diff --git a/CVE-2022/CVE-2022-383xx/CVE-2022-38371.json b/CVE-2022/CVE-2022-383xx/CVE-2022-38371.json index f673ee2b951..f710be3076f 100644 --- a/CVE-2022/CVE-2022-383xx/CVE-2022-38371.json +++ b/CVE-2022/CVE-2022-383xx/CVE-2022-38371.json @@ -2,13 +2,13 @@ "id": "CVE-2022-38371", "sourceIdentifier": "productcert@siemens.com", "published": "2022-10-11T11:15:10.297", - "lastModified": "2024-11-21T07:16:20.410", + "lastModified": "2025-04-08T09:15:15.900", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.7), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.21), APOGEE PXC Modular (BACnet) (All versions < V3.5.7), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.21), Desigo PXC00-E.D (All versions >= V2.3), Desigo PXC00-U (All versions >= V2.3), Desigo PXC001-E.D (All versions >= V2.3), Desigo PXC100-E.D (All versions >= V2.3), Desigo PXC12-E.D (All versions >= V2.3), Desigo PXC128-U (All versions >= V2.3), Desigo PXC200-E.D (All versions >= V2.3), Desigo PXC22-E.D (All versions >= V2.3), Desigo PXC22.1-E.D (All versions >= V2.3), Desigo PXC36.1-E.D (All versions >= V2.3), Desigo PXC50-E.D (All versions >= V2.3), Desigo PXC64-U (All versions >= V2.3), Desigo PXM20-E (All versions >= V2.3), Nucleus NET for Nucleus PLUS V1 (All versions < V5.2a), Nucleus NET for Nucleus PLUS V2 (All versions < V5.4), Nucleus ReadyStart V3 V2012 (All versions < V2012.08.1), Nucleus ReadyStart V3 V2017 (All versions < V2017.02.4), Nucleus Source Code (All versions including affected FTP server), TALON TC Compact (BACnet) (All versions < V3.5.7), TALON TC Modular (BACnet) (All versions < V3.5.7). The FTP server does not properly release memory resources that were reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial of service condition on devices that incorporate a vulnerable version of the FTP server." + "value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.7), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.21), APOGEE PXC Modular (BACnet) (All versions < V3.5.7), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.21), Desigo PXC00-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC00-U (All versions >= V2.3 < V6.30.37), Desigo PXC001-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC100-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC12-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC128-U (All versions >= V2.3 < V6.30.37), Desigo PXC200-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC22-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC22.1-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC36.1-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC50-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC64-U (All versions >= V2.3 < V6.30.37), Desigo PXM20-E (All versions >= V2.3 < V6.30.37), Nucleus NET for Nucleus PLUS V1 (All versions < V5.2a), Nucleus NET for Nucleus PLUS V2 (All versions < V5.4), Nucleus ReadyStart V3 V2012 (All versions < V2012.08.1), Nucleus ReadyStart V3 V2017 (All versions < V2017.02.4), Nucleus Source Code (All versions including affected FTP server), TALON TC Compact (BACnet) (All versions < V3.5.7), TALON TC Modular (BACnet) (All versions < V3.5.7). The FTP server does not properly release memory resources that were reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial of service condition on devices that incorporate a vulnerable version of the FTP server." }, { "lang": "es", @@ -16,6 +16,50 @@ } ], "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], "cvssMetricV31": [ { "source": "productcert@siemens.com", @@ -62,7 +106,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23814.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23814.json index 103f87fceb5..fbf160b67f5 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23814.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23814.json @@ -2,13 +2,13 @@ "id": "CVE-2024-23814", "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:12.430", - "lastModified": "2025-02-11T11:15:12.430", + "lastModified": "2025-04-08T09:15:17.187", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). The integrated ICMP service of the network stack of affected devices can be forced to exhaust its available memory resources when receiving specially crafted messages targeting IP fragment re-assembly. This could allow an unauthenticated remote attacker to cause a temporary denial of service condition of the ICMP service, other communication services are not affected. Affected devices will resume normal operation after the attack terminates." + "value": "The integrated ICMP service of the network stack of affected devices can be forced to exhaust its available memory resources when receiving specially crafted messages targeting IP fragment re-assembly. This could allow an unauthenticated remote attacker to cause a temporary denial of service condition of the ICMP service, other communication services are not affected. Affected devices will resume normal operation after the attack terminates." }, { "lang": "es", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -96,6 +96,10 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-725549.html", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-769027.html", "source": "productcert@siemens.com" diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41788.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41788.json new file mode 100644 index 00000000000..f8a42141118 --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41788.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-41788", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-04-08T09:15:17.820", + "lastModified": "2025-04-08T09:15:17.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the input parameters in specific GET requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-187636.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41789.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41789.json new file mode 100644 index 00000000000..794d8b88994 --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41789.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-41789", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-04-08T09:15:18.150", + "lastModified": "2025-04-08T09:15:18.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the language parameter in specific POST requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-187636.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41790.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41790.json new file mode 100644 index 00000000000..db4d55a59b7 --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41790.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-41790", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-04-08T09:15:18.590", + "lastModified": "2025-04-08T09:15:18.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the region parameter in specific POST requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-187636.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41791.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41791.json new file mode 100644 index 00000000000..65d89b856e9 --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41791.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-41791", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-04-08T09:15:18.790", + "lastModified": "2025-04-08T09:15:18.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not authenticate report creation requests. This could allow an unauthenticated remote attacker to read or clear the log files on the device, reset the device or set the date and time." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-187636.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41792.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41792.json new file mode 100644 index 00000000000..32c75c8e242 --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41792.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-41792", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-04-08T09:15:19.257", + "lastModified": "2025-04-08T09:15:19.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices contains a path traversal vulnerability. This could allow an unauthenticated attacker it to access arbitrary files on the device with root privileges." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.2, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-187636.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41793.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41793.json new file mode 100644 index 00000000000..aa4dfef209f --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41793.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-41793", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-04-08T09:15:19.563", + "lastModified": "2025-04-08T09:15:19.563", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices provides an endpoint that allows to enable the ssh service without authentication. This could allow an unauthenticated remote attacker to enable remote access to the device via ssh." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-187636.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41794.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41794.json new file mode 100644 index 00000000000..e6875dcab35 --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41794.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-41794", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-04-08T09:15:20.010", + "lastModified": "2025-04-08T09:15:20.010", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Affected devices contain hardcoded credentials for remote access to the device operating system with root privileges. This could allow unauthenticated remote attackers to gain full access to a device, if they are in possession of these credentials and if the ssh service is enabled (e.g., by exploitation of CVE-2024-41793)." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-187636.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41795.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41795.json new file mode 100644 index 00000000000..12df559e5a7 --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41795.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-41795", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-04-08T09:15:20.350", + "lastModified": "2025-04-08T09:15:20.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices is vulnerable to Cross-Site Request Forgery (CSRF) attacks. This could allow an unauthenticated attacker to change arbitrary device settings by tricking a legitimate device administrator to click on a malicious link." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-187636.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41796.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41796.json new file mode 100644 index 00000000000..039ead7646f --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41796.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-41796", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-04-08T09:15:20.813", + "lastModified": "2025-04-08T09:15:20.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices allows to change the login password without knowing the current password. In combination with a prepared CSRF attack (CVE-2024-41795) an unauthenticated attacker could be able to set the password to an attacker-controlled value." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-620" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-187636.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54015.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54015.json index fc507b3d725..90abd36e1cb 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54015.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54015.json @@ -2,13 +2,13 @@ "id": "CVE-2024-54015", "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:15.227", - "lastModified": "2025-03-11T10:15:15.450", + "lastModified": "2025-04-08T09:15:22.550", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.90), SIPROTEC 5 6MD85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 6MD86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 6MD89 (CP300) (All versions >= V8.80 < V9.68), SIPROTEC 5 6MU85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7KE85 (CP300) (All versions >= V8.80), SIPROTEC 5 7SA82 (CP150) (All versions < V9.90), SIPROTEC 5 7SA86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SA87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SD82 (CP150) (All versions < V9.90), SIPROTEC 5 7SD86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SD87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SJ86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SK82 (CP150) (All versions < V9.90), SIPROTEC 5 7SK85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SL82 (CP150) (All versions < V9.90), SIPROTEC 5 7SL86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SL87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SS85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7ST85 (CP300) (All versions >= V8.80 < V9.68), SIPROTEC 5 7ST86 (CP300) (All versions), SIPROTEC 5 7SX82 (CP150) (All versions < V9.90), SIPROTEC 5 7SX85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SY82 (CP150) (All versions < V9.90), SIPROTEC 5 7UM85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT82 (CP150) (All versions < V9.90), SIPROTEC 5 7UT85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VE85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VK87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VU85 (CP300) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.2) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 2) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions >= V8.80 < V9.90), SIPROTEC 5 Compact 7SX800 (CP050) (All versions >= V9.50 < V9.90). Affected devices do not properly validate SNMP GET requests. This could allow an unauthenticated, remote attacker to retrieve sensitive information of the affected devices with SNMPv2 GET requests using default credentials." + "value": "A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.90), SIPROTEC 5 6MD85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 6MD86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 6MD89 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 6MU85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7KE85 (CP300) (All versions >= V8.80), SIPROTEC 5 7SA82 (CP150) (All versions < V9.90), SIPROTEC 5 7SA86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SA87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SD82 (CP150) (All versions < V9.90), SIPROTEC 5 7SD86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SD87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SJ86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SK82 (CP150) (All versions < V9.90), SIPROTEC 5 7SK85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SL82 (CP150) (All versions < V9.90), SIPROTEC 5 7SL86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SL87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SS85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7ST85 (CP300) (All versions >= V8.80 < V9.68), SIPROTEC 5 7ST86 (CP300) (All versions), SIPROTEC 5 7SX82 (CP150) (All versions < V9.90), SIPROTEC 5 7SX85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SY82 (CP150) (All versions < V9.90), SIPROTEC 5 7UM85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT82 (CP150) (All versions < V9.90), SIPROTEC 5 7UT85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VE85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VK87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VU85 (CP300) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.2) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 2) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions >= V8.80 < V9.90), SIPROTEC 5 Compact 7SX800 (CP050) (All versions >= V9.50 < V9.90). Affected devices do not properly validate SNMP GET requests. This could allow an unauthenticated, remote attacker to retrieve sensitive information of the affected devices with SNMPv2 GET requests using default credentials." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54091.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54091.json index 7cf0877b2e9..f849f6141b6 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54091.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54091.json @@ -2,13 +2,13 @@ "id": "CVE-2024-54091", "sourceIdentifier": "productcert@siemens.com", "published": "2024-12-10T14:30:47.193", - "lastModified": "2024-12-12T14:15:22.953", + "lastModified": "2025-04-08T09:15:22.763", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in Parasolid V36.1 (All versions < V36.1.225), Parasolid V37.0 (All versions < V37.0.173). The affected application contains an out of bounds write past the end of an allocated buffer while parsing X_T data or a specially crafted file in X_T format.\r\nThis could allow an attacker to execute code in the context of the current process." + "value": "A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 12), Solid Edge SE2025 (All versions < V225.0 Update 3). The affected application contains an out of bounds write past the end of an allocated buffer while parsing X_T data or a specially crafted file in X_T format.\r\nThis could allow an attacker to execute code in the context of the current process." }, { "lang": "es", @@ -96,6 +96,10 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-672923.html", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-979056.html", "source": "productcert@siemens.com" diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54092.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54092.json new file mode 100644 index 00000000000..9202c2694d8 --- /dev/null +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54092.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2024-54092", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-04-08T09:15:23.320", + "lastModified": "2025-04-08T09:15:23.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Industrial Edge Device Kit - arm64 V1.17 (All versions), Industrial Edge Device Kit - arm64 V1.18 (All versions), Industrial Edge Device Kit - arm64 V1.19 (All versions), Industrial Edge Device Kit - arm64 V1.20 (All versions < V1.20.2-1), Industrial Edge Device Kit - arm64 V1.21 (All versions < V1.21.1-1), Industrial Edge Device Kit - x86-64 V1.17 (All versions), Industrial Edge Device Kit - x86-64 V1.18 (All versions), Industrial Edge Device Kit - x86-64 V1.19 (All versions), Industrial Edge Device Kit - x86-64 V1.20 (All versions < V1.20.2-1), Industrial Edge Device Kit - x86-64 V1.21 (All versions < V1.21.1-1), Industrial Edge Own Device (IEOD) (All versions < V1.21.1-1-a), Industrial Edge Virtual Device (All versions < V1.21.1-1-a), SCALANCE LPE9413 (6GK5998-3GS01-2AC2) (All versions), SIMATIC IPC BX-39A Industrial Edge Device (All versions < V3.0), SIMATIC IPC BX-59A Industrial Edge Device (All versions < V3.0), SIMATIC IPC127E Industrial Edge Device (All versions < V3.0), SIMATIC IPC227E Industrial Edge Device (All versions < V3.0), SIMATIC IPC427E Industrial Edge Device (All versions < V3.0), SIMATIC IPC847E Industrial Edge Device (All versions < V3.0). Affected devices do not properly enforce user authentication on specific API endpoints when identity federation is used. This could facilitate an unauthenticated remote attacker to circumvent authentication and impersonate a legitimate user. Successful exploitation requires that identity federation is currently or has previously been used and the attacker has learned the identity of a legitimate user." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1390" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-634640.html", + "source": "productcert@siemens.com" + }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-819629.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56830.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56830.json index c565f0b4a14..36103543436 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56830.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56830.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56830", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-02T05:15:07.967", - "lastModified": "2025-01-02T05:15:07.967", + "lastModified": "2025-04-08T09:15:23.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,10 @@ { "url": "https://metacpan.org/release/MNAGUIB/EasyTCP-0.26/changes", "source": "cve@mitre.org" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2025/04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0927.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0927.json index a5fbed3d79e..8ddb7bf74f2 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0927.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0927.json @@ -2,91 +2,15 @@ "id": "CVE-2025-0927", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-23T15:15:12.537", - "lastModified": "2025-03-31T15:15:43.270", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T08:15:14.863", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been found:\n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \nA heap overflow in the hfs and hfsplus filesystems can happen if a user mounts a manually crafted filesystem.\n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \nAt this point in time, it is not fixed in any released kernel version, this is a stop-gap report to notify that kernel.org is now the owner of this CVE id. \u00a0 \u00a0 \n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \nThe Linux kernel CVE team has been assigned CVE-2025-0927 as it was incorrectly created by a different CNA that really should have known better to not have done this.to this issue." - }, - { - "lang": "es", - "value": "Attila Sz\u00e1sz descubri\u00f3 que la implementaci\u00f3n del sistema de archivos HFS+ en el kernel de Linux conten\u00eda una vulnerabilidad de desbordamiento de pila. Un atacante podr\u00eda usar una imagen del sistema de archivos especialmente manipulada que, al montarse, podr\u00eda causar una denegaci\u00f3n de servicio (fallo del sistema) o posiblemente ejecutar c\u00f3digo arbitrario." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Filesystem bugs due to corrupt images are not considered a CVE for any filesystem that is only mountable by CAP_SYS_ADMIN in the initial user namespace. That includes delegated mounting." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "security@ubuntu.com", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 7.8, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 8.8, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 2.8, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "security@ubuntu.com", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-787" - } - ] - } - ], - "references": [ - { - "url": "https://www.kernel.org/", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://ssd-disclosure.com/ssd-advisory-linux-kernel-hfsplus-slab-out-of-bounds-write/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" - }, - { - "url": "https://ubuntu.com/security/CVE-2025-0927", - "source": "security@ubuntu.com" - }, - { - "url": "https://ubuntu.com/security/notices/USN-7276-1", - "source": "security@ubuntu.com" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22008.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22008.json new file mode 100644 index 00000000000..3a97dd6b9cf --- /dev/null +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22008.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-22008", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-04-08T09:15:24.157", + "lastModified": "2025-04-08T09:15:24.157", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: check that dummy regulator has been probed before using it\n\nDue to asynchronous driver probing there is a chance that the dummy\nregulator hasn't already been probed when first accessing it." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/21e3fdf3146f9c63888d6bfabbd553434a5fb93f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/270fe5c090f62dfce1cad0f5053e4827a6f50df4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/2c7a50bec4958f1d1c84d19cde518d0e96a676fd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/998b1aae22dca87da392ea35f089406cbef6032d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a99f1254b11eaadd0794b74a8178bad92ab01cae", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22009.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22009.json new file mode 100644 index 00000000000..123c421dd0d --- /dev/null +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22009.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-22009", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-04-08T09:15:24.460", + "lastModified": "2025-04-08T09:15:24.460", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: dummy: force synchronous probing\n\nSometimes I get a NULL pointer dereference at boot time in kobject_get()\nwith the following call stack:\n\nanatop_regulator_probe()\n devm_regulator_register()\n regulator_register()\n regulator_resolve_supply()\n kobject_get()\n\nBy placing some extra BUG_ON() statements I could verify that this is\nraised because probing of the 'dummy' regulator driver is not completed\n('dummy_regulator_rdev' is still NULL).\n\nIn the JTAG debugger I can see that dummy_regulator_probe() and\nanatop_regulator_probe() can be run by different kernel threads\n(kworker/u4:*). I haven't further investigated whether this can be\nchanged or if there are other possibilities to force synchronization\nbetween these two probe routines. On the other hand I don't expect much\nboot time penalty by probing the 'dummy' regulator synchronously." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/5ade367b56c3947c990598df92395ce737bee872", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8619909b38eeebd3e60910158d7d68441fc954e9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d3b83a1442a09b145006eb4294b1a963c5345c9c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e26f24ca4fb940b15e092796c5993142a2558bd9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22010.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22010.json new file mode 100644 index 00000000000..859781220c2 --- /dev/null +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22010.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-22010", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-04-08T09:15:24.777", + "lastModified": "2025-04-08T09:15:24.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix soft lockup during bt pages loop\n\nDriver runs a for-loop when allocating bt pages and mapping them with\nbuffer pages. When a large buffer (e.g. MR over 100GB) is being allocated,\nit may require a considerable loop count. This will lead to soft lockup:\n\n watchdog: BUG: soft lockup - CPU#27 stuck for 22s!\n ...\n Call trace:\n hem_list_alloc_mid_bt+0x124/0x394 [hns_roce_hw_v2]\n hns_roce_hem_list_request+0xf8/0x160 [hns_roce_hw_v2]\n hns_roce_mtr_create+0x2e4/0x360 [hns_roce_hw_v2]\n alloc_mr_pbl+0xd4/0x17c [hns_roce_hw_v2]\n hns_roce_reg_user_mr+0xf8/0x190 [hns_roce_hw_v2]\n ib_uverbs_reg_mr+0x118/0x290\n\n watchdog: BUG: soft lockup - CPU#35 stuck for 23s!\n ...\n Call trace:\n hns_roce_hem_list_find_mtt+0x7c/0xb0 [hns_roce_hw_v2]\n mtr_map_bufs+0xc4/0x204 [hns_roce_hw_v2]\n hns_roce_mtr_create+0x31c/0x3c4 [hns_roce_hw_v2]\n alloc_mr_pbl+0xb0/0x160 [hns_roce_hw_v2]\n hns_roce_reg_user_mr+0x108/0x1c0 [hns_roce_hw_v2]\n ib_uverbs_reg_mr+0x120/0x2bc\n\nAdd a cond_resched() to fix soft lockup during these loops. In order not\nto affect the allocation performance of normal-size buffer, set the loop\ncount of a 100GB MR as the threshold to call cond_resched()." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/13a52f6c9ff99f7d88f81da535cb4e85eade662b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/25655580136de59ec89f09089dd28008ea440fc9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/4104b0023ff66b5df900d23dbf38310893deca79", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/975355faba56c0751292ed15a90c3e2c7dc0aad6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9ab20fec7a1ce3057ad86afd27bfd08420b7cd11", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22011.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22011.json new file mode 100644 index 00000000000..3ad45b30798 --- /dev/null +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22011.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-22011", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-04-08T09:15:25.020", + "lastModified": "2025-04-08T09:15:25.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: dts: bcm2711: Fix xHCI power-domain\n\nDuring s2idle tests on the Raspberry CM4 the VPU firmware always crashes\non xHCI power-domain resume:\n\nroot@raspberrypi:/sys/power# echo freeze > state\n[ 70.724347] xhci_suspend finished\n[ 70.727730] xhci_plat_suspend finished\n[ 70.755624] bcm2835-power bcm2835-power: Power grafx off\n[ 70.761127] USB: Set power to 0\n\n[ 74.653040] USB: Failed to set power to 1 (-110)\n\nThis seems to be caused because of the mixed usage of\nraspberrypi-power and bcm2835-power at the same time. So avoid\nthe usage of the VPU firmware power-domain driver, which\nprevents the VPU crash." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/393947e06867923d4c2be380d46efd03407a8ce2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b8a47aa0b3df701d0fc41b3caf78d00571776be0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f44fa354a0715577ca32b085f6f60bcf32c748dd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22012.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22012.json new file mode 100644 index 00000000000..01b388149a9 --- /dev/null +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22012.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-22012", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-04-08T09:15:25.420", + "lastModified": "2025-04-08T09:15:25.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"arm64: dts: qcom: sdm845: Affirm IDR0.CCTW on apps_smmu\"\n\nThere are reports that the pagetable walker cache coherency is not a\ngiven across the spectrum of SDM845/850 devices, leading to lock-ups\nand resets. It works fine on some devices (like the Dragonboard 845c,\nbut not so much on the Lenovo Yoga C630).\n\nThis unfortunately looks like a fluke in firmware development, where\nlikely somewhere in the vast hypervisor stack, a change to accommodate\nfor this was only introduced after the initial software release (which\noften serves as a baseline for products).\n\nRevert the change to avoid additional guesswork around crashes.\n\nThis reverts commit 6b31a9744b8726c69bb0af290f8475a368a4b805." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/9e6e9fc90258a318d30b417bcccda908bb82ee9d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f00db31d235946853fb430de8c6aa1295efc8353", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22013.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22013.json new file mode 100644 index 00000000000..b0f418cd223 --- /dev/null +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22013.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-22013", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-04-08T09:15:25.643", + "lastModified": "2025-04-08T09:15:25.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state\n\nThere are several problems with the way hyp code lazily saves the host's\nFPSIMD/SVE state, including:\n\n* Host SVE being discarded unexpectedly due to inconsistent\n configuration of TIF_SVE and CPACR_ELx.ZEN. This has been seen to\n result in QEMU crashes where SVE is used by memmove(), as reported by\n Eric Auger:\n\n https://issues.redhat.com/browse/RHEL-68997\n\n* Host SVE state is discarded *after* modification by ptrace, which was an\n unintentional ptrace ABI change introduced with lazy discarding of SVE state.\n\n* The host FPMR value can be discarded when running a non-protected VM,\n where FPMR support is not exposed to a VM, and that VM uses\n FPSIMD/SVE. In these cases the hyp code does not save the host's FPMR\n before unbinding the host's FPSIMD/SVE/SME state, leaving a stale\n value in memory.\n\nAvoid these by eagerly saving and \"flushing\" the host's FPSIMD/SVE/SME\nstate when loading a vCPU such that KVM does not need to save any of the\nhost's FPSIMD/SVE/SME state. For clarity, fpsimd_kvm_prepare() is\nremoved and the necessary call to fpsimd_save_and_flush_cpu_state() is\nplaced in kvm_arch_vcpu_load_fp(). As 'fpsimd_state' and 'fpmr_ptr'\nshould not be used, they are set to NULL; all uses of these will be\nremoved in subsequent patches.\n\nHistorical problems go back at least as far as v5.17, e.g. erroneous\nassumptions about TIF_SVE being clear in commit:\n\n 8383741ab2e773a9 (\"KVM: arm64: Get rid of host SVE tracking/saving\")\n\n... and so this eager save+flush probably needs to be backported to ALL\nstable trees." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/79e140bba70bcacc5fe15bf8c0b958793fd7d56f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/806d5c1e1d2e5502175a24bf70f251648d99c36a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/900b444be493b7f404898c785d6605b177a093d0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fbc7e61195e23f744814e78524b73b59faa54ab4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22014.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22014.json new file mode 100644 index 00000000000..2334f0ffe43 --- /dev/null +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22014.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-22014", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-04-08T09:15:25.783", + "lastModified": "2025-04-08T09:15:25.783", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: pdr: Fix the potential deadlock\n\nWhen some client process A call pdr_add_lookup() to add the look up for\nthe service and does schedule locator work, later a process B got a new\nserver packet indicating locator is up and call pdr_locator_new_server()\nwhich eventually sets pdr->locator_init_complete to true which process A\nsees and takes list lock and queries domain list but it will timeout due\nto deadlock as the response will queued to the same qmi->wq and it is\nordered workqueue and process B is not able to complete new server\nrequest work due to deadlock on list lock.\n\nFix it by removing the unnecessary list iteration as the list iteration\nis already being done inside locator work, so avoid it here and just\ncall schedule_work() here.\n\n Process A Process B\n\n process_scheduled_works()\npdr_add_lookup() qmi_data_ready_work()\n process_scheduled_works() pdr_locator_new_server()\n pdr->locator_init_complete=true;\n pdr_locator_work()\n mutex_lock(&pdr->list_lock);\n\n pdr_locate_service() mutex_lock(&pdr->list_lock);\n\n pdr_get_domain_list()\n pr_err(\"PDR: %s get domain list\n txn wait failed: %d\\n\",\n req->service_name,\n ret);\n\nTimeout error log due to deadlock:\n\n\"\n PDR: tms/servreg get domain list txn wait failed: -110\n PDR: service lookup for msm/adsp/sensor_pd:tms/servreg failed: -110\n\"\n\nThanks to Bjorn and Johan for letting me know that this commit also fixes\nan audio regression when using the in-kernel pd-mapper as that makes it\neasier to hit this race. [1]" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/02612f1e4c34d94d6c8ee75bf7d254ed697e22d4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/0a566a79aca9851fae140536e0fc5b0853c90a90", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/2eeb03ad9f42dfece63051be2400af487ddb96d2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f2bbfd50e95bc117360f0f59e629aa03d821ebd6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f4489260f5713c94e1966e5f20445bff262876f4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22015.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22015.json new file mode 100644 index 00000000000..107d8b93b44 --- /dev/null +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22015.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-22015", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-04-08T09:15:26.150", + "lastModified": "2025-04-08T09:15:26.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/migrate: fix shmem xarray update during migration\n\nA shmem folio can be either in page cache or in swap cache, but not at the\nsame time. Namely, once it is in swap cache, folio->mapping should be\nNULL, and the folio is no longer in a shmem mapping.\n\nIn __folio_migrate_mapping(), to determine the number of xarray entries to\nupdate, folio_test_swapbacked() is used, but that conflates shmem in page\ncache case and shmem in swap cache case. It leads to xarray multi-index\nentry corruption, since it turns a sibling entry to a normal entry during\nxas_store() (see [1] for a userspace reproduction). Fix it by only using\nfolio_test_swapcache() to determine whether xarray is storing swap cache\nentries or not to choose the right number of xarray entries to update.\n\n[1] https://lore.kernel.org/linux-mm/Z8idPCkaJW1IChjT@casper.infradead.org/\n\nNote:\nIn __split_huge_page(), folio_test_anon() && folio_test_swapcache() is\nused to get swap_cache address space, but that ignores the shmem folio in\nswap cache case. It could lead to NULL pointer dereferencing when a\nin-swap-cache shmem folio is split at __xa_store(), since\n!folio_test_anon() is true and folio->mapping is NULL. But fortunately,\nits caller split_huge_page_to_list_to_order() bails out early with EBUSY\nwhen folio->mapping is NULL. So no need to take care of it here." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/29124ae980e2860f0eec7355949d3d3292ee81da", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/49100c0b070e900f87c8fac3be9b9ef8a30fa673", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/60cf233b585cdf1f3c5e52d1225606b86acd08b0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/75cfb92eb63298d717b6b0118f91ba12c4fcfeb5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c057ee03f751d6cecf7ee64f52f6545d94082aaa", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22016.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22016.json new file mode 100644 index 00000000000..9b5da835b57 --- /dev/null +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22016.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-22016", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-04-08T09:15:26.413", + "lastModified": "2025-04-08T09:15:26.413", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndpll: fix xa_alloc_cyclic() error handling\n\nIn case of returning 1 from xa_alloc_cyclic() (wrapping) ERR_PTR(1) will\nbe returned, which will cause IS_ERR() to be false. Which can lead to\ndereference not allocated pointer (pin).\n\nFix it by checking if err is lower than zero.\n\nThis wasn't found in real usecase, only noticed. Credit to Pierre." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/3614bf90130d60f191a5fe218d04f6251c678e13", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/4d350043be684762e581d9bdd32d543621d01a9c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cb2f8a5c1fd9e7a1fefa23afe20570e16da1ada4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22017.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22017.json new file mode 100644 index 00000000000..105f2782487 --- /dev/null +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22017.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-22017", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-04-08T09:15:26.557", + "lastModified": "2025-04-08T09:15:26.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndevlink: fix xa_alloc_cyclic() error handling\n\nIn case of returning 1 from xa_alloc_cyclic() (wrapping) ERR_PTR(1) will\nbe returned, which will cause IS_ERR() to be false. Which can lead to\ndereference not allocated pointer (rel).\n\nFix it by checking if err is lower than zero.\n\nThis wasn't found in real usecase, only noticed. Credit to Pierre." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/466132f6d28a7e47a82501fe1c46b8f90487412e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f3b97b7d4bf316c3991e5634c9f4847c2df35478", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f8aaa38cfaf6f20afa4db36b6529032fb69165dc", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23186.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23186.json new file mode 100644 index 00000000000..3394b5af087 --- /dev/null +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23186.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-23186", + "sourceIdentifier": "cna@sap.com", + "published": "2025-04-08T08:15:15.133", + "lastModified": "2025-04-08T08:15:15.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In certain conditions, SAP NetWeaver Application Server ABAP allows an authenticated attacker to craft a Remote Function Call (RFC) request to restricted destinations, which can be used to expose credentials for a remote service. These credentials can then be further exploited to completely compromise the remote service, potentially resulting in a significant impact on the confidentiality, integrity, and availability of the application." + }, + { + "lang": "es", + "value": "En ciertas circunstancias, SAP NetWeaver Application Server ABAP permite a un atacante autenticado manipular una solicitud de Remote Function Call (RFC) a destinos restringidos, que puede utilizarse para exponer las credenciales de un servicio remoto. Estas credenciales pueden explotarse posteriormente para comprometer completamente el servicio remoto, lo que podr\u00eda afectar significativamente la confidencialidad, la integridad y la disponibilidad de la aplicaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3554667", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26653.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26653.json new file mode 100644 index 00000000000..5c5621ed9b1 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26653.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-26653", + "sourceIdentifier": "cna@sap.com", + "published": "2025-04-08T08:15:15.710", + "lastModified": "2025-04-08T08:15:15.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP NetWeaver Application Server ABAP does not sufficiently encode user-controlled inputs, leading to Stored Cross-Site Scripting (XSS) vulnerability. This enables an attacker, without requiring any privileges, to inject malicious JavaScript into a website. When a user visits the compromised page, the injected script gets executed, potentially compromising the confidentiality and integrity within the scope of the victim\ufffds browser. Availability is not impacted." + }, + { + "lang": "es", + "value": "SAP NetWeaver Application Server ABAP no codifica adecuadamente las entradas controladas por el usuario, lo que provoca una vulnerabilidad de Cross-Site Scripting (XSS) almacenado. Esto permite a un atacante, sin necesidad de privilegios, inyectar JavaScript malicioso en un sitio web. Cuando un usuario visita la p\u00e1gina comprometida, el script inyectado se ejecuta, lo que podr\u00eda comprometer la confidencialidad e integridad del navegador de la v\u00edctima. La disponibilidad no se ve afectada." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3559307", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26654.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26654.json new file mode 100644 index 00000000000..1f4d37efd11 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26654.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-26654", + "sourceIdentifier": "cna@sap.com", + "published": "2025-04-08T08:15:15.903", + "lastModified": "2025-04-08T08:15:15.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP Commerce Cloud (Public Cloud) does not allow to disable unencrypted HTTP (port 80) entirely, but instead allows a redirect from port 80 to 443 (HTTPS). As a result, Commerce normally communicates securely over HTTPS. However, the confidentiality and integrity of data sent on the first request before the redirect may be impacted if the client is configured to use HTTP and sends confidential data on the first request before the redirect." + }, + { + "lang": "es", + "value": "SAP Commerce Cloud (Nube P\u00fablica) no permite deshabilitar por completo el protocolo HTTP sin cifrar (puerto 80), sino que permite una redirecci\u00f3n del puerto 80 al 443 (HTTPS). Como resultado, Commerce normalmente se comunica de forma segura mediante HTTPS. Sin embargo, la confidencialidad e integridad de los datos enviados en la primera solicitud antes de la redirecci\u00f3n pueden verse afectadas si el cliente est\u00e1 configurado para usar HTTP y env\u00eda datos confidenciales en la primera solicitud antes de la redirecci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3543274", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26657.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26657.json new file mode 100644 index 00000000000..f4c54ee7d32 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26657.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-26657", + "sourceIdentifier": "cna@sap.com", + "published": "2025-04-08T08:15:16.077", + "lastModified": "2025-04-08T08:15:16.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP KMC WPC allows an unauthenticated attacker to remotely retrieve usernames by a simple parameter query which could expose sensitive information causing low impact on confidentiality of the application. This has no effect on integrity and availability." + }, + { + "lang": "es", + "value": "SAP KMC WPC permite que un atacante no autenticado obtenga nombres de usuario de forma remota mediante una simple consulta de par\u00e1metros, lo que podr\u00eda exponer informaci\u00f3n confidencial, con un impacto m\u00ednimo en la confidencialidad de la aplicaci\u00f3n. Esto no afecta la integridad ni la disponibilidad." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3568307", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27428.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27428.json new file mode 100644 index 00000000000..ed5787f37f5 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27428.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-27428", + "sourceIdentifier": "cna@sap.com", + "published": "2025-04-08T08:15:16.230", + "lastModified": "2025-04-08T08:15:16.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Due to directory traversal vulnerability, an authorized attacker could gain access to some critical information by using RFC enabled function module. Upon successful exploitation, they could read files from any managed system connected to SAP Solution Manager, leading to high impact on confidentiality. There is no impact on integrity or availability." + }, + { + "lang": "es", + "value": "Debido a una vulnerabilidad de directory traversal, un atacante autorizado podr\u00eda acceder a informaci\u00f3n cr\u00edtica mediante un m\u00f3dulo de funci\u00f3n habilitado para RFC. Si se explota con \u00e9xito, podr\u00eda leer archivos de cualquier sistema administrado conectado a SAP Solution Manager, lo que afectar\u00eda gravemente la confidencialidad. No se observa impacto alguno en la integridad ni la disponibilidad." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3581811", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27429.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27429.json new file mode 100644 index 00000000000..c308af923c3 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27429.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-27429", + "sourceIdentifier": "cna@sap.com", + "published": "2025-04-08T08:15:16.397", + "lastModified": "2025-04-08T08:15:16.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system." + }, + { + "lang": "es", + "value": "SAP S/4HANA permite a un atacante con privilegios de usuario explotar una vulnerabilidad en el m\u00f3dulo de funci\u00f3n expuesta mediante RFC. Esta falla permite la inyecci\u00f3n de c\u00f3digo ABAP arbitrario en el sistema, omitiendo las comprobaciones de autorizaci\u00f3n esenciales. Esta vulnerabilidad funciona como una puerta trasera, creando el riesgo de comprometer completamente el sistema y socavando su confidencialidad, integridad y disponibilidad." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3581961", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27435.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27435.json new file mode 100644 index 00000000000..3747ffd67e5 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27435.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-27435", + "sourceIdentifier": "cna@sap.com", + "published": "2025-04-08T08:15:16.550", + "lastModified": "2025-04-08T08:15:16.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Under specific conditions and prerequisites, an unauthenticated attacker could access customer coupon codes exposed in the URL parameters of the Coupon Campaign URL in SAP Commerce. This could allow the attacker to use the disclosed coupon code, hence posing a low impact on confidentiality and integrity of the application." + }, + { + "lang": "es", + "value": "Bajo ciertas condiciones y requisitos previos, un atacante no autenticado podr\u00eda acceder a los c\u00f3digos de cup\u00f3n de los clientes expuestos en los par\u00e1metros de la URL de la campa\u00f1a de cupones en SAP Commerce. Esto podr\u00eda permitirle usar el c\u00f3digo de cup\u00f3n revelado, con un impacto m\u00ednimo en la confidencialidad e integridad de la aplicaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3539465", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27437.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27437.json new file mode 100644 index 00000000000..e6d9bf58fae --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27437.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-27437", + "sourceIdentifier": "cna@sap.com", + "published": "2025-04-08T08:15:16.697", + "lastModified": "2025-04-08T08:15:16.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Missing Authorization Check vulnerability exists in the Virus Scanner Interface of SAP NetWeaver Application Server ABAP. Because of this, an attacker authenticated as a non-administrative user can initiate a transaction, allowing them to access but not modify non-sensitive data without further authorization and with no effect on availability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de falta de comprobaci\u00f3n de autorizaci\u00f3n en la interfaz del esc\u00e1ner de virus de SAP NetWeaver Application Server ABAP. Debido a esto, un atacante autenticado como usuario no administrativo puede iniciar una transacci\u00f3n, lo que le permite acceder, pero no modificar, datos no sensibles sin autorizaci\u00f3n adicional y sin afectar la disponibilidad." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3568778", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2882.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2882.json new file mode 100644 index 00000000000..72b67a1ffaf --- /dev/null +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2882.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2025-2882", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-04-08T08:15:16.860", + "lastModified": "2025-04-08T08:15:16.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The GreenPay(tm) by Green.Money plugin for WordPress is vulnerable to Sensitive Information Exposure in versions between 3.0.0 and 3.0.9 through the publicly accessible phpinfo.php script. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed file." + }, + { + "lang": "es", + "value": "El complemento GreenPay\u2122 de Green.Money para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en las versiones 3.0.0 y 3.0.9 a trav\u00e9s del script phpinfo.php, de acceso p\u00fablico. Esto permite que atacantes no autenticados accedan a informaci\u00f3n potencialmente confidencial contenida en el archivo expuesto." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/green-money-payment-gateway/trunk/phpinfo.php", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3267032/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/green-money-payment-gateway/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ed57bb85-d4b5-4c89-a1c7-c3b8a0a5a2ea?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29999.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29999.json new file mode 100644 index 00000000000..91ea9dd8ce4 --- /dev/null +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29999.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-29999", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-04-08T09:15:27.053", + "lastModified": "2025-04-08T09:15:27.053", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Siemens License Server (SLS) (All versions < V4.3). The affected application searches for executable files in the application folder without proper validation.\r\nThis could allow an attacker to execute arbitrary code with administrative privileges by placing a malicious executable in the same directory." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-525431.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30000.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30000.json new file mode 100644 index 00000000000..f729c8a38df --- /dev/null +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30000.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30000", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-04-08T09:15:27.340", + "lastModified": "2025-04-08T09:15:27.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Siemens License Server (SLS) (All versions < V4.3). The affected application does not properly restrict permissions of the users. This could allow a lowly-privileged attacker to escalate their privileges." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-525431.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30013.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30013.json new file mode 100644 index 00000000000..d6664b29f09 --- /dev/null +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30013.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-30013", + "sourceIdentifier": "cna@sap.com", + "published": "2025-04-08T08:15:17.023", + "lastModified": "2025-04-08T08:15:17.023", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP ERP BW Business Content is vulnerable to OS Command Injection through certain function modules. These function modules, when executed with elevated privileges, improperly handle user input, allowing attacker to inject arbitrary OS commands. This vulnerability allows the execution of unintended commands on the underlying system, posing a significant security risk to the confidentiality, integrity and availability of the application." + }, + { + "lang": "es", + "value": "SAP ERP BW Business Content es vulnerable a la inyecci\u00f3n de comandos del sistema operativo a trav\u00e9s de ciertos m\u00f3dulos de funci\u00f3n. Estos m\u00f3dulos, al ejecutarse con privilegios elevados, gestionan incorrectamente la entrada del usuario, lo que permite a un atacante inyectar comandos arbitrarios del sistema operativo. Esta vulnerabilidad permite la ejecuci\u00f3n de comandos no deseados en el sistema subyacente, lo que supone un riesgo de seguridad significativo para la confidencialidad, integridad y disponibilidad de la aplicaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3571093", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30014.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30014.json new file mode 100644 index 00000000000..472df372365 --- /dev/null +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30014.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-30014", + "sourceIdentifier": "cna@sap.com", + "published": "2025-04-08T08:15:17.177", + "lastModified": "2025-04-08T08:15:17.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP Capital Yield Tax Management has directory traversal vulnerability due to insufficient path validation. This could allow an attacker with low privileges to read files from directory which they don\ufffdt have access to, hence causing a high impact on confidentiality. Integrity and Availability are not affected." + }, + { + "lang": "es", + "value": "SAP Capital Yield Tax Management presenta una vulnerabilidad de directory traversal debido a una validaci\u00f3n de ruta insuficiente. Esto podr\u00eda permitir que un atacante con pocos privilegios lea archivos de un directorio al que no tiene acceso, lo que afecta gravemente la confidencialidad. La integridad y la disponibilidad no se ven afectadas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-35" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/2927164", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30015.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30015.json new file mode 100644 index 00000000000..5c75e83f925 --- /dev/null +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30015.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-30015", + "sourceIdentifier": "cna@sap.com", + "published": "2025-04-08T08:15:17.340", + "lastModified": "2025-04-08T08:15:17.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Due to incorrect memory address handling in ABAP SQL of SAP NetWeaver and ABAP Platform (Application Server ABAP), an authenticated attacker with high privileges could execute certain forms of SQL queries leading to manipulation of content in the output variable. This vulnerability has a low impact on the confidentiality, integrity and the availability of the application." + }, + { + "lang": "es", + "value": "Debido a la gesti\u00f3n incorrecta de direcciones de memoria en ABAP SQL de SAP NetWeaver y la plataforma ABAP (Servidor de Aplicaciones ABAP), un atacante autenticado con altos privilegios podr\u00eda ejecutar ciertas consultas SQL, lo que conlleva la manipulaci\u00f3n del contenido de la variable de salida. Esta vulnerabilidad tiene un impacto m\u00ednimo en la confidencialidad, la integridad y la disponibilidad de la aplicaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3565944", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30016.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30016.json new file mode 100644 index 00000000000..5bc56a7db98 --- /dev/null +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30016.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-30016", + "sourceIdentifier": "cna@sap.com", + "published": "2025-04-08T08:15:17.493", + "lastModified": "2025-04-08T08:15:17.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP Financial Consolidation allows an unauthenticated attacker to gain unauthorized access to the Admin account. The vulnerability arises due to improper authentication mechanisms, due to which there is high impact on the Confidentiality, Integrity & Availability of the application." + }, + { + "lang": "es", + "value": "SAP Financial Consolidation permite que un atacante no autenticado obtenga acceso no autorizado a la cuenta de administrador. La vulnerabilidad surge debido a mecanismos de autenticaci\u00f3n inadecuados, lo que afecta gravemente la confidencialidad, la integridad y la disponibilidad de la aplicaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-921" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3572688", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30017.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30017.json new file mode 100644 index 00000000000..4caa53d9954 --- /dev/null +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30017.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-30017", + "sourceIdentifier": "cna@sap.com", + "published": "2025-04-08T08:15:17.650", + "lastModified": "2025-04-08T08:15:17.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Due to a missing authorization check, an authenticated attacker could upload a file as a template for solution documentation in SAP Solution Manager 7.1. After successful exploitation, an attacker can cause limited impact on the integrity and availability of the application." + }, + { + "lang": "es", + "value": "Debido a la falta de una verificaci\u00f3n de autorizaci\u00f3n, un atacante autenticado podr\u00eda cargar un archivo como plantilla para la documentaci\u00f3n de la soluci\u00f3n en SAP Solution Manager 7.1. Tras una explotaci\u00f3n exitosa, un atacante puede tener un impacto limitado en la integridad y disponibilidad de la aplicaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3558864", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30280.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30280.json new file mode 100644 index 00000000000..d7cd7a839a4 --- /dev/null +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30280.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30280", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-04-08T09:15:27.793", + "lastModified": "2025-04-08T09:15:27.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.21.0), Mendix Runtime V10.12 (All versions), Mendix Runtime V10.18 (All versions), Mendix Runtime V10.6 (All versions), Mendix Runtime V8 (All versions), Mendix Runtime V9 (All versions < V9.24.34). Affected applications allow for entity enumeration due to distinguishable responses in certain client actions. This could allow an unauthenticated remote attacker to list all valid entities and attribute names of a Mendix Runtime-based application." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-204" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-874353.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3064.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3064.json new file mode 100644 index 00000000000..3cdcb7b60ff --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3064.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2025-3064", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-04-08T09:15:28.140", + "lastModified": "2025-04-08T09:15:28.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WPFront User Role Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.2.1. This is due to missing or incorrect nonce validation on the whitelist_options() function. This makes it possible for unauthenticated attackers to update the default role option that can be leveraged for privilege escalation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This is only exploitable on multisite instances." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/wpfront-user-role-editor/trunk/includes/users/class-user-profile.php#L104", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wpfront-user-role-editor/trunk/includes/users/class-user-profile.php#L399", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3266542/#file142", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/wpfront-user-role-editor/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/efc7ad9f-714e-474c-87e8-ecbbdfabd550?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31330.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31330.json new file mode 100644 index 00000000000..4d1e084dce4 --- /dev/null +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31330.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-31330", + "sourceIdentifier": "cna@sap.com", + "published": "2025-04-08T08:15:17.800", + "lastModified": "2025-04-08T08:15:17.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP Landscape Transformation (SLT) allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system." + }, + { + "lang": "es", + "value": "SAP Landscape Transformation (SLT) permite a un atacante con privilegios de usuario explotar una vulnerabilidad en el m\u00f3dulo de funci\u00f3n expuesta mediante RFC. Esta falla permite la inyecci\u00f3n de c\u00f3digo ABAP arbitrario en el sistema, omitiendo las comprobaciones de autorizaci\u00f3n esenciales. Esta vulnerabilidad funciona como una puerta trasera, creando el riesgo de comprometer completamente el sistema, socavando su confidencialidad, integridad y disponibilidad." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3587115", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31331.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31331.json new file mode 100644 index 00000000000..45626b0cd79 --- /dev/null +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31331.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-31331", + "sourceIdentifier": "cna@sap.com", + "published": "2025-04-08T08:15:17.977", + "lastModified": "2025-04-08T08:15:17.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP NetWeaver allows an attacker to bypass authorization checks, enabling them to view portions of ABAP code that would normally require additional validation. Once logged into the ABAP system, the attacker can run a specific transaction that exposes sensitive system code without proper authorization. This vulnerability compromises the confidentiality." + }, + { + "lang": "es", + "value": "SAP NetWeaver permite a un atacante eludir las comprobaciones de autorizaci\u00f3n, lo que le permite ver fragmentos de c\u00f3digo ABAP que normalmente requerir\u00edan validaci\u00f3n adicional. Una vez conectado al sistema ABAP, el atacante puede ejecutar una transacci\u00f3n espec\u00edfica que expone c\u00f3digo confidencial del sistema sin la debida autorizaci\u00f3n. Esta vulnerabilidad compromete la confidencialidad." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3577131", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31332.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31332.json new file mode 100644 index 00000000000..033781a5ae8 --- /dev/null +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31332.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-31332", + "sourceIdentifier": "cna@sap.com", + "published": "2025-04-08T08:15:18.130", + "lastModified": "2025-04-08T08:15:18.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Due to insecure file permissions in SAP BusinessObjects Business Intelligence Platform, an attacker who has local access to the system could modify files potentially disrupting operations or cause service downtime hence leading to a high impact on integrity and availability. However, this vulnerability does not disclose any sensitive data." + }, + { + "lang": "es", + "value": "Debido a la falta de seguridad en los permisos de archivo de SAP BusinessObjects Business Intelligence Platform, un atacante con acceso local al sistema podr\u00eda modificar archivos, lo que podr\u00eda interrumpir las operaciones o causar interrupciones del servicio, lo que afectar\u00eda gravemente la integridad y la disponibilidad. Sin embargo, esta vulnerabilidad no revela informaci\u00f3n confidencial." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-277" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3565751", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31333.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31333.json new file mode 100644 index 00000000000..93df938bda5 --- /dev/null +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31333.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-31333", + "sourceIdentifier": "cna@sap.com", + "published": "2025-04-08T08:15:18.287", + "lastModified": "2025-04-08T08:15:18.287", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP S4CORE OData meta-data property is vulnerable to data tampering, due to which entity set could be externally modified by an attacker causing low impact on integrity of the application. Confidentiality and availability is not impacted." + }, + { + "lang": "es", + "value": "La propiedad de metadatos OData de SAP S4CORE es vulnerable a la manipulaci\u00f3n de datos, por lo que un atacante podr\u00eda modificar externamente el conjunto de entidades, lo que tendr\u00eda un impacto m\u00ednimo en la integridad de la aplicaci\u00f3n. La confidencialidad y la disponibilidad no se ven afectadas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-472" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3525971", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3430.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3430.json index a373a31d49a..155fd0b4286 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3430.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3430.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The 3DPrint Lite plugin for WordPress is vulnerable to SQL Injection via the 'printer_text' parameter in all versions up to, and including, 2.1.3.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento 3DPrint Lite para WordPress es vulnerable a la inyecci\u00f3n SQL mediante el par\u00e1metro 'printer_text' en todas las versiones hasta la 2.1.3.6 incluida, debido a un escape insuficiente del par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n de la consulta SQL existente. Esto permite a atacantes no autenticados a\u00f1adir consultas SQL adicionales a las consultas ya existentes, que pueden utilizarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3431.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3431.json new file mode 100644 index 00000000000..fb86e20e961 --- /dev/null +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3431.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-3431", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-04-08T08:15:18.447", + "lastModified": "2025-04-08T08:15:18.447", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The ZoomSounds - WordPress Wave Audio Player with Playlist plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 6.91 via the 'dzsap_download' action. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information." + }, + { + "lang": "es", + "value": "El complemento ZoomSounds - WordPress Wave Audio Player with Playlist para WordPress es vulnerable a la lectura arbitraria de archivos en todas las versiones hasta la 6.91 incluida, mediante la acci\u00f3n 'dzsap_download'. Esto permite a atacantes no autenticados leer el contenido de archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://codecanyon.net/item/zoomsounds-wordpress-wave-audio-player-with-playlist/6181433", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a78998da-1cb1-4991-95a8-a551bde04064?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3432.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3432.json new file mode 100644 index 00000000000..fac6dab82a7 --- /dev/null +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3432.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-3432", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-04-08T09:15:28.630", + "lastModified": "2025-04-08T09:15:28.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The AAWP Obfuscator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'data-aawp-web' parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wordpress.org/plugins/aawp-obfuscator/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/26b1b899-37a2-44fd-b961-5e6175e0417f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3433.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3433.json new file mode 100644 index 00000000000..5b50863ed6a --- /dev/null +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3433.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-3433", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-04-08T09:15:28.943", + "lastModified": "2025-04-08T09:15:28.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Advanced Advertising System plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 1.3.1. This is due to insufficient validation on the redirect url supplied via the 'redir' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/advanced-advertising-system/trunk/shortcode.php#L165", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/72a56589-9dc0-47a7-bb68-e31f84a639ee?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3436.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3436.json new file mode 100644 index 00000000000..576a055d827 --- /dev/null +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3436.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-3436", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-04-08T09:15:29.300", + "lastModified": "2025-04-08T09:15:29.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The coreActivity: Activity Logging for WordPress plugin for WordPress is vulnerable to SQL Injection via the 'order' and 'orderby' parameters in all versions up to, and including, 2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3259839/coreactivity/trunk/core/table/Live.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e1ebbb18-0266-49e8-ada3-b63905021846?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 89d278e291b..3419507342a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-08T08:00:20.558278+00:00 +2025-04-08T10:00:20.441567+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-08T07:15:43.303000+00:00 +2025-04-08T09:15:29.300000+00:00 ``` ### Last Data Feed Release @@ -33,29 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -288961 +289007 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `46` -- [CVE-2019-25223](CVE-2019/CVE-2019-252xx/CVE-2019-25223.json) (`2025-04-08T07:15:42.290`) -- [CVE-2024-47261](CVE-2024/CVE-2024-472xx/CVE-2024-47261.json) (`2025-04-08T06:15:43.053`) -- [CVE-2025-0361](CVE-2025/CVE-2025-03xx/CVE-2025-0361.json) (`2025-04-08T06:15:44.540`) -- [CVE-2025-3412](CVE-2025/CVE-2025-34xx/CVE-2025-3412.json) (`2025-04-08T06:15:44.970`) -- [CVE-2025-3413](CVE-2025/CVE-2025-34xx/CVE-2025-3413.json) (`2025-04-08T06:15:45.333`) -- [CVE-2025-3427](CVE-2025/CVE-2025-34xx/CVE-2025-3427.json) (`2025-04-08T07:15:42.740`) -- [CVE-2025-3428](CVE-2025/CVE-2025-34xx/CVE-2025-3428.json) (`2025-04-08T07:15:42.943`) -- [CVE-2025-3429](CVE-2025/CVE-2025-34xx/CVE-2025-3429.json) (`2025-04-08T07:15:43.120`) -- [CVE-2025-3430](CVE-2025/CVE-2025-34xx/CVE-2025-3430.json) (`2025-04-08T07:15:43.303`) +- [CVE-2025-26653](CVE-2025/CVE-2025-266xx/CVE-2025-26653.json) (`2025-04-08T08:15:15.710`) +- [CVE-2025-26654](CVE-2025/CVE-2025-266xx/CVE-2025-26654.json) (`2025-04-08T08:15:15.903`) +- [CVE-2025-26657](CVE-2025/CVE-2025-266xx/CVE-2025-26657.json) (`2025-04-08T08:15:16.077`) +- [CVE-2025-27428](CVE-2025/CVE-2025-274xx/CVE-2025-27428.json) (`2025-04-08T08:15:16.230`) +- [CVE-2025-27429](CVE-2025/CVE-2025-274xx/CVE-2025-27429.json) (`2025-04-08T08:15:16.397`) +- [CVE-2025-27435](CVE-2025/CVE-2025-274xx/CVE-2025-27435.json) (`2025-04-08T08:15:16.550`) +- [CVE-2025-27437](CVE-2025/CVE-2025-274xx/CVE-2025-27437.json) (`2025-04-08T08:15:16.697`) +- [CVE-2025-2882](CVE-2025/CVE-2025-28xx/CVE-2025-2882.json) (`2025-04-08T08:15:16.860`) +- [CVE-2025-29999](CVE-2025/CVE-2025-299xx/CVE-2025-29999.json) (`2025-04-08T09:15:27.053`) +- [CVE-2025-30000](CVE-2025/CVE-2025-300xx/CVE-2025-30000.json) (`2025-04-08T09:15:27.340`) +- [CVE-2025-30013](CVE-2025/CVE-2025-300xx/CVE-2025-30013.json) (`2025-04-08T08:15:17.023`) +- [CVE-2025-30014](CVE-2025/CVE-2025-300xx/CVE-2025-30014.json) (`2025-04-08T08:15:17.177`) +- [CVE-2025-30015](CVE-2025/CVE-2025-300xx/CVE-2025-30015.json) (`2025-04-08T08:15:17.340`) +- [CVE-2025-30016](CVE-2025/CVE-2025-300xx/CVE-2025-30016.json) (`2025-04-08T08:15:17.493`) +- [CVE-2025-30017](CVE-2025/CVE-2025-300xx/CVE-2025-30017.json) (`2025-04-08T08:15:17.650`) +- [CVE-2025-30280](CVE-2025/CVE-2025-302xx/CVE-2025-30280.json) (`2025-04-08T09:15:27.793`) +- [CVE-2025-3064](CVE-2025/CVE-2025-30xx/CVE-2025-3064.json) (`2025-04-08T09:15:28.140`) +- [CVE-2025-31330](CVE-2025/CVE-2025-313xx/CVE-2025-31330.json) (`2025-04-08T08:15:17.800`) +- [CVE-2025-31331](CVE-2025/CVE-2025-313xx/CVE-2025-31331.json) (`2025-04-08T08:15:17.977`) +- [CVE-2025-31332](CVE-2025/CVE-2025-313xx/CVE-2025-31332.json) (`2025-04-08T08:15:18.130`) +- [CVE-2025-31333](CVE-2025/CVE-2025-313xx/CVE-2025-31333.json) (`2025-04-08T08:15:18.287`) +- [CVE-2025-3431](CVE-2025/CVE-2025-34xx/CVE-2025-3431.json) (`2025-04-08T08:15:18.447`) +- [CVE-2025-3432](CVE-2025/CVE-2025-34xx/CVE-2025-3432.json) (`2025-04-08T09:15:28.630`) +- [CVE-2025-3433](CVE-2025/CVE-2025-34xx/CVE-2025-3433.json) (`2025-04-08T09:15:28.943`) +- [CVE-2025-3436](CVE-2025/CVE-2025-34xx/CVE-2025-3436.json) (`2025-04-08T09:15:29.300`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `7` -- [CVE-2025-3364](CVE-2025/CVE-2025-33xx/CVE-2025-3364.json) (`2025-04-08T06:15:44.690`) +- [CVE-2022-38371](CVE-2022/CVE-2022-383xx/CVE-2022-38371.json) (`2025-04-08T09:15:15.900`) +- [CVE-2024-23814](CVE-2024/CVE-2024-238xx/CVE-2024-23814.json) (`2025-04-08T09:15:17.187`) +- [CVE-2024-54015](CVE-2024/CVE-2024-540xx/CVE-2024-54015.json) (`2025-04-08T09:15:22.550`) +- [CVE-2024-54091](CVE-2024/CVE-2024-540xx/CVE-2024-54091.json) (`2025-04-08T09:15:22.763`) +- [CVE-2024-56830](CVE-2024/CVE-2024-568xx/CVE-2024-56830.json) (`2025-04-08T09:15:23.627`) +- [CVE-2025-0927](CVE-2025/CVE-2025-09xx/CVE-2025-0927.json) (`2025-04-08T08:15:14.863`) +- [CVE-2025-3430](CVE-2025/CVE-2025-34xx/CVE-2025-3430.json) (`2025-04-08T07:15:43.303`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 30931d375fa..b60bdb9f4d4 100644 --- a/_state.csv +++ b/_state.csv @@ -138600,7 +138600,7 @@ CVE-2019-2522,0,0,638737140f258e11051ee5bbdf0348d4d75583dff335dd9bacaf5548d0e7c0 CVE-2019-25220,0,0,d816e7498110be9fdee3cfe309ef71779578ebdc0da778db7a8c501d80ff8668,2024-11-18T17:35:01.780000 CVE-2019-25221,0,0,1df42d22725f30b375d9fa95a2ea36f97268cbdd206d333006cebd98ba4f48ba,2024-12-13T04:15:04.713000 CVE-2019-25222,0,0,1c3e94cef49da52b598375ce55e0334a5c0500fa73191415471f8de8ae5a9861,2025-03-21T11:08:00.220000 -CVE-2019-25223,1,1,55efe24dc6319a0a3f5ce900a427ab5946a9d4f67db5d16895166d2aba82d330,2025-04-08T07:15:42.290000 +CVE-2019-25223,0,0,55efe24dc6319a0a3f5ce900a427ab5946a9d4f67db5d16895166d2aba82d330,2025-04-08T07:15:42.290000 CVE-2019-2523,0,0,8dbf09cc09a9d36d5d379aecf44a233c56df498cda1cca6ed13442ba59e0191b,2024-11-21T04:41:02.417000 CVE-2019-2524,0,0,e78029c84d578c9195f9dc77e1bc1d99a41eb834e1b9ea40680656159ff29559,2024-11-21T04:41:02.543000 CVE-2019-2525,0,0,45bc199935b7701dbac60abc55ae16ce2ad0edb17c245390c2e47faaca8aac93,2024-11-21T04:41:02.660000 @@ -205312,7 +205312,7 @@ CVE-2022-38368,0,0,45fe5bee0727e9ba187ee94a2f0b2425c5fa95c7b5d5aafe9f98f2d16f81f CVE-2022-38369,0,0,c4d3a1084fb9f37cc991e3815650e20fea24339ecd268c10e6abb14a621639c2,2024-11-21T07:16:20.160000 CVE-2022-3837,0,0,2bc1a72bf65ba8aafcdbd243770746507823d35defa71bfdb1d335c9675f5112,2024-11-21T07:20:20.260000 CVE-2022-38370,0,0,cc05c590038262878611f741d12c28a566ef966669cc386261be7fb35178c87d,2024-11-21T07:16:20.287000 -CVE-2022-38371,0,0,79e8374dc40ab093f46ddda12cbaecbdf369d8ebbf92da683892a0a3e91bae83,2024-11-21T07:16:20.410000 +CVE-2022-38371,0,1,eefbd872da2206c65053f8f4ab8ebe8b623fca523f46e384dce984ef117662b1,2025-04-08T09:15:15.900000 CVE-2022-38372,0,0,dd1aaf7bbf7197da473f1e4f001b516dc2cc13302ee864a2c28484a8556609c8,2024-11-21T07:16:20.600000 CVE-2022-38373,0,0,8e84c37701036a24f2d904cb4b0a2f9f8ad8de6f65ef39542e95176dfff56f1a,2024-11-21T07:16:20.723000 CVE-2022-38374,0,0,0896c79f59b4422b5d74123cf4202dfe5b295dfae0e3541c604397953d6e06fb,2024-11-21T07:16:20.850000 @@ -252100,7 +252100,7 @@ CVE-2024-23810,0,0,f2f5fad1095108d3dacd61e6f85b7446124baa2350c0d88169d5c5b20a046 CVE-2024-23811,0,0,0403fc7b759c5031a0e3964d5cd968c4b8d98cfb4b93f144bb06accdee9c592b,2024-11-21T08:58:28.397000 CVE-2024-23812,0,0,cd0bc601708660f70d1d037eaa9637828cd5126193d2146674f74e975f2d8f4f,2024-11-21T08:58:28.530000 CVE-2024-23813,0,0,7330b340114f720605e701199802bc5852dd2e3b4502cb55004dd32904df5d45,2024-11-21T08:58:28.663000 -CVE-2024-23814,0,0,443e72cc1142f57a9272bda023f25cebb52f4d273ac2d0fa7ad49020fd61ed31,2025-02-11T11:15:12.430000 +CVE-2024-23814,0,1,9420e39bc9ddf68f5546719bfe24da8f79ea70daa1b98674e8eadc1c883164bc,2025-04-08T09:15:17.187000 CVE-2024-23816,0,0,45b8ab6d18f8b3a36dbb4f3268f40cc0794948c265f9b28a0d995f2e4e9bb44f,2024-11-21T08:58:28.797000 CVE-2024-23817,0,0,ff6dc4a22b7866d3f24198f333bbdc1cd88d8e8378a66f3e4e7d9f3932f6d7bb,2024-11-21T08:58:28.927000 CVE-2024-23818,0,0,1d11e94beef8b992781ba366a04aee82b4d83880b6bc21b8f750e61622e60900,2024-12-17T20:13:27.330000 @@ -265768,6 +265768,15 @@ CVE-2024-41783,0,0,ae1c0de72e5dfe79735ebfb7f8ec730c4db19a9e6ca5a3f003214d7fa45e7 CVE-2024-41784,0,0,834229de69197513aecb1da041f367a5c75a25616f354d789ef1d74c355b94ba,2024-11-20T14:35:10.117000 CVE-2024-41785,0,0,c8540d1d43d0438fcf633df69d213201ae76d612d879b3fa5839154f3178ea9a,2025-03-06T21:32:02.937000 CVE-2024-41787,0,0,ca11b7c7cbae167fb879d0935e0fce76c280439ac257e0ea74c70f9235cbcc80,2025-01-10T14:15:28.947000 +CVE-2024-41788,1,1,ea2307eef89431e5ac0edbb367d79dd05250c3d6db013601f569184b37fbcdea,2025-04-08T09:15:17.820000 +CVE-2024-41789,1,1,4c4b3efa50342e4a4cc31e0b3747fbc633a82233d4310674c3ff7da4b6010983,2025-04-08T09:15:18.150000 +CVE-2024-41790,1,1,cbf3c1b4c152e41c8b4d40e9930585ca84f16a88303bdaa3d2f6e52520d9bcba,2025-04-08T09:15:18.590000 +CVE-2024-41791,1,1,35f8fd5e0b2f6e2918da8552f0b2ca1bd055580d987fb60978018c4a09dd77e5,2025-04-08T09:15:18.790000 +CVE-2024-41792,1,1,ce253945b5488ff07a4057f590641f616d59a905d15a0fb445053a4ac202e8a7,2025-04-08T09:15:19.257000 +CVE-2024-41793,1,1,8d0ccc098bb34580c481baa2e23f3e3e95dcec5fda0f4ded4b4da017f394ceac,2025-04-08T09:15:19.563000 +CVE-2024-41794,1,1,b2cba2a49b8798af2dbc319c5a2fc1454899056850eeddfaad10e848174b4e07,2025-04-08T09:15:20.010000 +CVE-2024-41795,1,1,00b6d801212c6d87840071f532b8495d5a01c0d3b82eed0325d739b1d1ef70de,2025-04-08T09:15:20.350000 +CVE-2024-41796,1,1,55b0773bcb07c40d3982485c62d353f4d1a4e8342bd76a7dbe16766c688403be,2025-04-08T09:15:20.813000 CVE-2024-41798,0,0,5fea74d6ad8cd06d69b9494512651a1267ba07a833ce4e1ec1687234e2029539,2024-10-10T12:56:30.817000 CVE-2024-41799,0,0,57e0652da6088d2f7ef1d8a480b502117a7d15daea77cec2467e2ce23d41e466,2024-11-21T09:33:05.673000 CVE-2024-4180,0,0,130ce42da83b499edbac947bfc94b4a1e3a54824ec3a8a8cb78c4eb65e7d425f,2025-03-18T19:15:45.633000 @@ -269893,7 +269902,7 @@ CVE-2024-47258,0,0,9a4a5c7393716979191d8b2658cfc20c67a5be5e7a582de99084d292c7b32 CVE-2024-47259,0,0,96188ceb8a1444b367115b0072184fa3d1d29c538e52a4d93d0e09ad178490c1,2025-03-04T06:15:29.190000 CVE-2024-4726,0,0,49547663fe5a48a2e84af0b7917fde9ae28364c558246e73a84aca564ba26d79,2025-02-19T18:33:05.473000 CVE-2024-47260,0,0,5b27c98e99ae4ad671e69cbfcf95d8f33ff9e3ae5e7b5b451c53923f7fad5127,2025-03-04T06:15:29.710000 -CVE-2024-47261,1,1,b71350d3f10e577d15ec94abebab979ee0cda32a37c04c9015797f370218e354,2025-04-08T06:15:43.053000 +CVE-2024-47261,0,0,b71350d3f10e577d15ec94abebab979ee0cda32a37c04c9015797f370218e354,2025-04-08T06:15:43.053000 CVE-2024-47262,0,0,f5b41f79a65d45ee654aaae851aa1366b58e5f035dc01ee0ca87108ff5e14c82,2025-03-04T06:15:29.867000 CVE-2024-47264,0,0,d54fe244881b7e5c414df0af4606542f59c360dc75511e77f72d84fc11d1faed,2025-02-18T18:15:24.630000 CVE-2024-47265,0,0,447da14559255165bf0f0446b50ef025a850be7f968f75b645935b037c27e8cd,2025-02-13T15:15:19.600000 @@ -274878,7 +274887,7 @@ CVE-2024-54008,0,0,eea0fea8f522a304d841eaa6b0b75d4fade41407f80f4626ca71a3072a5c2 CVE-2024-54009,0,0,57a4bb8c66b26b4000e58cbef542e2f0e67be86fc478ee09e8a3296c8cd7f828,2024-12-19T23:15:06.887000 CVE-2024-54010,0,0,e416058a0e43b3161d01186417b7b48190d37daf5d8ae647cfe2dafe7e0f55f3,2025-01-31T18:15:37.577000 CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000 -CVE-2024-54015,0,0,15d5e1f3ec3d810c595ec1f32b64edabb37773d7fc12e946dfae697ba0178074,2025-03-11T10:15:15.450000 +CVE-2024-54015,0,1,4cd5419d7becd6785bc88f68b987f97a9be5001e607b7c499ccb18a9ad4cdf39,2025-04-08T09:15:22.550000 CVE-2024-54016,0,0,639aa106bb3e1987e1e073164a35006658ec1d494dc571ebf11ee73a840c80c3,2025-04-01T20:35:54.023000 CVE-2024-54018,0,0,cad6d12f1a14e927d37238581f95d0e8ab02634a89452232f8dadfac53c033d6,2025-03-11T15:15:43.113000 CVE-2024-5402,0,0,8a48be9314b3c9a679ac7b7baef4e61d2577cdb21f0001defb98f97ce31ab9a7,2024-11-21T09:47:34.947000 @@ -274918,7 +274927,8 @@ CVE-2024-54085,0,0,44631dc4ea36ebfeac3463397955a78235aa73c39f9e5787179507a91ff8a CVE-2024-54089,0,0,efd2198ce361ea992eb01ea5caf6a93dad81fb83e8cf416236617bce8d42af11,2025-02-11T11:15:15.423000 CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5de,2024-11-21T09:47:35.810000 CVE-2024-54090,0,0,66ce7fba27ae90aef333be57d6145501dc74f76ec68d084b34f2e2ffb0d19de5,2025-02-11T11:15:15.647000 -CVE-2024-54091,0,0,c74ca88b9c9f1f179fcfa192e0d2590f76bd392ddd6ead18a993fbadb250f86b,2024-12-12T14:15:22.953000 +CVE-2024-54091,0,1,6669dfba9e4b52b11ac13f159a10cf6dd259350d4a591cc31c8accd2299f4839,2025-04-08T09:15:22.763000 +CVE-2024-54092,1,1,c603537ecd19c80744aee344d52d5e102f809f00455daf9376de6bffe9174510,2025-04-08T09:15:23.320000 CVE-2024-54093,0,0,8ff323e645aebc7aeef25ba10ab98f1f6ad0ea9c0f1d7ee8b34034da91ced70a,2025-03-04T19:11:00.280000 CVE-2024-54094,0,0,4b5414d6bb86aa6d5d0ad7d402a8fed5c92b81411a35a19b8983e665f6e00eaa,2025-03-04T18:48:25.970000 CVE-2024-54095,0,0,21c8eedb1a0957c805c27199698b550557aa3e86d67c7e9aa5fc64a1b6a6ca6d,2025-03-04T18:45:18.927000 @@ -276579,7 +276589,7 @@ CVE-2024-56827,0,0,57a3cb45c026d1eb9eef42dd3043d41ad9c1a14469f315e5d3c4269e9166a CVE-2024-56828,0,0,411340721b967d3f5cddb24f1053cdcefb63de45376c59f5d060ad49387ea40f,2025-01-14T21:15:11.817000 CVE-2024-56829,0,0,fb517ef6b7f51e566ba1e37004f2890737a0fef0bcdec303fd5ff6dcfac6c408,2025-01-06T21:15:15.300000 CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c33b,2024-11-21T09:48:09.327000 -CVE-2024-56830,0,0,79c85b0b070d5536c466f2e90f00cc426f8f9dfa98d4a97719c579eb1ffbed30,2025-01-02T05:15:07.967000 +CVE-2024-56830,0,1,259c990fbcde712792da8c4d4dc09122d403bc6e23fa50f9406a98bd39483261,2025-04-08T09:15:23.627000 CVE-2024-5684,0,0,89fc556df6ea8323aa11fe4b3357624e27d83b832e2994b2f9ef28181d8fd16e,2024-11-21T09:48:09.440000 CVE-2024-56841,0,0,ed3d95bc1950728799aee37326d32f44c3872f343c5377c0bf1bddfc86b58d56,2025-01-14T11:15:17.020000 CVE-2024-5685,0,0,2d6b631f654a98eb4d420c5da149286286a9d638c829ff7827b94e7c52131735,2025-03-07T16:07:06.043000 @@ -281357,7 +281367,7 @@ CVE-2025-0356,0,0,7e522859a3d0689ccb777c8fef64a1b2b2f878cb4a2c9cceba026470a39874 CVE-2025-0357,0,0,0ae647dab29c7a227a1c7ef392ca808faddaedd9823b613fe8bd7952dd9efb7a,2025-01-25T02:15:26.990000 CVE-2025-0359,0,0,5d195c4a796a9d61c5445ec078ba210735f7a70ba6be4fd93632b7b4f6027f55,2025-03-04T06:15:30.023000 CVE-2025-0360,0,0,6206f28ff4cea73a7524a4842bc2375d59423b5ee65bea65d99ad80bb9353d1b,2025-03-04T06:15:30.180000 -CVE-2025-0361,1,1,2929927517c8a0d3f88a2b6f9d4aaefe9e0acce94db4ecb4ad49f33c17d21a31,2025-04-08T06:15:44.540000 +CVE-2025-0361,0,0,2929927517c8a0d3f88a2b6f9d4aaefe9e0acce94db4ecb4ad49f33c17d21a31,2025-04-08T06:15:44.540000 CVE-2025-0364,0,0,d86e1de6aeb2da3860f3a6864380bb4611cec9a62b9db022fce493a15089702c,2025-02-28T20:15:46.323000 CVE-2025-0365,0,0,1b8565779f76dbc2dcd5a3d916c320dbd38623a9ae7b55c218867abc471d9737,2025-02-24T15:56:57.453000 CVE-2025-0366,0,0,920cbf026bda2b01c51576327bc7f0315b5ccf05dfdbae1172aca359c4e3431e,2025-02-24T15:56:36.713000 @@ -281774,7 +281784,7 @@ CVE-2025-0918,0,0,4227989e3d35097382e4bc473e8d6b90f5c37e9be43ac707cd1a7bd79f7110 CVE-2025-0919,0,0,f3c40a8c3e9859b98dc4dbb233022019405b6bb3a32be39636bc5e978bd23a1b,2025-02-12T17:15:23.357000 CVE-2025-0924,0,0,f098c8869b022dbda442e50477571fe8e89ac3ff2ff9ea7bd16e8bb1ca9eb537,2025-02-17T05:15:09.410000 CVE-2025-0925,0,0,96e6ae1415f7de21f9d2302b09edfb8f35c8ed2d838c20a02e0bb3cb8fbcd173,2025-02-12T17:15:23.437000 -CVE-2025-0927,0,0,190f05df59e794a32a84e68e789bbaff5cd48e89d61353e916de72999417a54a,2025-03-31T15:15:43.270000 +CVE-2025-0927,0,1,b46c41d42b89bc6c44b7a8910761be8372f90944775d0b52d65bab4937ea4f2b,2025-04-08T08:15:14.863000 CVE-2025-0929,0,0,bcacb82faee52c17b22479d26474b4df04f76f99e634ac515f50cccea0dc9587,2025-01-31T14:15:34.130000 CVE-2025-0930,0,0,e48470a5aeaab134703b9f1449e9c6f114cca0e6b49cd331dee21f5acc590fd8,2025-01-31T14:15:34.293000 CVE-2025-0934,0,0,435f4840918befd21a2a5141d511b1a79f3fc5ba70f4b6b5d6a0bdf42935fbde,2025-02-18T18:49:12.210000 @@ -283642,7 +283652,17 @@ CVE-2025-22004,0,0,6d3f2035f7d51072e8f7dfea88ea9c76dd0c80f025452c96a3fc2caabdae1 CVE-2025-22005,0,0,4cd51e496a9f3454848e95f5f6a05c13a69bece8dea5c169e93cded54562bc5f,2025-04-07T14:18:34.453000 CVE-2025-22006,0,0,3ae2f25725b261486943b919fae821476183fa3ab460047898f00af25ca11479,2025-04-07T14:18:34.453000 CVE-2025-22007,0,0,3d5542812aeb3ea12efdc811fa913b4e1456a9295a5ddae09e69426d5bbac28c,2025-04-07T14:18:34.453000 +CVE-2025-22008,1,1,f120b7de7afaff6eee918af7c65cdbe9b66dbc044c8812578d3675e5597d2b08,2025-04-08T09:15:24.157000 +CVE-2025-22009,1,1,6865d31272f56f391b0588d0de39fe4d74b1065bf0d0003344e2f55cbbf97504,2025-04-08T09:15:24.460000 CVE-2025-2201,0,0,2371e9549039387486019592f5bf6cd7cee4f08ab86a19044d07c960855c7b24,2025-03-17T10:15:16.543000 +CVE-2025-22010,1,1,2bed4b97a9f211897b042e78ab25426b3f8ec73b400fbd10e3f942a6d23b2055,2025-04-08T09:15:24.777000 +CVE-2025-22011,1,1,5ddf787aaacde1326e2d4b8497b44c431b78ee6d081ce1feae31a21c2e972662,2025-04-08T09:15:25.020000 +CVE-2025-22012,1,1,c55f40489df0bdebde815e5ee91a94f9817a21039aa97d5dd937d92d578ac44e,2025-04-08T09:15:25.420000 +CVE-2025-22013,1,1,15c062bbd4b8d867f7790f615f3a01afb129276ec33e26ed16f1296433034926,2025-04-08T09:15:25.643000 +CVE-2025-22014,1,1,20a6385621d9cfb6bd57fe0023c1a6726e21fe3726b0b681df4b6f72ec869868,2025-04-08T09:15:25.783000 +CVE-2025-22015,1,1,f5ad0d53aebb895223f4da6ab63ce41df765c7ba92c7261425fe0137b1ac10ec,2025-04-08T09:15:26.150000 +CVE-2025-22016,1,1,d2d1c2d3bb7a247c57584b4b6702681e73862d659bc2ba5de64b77636d944d2f,2025-04-08T09:15:26.413000 +CVE-2025-22017,1,1,5597612579672e38a107e9fb3e43faaf3443e37744fa6e912c6e180344edc051,2025-04-08T09:15:26.557000 CVE-2025-2202,0,0,cf0ba4cc9b924e183defbee63ce1af96a184cec0b7613a3c88b1e156bd38ec40,2025-03-17T11:15:37.970000 CVE-2025-2205,0,0,b1382e6746291ecf1fa2fa4001a821037496afd4b23e79b7c29516948b896185,2025-03-12T04:15:19.810000 CVE-2025-2206,0,0,6d4b6e8bdf6b24741a4430972818a20f8052ecfc15f1df2ff630f331c8dbd714,2025-03-11T20:15:18.487000 @@ -284360,6 +284380,7 @@ CVE-2025-23128,0,0,856260a69fb4f1bb5d13296c47ffc7dac686c7ca9a44fff8151b1b7f11a74 CVE-2025-2317,0,0,9ea9ba34615d5bc5ee8806158627db355af143699ea415828af46066a4160dd0,2025-04-07T14:18:15.560000 CVE-2025-23184,0,0,d117de9ebd2827a8b285a215a95edfb5f2bc8c36d298a840f4f419212fe8e651,2025-02-15T01:15:11.010000 CVE-2025-23185,0,0,6a8fc3993811d2ce0c7ae31663c2f10b11720d00b7d18acd6d25289de30c4360,2025-03-11T01:15:34.330000 +CVE-2025-23186,1,1,a81621f9a73754c9e154016b0b996f90edff598072d6c4db34458edb367540d2,2025-04-08T08:15:15.133000 CVE-2025-23187,0,0,c290fe7dd4f9aea98485c447bf9862acb0a55538c675ba503d3516720f3efd65,2025-02-18T18:15:33.497000 CVE-2025-23188,0,0,38b58d0edc10fc1a9c41231926b7cfaaaf380211f861dba5aaca5167b534434b,2025-03-11T01:15:34.480000 CVE-2025-23189,0,0,b372693675c5d6d50e215d8acb54007642608e3ca2a789b9ea116e268e1e263e,2025-02-11T01:15:10.263000 @@ -286523,8 +286544,11 @@ CVE-2025-2664,0,0,6ff0ffc262e2befcd6bc6d4bc7b0cfbc02687b745501f8524d04b60b044f64 CVE-2025-26643,0,0,fdd1c1937beffd124d32a1ceadd3f98e87693b9c4f7e4b7907e61b194eac7eb4,2025-03-13T17:34:08.587000 CVE-2025-26645,0,0,c81d070a14a19f5aa832e5ee1c6a2271fc8ee18e21d17ccbca0820999b902cec,2025-03-11T17:16:44.200000 CVE-2025-2665,0,0,374db404c8969e7c1a917201d9c10b42061053e18c1f29851f060f01a96376d4,2025-03-23T22:15:13.340000 +CVE-2025-26653,1,1,58a100fc55a5df34be5be38a38a57bc1234e805131cd72c9f4d140f8c6d11e63,2025-04-08T08:15:15.710000 +CVE-2025-26654,1,1,e5c04cd51fc29d2bafa7830154665acd324cc8ebce0e19b8b36edb15b906fce4,2025-04-08T08:15:15.903000 CVE-2025-26655,0,0,2310006db81bae09c090aa02bc791abe44ca64048768875a974f320de93200af,2025-03-11T01:15:35.230000 CVE-2025-26656,0,0,34d4e35bb90461dd8f0d5168b5f8b88670bcc47fa5d50deb31db349b1e214e76,2025-03-11T01:15:35.383000 +CVE-2025-26657,1,1,bcf81fc79d840325faed8dd88b9788a690db409b9bc6c8aeb44fa28207231c1c,2025-04-08T08:15:16.077000 CVE-2025-26658,0,0,aedc4d0eb67f4f5f0b6a3ffda635a52c1b05624552df9e00a6801f2a11a2af99,2025-03-11T01:15:35.533000 CVE-2025-26659,0,0,e49bb37eae4d802d08529be287a8ee45c0a41d1e6476deffc54020440698032b,2025-03-11T01:15:35.683000 CVE-2025-26660,0,0,b711a00f5dfa32959fd3c766aaf7ba4ea22e4bae0e839f8f050152da069fcd60,2025-03-11T01:15:35.837000 @@ -286952,13 +286976,17 @@ CVE-2025-27424,0,0,adf668e3c9da25d6988b65719ab3ae75e8ad4e12b749c578b26687f0998af CVE-2025-27425,0,0,c54e7d57183b35696ef02157ace5e7fd42481ebab040d62abf3070bfa84b558b,2025-04-03T13:31:06.323000 CVE-2025-27426,0,0,9e747dc870c0998abb3ea7b3f3a4eaa73dd29484d0d06dd5ec65096667269572,2025-04-03T13:30:49.883000 CVE-2025-27427,0,0,d565503dda339161e0c992bbf6fbe87052f992922e0285903e51c88162194d98,2025-04-02T22:15:19.083000 +CVE-2025-27428,1,1,2e00efb7c518344fda016741534aa27c6125843a8f71ac323dc3aba7cf97cc43,2025-04-08T08:15:16.230000 +CVE-2025-27429,1,1,bdfa24ad8119acc327c487975203b4b39b98635d21110a1b77cdd4b91660dbac,2025-04-08T08:15:16.397000 CVE-2025-2743,0,0,8741e8ac5692905097a5a8e28797893f3dce794ca5823d56efd29770d2cd5a77,2025-03-27T16:45:46.410000 CVE-2025-27430,0,0,c8635f0b92dae7bf8e99c5e4e8dabb23fa1cb6267b38122c26d97fb0aff537e6,2025-03-11T01:15:36.157000 CVE-2025-27431,0,0,85033e3af4b6365958fcf162dc58009a9515212b38e9ac59600dfcd228492344,2025-03-11T01:15:36.310000 CVE-2025-27432,0,0,0097aad049d9f686ea71d8a6054e6d326f3e360a2d590fa8120819d74b49d0b1,2025-03-11T01:15:36.467000 CVE-2025-27433,0,0,e161df957ed89fa46830bd8be5e6f3613bdc39078a458446704c6b6e2d24aa49,2025-03-11T01:15:36.607000 CVE-2025-27434,0,0,9f3eccd1b65f086459b76c648d1b4ecbb9099d890e6e2239c04c850b487f55a6,2025-03-11T01:15:36.760000 +CVE-2025-27435,1,1,7b4f73a53d9d9fb7923a111ed6a4f02a04a7c91dd38687b333eb971a029d829e,2025-04-08T08:15:16.550000 CVE-2025-27436,0,0,e9dd40ff33da1e03b4af0fe710cae520f535a38763cba00e5b84d8f0ada2e28f,2025-03-11T01:15:36.920000 +CVE-2025-27437,1,1,215e7ade3cb15635674865941d74d1ec55f8829616844e53d484e0f8f105876e,2025-04-08T08:15:16.697000 CVE-2025-27438,0,0,aa271b66950b27900a45ff14fb7ffa30a34f109c554f6e3ef42a2a6604aa6c9a,2025-03-11T10:15:19.407000 CVE-2025-27439,0,0,0adb16bdd8175e50b2012f79d28e4b0f799da16ee6499b9aa741287f255e0365,2025-03-11T18:15:36.510000 CVE-2025-2744,0,0,70019c1a1354272236c9eec45caf986c8b60cd8d3eddcfb250ce564a0fe4e958,2025-03-27T16:45:46.410000 @@ -287250,6 +287278,7 @@ CVE-2025-2870,0,0,532ce24468347275f11c46ecc24e5d6555c309a32268ad9ae9a421f0ae266a CVE-2025-2874,0,0,6a503ede6640ff91644e2f2d002d5c6c981994fafd27ed943d3456640dee218b,2025-04-07T14:18:34.453000 CVE-2025-2877,0,0,84ec84d2bfb12624c83348efbdfe58ac8be43428be65066c732bbd9fdb6142cb,2025-04-07T16:15:25.720000 CVE-2025-2878,0,0,125728ac281a69ac5ecf14e31ba48aa14b6b6ffc7aef5853980db8dfb30bd674,2025-03-28T18:11:40.180000 +CVE-2025-2882,1,1,37159719a6744bd7c4b3e5214bb194116cb1f154395ebf42cd3293c288a9a410,2025-04-08T08:15:16.860000 CVE-2025-2885,0,0,e2d01fa5043ddafa560e776b063da46f782fa630659191bee2d9e55b0a2acc15,2025-03-28T18:11:40.180000 CVE-2025-28855,0,0,75330c0a82318338b0154938e1fd86b9e7a50bcf39b7166c9aad55a9af1a4355,2025-03-27T16:45:27.850000 CVE-2025-28856,0,0,db2bbb32cf52cca2ced522652c0571cdcf66f2f5f62f3cd167e79253416a8f6a,2025-03-11T21:15:42.763000 @@ -287569,11 +287598,18 @@ CVE-2025-29995,0,0,4e499babdfbbb2f8f3e0d85f41baf447f5b6555ca95dd3dd082c2591d71bb CVE-2025-29996,0,0,d9ce8180be5b647a2760a5e1584c793faf6e1ad0f69620939820540427591c65,2025-03-13T12:15:13.980000 CVE-2025-29997,0,0,23c5a96e3ca55a349666d8f7b75c279d7c1f39d20cf9fd2507bd7cdd234e7b90,2025-03-13T12:15:14.127000 CVE-2025-29998,0,0,3f15888bdd465d14766f235864b3d61f644d43d3eb6a7cb983806db35738379a,2025-03-13T12:15:14.277000 +CVE-2025-29999,1,1,84359c41084185f5b284ca1d2e7f21f12176ea15a8d11d8a0f3e3f4459257685,2025-04-08T09:15:27.053000 CVE-2025-3000,0,0,ae1877066464f53804bc7b03ebb1b9d13c43cf43cde1adbea92f828110fcc0d7,2025-04-01T20:26:22.890000 +CVE-2025-30000,1,1,d17fb49cb8685651417946a968191cb7858f1babd67488dfea6fe45a47814abb,2025-04-08T09:15:27.340000 CVE-2025-30004,0,0,73e410cd8c1771ca59aa80fff53e7e0cfccf00b0105ca49a3494abebe1dc7b1d,2025-04-01T20:26:22.890000 CVE-2025-30005,0,0,e545c32af86b79a8f709b3efabb24b994072a6d6325d7acaca8653d3031c0594,2025-04-01T20:26:22.890000 CVE-2025-30006,0,0,c398c238e98621e23bd6b30abda93469f6d677d63847ffe76c3e73fbb2a98915,2025-04-01T20:26:22.890000 CVE-2025-3001,0,0,27bffbb3e7b3c7258a825a0570f29d054bd03ad9a07c098cbfafe6044bea1c9f,2025-04-01T20:26:22.890000 +CVE-2025-30013,1,1,9f0f0f8c8b510b4fd9e629061684580085597831e6a3eba75091256484fb35d9,2025-04-08T08:15:17.023000 +CVE-2025-30014,1,1,91dba11cece11ed3ea61d61a1a5013a54eb478d3566a59d6c3f9a69a72da0ede,2025-04-08T08:15:17.177000 +CVE-2025-30015,1,1,85dacd112e52b6dd724910b6b2160c84e6123a94048dec93332c9a9e0b877cb2,2025-04-08T08:15:17.340000 +CVE-2025-30016,1,1,bc7f6737648401d5789bbcadafd4441c8f9235c06315030392c904bda3ec0111,2025-04-08T08:15:17.493000 +CVE-2025-30017,1,1,fe3d6b7e0539c0cb40b419acdb1705c1cc691db7d99ec227e50589a4d67f07f3,2025-04-08T08:15:17.650000 CVE-2025-3002,0,0,091ec418c4fe34b31a468958501cb85d78c731a0031e80a884c36ea5dec34f9b,2025-04-01T20:26:22.890000 CVE-2025-30022,0,0,323cd273db7b659115dae67e365f1f9a2dade36f53e606c124c9f18a94e682e6,2025-04-03T15:52:18.500000 CVE-2025-3003,0,0,37c02fb463f5c8a3a1dafcb39007a61a21e6fd3e14e7eb7da2154db9529b35a1,2025-04-01T20:26:22.890000 @@ -287676,6 +287712,7 @@ CVE-2025-30259,0,0,e7ad748a07d97a3ed7d8fd479d0bd66cf98f38cbfee97910d52cd90aa0d3b CVE-2025-3026,0,0,1ccfc3db3fa998e9ff1cdb0d3328ce5e8b50ad41edf4870aec75e9db46dbd3f7,2025-04-01T20:26:30.593000 CVE-2025-3027,0,0,9355f1632bf438848aed82af6cf484da7a1ad46dac5db96331cc9a677136537c,2025-04-01T20:26:30.593000 CVE-2025-3028,0,0,b4904bcbef402a86d26a68f36c89c0f13bdfe9f0b82a73bc5473d3a54339d650,2025-04-07T13:31:38.947000 +CVE-2025-30280,1,1,fa514384c10154b0a32aabc2d09a11838cc630f1eb5cdd10e834c81e7fe5101e,2025-04-08T09:15:27.793000 CVE-2025-3029,0,0,4233f9fe2c15ae070846afc464376435b2c22dc54bb1ae100ef75b468d792887,2025-04-07T13:31:33.743000 CVE-2025-3030,0,0,6c5a3267936101701b471cc1e9319d0624c399611df44e115f8b7cc82dfb076c,2025-04-07T13:31:26.793000 CVE-2025-3031,0,0,5d60434c3fd1b9eb0ecabc1c274e22b04626361f427f9c196b8950f8f03f9539,2025-04-07T13:31:10.027000 @@ -287877,6 +287914,7 @@ CVE-2025-30621,0,0,8c6a6eedc9f943375208fa96aeb0d151078d5fa54598208cfb233511cfe9b CVE-2025-30622,0,0,797c397d49f77f00a276d4088c4e3466e59efa0b6ce4fa17d94546d3a32ca074,2025-04-01T20:26:11.547000 CVE-2025-30623,0,0,a8e0620fa0eff69e53f34c91bac6562d90d04f91188fb9d1c9bfa47d4c96dabd,2025-03-27T16:44:44.143000 CVE-2025-3063,0,0,2e45f7e85b76c34e4c90c66b657feb85dadfe8fb2002194cf56059b20b804015,2025-04-02T14:58:07.527000 +CVE-2025-3064,1,1,1d25beab72f42677239e09478a00b8915ce297d152397fa70a1f57f4261ba7a8,2025-04-08T09:15:28.140000 CVE-2025-3066,0,0,4036e1c523f4d168ee49a384a6c587b88b052f12af15ef61935538c6b06fefb9,2025-04-07T13:30:17.320000 CVE-2025-3067,0,0,137654232245c02adb3b6bc4a9fe4453e793714623555640c944c49ca758c0bb,2025-04-02T14:58:07.527000 CVE-2025-30672,0,0,3ded266990ba9009f55577f3f5d04302a5c6b8450014b92c80b83398ad23d15e,2025-04-01T20:26:11.547000 @@ -288174,6 +288212,10 @@ CVE-2025-31285,0,0,c76aee62b0e63406ce2bba4eb6cc45c049f27ae73b357eac3652593406911 CVE-2025-31286,0,0,e856201c9b42834f1c9528734a2606281893fc23418757a05099912d18c27fb4,2025-04-07T14:18:49.830000 CVE-2025-3129,0,0,222a3d9c8714652d0d6ba97391c55e31cbb028a8923d2de4eeec30cd2a04c719,2025-04-07T14:18:34.453000 CVE-2025-3130,0,0,2fc34a21e49634629835e2bfdad21b63fabf65952307e6d85abb2208a8a72837,2025-04-07T14:18:34.453000 +CVE-2025-31330,1,1,c416c456b393d5616a021bbc7d8e782bdc9ee8f389962ceb676777061d8f8e81,2025-04-08T08:15:17.800000 +CVE-2025-31331,1,1,ca3bf730531e56192f3c50d3d58ea623c6ea120776b9b0b204abfa53b8c02fe5,2025-04-08T08:15:17.977000 +CVE-2025-31332,1,1,c873d67d02383e551718b10d86ae9e0c8df5ce4ec4ecc4deb5797db8beba4463,2025-04-08T08:15:18.130000 +CVE-2025-31333,1,1,04840edfbb44224e5dce19993638e29f7e49a7b53cd79f64e15ec11b7bdd1c2f,2025-04-08T08:15:18.287000 CVE-2025-31334,0,0,90b4ed63dc1be647230b7e7d107e9e1dc7ff2e1eceac7d38af6b4703cfff3e2b,2025-04-07T14:18:34.453000 CVE-2025-31335,0,0,23839e3692f6b9292f971ac2ba3542c0132ffb2a9a22b6edf4f234426c27d3e9,2025-03-28T18:11:40.180000 CVE-2025-3134,0,0,a71cb6e1788fa22b93ff06d650061e802b0d1c6df7394ab696b49920594382f7,2025-04-07T14:18:34.453000 @@ -288911,7 +288953,7 @@ CVE-2025-3360,0,0,00a8b0fe3c658775c0c228780a1e555aca09d51a98f5810881cf1b98d72242 CVE-2025-3361,0,0,0ea20e277f4a9d2735063cc0cb60a65a3bfa98052232e5b3d9f7eb7b4e884e11,2025-04-08T02:15:20.737000 CVE-2025-3362,0,0,dcadcf32942d6e019b98861990714d0be8e18d6cb35cbe37b8fc22491f746927,2025-04-08T02:15:20.913000 CVE-2025-3363,0,0,6cdd1886233f0221600f5c66e457e17c70ee647df54bd43e495876954e18637e,2025-04-08T02:15:21.077000 -CVE-2025-3364,0,1,c1a92dc54c4f0dce6436323db4c83b7a1e68ea03126483ddb4b4bdc4aac33620,2025-04-08T06:15:44.690000 +CVE-2025-3364,0,0,c1a92dc54c4f0dce6436323db4c83b7a1e68ea03126483ddb4b4bdc4aac33620,2025-04-08T06:15:44.690000 CVE-2025-3369,0,0,9bfab61711c9bf7f6a8c870d9df6b844b16be953ff70535930a493b686277665,2025-04-07T14:17:50.220000 CVE-2025-3370,0,0,3ca9a9bd8cfc457fadd94e88b3803dfeedb7934bde407602fa694d4cec7fa434,2025-04-07T14:17:50.220000 CVE-2025-3371,0,0,cf35734a694c96fa758a3813317d567d31fb084974287b75958b2467d9b5778e,2025-04-07T15:15:46.097000 @@ -288951,12 +288993,16 @@ CVE-2025-3408,0,0,e280499e482677db9ed67bae48ec56bda95a2aa8b5a2b1aef2034552663724 CVE-2025-3409,0,0,7e6c369f665f5cacb993009efd062e0fcb1ef1e93aa5eaac2f105df1a6aca67b,2025-04-08T05:15:40.050000 CVE-2025-3410,0,0,1460b18467eb6ba99e2769c7be09aa3edefed8692a6f8fb8e968417dcd40558e,2025-04-08T05:15:40.243000 CVE-2025-3411,0,0,5753ce54de79ff0bd44fd3fe48da092e857f5f3f13f51efe35640c23425c7d3d,2025-04-08T05:15:40.423000 -CVE-2025-3412,1,1,d5dc6d47992307d85d2cbd8c8a7ef20f9cafcd2285ab41a03a025cd99df5b1a2,2025-04-08T06:15:44.970000 -CVE-2025-3413,1,1,ee3f3525385f62dab06c73f0c3e63456024078737ae33792bbeb3b89e957703a,2025-04-08T06:15:45.333000 +CVE-2025-3412,0,0,d5dc6d47992307d85d2cbd8c8a7ef20f9cafcd2285ab41a03a025cd99df5b1a2,2025-04-08T06:15:44.970000 +CVE-2025-3413,0,0,ee3f3525385f62dab06c73f0c3e63456024078737ae33792bbeb3b89e957703a,2025-04-08T06:15:45.333000 CVE-2025-3424,0,0,be0fe6f8406eda3536331ded14e2f6be10ec512141cedd16fb1a1f0fe02bf768,2025-04-07T16:15:27.703000 CVE-2025-3425,0,0,9396f0e72f97b1c5b17d6a193f82e00c0d3f258bd16686092e11de9ff192286c,2025-04-07T16:15:27.963000 CVE-2025-3426,0,0,bc136ddbc855578300039b703456513a80b7a9e221e0139f4084d1b3f0db77d4,2025-04-07T17:15:40.073000 -CVE-2025-3427,1,1,f850547ae767a17bb67296cfcae3c5a676ac86e89b763364a11d8f2ad2d824ff,2025-04-08T07:15:42.740000 -CVE-2025-3428,1,1,fe4880e21d35737d150b4e676a276b5c33b0ca527b526883ce410400b5f770b9,2025-04-08T07:15:42.943000 -CVE-2025-3429,1,1,a4df39c5b7cc2899a9366e62fb48d05074f63294683e2006494bb123e63cb51c,2025-04-08T07:15:43.120000 -CVE-2025-3430,1,1,50ac472c7a03c1110362878c968629fc50bede758dfc0dc504c3d35d2348e628,2025-04-08T07:15:43.303000 +CVE-2025-3427,0,0,f850547ae767a17bb67296cfcae3c5a676ac86e89b763364a11d8f2ad2d824ff,2025-04-08T07:15:42.740000 +CVE-2025-3428,0,0,fe4880e21d35737d150b4e676a276b5c33b0ca527b526883ce410400b5f770b9,2025-04-08T07:15:42.943000 +CVE-2025-3429,0,0,a4df39c5b7cc2899a9366e62fb48d05074f63294683e2006494bb123e63cb51c,2025-04-08T07:15:43.120000 +CVE-2025-3430,0,1,b6c40d6b0ef3c8648892c15b77657ef236c19f9740d69b867859874e4fc54750,2025-04-08T07:15:43.303000 +CVE-2025-3431,1,1,e670e7d054e601025cf0eb72b723d5b37fb9fbb720309197877ef8f8d03470f7,2025-04-08T08:15:18.447000 +CVE-2025-3432,1,1,2bf3e23b6bedbebc6bd8cdc2583c4de94eee07f3a92d57f813cb35a4cfad2133,2025-04-08T09:15:28.630000 +CVE-2025-3433,1,1,c3110812ae023f72ad64a55b3ad2c3c0f766c027fee5bad7535d072d777395fa,2025-04-08T09:15:28.943000 +CVE-2025-3436,1,1,2bfe03c653abb051592f5f9f07910d069bc4f6a2ec0fe610705b4467e9c26af1,2025-04-08T09:15:29.300000