diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1814.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1814.json new file mode 100644 index 00000000000..6322e77b0bb --- /dev/null +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1814.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-1814", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-02T11:15:10.133", + "lastModified": "2025-03-02T11:15:10.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in Tenda AC6 15.03.05.16. Affected by this issue is some unknown functionality of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Raining-101/IOT_cve/blob/main/ac6.md_goform_WifiExtraSet.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298082", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298082", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.506532", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tenda.com.cn/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1815.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1815.json new file mode 100644 index 00000000000..98aefb2e1c8 --- /dev/null +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1815.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-1815", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-02T12:15:36.507", + "lastModified": "2025-03-02T12:15:36.507", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in pbrong hrms up to 1.0.1. This affects the function HrmsDB of the file \\resource\\resource.go. The manipulation of the argument user_cookie leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/A7cc/cve/issues/4", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/A7cc/cve/issues/4#issue-2877111776", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298083", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298083", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.506544", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index d50cc4aa691..11d39c81f5a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-02T11:00:19.246333+00:00 +2025-03-02T13:00:19.945598+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-02T10:15:09.947000+00:00 +2025-03-02T12:15:36.507000+00:00 ``` ### Last Data Feed Release @@ -33,16 +33,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -283608 +283610 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `2` -- [CVE-2025-1811](CVE-2025/CVE-2025-18xx/CVE-2025-1811.json) (`2025-03-02T09:15:09.843`) -- [CVE-2025-1812](CVE-2025/CVE-2025-18xx/CVE-2025-1812.json) (`2025-03-02T09:15:10.903`) -- [CVE-2025-1813](CVE-2025/CVE-2025-18xx/CVE-2025-1813.json) (`2025-03-02T10:15:09.947`) +- [CVE-2025-1814](CVE-2025/CVE-2025-18xx/CVE-2025-1814.json) (`2025-03-02T11:15:10.133`) +- [CVE-2025-1815](CVE-2025/CVE-2025-18xx/CVE-2025-1815.json) (`2025-03-02T12:15:36.507`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 3eb78e225f1..0853c22e2e0 100644 --- a/_state.csv +++ b/_state.csv @@ -280813,9 +280813,11 @@ CVE-2025-1807,0,0,54d4df5c6e5917a8e6301225da71138a49df62996289c880d666829ffbe07a CVE-2025-1808,0,0,e85619653928b44af9b84a4c6211f0f7ee9d4ff954d852238093c24631b5ee96,2025-03-02T01:15:10.230000 CVE-2025-1809,0,0,3f205d894d853d8a8ad77a546bafda5ade3ecde0f6e13c7ea897951eb88a6b27,2025-03-02T06:15:22.057000 CVE-2025-1810,0,0,13aa797b776cd13924053a4151a14d23c5a8ca6d6ced5a3bd21291dde19c4a7c,2025-03-02T07:15:10.160000 -CVE-2025-1811,1,1,24a1f5681a904f2edac43f7084ce3eba91ec9354d3dc7356043870af02759c98,2025-03-02T09:15:09.843000 -CVE-2025-1812,1,1,55735165c1d5560ec96f221524acb234a14d95736162e66bd936650dd6c9138a,2025-03-02T09:15:10.903000 -CVE-2025-1813,1,1,02ae6ad1ffdefd5aeb6eb7e2654a3edb0871de09a85ec36c91ba84639e7d059c,2025-03-02T10:15:09.947000 +CVE-2025-1811,0,0,24a1f5681a904f2edac43f7084ce3eba91ec9354d3dc7356043870af02759c98,2025-03-02T09:15:09.843000 +CVE-2025-1812,0,0,55735165c1d5560ec96f221524acb234a14d95736162e66bd936650dd6c9138a,2025-03-02T09:15:10.903000 +CVE-2025-1813,0,0,02ae6ad1ffdefd5aeb6eb7e2654a3edb0871de09a85ec36c91ba84639e7d059c,2025-03-02T10:15:09.947000 +CVE-2025-1814,1,1,f32f303f45c0d5175642c5f837f279040d610ef80b5baab57e9f2806480cde1b,2025-03-02T11:15:10.133000 +CVE-2025-1815,1,1,a34c30dda4b911432b4b2b780f4af0dad0a2b4112829890565e05e2f2e8dfd92,2025-03-02T12:15:36.507000 CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,d9e3ca63dc18f9436b5043ebae0bcb543cc6452f75921963fed59e1df065c2d7,2025-02-05T18:15:29.573000