Auto-Update: 2025-05-02T16:00:20.658717+00:00

This commit is contained in:
cad-safe-bot 2025-05-02 16:03:55 +00:00
parent ea2d0aa18a
commit 899408f9e8
63 changed files with 2789 additions and 924 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2016-1585",
"sourceIdentifier": "security@ubuntu.com",
"published": "2019-04-22T16:29:01.303",
"lastModified": "2024-11-21T02:46:41.493",
"vulnStatus": "Modified",
"lastModified": "2025-05-02T14:12:14.837",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security@ubuntu.com",
@ -36,26 +58,6 @@
},
"exploitabilityScore": 0.5,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -91,7 +93,7 @@
"description": [
{
"lang": "en",
"value": "CWE-254"
"value": "NVD-CWE-noinfo"
}
]
}
@ -106,7 +108,22 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:canonical:apparmor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96D33F41-3DFB-4EBE-B16C-9FAE0B9563D9"
"versionEndExcluding": "2.13.10",
"matchCriteriaId": "BB29454C-443A-42AB-964A-7E697F175160"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:canonical:apparmor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.0.12",
"matchCriteriaId": "2B54A239-7CBC-403C-8094-1D2FA09FA2B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:canonical:apparmor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.1.0",
"versionEndExcluding": "3.1.6",
"matchCriteriaId": "3BE2576D-BF6C-46B0-9786-7A92CEF92F10"
}
]
}
@ -124,7 +141,10 @@
},
{
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugs.launchpad.net/apparmor/+bug/1597017",
@ -136,7 +156,10 @@
},
{
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-9844",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-07-12T16:29:00.420",
"lastModified": "2025-05-01T15:15:52.720",
"vulnStatus": "Deferred",
"lastModified": "2025-05-02T15:25:18.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,26 +16,26 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -104,11 +104,17 @@
},
{
"url": "https://erpscan.io/advisories/erpscan-17-014-sap-netweaver-java-deserialization-untrusted-user-value-metadatauploader/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://me.sap.com/notes/2399804",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
]
},
{
"url": "http://www.securityfocus.com/bid/96865",
@ -120,7 +126,10 @@
},
{
"url": "https://erpscan.io/advisories/erpscan-17-014-sap-netweaver-java-deserialization-untrusted-user-value-metadatauploader/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-24309",
"sourceIdentifier": "productcert@siemens.com",
"published": "2022-03-08T12:15:11.580",
"lastModified": "2024-11-21T06:50:08.663",
"vulnStatus": "Modified",
"lastModified": "2025-05-02T14:12:44.273",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -130,7 +130,8 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"matchCriteriaId": "4EFCC29F-3789-4508-97F1-9E3833663B5E"
"versionEndExcluding": "9.13",
"matchCriteriaId": "182FBB13-5E6D-4701-B206-1A5AA12A0388"
}
]
}
@ -140,7 +141,10 @@
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-148641.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-148641.pdf",
@ -153,7 +157,10 @@
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-148641.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-148641.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37902",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2022-12-12T13:15:12.797",
"lastModified": "2024-11-21T07:15:20.840",
"lastModified": "2025-05-02T14:15:18.640",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37903",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2022-12-12T13:15:12.863",
"lastModified": "2024-11-21T07:15:20.970",
"lastModified": "2025-05-02T15:15:46.230",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37912",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2022-12-12T13:15:13.440",
"lastModified": "2024-11-21T07:15:22.153",
"lastModified": "2025-05-02T15:15:47.160",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44221",
"sourceIdentifier": "PSIRT@sonicwall.com",
"published": "2023-12-05T21:15:07.150",
"lastModified": "2025-05-02T01:00:03.173",
"vulnStatus": "Modified",
"lastModified": "2025-05-02T14:15:47.227",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6683",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-12T19:15:11.480",
"lastModified": "2024-11-21T08:44:20.377",
"vulnStatus": "Modified",
"lastModified": "2025-05-02T15:10:54.503",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -92,8 +92,8 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.0",
"versionEndExcluding": "9.0.0",
"matchCriteriaId": "0499945F-9B89-45BC-8147-2A118A91302F"
"versionEndExcluding": "8.2.2",
"matchCriteriaId": "C0232DBC-5896-4EC7-AEE7-595BBD67A5C7"
}
]
}
@ -123,11 +123,17 @@
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:2135",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2962",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-6683",
@ -146,11 +152,17 @@
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2135",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2962",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-6683",
@ -169,7 +181,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20240223-0001/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23758",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-20T23:15:07.683",
"lastModified": "2024-11-21T08:58:19.993",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:43:28.763",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unisys:stealth:5.3.062.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EC67F4BA-6058-4EAA-B611-75CBDE17E2DC"
}
]
}
]
}
],
"references": [
{
"url": "https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=70",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=70",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38475",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:04.883",
"lastModified": "2025-05-02T01:00:03.173",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-02T15:43:59.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -55,34 +55,89 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.4.0",
"versionEndExcluding": "2.4.60",
"matchCriteriaId": "13126636-FD76-4E3E-B949-14A5082DE02A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap_9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD886814-B4A0-4764-9F08-2060601D8E89"
}
]
}
]
}
],
"references": [
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/01/8",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/apache/httpd/commit/9a6157d1e2f7ab15963020381054b48782bc18cf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.blackhat.com/us-24/briefings/schedule/index.html#confusion-attacks-exploiting-hidden-semantic-ambiguity-in-apache-http-server-pre-recorded-40227",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48907",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-01T21:15:52.270",
"lastModified": "2025-05-02T13:52:51.693",
"lastModified": "2025-05-02T15:15:47.830",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Sematell ReplyOne 7.4.3.0 permite SSRF a trav\u00e9s de la API del servidor de aplicaciones."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-083.txt",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51005",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:24.470",
"lastModified": "2024-11-05T16:35:20.680",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:39:33.390",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r8500_firmware:1.0.2.160:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D9B3EF-5A5F-4EA3-AE90-583119B1B916"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63500DE4-BDBD-4F86-AB99-7DB084D0B912"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_50/50.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51007",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:24.647",
"lastModified": "2024-11-05T16:35:22.247",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:43:02.980",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:xr300_firmware:1.0.3.78:*:*:*:*:*:*:*",
"matchCriteriaId": "3E35B900-99B9-4937-B3F5-04212913F6DC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5590CF28-B88A-4755-904B-1BC1778FBEDD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear5/vuln_54/54.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51008",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:24.730",
"lastModified": "2024-11-05T16:35:23.023",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:43:04.657",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:xr300_firmware:1.0.3.78:*:*:*:*:*:*:*",
"matchCriteriaId": "3E35B900-99B9-4937-B3F5-04212913F6DC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5590CF28-B88A-4755-904B-1BC1778FBEDD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear5/vuln_53/53.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51009",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:24.807",
"lastModified": "2024-11-05T16:35:24.040",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:39:35.130",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r8500_firmware:1.0.2.160:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D9B3EF-5A5F-4EA3-AE90-583119B1B916"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63500DE4-BDBD-4F86-AB99-7DB084D0B912"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_47/47.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51012",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:25.057",
"lastModified": "2024-11-05T16:35:26.760",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:39:37.007",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r8500_firmware:1.0.2.160:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D9B3EF-5A5F-4EA3-AE90-583119B1B916"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63500DE4-BDBD-4F86-AB99-7DB084D0B912"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_45/45.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51013",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:25.143",
"lastModified": "2024-11-05T16:35:27.573",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:37:45.777",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r7000p_firmware:1.3.3.154:*:*:*:*:*:*:*",
"matchCriteriaId": "9D40A1E4-7E59-4035-881D-27AEF89152F4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE55F4D-E98B-46D3-B870-041141934CD1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear6/vuln_64/64.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51014",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:25.220",
"lastModified": "2024-11-05T16:35:28.387",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:43:06.327",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:xr300_firmware:1.0.3.78:*:*:*:*:*:*:*",
"matchCriteriaId": "3E35B900-99B9-4937-B3F5-04212913F6DC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5590CF28-B88A-4755-904B-1BC1778FBEDD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear5/vuln_56/56.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51015",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:25.303",
"lastModified": "2024-11-05T16:35:29.203",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:37:44.140",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r7000p_firmware:1.3.3.154:*:*:*:*:*:*:*",
"matchCriteriaId": "9D40A1E4-7E59-4035-881D-27AEF89152F4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE55F4D-E98B-46D3-B870-041141934CD1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear6/vuln_62/62.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51016",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:25.380",
"lastModified": "2024-11-05T16:35:30.037",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:43:08.260",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:xr300_firmware:1.0.3.78:*:*:*:*:*:*:*",
"matchCriteriaId": "3E35B900-99B9-4937-B3F5-04212913F6DC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5590CF28-B88A-4755-904B-1BC1778FBEDD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear5/vuln_58/58.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51017",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:25.460",
"lastModified": "2024-11-05T16:35:30.870",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:37:42.547",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r7000p_firmware:1.3.3.154:*:*:*:*:*:*:*",
"matchCriteriaId": "9D40A1E4-7E59-4035-881D-27AEF89152F4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE55F4D-E98B-46D3-B870-041141934CD1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear6/vuln_59/59.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51018",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:25.537",
"lastModified": "2024-11-05T16:35:31.680",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:37:40.860",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r7000p_firmware:1.3.3.154:*:*:*:*:*:*:*",
"matchCriteriaId": "9D40A1E4-7E59-4035-881D-27AEF89152F4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE55F4D-E98B-46D3-B870-041141934CD1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear6/vuln_60/60.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51019",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:25.627",
"lastModified": "2024-11-05T16:35:32.493",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:37:39.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r7000p_firmware:1.3.3.154:*:*:*:*:*:*:*",
"matchCriteriaId": "9D40A1E4-7E59-4035-881D-27AEF89152F4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE55F4D-E98B-46D3-B870-041141934CD1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear6/vuln_61/61.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51020",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:25.700",
"lastModified": "2024-11-05T16:35:33.313",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:37:37.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r7000p_firmware:1.3.3.154:*:*:*:*:*:*:*",
"matchCriteriaId": "9D40A1E4-7E59-4035-881D-27AEF89152F4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE55F4D-E98B-46D3-B870-041141934CD1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear6/vuln_63/63.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51022",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:25.860",
"lastModified": "2024-11-05T16:35:35.000",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:43:09.713",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:xr300_firmware:1.0.3.78:*:*:*:*:*:*:*",
"matchCriteriaId": "3E35B900-99B9-4937-B3F5-04212913F6DC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5590CF28-B88A-4755-904B-1BC1778FBEDD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear5/vuln_55/55.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52017",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:26.680",
"lastModified": "2024-11-05T17:35:29.290",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:43:12.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:xr300_firmware:1.0.3.78:*:*:*:*:*:*:*",
"matchCriteriaId": "3E35B900-99B9-4937-B3F5-04212913F6DC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5590CF28-B88A-4755-904B-1BC1778FBEDD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear5/vuln_54/54.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52018",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:26.757",
"lastModified": "2024-11-05T17:35:30.507",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:43:14.700",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:xr300_firmware:1.0.3.78:*:*:*:*:*:*:*",
"matchCriteriaId": "3E35B900-99B9-4937-B3F5-04212913F6DC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5590CF28-B88A-4755-904B-1BC1778FBEDD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear5/vuln_53/53.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52019",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:26.833",
"lastModified": "2024-11-05T17:35:31.593",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:39:38.770",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r8500_firmware:1.0.2.160:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D9B3EF-5A5F-4EA3-AE90-583119B1B916"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63500DE4-BDBD-4F86-AB99-7DB084D0B912"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_47/47.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52020",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:26.917",
"lastModified": "2024-11-05T16:35:38.663",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:39:40.467",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r8500_firmware:1.0.2.160:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D9B3EF-5A5F-4EA3-AE90-583119B1B916"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63500DE4-BDBD-4F86-AB99-7DB084D0B912"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_47/47.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52021",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:26.997",
"lastModified": "2024-11-05T16:35:39.440",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:39:42.457",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r8500_firmware:1.0.2.160:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D9B3EF-5A5F-4EA3-AE90-583119B1B916"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63500DE4-BDBD-4F86-AB99-7DB084D0B912"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_47/47.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52028",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:27.483",
"lastModified": "2024-11-05T16:35:51.053",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:36:28.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r7000p_firmware:1.3.3.154:*:*:*:*:*:*:*",
"matchCriteriaId": "9D40A1E4-7E59-4035-881D-27AEF89152F4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE55F4D-E98B-46D3-B870-041141934CD1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear6/vuln_60/60.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52029",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:27.573",
"lastModified": "2024-11-05T16:35:57.397",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:36:25.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r7000p_firmware:1.3.3.154:*:*:*:*:*:*:*",
"matchCriteriaId": "9D40A1E4-7E59-4035-881D-27AEF89152F4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE55F4D-E98B-46D3-B870-041141934CD1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear6/vuln_60/60.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52030",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T15:15:27.660",
"lastModified": "2024-11-05T16:35:58.320",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:36:21.870",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r7000p_firmware:1.3.3.154:*:*:*:*:*:*:*",
"matchCriteriaId": "9D40A1E4-7E59-4035-881D-27AEF89152F4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE55F4D-E98B-46D3-B870-041141934CD1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear6/vuln_60/60.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-1883",
"sourceIdentifier": "3DS.Information-Security@3ds.com",
"published": "2025-05-02T15:15:48.317",
"lastModified": "2025-05-02T15:15:48.317",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-Of-Bounds Write vulnerability exists in the OBJ file reading procedure in SOLIDWORKS eDrawings on Release SOLIDWORKS Desktop 2025. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted OBJ\u00c2\u00a0file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.3ds.com/vulnerability/advisories",
"source": "3DS.Information-Security@3ds.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-1884",
"sourceIdentifier": "3DS.Information-Security@3ds.com",
"published": "2025-05-02T15:15:48.440",
"lastModified": "2025-05-02T15:15:48.440",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use-After-Free vulnerability exists in the SLDPRT file reading procedure in SOLIDWORKS eDrawings on Release SOLIDWORKS Desktop 2025. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted SLDPRT file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://www.3ds.com/vulnerability/advisories",
"source": "3DS.Information-Security@3ds.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25891",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-18T22:15:18.693",
"lastModified": "2025-02-19T16:15:41.447",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-02T15:46:16.683",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dsl-3782_firmware:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FBB746-D313-4F4F-8F2E-32363A9C7C75"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dsl-3782:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F8D1900-34CB-45D3-8DF3-503E10B75E5B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link_DSL-3782_4.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link_DSL-3782_4.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25892",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-18T22:15:18.803",
"lastModified": "2025-02-19T16:15:41.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-02T15:46:15.050",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dsl-3782_firmware:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FBB746-D313-4F4F-8F2E-32363A9C7C75"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dsl-3782:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F8D1900-34CB-45D3-8DF3-503E10B75E5B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link%20DSL-3782_3.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link%20DSL-3782_3.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25893",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-18T22:15:18.920",
"lastModified": "2025-02-19T16:15:41.763",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-02T15:46:13.270",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dsl-3782_firmware:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FBB746-D313-4F4F-8F2E-32363A9C7C75"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dsl-3782:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F8D1900-34CB-45D3-8DF3-503E10B75E5B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_2_en.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_2_en.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25894",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-18T22:15:19.040",
"lastModified": "2025-02-19T16:15:41.930",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-02T15:46:11.650",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dsl-3782_firmware:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FBB746-D313-4F4F-8F2E-32363A9C7C75"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dsl-3782:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F8D1900-34CB-45D3-8DF3-503E10B75E5B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_1_en.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_1_en.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25895",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-18T22:15:19.163",
"lastModified": "2025-02-19T16:15:42.087",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-02T15:46:08.903",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dsl-3782_firmware:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FBB746-D313-4F4F-8F2E-32363A9C7C75"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dsl-3782:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F8D1900-34CB-45D3-8DF3-503E10B75E5B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_3_en.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_3_en.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25896",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-18T22:15:19.277",
"lastModified": "2025-02-19T16:15:42.240",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-02T15:46:07.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dsl-3782_firmware:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FBB746-D313-4F4F-8F2E-32363A9C7C75"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dsl-3782:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F8D1900-34CB-45D3-8DF3-503E10B75E5B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link_DSL-3782_5.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link_DSL-3782_5.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28219",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-28T14:15:20.253",
"lastModified": "2025-04-21T19:15:19.700",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:41:20.993",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:dc112a_firmware:1.0.0.64:*:*:*:*:*:*:*",
"matchCriteriaId": "40766026-137D-4E44-9DEC-18E1B66CD074"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:dc112a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F87FFC46-137D-45B8-B437-F15565FB33D0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/IdaJea/IOT_vuln_1/blob/master/DC112A_V1.0.0.64/sub_69600.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-31324",
"sourceIdentifier": "cna@sap.com",
"published": "2025-04-24T17:15:35.913",
"lastModified": "2025-05-01T20:15:36.200",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T14:22:39.743",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -55,26 +75,58 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:netweaver:7.50:*:*:*:*:*:*:*",
"matchCriteriaId": "F2B37045-2FB7-49BB-AE38-B84FAA6ADFB0"
}
]
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3594142",
"source": "cna@sap.com"
"source": "cna@sap.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
"source": "cna@sap.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.bleepingcomputer.com/news/security/sap-fixes-suspected-netweaver-zero-day-exploited-in-attacks/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Press/Media Coverage"
]
},
{
"url": "https://www.theregister.com/2025/04/25/sap_netweaver_patch/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Press/Media Coverage"
]
},
{
"url": "https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-32755",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2025-04-10T12:15:16.547",
"lastModified": "2025-05-01T19:05:44.990",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-02T15:54:54.490",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
@ -65,12 +65,6 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:ssh-agent:*:*:*:*:*:docker:*:*",
"versionEndExcluding": "6.11.2",
"matchCriteriaId": "D635AFF6-449C-4436-9E85-BC40D217DB7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:ssh-slave:*:*:*:*:*:docker:*:*",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-3514",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-02T06:15:48.980",
"lastModified": "2025-05-02T13:52:51.693",
"lastModified": "2025-05-02T15:15:48.797",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "The SureForms WordPress plugin before 1.4.4 does not sanitise and escape some of its Form settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/fc3da503-a973-44d8-82d0-13539501f8c0/",

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2025-37797",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-05-02T15:15:48.557",
"lastModified": "2025-05-02T15:15:48.557",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a UAF vulnerability in class handling\n\nThis patch fixes a Use-After-Free vulnerability in the HFSC qdisc class\nhandling. The issue occurs due to a time-of-check/time-of-use condition\nin hfsc_change_class() when working with certain child qdiscs like netem\nor codel.\n\nThe vulnerability works as follows:\n1. hfsc_change_class() checks if a class has packets (q.qlen != 0)\n2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g.,\n codel, netem) might drop packets and empty the queue\n3. The code continues assuming the queue is still non-empty, adding\n the class to vttree\n4. This breaks HFSC scheduler assumptions that only non-empty classes\n are in vttree\n5. Later, when the class is destroyed, this can lead to a Use-After-Free\n\nThe fix adds a second queue length check after qdisc_peek_len() to verify\nthe queue wasn't emptied."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/20d584a33e480ae80d105f43e0e7b56784da41b9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/28b09a067831f7317c3841812276022d6c940677",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/39b9095dd3b55d9b2743df038c32138efa34a9de",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3aa852e3605000d5c47035c3fc3a986d14ccfa9f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3df275ef0a6ae181e8428a6589ef5d5231e58b5c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/86cd4641c713455a4f1c8e54c370c598c2b1cee0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/bb583c88d23b72d8d16453d24856c99bd93dadf5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fcc8ede663569c704fb00a702973bd6c00373283",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2025-37798",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-05-02T15:15:48.657",
"lastModified": "2025-05-02T15:15:48.657",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncodel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()\n\nAfter making all ->qlen_notify() callbacks idempotent, now it is safe to\nremove the check of qlen!=0 from both fq_codel_dequeue() and\ncodel_qdisc_dequeue()."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/2f9761a94bae33d26e6a81b31b36e7d776d93dc1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/342debc12183b51773b3345ba267e9263bdfaaef",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4d55144b12e742404bb3f8fee6038bafbf45619d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/829c49b6b2ff45b043739168fd1245e4e1a91a30",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a57fe60ef4cf96bfbb6b58397ec28bdb5a5c6b31",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e73c838c80dccb9e4f19becc11d9f3cb4a27d483",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2025-3927",
"sourceIdentifier": "cret@cert.org",
"published": "2025-05-02T15:15:49.017",
"lastModified": "2025-05-02T15:15:49.017",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cret@cert.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Digigram's PYKO-OUT audio-over-IP (AoIP) web-server does not require a password by default, allowing any attacker with the target IP address to connect and compromise the device, potentially pivoting to connected network or hardware devices."
}
],
"metrics": {},
"references": [
{
"url": "https://www.digigram.com/download/pyko-out-user-manual-en-jan-2019/",
"source": "cret@cert.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3928",
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2025-04-25T16:15:27.817",
"lastModified": "2025-05-02T03:15:20.997",
"vulnStatus": "Modified",
"lastModified": "2025-05-02T14:15:28.413",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -186,15 +186,25 @@
},
{
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-3928",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.commvault.com/blogs/notice-security-advisory-update",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.commvault.com/blogs/security-advisory-march-7-2025",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-4166",
"sourceIdentifier": "security@hashicorp.com",
"published": "2025-05-02T15:15:50.313",
"lastModified": "2025-05-02T15:15:50.313",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vault Community and Vault Enterprise Key/Value (kv) Version 2 plugin may unintentionally expose sensitive information in server and audit logs when users submit malformed payloads during secret creation or update operations via the Vault REST API. This vulnerability, identified as CVE-2025-4166, is fixed in Vault Community 1.19.3 and Vault Enterprise 1.19.3, 1.18.9, 1.17.16, 1.16.20."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@hashicorp.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@hashicorp.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-209"
}
]
}
],
"references": [
{
"url": "https://discuss.hashicorp.com/t/hcsec-2025-09-vault-may-expose-sensitive-information-in-error-logs-when-processing-malformed-data-with-the-kv-v2-plugin",
"source": "security@hashicorp.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-44868",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-02T15:15:49.123",
"lastModified": "2025-05-02T15:15:49.123",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Wavlink WL-WN530H4 20220801 was found to contain a command injection vulnerability in the ping_test function of the adm.cgi via the pingIp parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Summermu/VulnForIoT/tree/main/Wavlink_WL-WN530H4/ping_test/readme.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-44872",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-02T15:15:49.227",
"lastModified": "2025-05-02T15:15:49.227",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC9 V15.03.06.42_multi was found to contain a command injection vulnerability in the formsetUsbUnload function via the deviceName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Summermu/VulnForIoT/tree/main/Tenda_AC/AC9_formsetUsbUnload",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-44877",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-02T15:15:49.323",
"lastModified": "2025-05-02T15:15:49.323",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC9 V15.03.06.42_multi was found to contain a command injection vulnerability in the formSetSambaConf function via the usbname parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Summermu/VulnForIoT/tree/main/Tenda_AC/AC9_formSetSambaConf",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-46568",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-05-01T18:15:58.263",
"lastModified": "2025-05-02T13:52:51.693",
"lastModified": "2025-05-02T14:15:19.860",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -64,7 +64,7 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -77,6 +77,10 @@
{
"url": "https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-998c-x8hx-737r",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-998c-x8hx-737r",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-46625",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-01T20:15:38.037",
"lastModified": "2025-05-02T13:52:51.693",
"lastModified": "2025-05-02T14:15:19.957",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -22,20 +22,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-46630",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-01T20:15:38.803",
"lastModified": "2025-05-02T13:52:51.693",
"lastModified": "2025-05-02T15:15:49.420",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Los controles de acceso inadecuados en el portal de administraci\u00f3n web de Tenda RX2 Pro 16.03.30.14 permiten que un atacante remoto no autenticado habilite 'ate' (un binario de administraci\u00f3n del sistema remoto) enviando una solicitud web /goform/ate."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46630-enable-ate-unauthenticated-through-httpd",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-46631",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-01T20:15:39.010",
"lastModified": "2025-05-02T13:52:51.693",
"lastModified": "2025-05-02T15:15:49.560",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Los controles de acceso inadecuados en el portal de administraci\u00f3n web del Tenda RX2 Pro 16.03.30.14 permiten que un atacante remoto no autenticado habilite el acceso telnet al sistema operativo del enrutador mediante el env\u00edo de una solicitud web /goform/telnet."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46631-enable-telnet-unauthenticated-through-httpd",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-46632",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-01T20:15:39.167",
"lastModified": "2025-05-02T13:52:51.693",
"lastModified": "2025-05-02T15:15:49.710",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La reutilizaci\u00f3n del vector de inicializaci\u00f3n (IV) en el portal de administraci\u00f3n web de Tenda RX2 Pro 16.03.30.14 puede permitir que un atacante discierna informaci\u00f3n o descifre m\u00e1s f\u00e1cilmente los mensajes cifrados entre el cliente y el servidor."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-323"
}
]
}
],
"references": [
{
"url": "https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46632-static-iv-use-in-httpd",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-46633",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-01T20:15:39.310",
"lastModified": "2025-05-02T13:52:51.693",
"lastModified": "2025-05-02T15:15:49.853",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La transmisi\u00f3n de informaci\u00f3n confidencial en texto plano en el portal de administraci\u00f3n web del Tenda RX2 Pro 16.03.30.14 permite a un atacante descifrar el tr\u00e1fico entre el cliente y el servidor mediante la recopilaci\u00f3n de la clave AES sim\u00e9trica del tr\u00e1fico recopilado u observado. La clave AES se env\u00eda en texto plano en respuesta a una autenticaci\u00f3n exitosa. El IV siempre es EU5H62G9ICGRNI43."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"references": [
{
"url": "https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46633-transmission-of-plaintext-symmetric-key-in-httpd",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-46634",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-01T20:15:39.460",
"lastModified": "2025-05-02T13:52:51.693",
"lastModified": "2025-05-02T15:15:50.023",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La transmisi\u00f3n de informaci\u00f3n confidencial en texto plano en el portal de administraci\u00f3n web del Tenda RX2 Pro 16.03.30.14 podr\u00eda permitir que un atacante no autenticado se autentique en dicho portal recopilando credenciales del tr\u00e1fico observado/recopilado. Implementa cifrado, pero solo despu\u00e9s de que el usuario haya transmitido el hash de su contrase\u00f1a en texto plano. El hash puede reproducirse para la autenticaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"references": [
{
"url": "https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46634-transmission-of-plaintext-credentials-in-httpd",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-46635",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-01T20:15:39.600",
"lastModified": "2025-05-02T13:52:51.693",
"lastModified": "2025-05-02T15:15:50.167",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se detect\u00f3 un problema en los dispositivos Tenda RX2 Pro 16.03.30.14. Un aislamiento de red inadecuado entre la red Wi-Fi de invitado y otras interfaces de red del router permite a un atacante (autenticado en la red Wi-Fi de invitado) acceder a recursos del router o a recursos y dispositivos de otras redes alojadas por este configurando una direcci\u00f3n IP est\u00e1tica (dentro de la subred no de invitado) en su host."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://blog.uturn.dev/#/writeups/iot-village/tenda-w18e/README?id=cve-2024-46435-delfacebookpic-stack-overflow",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-05-02T14:00:21.284315+00:00
2025-05-02T16:00:20.658717+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-05-02T13:53:49.480000+00:00
2025-05-02T15:54:54.490000+00:00
```
### Last Data Feed Release
@ -33,48 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
292291
292300
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `9`
- [CVE-2025-2421](CVE-2025/CVE-2025-24xx/CVE-2025-2421.json) (`2025-05-02T12:15:15.803`)
- [CVE-2025-2488](CVE-2025/CVE-2025-24xx/CVE-2025-2488.json) (`2025-05-02T12:15:16.340`)
- [CVE-2025-2605](CVE-2025/CVE-2025-26xx/CVE-2025-2605.json) (`2025-05-02T13:15:46.440`)
- [CVE-2025-4204](CVE-2025/CVE-2025-42xx/CVE-2025-4204.json) (`2025-05-02T13:15:47.423`)
- [CVE-2025-1883](CVE-2025/CVE-2025-18xx/CVE-2025-1883.json) (`2025-05-02T15:15:48.317`)
- [CVE-2025-1884](CVE-2025/CVE-2025-18xx/CVE-2025-1884.json) (`2025-05-02T15:15:48.440`)
- [CVE-2025-37797](CVE-2025/CVE-2025-377xx/CVE-2025-37797.json) (`2025-05-02T15:15:48.557`)
- [CVE-2025-37798](CVE-2025/CVE-2025-377xx/CVE-2025-37798.json) (`2025-05-02T15:15:48.657`)
- [CVE-2025-3927](CVE-2025/CVE-2025-39xx/CVE-2025-3927.json) (`2025-05-02T15:15:49.017`)
- [CVE-2025-4166](CVE-2025/CVE-2025-41xx/CVE-2025-4166.json) (`2025-05-02T15:15:50.313`)
- [CVE-2025-44868](CVE-2025/CVE-2025-448xx/CVE-2025-44868.json) (`2025-05-02T15:15:49.123`)
- [CVE-2025-44872](CVE-2025/CVE-2025-448xx/CVE-2025-44872.json) (`2025-05-02T15:15:49.227`)
- [CVE-2025-44877](CVE-2025/CVE-2025-448xx/CVE-2025-44877.json) (`2025-05-02T15:15:49.323`)
### CVEs modified in the last Commit
Recently modified CVEs: `612`
Recently modified CVEs: `52`
- [CVE-2025-46552](CVE-2025/CVE-2025-465xx/CVE-2025-46552.json) (`2025-05-02T13:53:40.163`)
- [CVE-2025-46554](CVE-2025/CVE-2025-465xx/CVE-2025-46554.json) (`2025-05-02T13:53:40.163`)
- [CVE-2025-46557](CVE-2025/CVE-2025-465xx/CVE-2025-46557.json) (`2025-05-02T13:53:40.163`)
- [CVE-2025-46558](CVE-2025/CVE-2025-465xx/CVE-2025-46558.json) (`2025-05-02T13:53:40.163`)
- [CVE-2025-46560](CVE-2025/CVE-2025-465xx/CVE-2025-46560.json) (`2025-05-02T13:53:40.163`)
- [CVE-2025-46565](CVE-2025/CVE-2025-465xx/CVE-2025-46565.json) (`2025-05-02T13:52:51.693`)
- [CVE-2025-46566](CVE-2025/CVE-2025-465xx/CVE-2025-46566.json) (`2025-05-02T13:52:51.693`)
- [CVE-2025-46567](CVE-2025/CVE-2025-465xx/CVE-2025-46567.json) (`2025-05-02T13:52:51.693`)
- [CVE-2025-46568](CVE-2025/CVE-2025-465xx/CVE-2025-46568.json) (`2025-05-02T13:52:51.693`)
- [CVE-2025-46569](CVE-2025/CVE-2025-465xx/CVE-2025-46569.json) (`2025-05-02T13:52:51.693`)
- [CVE-2025-46619](CVE-2025/CVE-2025-466xx/CVE-2025-46619.json) (`2025-05-02T13:53:40.163`)
- [CVE-2025-46625](CVE-2025/CVE-2025-466xx/CVE-2025-46625.json) (`2025-05-02T13:52:51.693`)
- [CVE-2025-46626](CVE-2025/CVE-2025-466xx/CVE-2025-46626.json) (`2025-05-02T13:52:51.693`)
- [CVE-2025-46627](CVE-2025/CVE-2025-466xx/CVE-2025-46627.json) (`2025-05-02T13:52:51.693`)
- [CVE-2025-46628](CVE-2025/CVE-2025-466xx/CVE-2025-46628.json) (`2025-05-02T13:52:51.693`)
- [CVE-2025-46629](CVE-2025/CVE-2025-466xx/CVE-2025-46629.json) (`2025-05-02T13:52:51.693`)
- [CVE-2025-46630](CVE-2025/CVE-2025-466xx/CVE-2025-46630.json) (`2025-05-02T13:52:51.693`)
- [CVE-2025-46631](CVE-2025/CVE-2025-466xx/CVE-2025-46631.json) (`2025-05-02T13:52:51.693`)
- [CVE-2025-46632](CVE-2025/CVE-2025-466xx/CVE-2025-46632.json) (`2025-05-02T13:52:51.693`)
- [CVE-2025-46633](CVE-2025/CVE-2025-466xx/CVE-2025-46633.json) (`2025-05-02T13:52:51.693`)
- [CVE-2025-46634](CVE-2025/CVE-2025-466xx/CVE-2025-46634.json) (`2025-05-02T13:52:51.693`)
- [CVE-2025-46635](CVE-2025/CVE-2025-466xx/CVE-2025-46635.json) (`2025-05-02T13:52:51.693`)
- [CVE-2025-47153](CVE-2025/CVE-2025-471xx/CVE-2025-47153.json) (`2025-05-02T13:53:40.163`)
- [CVE-2025-47154](CVE-2025/CVE-2025-471xx/CVE-2025-47154.json) (`2025-05-02T13:53:40.163`)
- [CVE-2025-47201](CVE-2025/CVE-2025-472xx/CVE-2025-47201.json) (`2025-05-02T13:52:51.693`)
- [CVE-2024-52019](CVE-2024/CVE-2024-520xx/CVE-2024-52019.json) (`2025-05-02T15:39:38.770`)
- [CVE-2024-52020](CVE-2024/CVE-2024-520xx/CVE-2024-52020.json) (`2025-05-02T15:39:40.467`)
- [CVE-2024-52021](CVE-2024/CVE-2024-520xx/CVE-2024-52021.json) (`2025-05-02T15:39:42.457`)
- [CVE-2024-52028](CVE-2024/CVE-2024-520xx/CVE-2024-52028.json) (`2025-05-02T15:36:28.180`)
- [CVE-2024-52029](CVE-2024/CVE-2024-520xx/CVE-2024-52029.json) (`2025-05-02T15:36:25.380`)
- [CVE-2024-52030](CVE-2024/CVE-2024-520xx/CVE-2024-52030.json) (`2025-05-02T15:36:21.870`)
- [CVE-2025-25891](CVE-2025/CVE-2025-258xx/CVE-2025-25891.json) (`2025-05-02T15:46:16.683`)
- [CVE-2025-25892](CVE-2025/CVE-2025-258xx/CVE-2025-25892.json) (`2025-05-02T15:46:15.050`)
- [CVE-2025-25893](CVE-2025/CVE-2025-258xx/CVE-2025-25893.json) (`2025-05-02T15:46:13.270`)
- [CVE-2025-25894](CVE-2025/CVE-2025-258xx/CVE-2025-25894.json) (`2025-05-02T15:46:11.650`)
- [CVE-2025-25895](CVE-2025/CVE-2025-258xx/CVE-2025-25895.json) (`2025-05-02T15:46:08.903`)
- [CVE-2025-25896](CVE-2025/CVE-2025-258xx/CVE-2025-25896.json) (`2025-05-02T15:46:07.087`)
- [CVE-2025-28219](CVE-2025/CVE-2025-282xx/CVE-2025-28219.json) (`2025-05-02T15:41:20.993`)
- [CVE-2025-31324](CVE-2025/CVE-2025-313xx/CVE-2025-31324.json) (`2025-05-02T14:22:39.743`)
- [CVE-2025-32755](CVE-2025/CVE-2025-327xx/CVE-2025-32755.json) (`2025-05-02T15:54:54.490`)
- [CVE-2025-3514](CVE-2025/CVE-2025-35xx/CVE-2025-3514.json) (`2025-05-02T15:15:48.797`)
- [CVE-2025-3928](CVE-2025/CVE-2025-39xx/CVE-2025-3928.json) (`2025-05-02T14:15:28.413`)
- [CVE-2025-46568](CVE-2025/CVE-2025-465xx/CVE-2025-46568.json) (`2025-05-02T14:15:19.860`)
- [CVE-2025-46625](CVE-2025/CVE-2025-466xx/CVE-2025-46625.json) (`2025-05-02T14:15:19.957`)
- [CVE-2025-46630](CVE-2025/CVE-2025-466xx/CVE-2025-46630.json) (`2025-05-02T15:15:49.420`)
- [CVE-2025-46631](CVE-2025/CVE-2025-466xx/CVE-2025-46631.json) (`2025-05-02T15:15:49.560`)
- [CVE-2025-46632](CVE-2025/CVE-2025-466xx/CVE-2025-46632.json) (`2025-05-02T15:15:49.710`)
- [CVE-2025-46633](CVE-2025/CVE-2025-466xx/CVE-2025-46633.json) (`2025-05-02T15:15:49.853`)
- [CVE-2025-46634](CVE-2025/CVE-2025-466xx/CVE-2025-46634.json) (`2025-05-02T15:15:50.023`)
- [CVE-2025-46635](CVE-2025/CVE-2025-466xx/CVE-2025-46635.json) (`2025-05-02T15:15:50.167`)
## Download and Usage

1325
_state.csv

File diff suppressed because it is too large Load Diff