mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2025-04-13T20:00:19.975493+00:00
This commit is contained in:
parent
01e57441f4
commit
788ceb6651
145
CVE-2025/CVE-2025-35xx/CVE-2025-3538.json
Normal file
145
CVE-2025/CVE-2025-35xx/CVE-2025-3538.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-3538",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-13T19:15:14.627",
|
||||
"lastModified": "2025-04-13T19:15:14.627",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been rated as critical. This issue affects the function auth_asp of the file /auth.asp of the component jhttpd. The manipulation of the argument callback leads to stack-based buffer overflow. The attack needs to be approached within the local network. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
|
||||
"baseScore": 8.3,
|
||||
"accessVector": "ADJACENT_NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 6.5,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Fizz-L/CVE1/blob/main/DI-8100Command%20execution2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.304577",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.304577",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.524224",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
13
README.md
13
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-13T18:00:20.120095+00:00
|
||||
2025-04-13T20:00:19.975493+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-13T17:15:14.497000+00:00
|
||||
2025-04-13T19:15:14.627000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,21 +33,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
289728
|
||||
289729
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
- [CVE-2025-3538](CVE-2025/CVE-2025-35xx/CVE-2025-3538.json) (`2025-04-13T19:15:14.627`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2024-56406](CVE-2024/CVE-2024-564xx/CVE-2024-56406.json) (`2025-04-13T17:15:14.340`)
|
||||
- [CVE-2024-6531](CVE-2024/CVE-2024-65xx/CVE-2024-6531.json) (`2025-04-13T17:15:14.497`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
@ -276248,7 +276248,7 @@ CVE-2024-5638,0,0,4a64496852c4ee147220588b5d1940917ce749a1b3dd56d16a77a8cf3ed54b
|
||||
CVE-2024-5639,0,0,78123d59d6ff1062d5cdcc1456c84b89eb240e57bd822aee818d4edc5bb804e5,2024-11-21T09:48:04.290000
|
||||
CVE-2024-5640,0,0,01c62801966d56f9308a985efd017779bd36dfe950ad675d920936fb65a56c1f,2024-11-21T09:48:04.440000
|
||||
CVE-2024-56404,0,0,0922979315c1e629cdb1fe6a847df3905e5c41f9b68e7cd17dbd9ff65fcb7683,2025-01-24T18:15:31.883000
|
||||
CVE-2024-56406,0,1,9ccebb52f22956df286c65e2c2c2b042f1820d2b1cc755310a97140782c986d9,2025-04-13T17:15:14.340000
|
||||
CVE-2024-56406,0,0,9ccebb52f22956df286c65e2c2c2b042f1820d2b1cc755310a97140782c986d9,2025-04-13T17:15:14.340000
|
||||
CVE-2024-56408,0,0,afea4ec88a0c4f08d13a60e8ad60ee434ed5e10f4d4e8338b1f856c6e34cc00b,2025-01-03T19:15:12.533000
|
||||
CVE-2024-56409,0,0,a43aa805ff701655a22fb4deb11b925e5e1108fad53ac1562d0e2d49e92fea52,2025-01-03T19:15:12.627000
|
||||
CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000
|
||||
@ -278043,7 +278043,7 @@ CVE-2024-6527,0,0,1c902d3e69979da0072c97f0f6158ef63ac37ab276d356162e4237f6cd7f29
|
||||
CVE-2024-6528,0,0,e9156787d27dd4fdfba6d50ea03aa667bd17ded1c421119f0c1fa761de458d59,2024-11-21T09:49:48.730000
|
||||
CVE-2024-6529,0,0,ed46f22dca2f91d6161013b687689db7749496f0bca222bee710b6a195277196,2025-04-10T13:49:49.100000
|
||||
CVE-2024-6530,0,0,16bc13dd377f9278a655d2630ff198bda3220080ee66519b965bf3c0166dea1f,2024-10-16T16:53:08.487000
|
||||
CVE-2024-6531,0,1,1ea0d73a3077a66922404938d743081022e58fc7a8d5eaf5f7b69fbe5323ccb6,2025-04-13T17:15:14.497000
|
||||
CVE-2024-6531,0,0,1ea0d73a3077a66922404938d743081022e58fc7a8d5eaf5f7b69fbe5323ccb6,2025-04-13T17:15:14.497000
|
||||
CVE-2024-6532,0,0,2407b42018f3da2cafc970b52c1c77bde3fd6e6365e373370fa37b28b396b346,2024-08-14T13:00:37.107000
|
||||
CVE-2024-6533,0,0,46cc3e18f97fea63af187d8ee8a858656681df510db22100693a4acc025acf0c,2024-08-19T18:13:59.457000
|
||||
CVE-2024-6534,0,0,fee5cbdaffddfb85a58c5c6ac217194b7470a5751dc745f2394460e6da4103af,2024-08-19T18:17:15.110000
|
||||
@ -289727,3 +289727,4 @@ CVE-2025-3534,0,0,20343b4b05d17c17be3f7d93c0ea65769ab86b9e28ec78891f5e5aa199e5d8
|
||||
CVE-2025-3535,0,0,20a3ab890af5959bf399c00bc41734d4f07ba7d64b047586ccdbd8634b49ac47,2025-04-13T11:15:14.723000
|
||||
CVE-2025-3536,0,0,c31a1de3f48e2866d4013a055bf24fbc581deec3e1b5ce4c5cee10d21ff0252b,2025-04-13T12:15:15.533000
|
||||
CVE-2025-3537,0,0,036a9583ee863638698f20206157a90f24c493477fea72757dbca396641cb56c,2025-04-13T12:15:15.713000
|
||||
CVE-2025-3538,1,1,965e3e3c9608f47ae82eae57bfb1ec21dc96c297aef789371b8e7c11341398fa,2025-04-13T19:15:14.627000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user