Auto-Update: 2025-04-11T04:00:20.361870+00:00

This commit is contained in:
cad-safe-bot 2025-04-11 04:03:54 +00:00
parent d6fd0e0787
commit 5cdf4dd8f6
32 changed files with 21106 additions and 20041 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-51461",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-04-11T02:15:17.250",
"lastModified": "2025-04-11T02:15:17.250",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM QRadar WinCollect Agent 10.0 through 10.1.13 could allow a remote attacker to cause a denial of service by interrupting an HTTP request that could consume memory resources."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7230614",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-0120",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2025-04-11T02:15:18.197",
"lastModified": "2025-04-11T02:15:18.197",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability with a privilege management mechanism in the Palo Alto Networks GlobalProtect\u2122 app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\\SYSTEM. However, execution requires that the local user can also successfully exploit a race condition, which makes this vulnerability difficult to exploit."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NO",
"Recovery": "USER",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "AMBER"
}
}
]
},
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-250"
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2025-0120",
"source": "psirt@paloaltonetworks.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-0121",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2025-04-11T02:15:18.403",
"lastModified": "2025-04-11T02:15:18.403",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A null pointer dereference vulnerability in the Palo Alto Networks Cortex\u00ae XDR agent on Windows devices allows a low-privileged local Windows user to crash the agent. Additionally, malware can use this vulnerability to perform malicious activity without Cortex XDR being able to detect it."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NO",
"Recovery": "USER",
"valueDensity": "DIFFUSE",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "AMBER"
}
}
]
},
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2025-0121",
"source": "psirt@paloaltonetworks.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-0122",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2025-04-11T02:15:18.527",
"lastModified": "2025-04-11T02:15:18.527",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A denial-of-service (DoS) vulnerability in Palo Alto Networks Prisma\u00ae SD-WAN ION devices enables an unauthenticated attacker in a network adjacent to a Prisma SD-WAN ION device to disrupt the packet processing capabilities of the device by sending a burst of crafted packets to that device."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:D/RE:L/U:Amber",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "YES",
"Recovery": "AUTOMATIC",
"valueDensity": "DIFFUSE",
"vulnerabilityResponseEffort": "LOW",
"providerUrgency": "AMBER"
}
}
]
},
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2025-0122",
"source": "psirt@paloaltonetworks.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-0124",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2025-04-11T02:15:18.663",
"lastModified": "2025-04-11T02:15:18.663",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authenticated file deletion vulnerability in the Palo Alto Networks PAN-OS\u00ae software enables an authenticated attacker with network access to the management web interface to delete certain files as the \u201cnobody\u201d user; this includes limited logs and configuration files but does not include system files.\n\nThe attacker must have network access to the management web interface to exploit this issue. You greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\nThis issue affects Cloud NGFW. However, this issue does not affect Prisma\u00ae Access software."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NO",
"Recovery": "USER",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "AMBER"
}
}
]
},
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-73"
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2025-0124",
"source": "psirt@paloaltonetworks.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-0125",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2025-04-11T02:15:18.820",
"lastModified": "2025-04-11T02:15:18.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS\u00ae software enables a malicious authenticated read-write administrator to impersonate another legitimate authenticated PAN-OS administrator.\n\n\nThe attacker must have network access to the management web interface to exploit this issue. You greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\nThis issue does not affect Cloud NGFW and all Prisma\u00ae Access instances."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:C/RE:M/U:Amber",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NEGLIGIBLE",
"Automatable": "NO",
"Recovery": "USER",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "AMBER"
}
}
]
},
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-83"
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2025-0125",
"source": "psirt@paloaltonetworks.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-0126",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2025-04-11T02:15:18.970",
"lastModified": "2025-04-11T02:15:18.970",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When configured using SAML, a session fixation vulnerability in the GlobalProtect\u2122 login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker.\n\nThe SAML login for the PAN-OS\u00ae management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma\u00ae Access instances are proactively patched."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NO",
"Recovery": "USER",
"valueDensity": "DIFFUSE",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "AMBER"
}
}
]
},
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-384"
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2025-0126",
"source": "psirt@paloaltonetworks.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-0127",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2025-04-11T02:15:19.120",
"lastModified": "2025-04-11T02:15:19.120",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A command injection vulnerability in Palo Alto Networks PAN-OS\u00ae software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. This issue is only applicable to PAN-OS VM-Series. This issue does not affect firewalls that are already deployed.\n\nCloud NGFW and Prisma\u00ae Access are not affected by this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NO",
"Recovery": "USER",
"valueDensity": "DIFFUSE",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "AMBER"
}
}
]
},
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2025-0127",
"source": "psirt@paloaltonetworks.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-0128",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2025-04-11T02:15:19.253",
"lastModified": "2025-04-11T02:15:19.253",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A denial-of-service (DoS) vulnerability in the Simple Certificate Enrollment Protocol (SCEP) authentication feature of Palo Alto Networks PAN-OS\u00ae software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode.\n\nCloud NGFW is not affected by this vulnerability. Prisma\u00ae Access software is proactively patched and protected from this issue."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:M/U:Amber",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "YES",
"Recovery": "USER",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "AMBER"
}
}
]
},
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2025-0128",
"source": "psirt@paloaltonetworks.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26335",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-04-11T02:15:19.397",
"lastModified": "2025-04-11T02:15:19.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell PowerProtect Cyber Recovery, versions prior to 19.18.0.2, contains an Insertion of Sensitive Information Into Sent Data vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.3,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-201"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000306005/dsa-2025-113-security-update-for-dell-powerprotect-cyber-recovery",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32757",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:13.903",
"lastModified": "2025-04-11T03:15:13.903",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32758",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:14.427",
"lastModified": "2025-04-11T03:15:14.427",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32759",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:14.477",
"lastModified": "2025-04-11T03:15:14.477",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32760",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:14.530",
"lastModified": "2025-04-11T03:15:14.530",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32761",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:14.583",
"lastModified": "2025-04-11T03:15:14.583",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32762",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:14.637",
"lastModified": "2025-04-11T03:15:14.637",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32763",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:14.693",
"lastModified": "2025-04-11T03:15:14.693",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32764",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:14.747",
"lastModified": "2025-04-11T03:15:14.747",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32765",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:14.790",
"lastModified": "2025-04-11T03:15:14.790",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32767",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:14.843",
"lastModified": "2025-04-11T03:15:14.843",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32768",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:14.893",
"lastModified": "2025-04-11T03:15:14.893",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32769",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:14.943",
"lastModified": "2025-04-11T03:15:14.943",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32770",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:14.993",
"lastModified": "2025-04-11T03:15:14.993",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32771",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:15.047",
"lastModified": "2025-04-11T03:15:15.047",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32772",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:15.100",
"lastModified": "2025-04-11T03:15:15.100",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32773",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:15.153",
"lastModified": "2025-04-11T03:15:15.153",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32774",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:15.200",
"lastModified": "2025-04-11T03:15:15.200",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-32775",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-04-11T03:15:15.250",
"lastModified": "2025-04-11T03:15:15.250",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -2,9 +2,16 @@
"id": "CVE-2025-32808",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-11T01:15:55.097",
"lastModified": "2025-04-11T01:15:55.097",
"lastModified": "2025-04-11T02:15:19.540",
"vulnStatus": "Received",
"cveTags": [],
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"exclusively-hosted-service"
]
}
],
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,16 @@
"id": "CVE-2025-32809",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-11T01:15:55.453",
"lastModified": "2025-04-11T01:15:55.453",
"lastModified": "2025-04-11T02:15:19.667",
"vulnStatus": "Received",
"cveTags": [],
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"exclusively-hosted-service"
]
}
],
"descriptions": [
{
"lang": "en",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-11T02:02:18.808242+00:00
2025-04-11T04:00:20.361870+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-11T01:15:55.453000+00:00
2025-04-11T03:15:15.250000+00:00
```
### Last Data Feed Release
@ -33,47 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
289561
289589
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `28`
- [CVE-2025-32807](CVE-2025/CVE-2025-328xx/CVE-2025-32807.json) (`2025-04-11T00:15:27.777`)
- [CVE-2025-32808](CVE-2025/CVE-2025-328xx/CVE-2025-32808.json) (`2025-04-11T01:15:55.097`)
- [CVE-2025-32809](CVE-2025/CVE-2025-328xx/CVE-2025-32809.json) (`2025-04-11T01:15:55.453`)
- [CVE-2025-0122](CVE-2025/CVE-2025-01xx/CVE-2025-0122.json) (`2025-04-11T02:15:18.527`)
- [CVE-2025-0124](CVE-2025/CVE-2025-01xx/CVE-2025-0124.json) (`2025-04-11T02:15:18.663`)
- [CVE-2025-0125](CVE-2025/CVE-2025-01xx/CVE-2025-0125.json) (`2025-04-11T02:15:18.820`)
- [CVE-2025-0126](CVE-2025/CVE-2025-01xx/CVE-2025-0126.json) (`2025-04-11T02:15:18.970`)
- [CVE-2025-0127](CVE-2025/CVE-2025-01xx/CVE-2025-0127.json) (`2025-04-11T02:15:19.120`)
- [CVE-2025-0128](CVE-2025/CVE-2025-01xx/CVE-2025-0128.json) (`2025-04-11T02:15:19.253`)
- [CVE-2025-26335](CVE-2025/CVE-2025-263xx/CVE-2025-26335.json) (`2025-04-11T02:15:19.397`)
- [CVE-2025-32757](CVE-2025/CVE-2025-327xx/CVE-2025-32757.json) (`2025-04-11T03:15:13.903`)
- [CVE-2025-32758](CVE-2025/CVE-2025-327xx/CVE-2025-32758.json) (`2025-04-11T03:15:14.427`)
- [CVE-2025-32759](CVE-2025/CVE-2025-327xx/CVE-2025-32759.json) (`2025-04-11T03:15:14.477`)
- [CVE-2025-32760](CVE-2025/CVE-2025-327xx/CVE-2025-32760.json) (`2025-04-11T03:15:14.530`)
- [CVE-2025-32761](CVE-2025/CVE-2025-327xx/CVE-2025-32761.json) (`2025-04-11T03:15:14.583`)
- [CVE-2025-32762](CVE-2025/CVE-2025-327xx/CVE-2025-32762.json) (`2025-04-11T03:15:14.637`)
- [CVE-2025-32763](CVE-2025/CVE-2025-327xx/CVE-2025-32763.json) (`2025-04-11T03:15:14.693`)
- [CVE-2025-32764](CVE-2025/CVE-2025-327xx/CVE-2025-32764.json) (`2025-04-11T03:15:14.747`)
- [CVE-2025-32765](CVE-2025/CVE-2025-327xx/CVE-2025-32765.json) (`2025-04-11T03:15:14.790`)
- [CVE-2025-32767](CVE-2025/CVE-2025-327xx/CVE-2025-32767.json) (`2025-04-11T03:15:14.843`)
- [CVE-2025-32768](CVE-2025/CVE-2025-327xx/CVE-2025-32768.json) (`2025-04-11T03:15:14.893`)
- [CVE-2025-32769](CVE-2025/CVE-2025-327xx/CVE-2025-32769.json) (`2025-04-11T03:15:14.943`)
- [CVE-2025-32770](CVE-2025/CVE-2025-327xx/CVE-2025-32770.json) (`2025-04-11T03:15:14.993`)
- [CVE-2025-32771](CVE-2025/CVE-2025-327xx/CVE-2025-32771.json) (`2025-04-11T03:15:15.047`)
- [CVE-2025-32772](CVE-2025/CVE-2025-327xx/CVE-2025-32772.json) (`2025-04-11T03:15:15.100`)
- [CVE-2025-32773](CVE-2025/CVE-2025-327xx/CVE-2025-32773.json) (`2025-04-11T03:15:15.153`)
- [CVE-2025-32774](CVE-2025/CVE-2025-327xx/CVE-2025-32774.json) (`2025-04-11T03:15:15.200`)
- [CVE-2025-32775](CVE-2025/CVE-2025-327xx/CVE-2025-32775.json) (`2025-04-11T03:15:15.250`)
### CVEs modified in the last Commit
Recently modified CVEs: `20001`
Recently modified CVEs: `2`
- [CVE-2014-1870](CVE-2014/CVE-2014-18xx/CVE-2014-1870.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1876](CVE-2014/CVE-2014-18xx/CVE-2014-1876.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1879](CVE-2014/CVE-2014-18xx/CVE-2014-1879.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1903](CVE-2014/CVE-2014-19xx/CVE-2014-1903.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1910](CVE-2014/CVE-2014-19xx/CVE-2014-1910.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1914](CVE-2014/CVE-2014-19xx/CVE-2014-1914.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1915](CVE-2014/CVE-2014-19xx/CVE-2014-1915.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1916](CVE-2014/CVE-2014-19xx/CVE-2014-1916.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1921](CVE-2014/CVE-2014-19xx/CVE-2014-1921.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1930](CVE-2014/CVE-2014-19xx/CVE-2014-1930.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1931](CVE-2014/CVE-2014-19xx/CVE-2014-1931.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1943](CVE-2014/CVE-2014-19xx/CVE-2014-1943.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1948](CVE-2014/CVE-2014-19xx/CVE-2014-1948.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1950](CVE-2014/CVE-2014-19xx/CVE-2014-1950.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1960](CVE-2014/CVE-2014-19xx/CVE-2014-1960.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1961](CVE-2014/CVE-2014-19xx/CVE-2014-1961.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1962](CVE-2014/CVE-2014-19xx/CVE-2014-1962.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1963](CVE-2014/CVE-2014-19xx/CVE-2014-1963.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1964](CVE-2014/CVE-2014-19xx/CVE-2014-1964.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1965](CVE-2014/CVE-2014-19xx/CVE-2014-1965.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-1966](CVE-2014/CVE-2014-19xx/CVE-2014-1966.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-2018](CVE-2014/CVE-2014-20xx/CVE-2014-2018.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-2019](CVE-2014/CVE-2014-20xx/CVE-2014-2019.json) (`2025-04-11T00:51:21.963`)
- [CVE-2014-2020](CVE-2014/CVE-2014-20xx/CVE-2014-2020.json) (`2025-04-11T00:51:21.963`)
- [CVE-2024-50217](CVE-2024/CVE-2024-502xx/CVE-2024-50217.json) (`2025-04-11T01:15:52.283`)
- [CVE-2025-32808](CVE-2025/CVE-2025-328xx/CVE-2025-32808.json) (`2025-04-11T02:15:19.540`)
- [CVE-2025-32809](CVE-2025/CVE-2025-328xx/CVE-2025-32809.json) (`2025-04-11T02:15:19.667`)
## Download and Usage

40036
_state.csv

File diff suppressed because it is too large Load Diff