mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2025-03-24T09:00:20.168871+00:00
This commit is contained in:
parent
acffe1b388
commit
339063a881
145
CVE-2025/CVE-2025-26xx/CVE-2025-2688.json
Normal file
145
CVE-2025/CVE-2025-26xx/CVE-2025-2688.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-2688",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-24T07:15:12.760",
|
||||
"lastModified": "2025-03-24T07:15:12.760",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in TOTOLINK A3000RU up to 5.9c.5185. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/ExportSyslog.sh of the component Syslog Configuration File Handler. The manipulation leads to improper access controls. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
|
||||
"baseScore": 3.3,
|
||||
"accessVector": "ADJACENT_NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 6.5,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lavender-bicycle-a5a.notion.site/TOTOLINK-A3000RU-ExportSyslog-1b953a41781f8064970dc7809a52ac6c?pvs=4",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300709",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300709",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.521570",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-26xx/CVE-2025-2689.json
Normal file
141
CVE-2025/CVE-2025-26xx/CVE-2025-2689.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-2689",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-24T07:15:14.010",
|
||||
"lastModified": "2025-03-24T07:15:14.010",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in yiisoft Yii2 up to 2.0.45. Affected by this issue is the function getIterator of the file symfony\\finder\\Iterator\\SortableIterator.php. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gaorenyusi/gaorenyusi/blob/main/Yii2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300710",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300710",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.521709",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-26xx/CVE-2025-2690.json
Normal file
141
CVE-2025/CVE-2025-26xx/CVE-2025-2690.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-2690",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-24T08:15:12.793",
|
||||
"lastModified": "2025-03-24T08:15:12.793",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in yiisoft Yii2 up to 2.0.39. This affects the function Generate of the file phpunit\\src\\Framework\\MockObject\\MockClass.php. The manipulation leads to deserialization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gaorenyusi/gaorenyusi/blob/main/Yii2-2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300711",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300711",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.521718",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-26xx/CVE-2025-2699.json
Normal file
141
CVE-2025/CVE-2025-26xx/CVE-2025-2699.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-2699",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-24T08:15:12.967",
|
||||
"lastModified": "2025-03-24T08:15:12.967",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in GetmeUK ContentTools up to 1.6.16. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Image Handler. The manipulation of the argument onload leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Masamuneee/657f2e2b0eb5bf9b0d4dbb79f00dac37",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300716",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300716",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.515864",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
20
README.md
20
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-24T07:00:20.201280+00:00
|
||||
2025-03-24T09:00:20.168871+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-24T06:15:13.397000+00:00
|
||||
2025-03-24T08:15:12.967000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,21 +33,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
286285
|
||||
286289
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `8`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-10558](CVE-2024/CVE-2024-105xx/CVE-2024-10558.json) (`2025-03-24T06:15:12.613`)
|
||||
- [CVE-2024-13124](CVE-2024/CVE-2024-131xx/CVE-2024-13124.json) (`2025-03-24T06:15:12.790`)
|
||||
- [CVE-2025-1062](CVE-2025/CVE-2025-10xx/CVE-2025-1062.json) (`2025-03-24T06:15:12.910`)
|
||||
- [CVE-2025-1203](CVE-2025/CVE-2025-12xx/CVE-2025-1203.json) (`2025-03-24T06:15:13.013`)
|
||||
- [CVE-2025-2683](CVE-2025/CVE-2025-26xx/CVE-2025-2683.json) (`2025-03-24T05:15:13.037`)
|
||||
- [CVE-2025-2684](CVE-2025/CVE-2025-26xx/CVE-2025-2684.json) (`2025-03-24T05:15:13.373`)
|
||||
- [CVE-2025-2686](CVE-2025/CVE-2025-26xx/CVE-2025-2686.json) (`2025-03-24T06:15:13.127`)
|
||||
- [CVE-2025-2687](CVE-2025/CVE-2025-26xx/CVE-2025-2687.json) (`2025-03-24T06:15:13.397`)
|
||||
- [CVE-2025-2688](CVE-2025/CVE-2025-26xx/CVE-2025-2688.json) (`2025-03-24T07:15:12.760`)
|
||||
- [CVE-2025-2689](CVE-2025/CVE-2025-26xx/CVE-2025-2689.json) (`2025-03-24T07:15:14.010`)
|
||||
- [CVE-2025-2690](CVE-2025/CVE-2025-26xx/CVE-2025-2690.json) (`2025-03-24T08:15:12.793`)
|
||||
- [CVE-2025-2699](CVE-2025/CVE-2025-26xx/CVE-2025-2699.json) (`2025-03-24T08:15:12.967`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
20
_state.csv
20
_state.csv
@ -244884,7 +244884,7 @@ CVE-2024-10553,0,0,bcb1f299f134c4c11b5d267ba4c70351f3ee7bd0b65b687ff780e6fd48f69
|
||||
CVE-2024-10555,0,0,c0c41d706222adae224343df415ec56327197387e8b3f526c30bed44f76590a1,2024-12-20T17:15:07.037000
|
||||
CVE-2024-10556,0,0,04893ef6555133c7fb4a065ad7ee40a556bb83716f5e6bb1e4354bd00fe9ad00,2024-11-01T20:51:35.617000
|
||||
CVE-2024-10557,0,0,b747d74cc2db5316ba1b28eca3b4e6b47e90682d5ab526a26512f546950fed33,2024-11-01T20:48:56.980000
|
||||
CVE-2024-10558,1,1,b7704851cabf4393c1f0081c71e75faa3394bf3442f96ec01f27b69746af4001,2025-03-24T06:15:12.613000
|
||||
CVE-2024-10558,0,0,b7704851cabf4393c1f0081c71e75faa3394bf3442f96ec01f27b69746af4001,2025-03-24T06:15:12.613000
|
||||
CVE-2024-10559,0,0,c8d062140f2ef6eed0dfc622284881dacca3b7549dba8d59c8cf3df34e9d5f7f,2024-11-01T20:43:41.070000
|
||||
CVE-2024-1056,0,0,af182e17efd4af1cb9d6458d1d7d67974a36b702d2e517ba61380bf6c671d68a,2024-09-19T22:06:32.340000
|
||||
CVE-2024-10561,0,0,8bc2c05db76aa376d335351430f1359bc8af3088a8d507bfe4a1e2db13ccce63,2024-11-01T20:42:12.303000
|
||||
@ -247403,7 +247403,7 @@ CVE-2024-13119,0,0,73826a06c11021e3ab53b915522c9178a0e342dd2d9e6f744a28454c1427d
|
||||
CVE-2024-1312,0,0,d16b3ecc82cd74d4071dc20055eab0a36b43013bc6757c1d62cda1a87b890d59,2024-11-21T08:50:18.020000
|
||||
CVE-2024-13120,0,0,bf28b53c2d93a12739a8ec95b1d7d2d5cd7dd1e5003751f3f3cff0db287ff89c,2025-03-22T15:15:36.820000
|
||||
CVE-2024-13121,0,0,eea054139dc60b1a73e646e7a0792d046eb2c33404d8501622a8bb165162f3ee,2025-02-19T22:15:22.250000
|
||||
CVE-2024-13124,1,1,0a74acd460846851dac3bb10fec987685f18ebd8a97e3f50e0bec8954c8a508e,2025-03-24T06:15:12.790000
|
||||
CVE-2024-13124,0,0,0a74acd460846851dac3bb10fec987685f18ebd8a97e3f50e0bec8954c8a508e,2025-03-24T06:15:12.790000
|
||||
CVE-2024-13125,0,0,bcf9d3da81b0bd561483ac7c7c16f4aea5f6f77159bd25d7d228b3f63d6a7f5c,2025-02-19T22:15:22.390000
|
||||
CVE-2024-13126,0,0,2954b0c6d56f081558db1c9d9552b1f2529defcf3528faffaea30c48e2a49418,2025-03-17T19:15:21.573000
|
||||
CVE-2024-13129,0,0,b0eed5efae58289046079d42bcdb7ee605946275886670758de35d713757689a,2025-01-03T22:15:06.677000
|
||||
@ -281487,7 +281487,7 @@ CVE-2025-1058,0,0,931565082cf6be7adcbf5c17fdfd20136c63742e85ad7be32de9be500e9b28
|
||||
CVE-2025-1059,0,0,c8e08f393241882abd9f520991c8527e65d38e4d6c43516ed6bd207e016f7d2f,2025-02-13T06:15:21.680000
|
||||
CVE-2025-1060,0,0,249a972722a8ea5c8c8703c094cf839a07a282f53cdfa1c21d84e389f952edae,2025-02-13T06:15:22.213000
|
||||
CVE-2025-1061,0,0,719d74f0f0646df1bcdf5186f15b6b006503d4de7dcd7fdf659e983ae5a27990,2025-02-07T02:15:29.587000
|
||||
CVE-2025-1062,1,1,765bbb99d9d577f8d422e6ffabbdbb251a6ce884fd55b99dc96f441ba9a0b1a2,2025-03-24T06:15:12.910000
|
||||
CVE-2025-1062,0,0,765bbb99d9d577f8d422e6ffabbdbb251a6ce884fd55b99dc96f441ba9a0b1a2,2025-03-24T06:15:12.910000
|
||||
CVE-2025-1063,0,0,f6ebc08f6e2568783d19012ba06b647ad752279ad00c89461f145d2a92f0083e,2025-02-28T16:07:01.990000
|
||||
CVE-2025-1064,0,0,7b7164b210697e056675206baf5cc1f85c1aa8eb0b02774ad30b163694ee3ea3,2025-02-25T20:41:01.500000
|
||||
CVE-2025-1065,0,0,70a90000a3a4cb679474daa22883e05e6abe48ed1e55dd42dffa8e01fc4b0bec,2025-02-19T06:15:21.507000
|
||||
@ -281596,7 +281596,7 @@ CVE-2025-1199,0,0,b293e1750426e162cd73c69f2470f66e74330c6db9c1208ddcbe2ec678b89d
|
||||
CVE-2025-1200,0,0,2cf33b7c7420072fbc797907606ea05888cf6aaff43c22f0ef1f03dfb676810e,2025-02-12T14:15:32.090000
|
||||
CVE-2025-1201,0,0,9013de96c060dac01f3dd28cb24bb7efd9ce2730a40f3d2bb427bc4ce086e7ef,2025-02-18T18:01:07.620000
|
||||
CVE-2025-1202,0,0,145e416d76817c96da29e1ee25f9dd444dc5ef4d95ddc6c06c93503cc4db41a1,2025-02-18T18:02:04.383000
|
||||
CVE-2025-1203,1,1,aa689e75956b99817ce19f78278798465072e4e7c89d5779f29f8eb423ceac4e,2025-03-24T06:15:13.013000
|
||||
CVE-2025-1203,0,0,aa689e75956b99817ce19f78278798465072e4e7c89d5779f29f8eb423ceac4e,2025-03-24T06:15:13.013000
|
||||
CVE-2025-1204,0,0,1a6a6d6d7e9c4d6739bac4886c5ffe95dd752abb1877293a1f41dffddd75c21f,2025-02-25T17:15:14.057000
|
||||
CVE-2025-1206,0,0,ea94e082f0fb2c3e9cbf9071800bfcaa07133d59e9c405a94dd3f8f199626042,2025-02-20T20:39:04.393000
|
||||
CVE-2025-1207,0,0,7d124cbc886c8b13b8ddd3ab6b7b5525d0938d2d0afc4dcd7d8089b241a520f5,2025-02-12T16:15:44.393000
|
||||
@ -285640,22 +285640,23 @@ CVE-2025-2681,0,0,96e3adbdb0acc40a906d68f34fae609d1b764f077ae3c384f9d71b0d62d6c7
|
||||
CVE-2025-26816,0,0,2ec5a5349b9517d8ba53395229a7b8942acd452c9df91a0b3e2328a764fb96c9,2025-03-20T21:15:23.273000
|
||||
CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000
|
||||
CVE-2025-2682,0,0,47cce8dbd8886c4724e583ef44f66736045d1a063560eba1a04dab7e1c857ed5,2025-03-24T04:15:14.643000
|
||||
CVE-2025-2683,1,1,ff72afb8cc309d071877a318b5c1291ad69d94dc4922fc7f03aa9db946226030,2025-03-24T05:15:13.037000
|
||||
CVE-2025-2684,1,1,a463054d0535d99b260565e349f65616471a98961616677ec7013b62da272fbe,2025-03-24T05:15:13.373000
|
||||
CVE-2025-2683,0,0,ff72afb8cc309d071877a318b5c1291ad69d94dc4922fc7f03aa9db946226030,2025-03-24T05:15:13.037000
|
||||
CVE-2025-2684,0,0,a463054d0535d99b260565e349f65616471a98961616677ec7013b62da272fbe,2025-03-24T05:15:13.373000
|
||||
CVE-2025-26849,0,0,b01e97de5d13c5e322817bb01db0ae13a4e34f402b7f75a8f8b8da54efb28ebd,2025-03-05T04:15:12.367000
|
||||
CVE-2025-26852,0,0,bcd9e710927b567dc35974dca2db0f81a7d52c57667c4798aaca61a45ae98cbf,2025-03-20T21:15:23.400000
|
||||
CVE-2025-26853,0,0,6b301532c9f4b450159f96198c19fbcde47cc6cc13f1c0fca54f5cb5b2c817ef,2025-03-20T21:15:23.550000
|
||||
CVE-2025-26856,0,0,7824298cfc11aa81d23219a23487dd842dd5c11d44f90723ef1786188c90cd64,2025-02-20T06:15:21.673000
|
||||
CVE-2025-2686,1,1,a76c164685b9183ddc211fba13468fcb67d255bf9600859ed63ab700bebcf6b6,2025-03-24T06:15:13.127000
|
||||
CVE-2025-2686,0,0,a76c164685b9183ddc211fba13468fcb67d255bf9600859ed63ab700bebcf6b6,2025-03-24T06:15:13.127000
|
||||
CVE-2025-26865,0,0,392cafa9196f9e16f10dbe623eb410cd729a2dc1013d61e7dc7061610b7c87ad,2025-03-11T20:15:17.917000
|
||||
CVE-2025-26868,0,0,cba4f0d0c27029718e2b50a126041299a77ea3636d837c9614e50e9855b0878b,2025-02-25T15:15:23.903000
|
||||
CVE-2025-2687,1,1,7aaed5b40535dd0f84f14a20fcfcabf37cc42403ae5fec29ff03a7218732870f,2025-03-24T06:15:13.397000
|
||||
CVE-2025-2687,0,0,7aaed5b40535dd0f84f14a20fcfcabf37cc42403ae5fec29ff03a7218732870f,2025-03-24T06:15:13.397000
|
||||
CVE-2025-26871,0,0,ab850536250644e42a3ba5d883350c3eff02f87d1e660abd32733c03a6449348,2025-02-25T15:15:24.040000
|
||||
CVE-2025-26875,0,0,1eb25a80831e545b4298e6aed92aca9e86c317dc16ff78bda859574fde302510,2025-03-15T22:15:13.690000
|
||||
CVE-2025-26876,0,0,22d5e3662987726006c8c5bdd9aefc0ed802e210686667cf89016011bdc03010,2025-02-25T15:15:24.180000
|
||||
CVE-2025-26877,0,0,b6bbd106fc09effb170ea41e4eff1e72fc5e0e40d7a5e670464380cec25fedef,2025-02-25T15:15:24.380000
|
||||
CVE-2025-26878,0,0,b83c78001aed3b72257afa473beed64325520c746080d9d4c55fc0721207cb83,2025-02-25T15:15:24.560000
|
||||
CVE-2025-26879,0,0,ff13b8336e93c3c4112258e1261f28d97f76ce67ffc3e5951e1c9eced4ea0dc7,2025-03-03T14:15:56.213000
|
||||
CVE-2025-2688,1,1,b42c9b4a50806d07064eaf59e50fdaec52a4a94edd9eae74c06e16ea7770c8c7,2025-03-24T07:15:12.760000
|
||||
CVE-2025-26881,0,0,921429dd5a0c5a1101d4da691445afee44c665c84de754602fbf841d0217b94b,2025-02-25T15:15:24.690000
|
||||
CVE-2025-26882,0,0,7062fd0c75af34ccf6b6ec2ff75c922493b57ba8fdc01187594aa2fa72d319c7,2025-02-25T15:15:24.837000
|
||||
CVE-2025-26883,0,0,922ad8d066f9e08d920e6020bb5edb414ef495b7a7f4fba5c400a5b716452883,2025-02-24T15:15:14.007000
|
||||
@ -285663,12 +285664,14 @@ CVE-2025-26884,0,0,1d074e2084c12e5387b24bf69656649d494667e7bb4c2438392c9dd96d466
|
||||
CVE-2025-26885,0,0,2ef732a4cebbeb85a5dbbaf27f49124f8d762a49e8e7f3b22ab266ddbd21a44b,2025-03-03T14:15:56.360000
|
||||
CVE-2025-26886,0,0,3fccb07cd6593c19d4ebd609ac67b0d6e5961e270965b650cf84c0ac5737cb12,2025-03-15T22:15:13.837000
|
||||
CVE-2025-26887,0,0,d620956d3ea5625abfbc4595a1a19c4cbaf27ed3b93aec2afc55fa2fa354983d,2025-02-25T15:15:25.117000
|
||||
CVE-2025-2689,1,1,d8c726f1a3e2908ab78787ceefb97974fa814ebace7b67f0dc84adfd826d135d,2025-03-24T07:15:14.010000
|
||||
CVE-2025-26891,0,0,20d9b98fa953b2c2ae1876c761e770a063cad8d8555cb8705b5f8d6ebece6625,2025-02-25T15:15:25.253000
|
||||
CVE-2025-26893,0,0,1e55e8031dea60b355f7bfdcd2784f0b2b9ad5afec3a445aae3078ebb5e3718e,2025-02-25T15:15:25.390000
|
||||
CVE-2025-26895,0,0,3eb6addb22fb4b37c6c3f31fac229fd983ae417a5135246d65834c2c589c8b04,2025-03-15T22:15:14.013000
|
||||
CVE-2025-26896,0,0,698aeca623c70e4b06e040cd55b5c2549a6c6c52876a66af61cb43c3e54c60ab,2025-02-25T15:15:25.527000
|
||||
CVE-2025-26897,0,0,008344bbc82c06e5be6950b4745d40969170caa982c12bbebacc137b35f38f42,2025-02-25T15:15:25.690000
|
||||
CVE-2025-26899,0,0,95b084e2f68809ccb6891be9923c60028fc93cee3b6a691436d8301682c70fa6,2025-03-15T22:15:14.250000
|
||||
CVE-2025-2690,1,1,57a32debb38cade6e739d1e7fb3942ee27484ab9115cd7ec757f2fc24a9dfe0e,2025-03-24T08:15:12.793000
|
||||
CVE-2025-26900,0,0,059a3c3ee3ee2a5a8549e4b2d083087d5d389f3b34374b636a32cc0884702ad8,2025-02-25T15:15:25.853000
|
||||
CVE-2025-26904,0,0,cab9a4c8649e54f1340a29bbdf14f52168b5cc51065c592884d99916bd742bf3,2025-02-25T15:15:25.990000
|
||||
CVE-2025-26905,0,0,3fd420b5cf6d35f2394ffb7c8b96279ea5b6a88032aa4ac13abb160d4bcc3b89,2025-02-25T15:15:26.127000
|
||||
@ -285732,6 +285735,7 @@ CVE-2025-26985,0,0,5fb0ce30a005f045393ce6a9e4877e64e68127385c508c29b67962ad383bc
|
||||
CVE-2025-26987,0,0,597d2628b42a4a65165e807aa9eb7e16ab56b0bee51783965b846b2753d560be,2025-02-25T15:15:31.313000
|
||||
CVE-2025-26988,0,0,0319a38815984a3d7757bba2dab0c325e1f38ec9d387be497de99ad33c8d24a9,2025-03-07T20:35:36.553000
|
||||
CVE-2025-26989,0,0,b0ef3d20e454de8c22a4b1527a3da924af34822ec9bc2b6dd3acc50906fd5b9d,2025-03-07T20:36:56.700000
|
||||
CVE-2025-2699,1,1,d5388731c3287cb1b09010a05224f9d8910e114a41685dd6c5a3eb15835d0529,2025-03-24T08:15:12.967000
|
||||
CVE-2025-26991,0,0,84217b1c95797f5f6a3434460f887fd28027f10e4a2535fce5046994c53e0aac,2025-02-25T15:15:31.460000
|
||||
CVE-2025-26993,0,0,25d916d390de90b80a1e84bf0243f302c32b655919eea97f6f91c9f96aa389dc,2025-02-25T15:15:31.590000
|
||||
CVE-2025-26994,0,0,03494b736a3ca693fdaefc610166ca8a10d800440713e480c6b170f7815e45d0,2025-03-07T20:37:45.723000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user