mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2025-04-11T04:00:20.361870+00:00
This commit is contained in:
parent
d6fd0e0787
commit
5cdf4dd8f6
56
CVE-2024/CVE-2024-514xx/CVE-2024-51461.json
Normal file
56
CVE-2024/CVE-2024-514xx/CVE-2024-51461.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-51461",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-04-11T02:15:17.250",
|
||||
"lastModified": "2025-04-11T02:15:17.250",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM QRadar WinCollect Agent 10.0 through 10.1.13 could allow a remote attacker to cause a denial of service by interrupting an HTTP request that could consume memory resources."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7230614",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-01xx/CVE-2025-0120.json
Normal file
78
CVE-2025/CVE-2025-01xx/CVE-2025-0120.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-0120",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2025-04-11T02:15:18.197",
|
||||
"lastModified": "2025-04-11T02:15:18.197",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability with a privilege management mechanism in the Palo Alto Networks GlobalProtect\u2122 app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\\SYSTEM. However, execution requires that the local user can also successfully exploit a race condition, which makes this vulnerability difficult to exploit."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NO",
|
||||
"Recovery": "USER",
|
||||
"valueDensity": "CONCENTRATED",
|
||||
"vulnerabilityResponseEffort": "MODERATE",
|
||||
"providerUrgency": "AMBER"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-250"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2025-0120",
|
||||
"source": "psirt@paloaltonetworks.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-01xx/CVE-2025-0121.json
Normal file
78
CVE-2025/CVE-2025-01xx/CVE-2025-0121.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-0121",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2025-04-11T02:15:18.403",
|
||||
"lastModified": "2025-04-11T02:15:18.403",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A null pointer dereference vulnerability in the Palo Alto Networks Cortex\u00ae XDR agent on Windows devices allows a low-privileged local Windows user to crash the agent. Additionally, malware can use this vulnerability to perform malicious activity without Cortex XDR being able to detect it."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NO",
|
||||
"Recovery": "USER",
|
||||
"valueDensity": "DIFFUSE",
|
||||
"vulnerabilityResponseEffort": "MODERATE",
|
||||
"providerUrgency": "AMBER"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2025-0121",
|
||||
"source": "psirt@paloaltonetworks.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-01xx/CVE-2025-0122.json
Normal file
78
CVE-2025/CVE-2025-01xx/CVE-2025-0122.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-0122",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2025-04-11T02:15:18.527",
|
||||
"lastModified": "2025-04-11T02:15:18.527",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A denial-of-service (DoS) vulnerability in Palo Alto Networks Prisma\u00ae SD-WAN ION devices enables an unauthenticated attacker in a network adjacent to a Prisma SD-WAN ION device to disrupt the packet processing capabilities of the device by sending a burst of crafted packets to that device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:D/RE:L/U:Amber",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "YES",
|
||||
"Recovery": "AUTOMATIC",
|
||||
"valueDensity": "DIFFUSE",
|
||||
"vulnerabilityResponseEffort": "LOW",
|
||||
"providerUrgency": "AMBER"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2025-0122",
|
||||
"source": "psirt@paloaltonetworks.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-01xx/CVE-2025-0124.json
Normal file
78
CVE-2025/CVE-2025-01xx/CVE-2025-0124.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-0124",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2025-04-11T02:15:18.663",
|
||||
"lastModified": "2025-04-11T02:15:18.663",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authenticated file deletion vulnerability in the Palo Alto Networks PAN-OS\u00ae software enables an authenticated attacker with network access to the management web interface to delete certain files as the \u201cnobody\u201d user; this includes limited logs and configuration files but does not include system files.\n\nThe attacker must have network access to the management web interface to exploit this issue. You greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\nThis issue affects Cloud NGFW. However, this issue does not affect Prisma\u00ae Access software."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NO",
|
||||
"Recovery": "USER",
|
||||
"valueDensity": "CONCENTRATED",
|
||||
"vulnerabilityResponseEffort": "MODERATE",
|
||||
"providerUrgency": "AMBER"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-73"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2025-0124",
|
||||
"source": "psirt@paloaltonetworks.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-01xx/CVE-2025-0125.json
Normal file
78
CVE-2025/CVE-2025-01xx/CVE-2025-0125.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-0125",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2025-04-11T02:15:18.820",
|
||||
"lastModified": "2025-04-11T02:15:18.820",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS\u00ae software enables a malicious authenticated read-write administrator to impersonate another legitimate authenticated PAN-OS administrator.\n\n\nThe attacker must have network access to the management web interface to exploit this issue. You greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\nThis issue does not affect Cloud NGFW and all Prisma\u00ae Access instances."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:C/RE:M/U:Amber",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NEGLIGIBLE",
|
||||
"Automatable": "NO",
|
||||
"Recovery": "USER",
|
||||
"valueDensity": "CONCENTRATED",
|
||||
"vulnerabilityResponseEffort": "MODERATE",
|
||||
"providerUrgency": "AMBER"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-83"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2025-0125",
|
||||
"source": "psirt@paloaltonetworks.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-01xx/CVE-2025-0126.json
Normal file
78
CVE-2025/CVE-2025-01xx/CVE-2025-0126.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-0126",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2025-04-11T02:15:18.970",
|
||||
"lastModified": "2025-04-11T02:15:18.970",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "When configured using SAML, a session fixation vulnerability in the GlobalProtect\u2122 login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker.\n\nThe SAML login for the PAN-OS\u00ae management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma\u00ae Access instances are proactively patched."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NO",
|
||||
"Recovery": "USER",
|
||||
"valueDensity": "DIFFUSE",
|
||||
"vulnerabilityResponseEffort": "MODERATE",
|
||||
"providerUrgency": "AMBER"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-384"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2025-0126",
|
||||
"source": "psirt@paloaltonetworks.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-01xx/CVE-2025-0127.json
Normal file
78
CVE-2025/CVE-2025-01xx/CVE-2025-0127.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-0127",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2025-04-11T02:15:19.120",
|
||||
"lastModified": "2025-04-11T02:15:19.120",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A command injection vulnerability in Palo Alto Networks PAN-OS\u00ae software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. This issue is only applicable to PAN-OS VM-Series. This issue does not affect firewalls that are already deployed.\n\nCloud NGFW and Prisma\u00ae Access are not affected by this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NO",
|
||||
"Recovery": "USER",
|
||||
"valueDensity": "DIFFUSE",
|
||||
"vulnerabilityResponseEffort": "MODERATE",
|
||||
"providerUrgency": "AMBER"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2025-0127",
|
||||
"source": "psirt@paloaltonetworks.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-01xx/CVE-2025-0128.json
Normal file
78
CVE-2025/CVE-2025-01xx/CVE-2025-0128.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-0128",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2025-04-11T02:15:19.253",
|
||||
"lastModified": "2025-04-11T02:15:19.253",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A denial-of-service (DoS) vulnerability in the Simple Certificate Enrollment Protocol (SCEP) authentication feature of Palo Alto Networks PAN-OS\u00ae software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode.\n\nCloud NGFW is not affected by this vulnerability. Prisma\u00ae Access software is proactively patched and protected from this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:M/U:Amber",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "YES",
|
||||
"Recovery": "USER",
|
||||
"valueDensity": "CONCENTRATED",
|
||||
"vulnerabilityResponseEffort": "MODERATE",
|
||||
"providerUrgency": "AMBER"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2025-0128",
|
||||
"source": "psirt@paloaltonetworks.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-263xx/CVE-2025-26335.json
Normal file
56
CVE-2025/CVE-2025-263xx/CVE-2025-26335.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26335",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2025-04-11T02:15:19.397",
|
||||
"lastModified": "2025-04-11T02:15:19.397",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerProtect Cyber Recovery, versions prior to 19.18.0.2, contains an Insertion of Sensitive Information Into Sent Data vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-201"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000306005/dsa-2025-113-security-update-for-dell-powerprotect-cyber-recovery",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32757.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32757.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32757",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:13.903",
|
||||
"lastModified": "2025-04-11T03:15:13.903",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32758.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32758.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32758",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:14.427",
|
||||
"lastModified": "2025-04-11T03:15:14.427",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32759.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32759.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32759",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:14.477",
|
||||
"lastModified": "2025-04-11T03:15:14.477",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32760.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32760.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32760",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:14.530",
|
||||
"lastModified": "2025-04-11T03:15:14.530",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32761.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32761.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32761",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:14.583",
|
||||
"lastModified": "2025-04-11T03:15:14.583",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32762.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32762.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32762",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:14.637",
|
||||
"lastModified": "2025-04-11T03:15:14.637",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32763.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32763.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32763",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:14.693",
|
||||
"lastModified": "2025-04-11T03:15:14.693",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32764.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32764.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32764",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:14.747",
|
||||
"lastModified": "2025-04-11T03:15:14.747",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32765.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32765.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32765",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:14.790",
|
||||
"lastModified": "2025-04-11T03:15:14.790",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32767.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32767.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32767",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:14.843",
|
||||
"lastModified": "2025-04-11T03:15:14.843",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32768.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32768.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32768",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:14.893",
|
||||
"lastModified": "2025-04-11T03:15:14.893",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32769.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32769.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32769",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:14.943",
|
||||
"lastModified": "2025-04-11T03:15:14.943",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32770.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32770.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32770",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:14.993",
|
||||
"lastModified": "2025-04-11T03:15:14.993",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32771.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32771.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32771",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:15.047",
|
||||
"lastModified": "2025-04-11T03:15:15.047",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32772.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32772.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32772",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:15.100",
|
||||
"lastModified": "2025-04-11T03:15:15.100",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32773.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32773.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32773",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:15.153",
|
||||
"lastModified": "2025-04-11T03:15:15.153",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32774.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32774.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32774",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:15.200",
|
||||
"lastModified": "2025-04-11T03:15:15.200",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-327xx/CVE-2025-32775.json
Normal file
16
CVE-2025/CVE-2025-327xx/CVE-2025-32775.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-32775",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-04-11T03:15:15.250",
|
||||
"lastModified": "2025-04-11T03:15:15.250",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,9 +2,16 @@
|
||||
"id": "CVE-2025-32808",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-11T01:15:55.097",
|
||||
"lastModified": "2025-04-11T01:15:55.097",
|
||||
"lastModified": "2025-04-11T02:15:19.540",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"exclusively-hosted-service"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,9 +2,16 @@
|
||||
"id": "CVE-2025-32809",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-11T01:15:55.453",
|
||||
"lastModified": "2025-04-11T01:15:55.453",
|
||||
"lastModified": "2025-04-11T02:15:19.667",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"exclusively-hosted-service"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
65
README.md
65
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-11T02:02:18.808242+00:00
|
||||
2025-04-11T04:00:20.361870+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-11T01:15:55.453000+00:00
|
||||
2025-04-11T03:15:15.250000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,47 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
289561
|
||||
289589
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `28`
|
||||
|
||||
- [CVE-2025-32807](CVE-2025/CVE-2025-328xx/CVE-2025-32807.json) (`2025-04-11T00:15:27.777`)
|
||||
- [CVE-2025-32808](CVE-2025/CVE-2025-328xx/CVE-2025-32808.json) (`2025-04-11T01:15:55.097`)
|
||||
- [CVE-2025-32809](CVE-2025/CVE-2025-328xx/CVE-2025-32809.json) (`2025-04-11T01:15:55.453`)
|
||||
- [CVE-2025-0122](CVE-2025/CVE-2025-01xx/CVE-2025-0122.json) (`2025-04-11T02:15:18.527`)
|
||||
- [CVE-2025-0124](CVE-2025/CVE-2025-01xx/CVE-2025-0124.json) (`2025-04-11T02:15:18.663`)
|
||||
- [CVE-2025-0125](CVE-2025/CVE-2025-01xx/CVE-2025-0125.json) (`2025-04-11T02:15:18.820`)
|
||||
- [CVE-2025-0126](CVE-2025/CVE-2025-01xx/CVE-2025-0126.json) (`2025-04-11T02:15:18.970`)
|
||||
- [CVE-2025-0127](CVE-2025/CVE-2025-01xx/CVE-2025-0127.json) (`2025-04-11T02:15:19.120`)
|
||||
- [CVE-2025-0128](CVE-2025/CVE-2025-01xx/CVE-2025-0128.json) (`2025-04-11T02:15:19.253`)
|
||||
- [CVE-2025-26335](CVE-2025/CVE-2025-263xx/CVE-2025-26335.json) (`2025-04-11T02:15:19.397`)
|
||||
- [CVE-2025-32757](CVE-2025/CVE-2025-327xx/CVE-2025-32757.json) (`2025-04-11T03:15:13.903`)
|
||||
- [CVE-2025-32758](CVE-2025/CVE-2025-327xx/CVE-2025-32758.json) (`2025-04-11T03:15:14.427`)
|
||||
- [CVE-2025-32759](CVE-2025/CVE-2025-327xx/CVE-2025-32759.json) (`2025-04-11T03:15:14.477`)
|
||||
- [CVE-2025-32760](CVE-2025/CVE-2025-327xx/CVE-2025-32760.json) (`2025-04-11T03:15:14.530`)
|
||||
- [CVE-2025-32761](CVE-2025/CVE-2025-327xx/CVE-2025-32761.json) (`2025-04-11T03:15:14.583`)
|
||||
- [CVE-2025-32762](CVE-2025/CVE-2025-327xx/CVE-2025-32762.json) (`2025-04-11T03:15:14.637`)
|
||||
- [CVE-2025-32763](CVE-2025/CVE-2025-327xx/CVE-2025-32763.json) (`2025-04-11T03:15:14.693`)
|
||||
- [CVE-2025-32764](CVE-2025/CVE-2025-327xx/CVE-2025-32764.json) (`2025-04-11T03:15:14.747`)
|
||||
- [CVE-2025-32765](CVE-2025/CVE-2025-327xx/CVE-2025-32765.json) (`2025-04-11T03:15:14.790`)
|
||||
- [CVE-2025-32767](CVE-2025/CVE-2025-327xx/CVE-2025-32767.json) (`2025-04-11T03:15:14.843`)
|
||||
- [CVE-2025-32768](CVE-2025/CVE-2025-327xx/CVE-2025-32768.json) (`2025-04-11T03:15:14.893`)
|
||||
- [CVE-2025-32769](CVE-2025/CVE-2025-327xx/CVE-2025-32769.json) (`2025-04-11T03:15:14.943`)
|
||||
- [CVE-2025-32770](CVE-2025/CVE-2025-327xx/CVE-2025-32770.json) (`2025-04-11T03:15:14.993`)
|
||||
- [CVE-2025-32771](CVE-2025/CVE-2025-327xx/CVE-2025-32771.json) (`2025-04-11T03:15:15.047`)
|
||||
- [CVE-2025-32772](CVE-2025/CVE-2025-327xx/CVE-2025-32772.json) (`2025-04-11T03:15:15.100`)
|
||||
- [CVE-2025-32773](CVE-2025/CVE-2025-327xx/CVE-2025-32773.json) (`2025-04-11T03:15:15.153`)
|
||||
- [CVE-2025-32774](CVE-2025/CVE-2025-327xx/CVE-2025-32774.json) (`2025-04-11T03:15:15.200`)
|
||||
- [CVE-2025-32775](CVE-2025/CVE-2025-327xx/CVE-2025-32775.json) (`2025-04-11T03:15:15.250`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `20001`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2014-1870](CVE-2014/CVE-2014-18xx/CVE-2014-1870.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1876](CVE-2014/CVE-2014-18xx/CVE-2014-1876.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1879](CVE-2014/CVE-2014-18xx/CVE-2014-1879.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1903](CVE-2014/CVE-2014-19xx/CVE-2014-1903.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1910](CVE-2014/CVE-2014-19xx/CVE-2014-1910.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1914](CVE-2014/CVE-2014-19xx/CVE-2014-1914.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1915](CVE-2014/CVE-2014-19xx/CVE-2014-1915.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1916](CVE-2014/CVE-2014-19xx/CVE-2014-1916.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1921](CVE-2014/CVE-2014-19xx/CVE-2014-1921.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1930](CVE-2014/CVE-2014-19xx/CVE-2014-1930.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1931](CVE-2014/CVE-2014-19xx/CVE-2014-1931.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1943](CVE-2014/CVE-2014-19xx/CVE-2014-1943.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1948](CVE-2014/CVE-2014-19xx/CVE-2014-1948.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1950](CVE-2014/CVE-2014-19xx/CVE-2014-1950.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1960](CVE-2014/CVE-2014-19xx/CVE-2014-1960.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1961](CVE-2014/CVE-2014-19xx/CVE-2014-1961.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1962](CVE-2014/CVE-2014-19xx/CVE-2014-1962.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1963](CVE-2014/CVE-2014-19xx/CVE-2014-1963.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1964](CVE-2014/CVE-2014-19xx/CVE-2014-1964.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1965](CVE-2014/CVE-2014-19xx/CVE-2014-1965.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-1966](CVE-2014/CVE-2014-19xx/CVE-2014-1966.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-2018](CVE-2014/CVE-2014-20xx/CVE-2014-2018.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-2019](CVE-2014/CVE-2014-20xx/CVE-2014-2019.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2014-2020](CVE-2014/CVE-2014-20xx/CVE-2014-2020.json) (`2025-04-11T00:51:21.963`)
|
||||
- [CVE-2024-50217](CVE-2024/CVE-2024-502xx/CVE-2024-50217.json) (`2025-04-11T01:15:52.283`)
|
||||
- [CVE-2025-32808](CVE-2025/CVE-2025-328xx/CVE-2025-32808.json) (`2025-04-11T02:15:19.540`)
|
||||
- [CVE-2025-32809](CVE-2025/CVE-2025-328xx/CVE-2025-32809.json) (`2025-04-11T02:15:19.667`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
40036
_state.csv
40036
_state.csv
File diff suppressed because it is too large
Load Diff
Loading…
x
Reference in New Issue
Block a user