Auto-Update: 2025-04-16T08:00:21.253156+00:00

This commit is contained in:
cad-safe-bot 2025-04-16 08:03:55 +00:00
parent 997db68ed5
commit 44be641fa0
6 changed files with 390 additions and 11 deletions

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-10680",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-04-16T06:15:42.367",
"lastModified": "2025-04-16T06:15:42.367",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Form Maker by 10Web WordPress plugin before 1.15.32 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/240948d7-ece0-437f-b926-62937bdbd9db/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-3247",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-04-16T06:15:42.933",
"lastModified": "2025-04-16T06:15:42.933",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Contact Form 7 plugin for WordPress is vulnerable to Order Replay in all versions up to, and including, 6.0.5 via the 'wpcf7_stripe_skip_spam_check' function due to insufficient validation on a user controlled key. This makes it possible for unauthenticated attackers to reuse a single Stripe PaymentIntent for multiple transactions. Only the first transaction is processed via Stripe, but the plugin sends a successful email message for each transaction, which may trick an administrator into fulfilling each order."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-354"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/contact-form-7/tags/6.0.5/modules/stripe/stripe.php#L114",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3270138/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/38257dbf-288e-4028-af65-85f5389888ac?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3674",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-16T07:15:42.300",
"lastModified": "2025-04-16T07:15:42.300",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK A3700R 9.1.2u.5822_B20200513. It has been declared as critical. Affected by this vulnerability is the function setUrlFilterRules of the file /cgi-bin/cstecgi.cgi. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-266"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://lavender-bicycle-a5a.notion.site/TOTOLINK-A3700R-setUrlFilterRules-1cb53a41781f808f9547da7748580914?pvs=4",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.304963",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.304963",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.551302",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3675",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-16T07:15:43.947",
"lastModified": "2025-04-16T07:15:43.947",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK A3700R 9.1.2u.5822_B20200513. It has been rated as critical. Affected by this issue is the function setL2tpServerCfg of the file /cgi-bin/cstecgi.cgi. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-266"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://lavender-bicycle-a5a.notion.site/TOTOLINK-A3700R-setL2tpServerCfg-1cb53a41781f80319d38dc5a8e9174ae?pvs=4",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.304964",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.304964",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.551304",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-16T06:00:19.656527+00:00
2025-04-16T08:00:21.253156+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-16T05:15:33.003000+00:00
2025-04-16T07:15:43.947000+00:00
```
### Last Data Feed Release
@ -33,17 +33,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
290106
290110
```
### CVEs added in the last Commit
Recently added CVEs: `4`
- [CVE-2025-22018](CVE-2025/CVE-2025-220xx/CVE-2025-22018.json) (`2025-04-16T05:15:31.297`)
- [CVE-2025-3666](CVE-2025/CVE-2025-36xx/CVE-2025-3666.json) (`2025-04-16T04:15:23.040`)
- [CVE-2025-3667](CVE-2025/CVE-2025-36xx/CVE-2025-3667.json) (`2025-04-16T05:15:32.660`)
- [CVE-2025-3668](CVE-2025/CVE-2025-36xx/CVE-2025-3668.json) (`2025-04-16T05:15:33.003`)
- [CVE-2024-10680](CVE-2024/CVE-2024-106xx/CVE-2024-10680.json) (`2025-04-16T06:15:42.367`)
- [CVE-2025-3247](CVE-2025/CVE-2025-32xx/CVE-2025-3247.json) (`2025-04-16T06:15:42.933`)
- [CVE-2025-3674](CVE-2025/CVE-2025-36xx/CVE-2025-3674.json) (`2025-04-16T07:15:42.300`)
- [CVE-2025-3675](CVE-2025/CVE-2025-36xx/CVE-2025-3675.json) (`2025-04-16T07:15:43.947`)
### CVEs modified in the last Commit

View File

@ -245168,6 +245168,7 @@ CVE-2024-10676,0,0,6887bcf7e7ad4dff7b3acb5ccb4703ef99e151f3c3b6329edf86e56346e5b
CVE-2024-10678,0,0,2d4c7c0dbf73a0febb64fcb95cf96aa0969f22be17ad5704c54158d8b7b8b392,2024-12-16T19:15:05.907000
CVE-2024-10679,0,0,6031e8f0ed489a1fd714c3ee41c8f59bb6f216bd86d1989d37ded7c87ab84db5,2025-03-27T16:45:46.410000
CVE-2024-1068,0,0,19fff8aed0f63e6149ffcd4b412aacdd7ffcb6468d1d60a7391f61d942a540cd,2024-11-21T08:49:43.460000
CVE-2024-10680,1,1,d8db6973754105a98eca4bb3b8eb778cd5a40da91f9bac516c7b64f7c6331f96,2025-04-16T06:15:42.367000
CVE-2024-10681,0,0,b8f17934b6825994f779df09ece3578475b75ad6fb261f72f1afc8dc3363b0f0,2024-12-06T10:15:04.533000
CVE-2024-10682,0,0,a7e8df655c8e75ce2215a7ec3bf41218b640524758c0db7f945bc19c5ad286f0,2024-11-21T13:57:24.187000
CVE-2024-10683,0,0,4d3a70daf30fbf2f2ba33971b3daca0cfdf2ea629fdbab703b0dff039ae72ac0,2024-11-12T13:56:24.513000
@ -283811,7 +283812,7 @@ CVE-2025-22014,0,0,d0677bce9b40bf2440f1e3f05d26248d0f1a8e04e3af5766ae8663607da1e
CVE-2025-22015,0,0,76ef40b09e4f1cb899d4a2ab31f22c4f6d8c6e60d75140b0b3e5777f401c7fbf,2025-04-08T18:13:53.347000
CVE-2025-22016,0,0,147b90da5e7863ebd9aa554a0d14ec0b4cb2770bdef3a66630422d63719c334c,2025-04-08T18:13:53.347000
CVE-2025-22017,0,0,47242ca22d32729ade7b3f671002250e206d140a0d8f74e89394f4529c76da51,2025-04-08T18:13:53.347000
CVE-2025-22018,1,1,d327e10a541b12bcbf37dc757188fd2a7ab983d5f4cbe506b5820b89f5f4061c,2025-04-16T05:15:31.297000
CVE-2025-22018,0,0,d327e10a541b12bcbf37dc757188fd2a7ab983d5f4cbe506b5820b89f5f4061c,2025-04-16T05:15:31.297000
CVE-2025-2202,0,0,cf0ba4cc9b924e183defbee63ce1af96a184cec0b7613a3c88b1e156bd38ec40,2025-03-17T11:15:37.970000
CVE-2025-2205,0,0,fbf363faec05dffcfc872bf5b989460ea4958dbb9808068cb2832da5e42818ef,2025-03-12T04:15:19.810000
CVE-2025-2206,0,0,6d4b6e8bdf6b24741a4430972818a20f8052ecfc15f1df2ff630f331c8dbd714,2025-03-11T20:15:18.487000
@ -289683,6 +289684,7 @@ CVE-2025-3245,0,0,396ea3bbe154112d349f915c8c28a6610578699cecf486191d9d012a69d9c5
CVE-2025-32460,0,0,16cc364f1c655bf6f21d50384a646311718edc25ee850ac035bf3b1975d34030,2025-04-09T20:02:41.860000
CVE-2025-32461,0,0,8bce56f6863b74eaac27069424b18b802ee4aeb8905aa3153fdbbd924c0604dc,2025-04-09T20:02:41.860000
CVE-2025-32464,0,0,90ecf00992aa935a1ec172382a80a6a814adef224b6842ca8a80c5ebbf6d56cf,2025-04-09T20:02:41.860000
CVE-2025-3247,1,1,fa8780e25ad5b025db213cf6c924f2e6ef3351ee29b437d774b8dd4d4a6d23a9,2025-04-16T06:15:42.933000
CVE-2025-32476,0,0,9d54d65167184e122be5c3a790d5ad19d5abaa6b052713e592bcb27d26085427,2025-04-09T20:02:41.860000
CVE-2025-32477,0,0,6aaeb344af7fac729d48ed1cd0817d6c11c34e76428c0bd5b074c3df21934506,2025-04-09T20:02:41.860000
CVE-2025-32478,0,0,dda56302d340936b33be9b172f0f1b3962b76b9c83b1ee4199324d81c031ab47,2025-04-09T20:02:41.860000
@ -290101,7 +290103,9 @@ CVE-2025-3622,0,0,6b7db9933e6b248f0000367113483a5e806bad53678214380c37af6b793ac8
CVE-2025-3663,0,0,fa2e0960b918812c638afdd8c1c2fafb9b500a45bc96c2abddaf978fcf1b98a1,2025-04-16T03:15:17.680000
CVE-2025-3664,0,0,cf22f719d3698b38e86a180ea4652dc27df85c18f033ca8e0b197b572edbf120,2025-04-16T03:15:17.883000
CVE-2025-3665,0,0,1f4374ee4287f0666887b1c9fc6ecdfcbb0aa03e9e8bb8ffd16185df92964133,2025-04-16T03:15:18.057000
CVE-2025-3666,1,1,013c53642f9002028db16e0f6f66c915614dba9a66ded506d4bf5a7e3a4d6559,2025-04-16T04:15:23.040000
CVE-2025-3667,1,1,1b2b51d7de6babb6a695353dfe57612a861c8ad2b5e591ebe4981ac8b2b614d3,2025-04-16T05:15:32.660000
CVE-2025-3668,1,1,58342357ea7ebc8c499e4c8a044a0200fc62864e574b400d3c8f0e35870b4b7b,2025-04-16T05:15:33.003000
CVE-2025-3666,0,0,013c53642f9002028db16e0f6f66c915614dba9a66ded506d4bf5a7e3a4d6559,2025-04-16T04:15:23.040000
CVE-2025-3667,0,0,1b2b51d7de6babb6a695353dfe57612a861c8ad2b5e591ebe4981ac8b2b614d3,2025-04-16T05:15:32.660000
CVE-2025-3668,0,0,58342357ea7ebc8c499e4c8a044a0200fc62864e574b400d3c8f0e35870b4b7b,2025-04-16T05:15:33.003000
CVE-2025-3674,1,1,a4538d60e855a22391915743a30ee7d71badf24110eb40a2f6f793d77b531a7e,2025-04-16T07:15:42.300000
CVE-2025-3675,1,1,7b0f93cad5b003511307db8cf27413ab379fc3e942aed287bd8dfc8bfbaf5f0f,2025-04-16T07:15:43.947000
CVE-2025-3698,0,0,ef82dc028cd253273764159d19762bdf354152d22755dd0186a08209438342d7,2025-04-16T03:15:18.223000

Can't render this file because it is too large.