX15",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "V100R014"
}
]
}
},
{
"product_name": "Magic NX30 Pro",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "V100R014"
}
]
}
},
{
"product_name": "Magic NX400",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "V100R014"
}
]
}
},
{
"product_name": "Magic R3010",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "V100R014"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.304582",
"refsource": "MISC",
"name": "https://vuldb.com/?id.304582"
},
{
"url": "https://vuldb.com/?ctiid.304582",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.304582"
},
{
"url": "https://vuldb.com/?submit.524739",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.524739"
},
{
"url": "https://gist.github.com/mono7s/9369a3ef060b5655303cd234ba583bb5",
"refsource": "MISC",
"name": "https://gist.github.com/mono7s/9369a3ef060b5655303cd234ba583bb5"
},
{
"url": "https://zhiliao.h3c.com/theme/details/229784",
"refsource": "MISC",
"name": "https://zhiliao.h3c.com/theme/details/229784"
},
{
"url": "https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/",
"refsource": "MISC",
"name": "https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/"
}
]
},
"credits": [
{
"lang": "en",
"value": "mono7s (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 8,
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseSeverity": "HIGH"
},
{
"version": "3.0",
"baseScore": 8,
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseSeverity": "HIGH"
},
{
"version": "2.0",
"baseScore": 7.7,
"vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C"
}
]
}

View File

@ -1,17 +1,172 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-3544",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014 and classified as critical. This issue affects the function FCGI_CheckStringIfContainsSemicolon of the file /api/wizard/getCapabilityWeb of the component HTTP POST Request Handler. The manipulation leads to command injection. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component."
},
{
"lang": "deu",
"value": "Eine kritische Schwachstelle wurde in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 bis V100R014 gefunden. Betroffen davon ist die Funktion FCGI_CheckStringIfContainsSemicolon der Datei /api/wizard/getCapabilityWeb der Komponente HTTP POST Request Handler. Durch Manipulation mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei im lokalen Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Command Injection",
"cweId": "CWE-77"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Injection",
"cweId": "CWE-74"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "H3C",
"product": {
"product_data": [
{
"product_name": "Magic NX15",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "V100R014"
}
]
}
},
{
"product_name": "Magic NX30 Pro",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "V100R014"
}
]
}
},
{
"product_name": "Magic NX400",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "V100R014"
}
]
}
},
{
"product_name": "Magic R3010",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "V100R014"
}
]
}
},
{
"product_name": "Magic BE18000",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "V100R014"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.304583",
"refsource": "MISC",
"name": "https://vuldb.com/?id.304583"
},
{
"url": "https://vuldb.com/?ctiid.304583",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.304583"
},
{
"url": "https://vuldb.com/?submit.524743",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.524743"
},
{
"url": "https://gist.github.com/isstabber/05dfeefa3685a369b8802626e0252e27",
"refsource": "MISC",
"name": "https://gist.github.com/isstabber/05dfeefa3685a369b8802626e0252e27"
},
{
"url": "https://zhiliao.h3c.com/theme/details/229784",
"refsource": "MISC",
"name": "https://zhiliao.h3c.com/theme/details/229784"
},
{
"url": "https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/",
"refsource": "MISC",
"name": "https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/"
}
]
},
"credits": [
{
"lang": "en",
"value": "mono7s (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 8,
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseSeverity": "HIGH"
},
{
"version": "3.0",
"baseScore": 8,
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseSeverity": "HIGH"
},
{
"version": "2.0",
"baseScore": 7.7,
"vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C"
}
]
}