From d94ff328194e388e729e6b8526295aad16564964 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 13 Apr 2025 08:04:22 +0000 Subject: [PATCH] Auto-Update: 2025-04-13T08:00:19.417007+00:00 --- CVE-2025/CVE-2025-35xx/CVE-2025-3531.json | 145 ++++++++++++++++++++++ CVE-2025/CVE-2025-35xx/CVE-2025-3532.json | 141 +++++++++++++++++++++ README.md | 13 +- _state.csv | 4 +- 4 files changed, 296 insertions(+), 7 deletions(-) create mode 100644 CVE-2025/CVE-2025-35xx/CVE-2025-3531.json create mode 100644 CVE-2025/CVE-2025-35xx/CVE-2025-3532.json diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3531.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3531.json new file mode 100644 index 00000000000..91ed457e89d --- /dev/null +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3531.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-3531", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-13T06:15:14.170", + "lastModified": "2025-04-13T06:15:14.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in YouDianCMS 9.5.21. This affects an unknown part of the file /App/Tpl/Admin/Default/Log/index.html. The manipulation of the argument UserName/LogType leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zonesec0/findcve/issues/4", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/zonesec0/findcve/issues/5", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.304569", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.304569", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.543080", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3532.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3532.json new file mode 100644 index 00000000000..3037e381137 --- /dev/null +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3532.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-3532", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-13T06:15:15.843", + "lastModified": "2025-04-13T06:15:15.843", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in YouDianCMS 9.5.21. This vulnerability affects unknown code of the file /App/Tpl/Member/Default/Order/index.html.Attackers. The manipulation of the argument OrderNumber leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zonesec0/findcve/issues/6", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.304570", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.304570", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.543082", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b00ca6276e3..300f4f67e03 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-13T06:00:19.948248+00:00 +2025-04-13T08:00:19.417007+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-13T04:15:15.777000+00:00 +2025-04-13T06:15:15.843000+00:00 ``` ### Last Data Feed Release @@ -33,20 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -289719 +289721 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `2` +- [CVE-2025-3531](CVE-2025/CVE-2025-35xx/CVE-2025-3531.json) (`2025-04-13T06:15:14.170`) +- [CVE-2025-3532](CVE-2025/CVE-2025-35xx/CVE-2025-3532.json) (`2025-04-13T06:15:15.843`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -- [CVE-2025-0395](CVE-2025/CVE-2025-03xx/CVE-2025-0395.json) (`2025-04-13T04:15:15.777`) ## Download and Usage diff --git a/_state.csv b/_state.csv index eeadb6d1e1b..782b97f7b88 100644 --- a/_state.csv +++ b/_state.csv @@ -281445,7 +281445,7 @@ CVE-2025-0391,0,0,0467368bada2df94a15908d4f5a949241716a78292a611cf2ebdc384e88dff CVE-2025-0392,0,0,6d776f15a1615409f95c7590d77895411eaef103ad79522fbedabde2ae1bcf6e,2025-01-11T11:15:06.657000 CVE-2025-0393,0,0,74b1491fc9d1d332b7cea13756d765de036ad1e5aabef642cce253224abebfeb,2025-03-03T18:44:25.393000 CVE-2025-0394,0,0,8af05602da319139a083fa2a7a4d905dc508d9028abbcf98db5f09623dbab6ca,2025-01-14T09:15:21.430000 -CVE-2025-0395,0,1,39c6a72a092ae914c8d2ca06f4f0a91a249fc0dd2653680f2d523c990003db7e,2025-04-13T04:15:15.777000 +CVE-2025-0395,0,0,39c6a72a092ae914c8d2ca06f4f0a91a249fc0dd2653680f2d523c990003db7e,2025-04-13T04:15:15.777000 CVE-2025-0396,0,0,b1ad63be952ebb25b29036632d23a5d199acb4c2189238a997d4a9d9ed4a3a46,2025-01-12T12:15:17.963000 CVE-2025-0397,0,0,fc2836035f8f0734fbc89dbf3d5d6ca5a6d8f9324d4d87855a3361cc69455d9f,2025-01-12T13:15:07.333000 CVE-2025-0398,0,0,7635a06cfc090a7002e0ac0d2d6a644dce64169ca946e1fb581e4d24bb6a960c,2025-01-12T14:15:08.993000 @@ -289718,3 +289718,5 @@ CVE-2025-3474,0,0,86c754cf553decd220dba53e5d0d63448d8121da39946fc69feccec7149819 CVE-2025-3475,0,0,443d35ed0e717701a1888d83d8695b8f16fb37648583a3e79025b880997d544a,2025-04-09T20:02:41.860000 CVE-2025-3489,0,0,67fcd6c9f94bb6bf638f4e8bb2240b0887ef71aca32f3728fb5180eccf26711c,2025-04-11T15:40:10.277000 CVE-2025-3512,0,0,036d013cd0e3204c7e29f8f12826d9befccf940571ea0ad101dc3475585d72f8,2025-04-11T15:39:52.920000 +CVE-2025-3531,1,1,946098fc7b20929a2c2464b28ec15541a0e1d591be957392397507aeb9e352c7,2025-04-13T06:15:14.170000 +CVE-2025-3532,1,1,022dcfbac09a9d7714f7fba4a6d70ab148637d7bb3cd4719f4211cbd8a34558e,2025-04-13T06:15:15.843000