mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2025-06-21T10:00:29.021863+00:00
This commit is contained in:
parent
b71d476978
commit
4a4865dac8
145
CVE-2025/CVE-2025-64xx/CVE-2025-6402.json
Normal file
145
CVE-2025/CVE-2025-64xx/CVE-2025-6402.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-6402",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-21T09:15:22.193",
|
||||
"lastModified": "2025-06-21T09:15:22.193",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been declared as critical. This vulnerability affects unknown code of the file /boafrm/formIpv6Setup of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/d2pq/cve/blob/main/616/22.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313396",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313396",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597693",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
13
README.md
13
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-21T08:00:18.937181+00:00
|
||||
2025-06-21T10:00:29.021863+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-21T07:15:23.197000+00:00
|
||||
2025-06-21T09:15:22.193000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,17 +33,14 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
298983
|
||||
298984
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
- [CVE-2025-5034](CVE-2025/CVE-2025-50xx/CVE-2025-5034.json) (`2025-06-21T06:15:18.363`)
|
||||
- [CVE-2025-5143](CVE-2025/CVE-2025-51xx/CVE-2025-5143.json) (`2025-06-21T07:15:22.110`)
|
||||
- [CVE-2025-6400](CVE-2025/CVE-2025-64xx/CVE-2025-6400.json) (`2025-06-21T06:15:19.577`)
|
||||
- [CVE-2025-6401](CVE-2025/CVE-2025-64xx/CVE-2025-6401.json) (`2025-06-21T07:15:23.197`)
|
||||
- [CVE-2025-6402](CVE-2025/CVE-2025-64xx/CVE-2025-6402.json) (`2025-06-21T09:15:22.193`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
@ -298007,7 +298007,7 @@ CVE-2025-5030,0,0,6d4b94a2a3e4b3835c2395db7b8595a9109a231f789fd318934411db49833e
|
||||
CVE-2025-5031,0,0,5f2ab8d2bd00dbf44f07508d2176837c7f0d7e14295892849ea6ba136599d0aa,2025-05-21T20:24:58.133000
|
||||
CVE-2025-5032,0,0,4156143fef9ccb288081dade2120fec7f51a54986c4f66b96dc31d6794fced0f,2025-05-28T14:12:07.037000
|
||||
CVE-2025-5033,0,0,06c9afb9196a99dd4f0b3020a989f4b3254b2b9e05cd3f3304d140aa64b94a45,2025-06-20T16:15:38.947000
|
||||
CVE-2025-5034,1,1,a5237986d670eb1fe5b75c607eb4c19a8e149970963980b2e7a9c1ea2e29eb2a,2025-06-21T06:15:18.363000
|
||||
CVE-2025-5034,0,0,a5237986d670eb1fe5b75c607eb4c19a8e149970963980b2e7a9c1ea2e29eb2a,2025-06-21T06:15:18.363000
|
||||
CVE-2025-5036,0,0,c38e53ab36341883513f1bc0436ec7cb62abd108008baba46460fded702f863e,2025-06-02T18:15:24.783000
|
||||
CVE-2025-5049,0,0,53dbae82bdedc08260f20ca332c247f8512f5fc62c5e6ab84cf9d9483000bcbc,2025-05-21T20:24:58.133000
|
||||
CVE-2025-5050,0,0,0231a3b3f178e79df4e21eb66d9feaab9381ab362e00abce6f5ea784e566916f,2025-05-21T20:24:58.133000
|
||||
@ -298081,7 +298081,7 @@ CVE-2025-5139,0,0,478cd92def8402421385452923781dbb1e2d7c36d24453f72439415b1b2783
|
||||
CVE-2025-5140,0,0,7eb8851e623e7595aeb04f88f3b17c4f06b9055459a202a999065089d465d23f,2025-05-28T14:58:52.920000
|
||||
CVE-2025-5141,0,0,c15f6868f26f87e39a3f43de04f54fd301d39ee102b85bad5264f415113350ff,2025-06-17T20:50:23.507000
|
||||
CVE-2025-5142,0,0,cfb77a196d5255a5a436db83dff520eaaa1d53cc832ec32bce9b0d13a0b8d87b,2025-06-04T18:29:34.470000
|
||||
CVE-2025-5143,1,1,d3c779d2d3d7691aa412ad00863959259a7fad2a48151861aa04fd8584e07f96,2025-06-21T07:15:22.110000
|
||||
CVE-2025-5143,0,0,d3c779d2d3d7691aa412ad00863959259a7fad2a48151861aa04fd8584e07f96,2025-06-21T07:15:22.110000
|
||||
CVE-2025-5144,0,0,8a5bb519fc70cea9f7c759b1b417a0b6e1cf15ebfdb18f92af6baa233444cd87,2025-06-12T16:06:20.180000
|
||||
CVE-2025-5145,0,0,79eef495ab65fcf81286a635001443af56e362b501d3db2d9a57e69f802a1c67,2025-05-28T14:58:52.920000
|
||||
CVE-2025-5146,0,0,30dc5c61e39c6bb48e155d9bcd0fd66e2395886111a482cc56b330fb6c74d9f8,2025-05-29T07:15:25.120000
|
||||
@ -298980,5 +298980,6 @@ CVE-2025-6384,0,0,5cdec51953ac45fb27a9189069c1d2dedd736d67cb8696f7a629dd1dd7d119
|
||||
CVE-2025-6393,0,0,8fdf36f15a3c8062a52f965b882fa901ea85b71f63ac82f6e8e8e5dca7616106,2025-06-21T01:15:29.650000
|
||||
CVE-2025-6394,0,0,0d29effea134417ccb539ed8195e20c39f8378791ae92c1ec4fb1ad0a57731cd,2025-06-21T02:15:20.247000
|
||||
CVE-2025-6399,0,0,4e1efe71bd5e4cfa8ab2ff5a9127ce00373b7f6790fd011901c9b5eee0f73f6a,2025-06-21T04:15:23.140000
|
||||
CVE-2025-6400,1,1,748a86d253e9363c04b818e49ea5dee266bc2fc2cefdf3d21460cc5d4fa7f8cf,2025-06-21T06:15:19.577000
|
||||
CVE-2025-6401,1,1,9d9dd7c8c9a8182d339c1e04938e080d45737af681976610632f07c1158446ae,2025-06-21T07:15:23.197000
|
||||
CVE-2025-6400,0,0,748a86d253e9363c04b818e49ea5dee266bc2fc2cefdf3d21460cc5d4fa7f8cf,2025-06-21T06:15:19.577000
|
||||
CVE-2025-6401,0,0,9d9dd7c8c9a8182d339c1e04938e080d45737af681976610632f07c1158446ae,2025-06-21T07:15:23.197000
|
||||
CVE-2025-6402,1,1,86e3fb80660b4a0aa440d06524000ca21ff60f631715b366a9d8547e04bbf0c9,2025-06-21T09:15:22.193000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user