From 441eb613b65188d65bb312e9c8ef626990a4b07b Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 25 Mar 2025 05:03:51 +0000 Subject: [PATCH] Auto-Update: 2025-03-25T05:00:19.876046+00:00 --- CVE-2025/CVE-2025-27xx/CVE-2025-2725.json | 141 ++++++++++++++++++++++ CVE-2025/CVE-2025-27xx/CVE-2025-2726.json | 141 ++++++++++++++++++++++ CVE-2025/CVE-2025-27xx/CVE-2025-2727.json | 141 ++++++++++++++++++++++ CVE-2025/CVE-2025-27xx/CVE-2025-2728.json | 141 ++++++++++++++++++++++ CVE-2025/CVE-2025-27xx/CVE-2025-2729.json | 141 ++++++++++++++++++++++ CVE-2025/CVE-2025-27xx/CVE-2025-2730.json | 141 ++++++++++++++++++++++ CVE-2025/CVE-2025-27xx/CVE-2025-2731.json | 141 ++++++++++++++++++++++ CVE-2025/CVE-2025-27xx/CVE-2025-2732.json | 141 ++++++++++++++++++++++ README.md | 24 ++-- _state.csv | 20 ++- 10 files changed, 1155 insertions(+), 17 deletions(-) create mode 100644 CVE-2025/CVE-2025-27xx/CVE-2025-2725.json create mode 100644 CVE-2025/CVE-2025-27xx/CVE-2025-2726.json create mode 100644 CVE-2025/CVE-2025-27xx/CVE-2025-2727.json create mode 100644 CVE-2025/CVE-2025-27xx/CVE-2025-2728.json create mode 100644 CVE-2025/CVE-2025-27xx/CVE-2025-2729.json create mode 100644 CVE-2025/CVE-2025-27xx/CVE-2025-2730.json create mode 100644 CVE-2025/CVE-2025-27xx/CVE-2025-2731.json create mode 100644 CVE-2025/CVE-2025-27xx/CVE-2025-2732.json diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2725.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2725.json new file mode 100644 index 00000000000..d896be4c3f7 --- /dev/null +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2725.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2725", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-25T03:15:16.097", + "lastModified": "2025-03-25T03:15:16.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. Affected by this vulnerability is an unknown functionality of the file /api/login/auth of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ZIKH26/CVE-information/blob/master/H3C/Vulnerability%20Information_1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.300745", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.300745", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.520390", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2726.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2726.json new file mode 100644 index 00000000000..44103fdca24 --- /dev/null +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2726.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2726", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-25T03:15:16.280", + "lastModified": "2025-03-25T03:15:16.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. Affected by this issue is some unknown functionality of the file /api/esps of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ZIKH26/CVE-information/blob/master/H3C/Vulnerability%20Information_2.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.300746", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.300746", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.520393", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2727.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2727.json new file mode 100644 index 00000000000..f4248141f43 --- /dev/null +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2727.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2727", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-25T03:15:16.450", + "lastModified": "2025-03-25T03:15:16.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in H3C Magic NX30 Pro up to V100R007. This affects an unknown part of the file /api/wizard/getNetworkStatus of the component HTTP POST Request Handler. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ggstrunk/CVE/blob/main/wizard_getNetworkStatus.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.300747", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.300747", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.520394", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2728.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2728.json new file mode 100644 index 00000000000..32e777f20f7 --- /dev/null +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2728.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2728", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-25T03:15:16.627", + "lastModified": "2025-03-25T03:15:16.627", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in H3C Magic NX30 Pro and Magic NX400 up to V100R014 and classified as critical. This vulnerability affects unknown code of the file /api/wizard/getNetworkConf. The manipulation leads to command injection. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/RK1Y8/cve_cve/blob/main/h3c.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.300748", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.300748", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.520462", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2729.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2729.json new file mode 100644 index 00000000000..9f689cece60 --- /dev/null +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2729.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2729", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-25T03:15:16.800", + "lastModified": "2025-03-25T03:15:16.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014 and classified as critical. This issue affects some unknown processing of the file /api/wizard/networkSetup of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Qwen11/CVE_store/blob/main/H3C/vulnerability%20Information_1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.300749", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.300749", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.520494", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2730.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2730.json new file mode 100644 index 00000000000..aaaba366411 --- /dev/null +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2730.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2730", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-25T03:15:16.973", + "lastModified": "2025-03-25T03:15:16.973", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. It has been classified as critical. Affected is an unknown function of the file /api/wizard/getssidname of the component HTTP POST Request Handler. The manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Qwen11/CVE_store/blob/main/H3C/vulnerability%20Information_2.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.300750", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.300750", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.520495", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2731.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2731.json new file mode 100644 index 00000000000..06392d72a05 --- /dev/null +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2731.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2731", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-25T04:15:18.943", + "lastModified": "2025-03-25T04:15:18.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/wizard/getDualbandSync of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Qwen11/CVE_store/blob/main/H3C/vulnerability%20Information_3.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.300751", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.300751", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.520497", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2732.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2732.json new file mode 100644 index 00000000000..8ed1d51840d --- /dev/null +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2732.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2732", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-25T04:15:20.793", + "lastModified": "2025-03-25T04:15:20.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. It has been rated as critical. Affected by this issue is some unknown functionality of the file /api/wizard/getWifiNeighbour of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Qwen11/CVE_store/blob/main/H3C/vulnerability%20Information_4.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.300752", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.300752", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.520499", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b7062104e22..3f45cf4f1a1 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-25T03:00:19.916358+00:00 +2025-03-25T05:00:19.876046+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-25T02:15:14.143000+00:00 +2025-03-25T04:15:20.793000+00:00 ``` ### Last Data Feed Release @@ -33,25 +33,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -286431 +286439 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `8` -- [CVE-2025-2722](CVE-2025/CVE-2025-27xx/CVE-2025-2722.json) (`2025-03-25T01:15:11.617`) -- [CVE-2025-2723](CVE-2025/CVE-2025-27xx/CVE-2025-2723.json) (`2025-03-25T01:15:11.800`) -- [CVE-2025-2724](CVE-2025/CVE-2025-27xx/CVE-2025-2724.json) (`2025-03-25T02:15:14.143`) +- [CVE-2025-2725](CVE-2025/CVE-2025-27xx/CVE-2025-2725.json) (`2025-03-25T03:15:16.097`) +- [CVE-2025-2726](CVE-2025/CVE-2025-27xx/CVE-2025-2726.json) (`2025-03-25T03:15:16.280`) +- [CVE-2025-2727](CVE-2025/CVE-2025-27xx/CVE-2025-2727.json) (`2025-03-25T03:15:16.450`) +- [CVE-2025-2728](CVE-2025/CVE-2025-27xx/CVE-2025-2728.json) (`2025-03-25T03:15:16.627`) +- [CVE-2025-2729](CVE-2025/CVE-2025-27xx/CVE-2025-2729.json) (`2025-03-25T03:15:16.800`) +- [CVE-2025-2730](CVE-2025/CVE-2025-27xx/CVE-2025-2730.json) (`2025-03-25T03:15:16.973`) +- [CVE-2025-2731](CVE-2025/CVE-2025-27xx/CVE-2025-2731.json) (`2025-03-25T04:15:18.943`) +- [CVE-2025-2732](CVE-2025/CVE-2025-27xx/CVE-2025-2732.json) (`2025-03-25T04:15:20.793`) ### CVEs modified in the last Commit -Recently modified CVEs: `3` +Recently modified CVEs: `0` -- [CVE-2024-47939](CVE-2024/CVE-2024-479xx/CVE-2024-47939.json) (`2025-03-25T02:15:13.070`) -- [CVE-2025-21757](CVE-2025/CVE-2025-217xx/CVE-2025-21757.json) (`2025-03-25T02:15:14.073`) -- [CVE-2025-30154](CVE-2025/CVE-2025-301xx/CVE-2025-30154.json) (`2025-03-25T01:00:02.187`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5b5ef1051e7..dd65137d400 100644 --- a/_state.csv +++ b/_state.csv @@ -270279,7 +270279,7 @@ CVE-2024-47926,0,0,484379ebe866d5f80b8df90be76850be47d4ff1695103f0fb6b101347d861 CVE-2024-4793,0,0,8f8d213042dd93a999736e061d0b2d842220778c0af6e02c4dc652643ef283b0,2025-02-20T18:23:45.077000 CVE-2024-47934,0,0,f6442eedb05ff02580ad694316069b27af97d384d3677baf492d0ce5c2b952f4,2025-01-08T03:15:08.550000 CVE-2024-47935,0,0,d0ad6a30600cc3e99b6dd112b63446a26523a856983df4b6127fa6046b2052c7,2025-02-17T06:15:13.053000 -CVE-2024-47939,0,1,7faf401d96b09e934bbbfe929a8ff16243a52ce1c2896a7fdbf954d8be99b110,2025-03-25T02:15:13.070000 +CVE-2024-47939,0,0,7faf401d96b09e934bbbfe929a8ff16243a52ce1c2896a7fdbf954d8be99b110,2025-03-25T02:15:13.070000 CVE-2024-4794,0,0,98a72307e185fe1ebcdbe465a8e92442dae9220581740707a3414bf42f6f4122,2025-02-20T18:22:57.657000 CVE-2024-47940,0,0,8e131fde2b9324945d980aa8295564fd41e66188f4f5ae4e8bf40a16b2d3387b,2024-11-13T23:14:54.567000 CVE-2024-47941,0,0,c14597f29ad3a4a8a32128ea5b010d0814d869c0e2360c56651603c13be16469,2024-11-13T23:15:09.783000 @@ -282890,7 +282890,7 @@ CVE-2025-21753,0,0,5ffc950736182b4e16af3a1e912a74c429a8fa5eb78beddd85d1995353c22 CVE-2025-21754,0,0,1b750cbe41c9b3bbcc7f63c20e66c80f94709b9489678aac8e0d85f9304ce084,2025-02-27T03:15:16.050000 CVE-2025-21755,0,0,46b7514ef21d6512abf15f8226f898cc61c0c2fa80c3a511e1302344c71eab98,2025-03-13T13:15:52.260000 CVE-2025-21756,0,0,c40199821a5da6ce68a70efd9a54a32f4464f1fd231cf3e4835543cd9fd53fb7,2025-03-24T17:32:35.823000 -CVE-2025-21757,0,1,ab8b45e5a003741815b72443c665faf05d0db02244ec489164dd1e3c390b1bbd,2025-03-25T02:15:14.073000 +CVE-2025-21757,0,0,ab8b45e5a003741815b72443c665faf05d0db02244ec489164dd1e3c390b1bbd,2025-03-25T02:15:14.073000 CVE-2025-21758,0,0,dd3a68f6ecd8249710aa02c611213c6149de3eb31e7b461e4834e08f0eb3f850,2025-03-13T13:15:52.750000 CVE-2025-21759,0,0,d073696add3fce6b2281a67ef636d78e4fa3bd2f3ca3af9bcf1820987292ecef,2025-03-24T17:33:09.887000 CVE-2025-2176,0,0,cdda744837875ac24d668729c042d3eaaaf9ad3b59c96ecf2b684af62dcbe73e,2025-03-11T08:15:12.090000 @@ -285856,22 +285856,25 @@ CVE-2025-2720,0,0,a92931a5708b0407492b6ac8af858705f8a5bf0f2f3f48440a24e27cedea94 CVE-2025-2721,0,0,5688fc3e066f588e94732819cfc733473401dc2843aa1ba44705983c628154fc,2025-03-25T00:15:15.693000 CVE-2025-27218,0,0,a1f84aab7c20671025069586dc6eda2e424af576b61d56df1ec2458e5aa40a25,2025-02-20T21:15:26.510000 CVE-2025-27219,0,0,daf263bc5dc335c24b10a63de4b30bc2cd803d7c7b13164f0156e1db3a4313a5,2025-03-05T14:08:20.493000 -CVE-2025-2722,1,1,77baea4842d35e699d12925681990538b7c751c1b6ca28de12d401dec2904fa5,2025-03-25T01:15:11.617000 +CVE-2025-2722,0,0,77baea4842d35e699d12925681990538b7c751c1b6ca28de12d401dec2904fa5,2025-03-25T01:15:11.617000 CVE-2025-27220,0,0,e5fae4b98ca62e096f6d20d7f99647f190b45376624f11e0f6dbd661df523352,2025-03-05T14:58:14.463000 CVE-2025-27221,0,0,bd575e135810e32dc670f036e8c3abfa23275c9e4b932c5ac7961776f844fa1e,2025-03-05T14:58:05.300000 -CVE-2025-2723,1,1,ed753499280c645fa6f1a235aeba7e07f3958889468946e04e659509b275063d,2025-03-25T01:15:11.800000 -CVE-2025-2724,1,1,08b38d7f577ee625ae270e836cb51d9f824fabfa0c3299bc7373b4e2003b6876,2025-03-25T02:15:14.143000 +CVE-2025-2723,0,0,ed753499280c645fa6f1a235aeba7e07f3958889468946e04e659509b275063d,2025-03-25T01:15:11.800000 +CVE-2025-2724,0,0,08b38d7f577ee625ae270e836cb51d9f824fabfa0c3299bc7373b4e2003b6876,2025-03-25T02:15:14.143000 +CVE-2025-2725,1,1,3080e55e60e384bdb113db7c2dd0a2156d635983015b28f3dedc99f65aa13291,2025-03-25T03:15:16.097000 CVE-2025-27253,0,0,e6fd345c99af7ee03f79cb7784a5ae2d7ed62bc20a94544c634faa9f6cea75f1,2025-03-12T11:15:41.127000 CVE-2025-27254,0,0,1326449cb688d3d742c54aa7c26671bc1a30e863cdbd3bd942083e3395c678b9,2025-03-12T12:15:14.767000 CVE-2025-27255,0,0,e778f08cf23683afc5d4a9e46aba9493b6f8173a4bc86a191d0135a1893c7fc7,2025-03-12T12:15:14.907000 CVE-2025-27256,0,0,faa5f1c45cf1df7eaa32fc86b6cec46d0d1a169c24ab8cf8bd8a3126393a2add,2025-03-12T12:15:15.047000 CVE-2025-27257,0,0,35c5381be4b8261e4f71266ede8fcd92d8a42ce97885652c7e62cfebbc1b8ddf,2025-03-12T12:15:15.187000 +CVE-2025-2726,1,1,d27680213068f5757240b0269878b6817172f09e32eca40c6fa79caeb275051f,2025-03-25T03:15:16.280000 CVE-2025-27263,0,0,0d6473ce6be397da70ae29bc260e636ca3c6169d6fa59d6f77401b8f5578c5c3,2025-03-03T14:15:57.980000 CVE-2025-27264,0,0,57766bee671a71e603c6190f5ecce6b6ab03f589b571849a06d4f3626124f857,2025-03-03T14:15:58.123000 CVE-2025-27265,0,0,064ce13be3b2caa339c06df0a9bbd275da3bf393870e4191cf15429558044c93,2025-02-24T15:15:14.310000 CVE-2025-27266,0,0,0b43dda3510df1a6caf90e315ec8e9c1ba742b051a50a212ca0413260e31120b,2025-02-24T15:15:14.443000 CVE-2025-27268,0,0,3174702840ac51701223fd78f030265fdecc7c2ffadea0a55057ef38d207fc0b,2025-03-03T14:15:58.260000 CVE-2025-27269,0,0,cda17c6a54559232936df28b8cf7711d2616fcb290267724b2af86f894a9aa65,2025-03-03T14:15:58.403000 +CVE-2025-2727,1,1,504a3c3d133064790fac63e9fc7120de3cdddde660e3cc7f6ef0d34962caa686,2025-03-25T03:15:16.450000 CVE-2025-27270,0,0,4345f1c1b15678a4b2ef9a6d3d453e7a5c46137ca8899ccd2e842d25a097e4f6,2025-03-03T14:15:58.540000 CVE-2025-27271,0,0,e3c2645210f856dd2bf72e6ed4222c53429c06af30de0ffdb6eb0d99ebf0dc73,2025-03-03T14:15:58.677000 CVE-2025-27272,0,0,031cb0c5a5ee5c0d99c125c8cfce6477a55151f9e350ba83c3bb825eb8b36e1c,2025-02-24T15:15:14.587000 @@ -285882,13 +285885,16 @@ CVE-2025-27276,0,0,38d755ee9b6acb225b7f449b7a5baa0e000c60dcb53715f6dc4116b6d4e4c CVE-2025-27277,0,0,1e3db72458897ceab2ba68afe91afc155436af173199d9b5d9a959fd815e4da9,2025-02-24T15:15:14.867000 CVE-2025-27278,0,0,256de16b0bce0b2fd5dba8326d4ac9f106c7f7707f2dce3a3458f81de2f34615,2025-03-03T14:15:59.237000 CVE-2025-27279,0,0,e02d4da30ee7c46005e2dd222aff84182ec72114143ea7720d0988b2b719c61c,2025-03-03T14:15:59.373000 +CVE-2025-2728,1,1,5d93fd426ea9ef2120914fbccaaa9a21db96993a618ffa14bc0b3ab4ad98ca65,2025-03-25T03:15:16.627000 CVE-2025-27280,0,0,8676dde15db79bd7dff4cf239425e3f3d950b17aa3701d636d0a7bd0e166a35e,2025-02-24T15:15:15.007000 CVE-2025-27281,0,0,9fdda88ecd2274c6eff1c09bae76e3a303f46955141b83096a7ba9176ec09e80,2025-03-15T22:15:15.697000 +CVE-2025-2729,1,1,d9e769e3fcd3f6c5ba418f2ae5d27938ca2e49bb13d361c77802005586bba348,2025-03-25T03:15:16.800000 CVE-2025-27290,0,0,aa628d5cea07d5d297c7ccfde23ff70de2a1958791da61d5415ca3597f031c14,2025-02-24T15:15:15.153000 CVE-2025-27294,0,0,c0b6fc5af6ea72ce95deb09b1966be2a148292fc28e45c7d495dbcb943cd9ee4,2025-02-24T15:15:15.287000 CVE-2025-27296,0,0,f7aed2bd994db7600652c28570e7742995619d861eb9e40b04a8a3c93de0a4f5,2025-02-24T15:15:15.423000 CVE-2025-27297,0,0,95db9906477d52c2de1a8a456daf46e161b9abe5a8e730d3f29b26be2dd97704,2025-02-24T15:15:15.567000 CVE-2025-27298,0,0,9960151b7da8df7d6db69029a962ee932aee7b76aba6ce4658ecfc21ab71df47,2025-02-24T15:15:15.703000 +CVE-2025-2730,1,1,7b91d6cfa52116175bc691651f73ccc67b0565053fcd9d0add2aedf83e4ee001,2025-03-25T03:15:16.973000 CVE-2025-27300,0,0,d66647b7f71200d1677535353b3d6824f3bc7339b0da601cd7547880b84dbd6f,2025-02-24T15:15:15.853000 CVE-2025-27301,0,0,64f043779c78c2ed84c27b8523770671a1fb6421af68da8a432cb4c7bf0ebc7c,2025-02-24T15:15:15.983000 CVE-2025-27303,0,0,a7a6d6c25ce6950b41fb76e8348a73edf41cf16dfbeb4a8d683f81caa1910109,2025-02-24T15:15:16.123000 @@ -285896,12 +285902,14 @@ CVE-2025-27304,0,0,9d2160199dafe840e771986f204c061835c7ed7add0f4ae4cf8c99555b7a3 CVE-2025-27305,0,0,bf074d91fed5e21564acaf77c0028ab2d84637020401d70d2a04e7068101daf4,2025-02-24T15:15:16.387000 CVE-2025-27306,0,0,80702ad22c275e37a0cbac8c8257049e2cc59528c7889d8099c083916777eab3,2025-02-24T15:15:16.523000 CVE-2025-27307,0,0,51f2191ce96fb79adb3f67c48699c360eaca5adb32f81b1526864b04b25e65bf,2025-02-24T15:15:16.653000 +CVE-2025-2731,1,1,d32cd005a2b1c3bbb67173911d609870a03f4f146f263dc7f24f41bf1319e6e0,2025-03-25T04:15:18.943000 CVE-2025-27311,0,0,887daf3ca5e659c3544c21201f804fbc1bf8b2cd8c00da7ecaf2899ee756ead7,2025-02-24T15:15:16.783000 CVE-2025-27312,0,0,b581bf2145bb64186de8cfc506dddf34a2209eb697269956dc9c4e9722d7a127,2025-02-24T15:15:16.917000 CVE-2025-27315,0,0,6e14eabdb3c0e89a0edb103c9452c91b7720a99d50fe2048c64c3b2ac69e2725,2025-02-24T15:15:17.047000 CVE-2025-27316,0,0,78a664ed18e2a3f09c84cff8eafbb3e667c271b347b6c49cb4057c71b6fb2f84,2025-02-24T15:15:17.193000 CVE-2025-27317,0,0,6890f6ed99867285ecccef44abce2bb31cd702302b365d74843fb1b631d8a7e0,2025-02-24T15:15:17.353000 CVE-2025-27318,0,0,01062c1cc7b69a94a4b00c3bba687232094c6f37680977c56572c43c965cbcbe,2025-02-24T15:15:17.487000 +CVE-2025-2732,1,1,ed61792835eebe9a24df73a503895eec433e0254ad1b571cacbd11f683b7e63a,2025-03-25T04:15:20.793000 CVE-2025-27320,0,0,8ddde046a5073fb57db51ac32c278ea72fd103a7b6698e137a1a5af8558b1579,2025-02-24T15:15:17.620000 CVE-2025-27321,0,0,57e789f06d16f73e5a359b61adef9f6f0ec207245e4ca47b20a61f61292b4b5b,2025-02-24T15:15:17.753000 CVE-2025-27323,0,0,6b3c8bfca9a52e8e86879d19ce880fdf9f7a54b902cbc68d3d2a6df3d91b39a9,2025-02-24T15:15:17.887000 @@ -286321,7 +286329,7 @@ CVE-2025-30143,0,0,c72031c589e36c3d2604bcb120ba9a6dd94ff4f6eee14259c749d5630ebbf CVE-2025-30144,0,0,15bf5f8218ba2223682697484bbc86f902d5a148eb49e6248d7c2412b7737d74,2025-03-19T16:15:33.080000 CVE-2025-30152,0,0,fb7d8b36a0a9757a199a4cf8f9b4b43b19a772c330ea1d3bb0186654fc6f920c,2025-03-19T16:15:33.313000 CVE-2025-30153,0,0,da47524558affc65b6874f9bef3637406802e7d0a047ff83de555cab022828e8,2025-03-19T16:15:33.607000 -CVE-2025-30154,0,1,d542b7883cd43893f483c4cb2736bb3861126bf74bcf09b7a23d392e9f0ccf44,2025-03-25T01:00:02.187000 +CVE-2025-30154,0,0,d542b7883cd43893f483c4cb2736bb3861126bf74bcf09b7a23d392e9f0ccf44,2025-03-25T01:00:02.187000 CVE-2025-30157,0,0,b7d565fa042efeea73d550fb215fb58640989cdcd04813767e503c6d1f6d08fe,2025-03-21T16:15:19.767000 CVE-2025-30160,0,0,25be472787022894833e0e3357865514f4516e8d537c62073ee43066a681f12b,2025-03-20T19:15:38.383000 CVE-2025-30162,0,0,d07cb25076f5a28ed462e799ab6d594b53e5288e310c7f09f6f9412cf484c1b5,2025-03-24T19:15:52.767000