mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2025-03-16T23:00:20.116017+00:00
This commit is contained in:
parent
6360652d59
commit
de7c411de2
133
CVE-2025/CVE-2025-23xx/CVE-2025-2347.json
Normal file
133
CVE-2025/CVE-2025-23xx/CVE-2025-2347.json
Normal file
@ -0,0 +1,133 @@
|
||||
{
|
||||
"id": "CVE-2025-2347",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-16T21:15:37.617",
|
||||
"lastModified": "2025-03-16T21:15:37.617",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in IROAD Dash Cam FX2 up to 20250308 and classified as problematic. This issue affects some unknown processing of the component Device Registration. The manipulation of the argument Password with the input qwertyuiop leads to use of default password. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 5.8,
|
||||
"accessVector": "ADJACENT_NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 6.5,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1393"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-7-bypass-of-device-pairingregistration-for-iroad-fx2",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.299813",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.299813",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2025/CVE-2025-23xx/CVE-2025-2348.json
Normal file
137
CVE-2025/CVE-2025-23xx/CVE-2025-2348.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2025-2348",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-16T21:15:37.783",
|
||||
"lastModified": "2025-03-16T21:15:37.783",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in IROAD Dash Cam FX2 up to 20250308. It has been classified as problematic. Affected is an unknown function of the file /mnt/extsd/event/ of the component HTTP/RTSP. The manipulation leads to information disclosure. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
|
||||
"baseScore": 3.3,
|
||||
"accessVector": "ADJACENT_NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 6.5,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-8-dumping-files-over-http-and-rtsp-without-authentication",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.299814",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.299814",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2025/CVE-2025-23xx/CVE-2025-2349.json
Normal file
137
CVE-2025/CVE-2025-23xx/CVE-2025-2349.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2025-2349",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-16T22:15:11.747",
|
||||
"lastModified": "2025-03-16T22:15:11.747",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in IROAD Dash Cam FX2 up to 20250308. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /etc/passwd of the component Password Hash Handler. The manipulation leads to password hash with insufficient computational effort. Access to the local network is required for this attack. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 2.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
|
||||
"baseScore": 1.8,
|
||||
"accessVector": "ADJACENT_NETWORK",
|
||||
"accessComplexity": "HIGH",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 3.2,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-326"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-916"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-9-exposed-root-password",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.299815",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.299815",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-23xx/CVE-2025-2350.json
Normal file
141
CVE-2025/CVE-2025-23xx/CVE-2025-2350.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-2350",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-16T22:15:13.023",
|
||||
"lastModified": "2025-03-16T22:15:13.023",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in IROAD Dash Cam FX2 up to 20250308. It has been rated as critical. Affected by this issue is some unknown functionality of the file /action/upload_file. The manipulation leads to unrestricted upload. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 5.8,
|
||||
"accessVector": "ADJACENT_NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 6.5,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-10-unauthenticated-uploads",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-11-unrestricted-webshell",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.299816",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.299816",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
14
README.md
14
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-16T21:00:19.269698+00:00
|
||||
2025-03-16T23:00:20.116017+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-16T20:15:11.603000+00:00
|
||||
2025-03-16T22:15:13.023000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,15 +33,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
285354
|
||||
285358
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2025-2345](CVE-2025/CVE-2025-23xx/CVE-2025-2345.json) (`2025-03-16T19:15:36.510`)
|
||||
- [CVE-2025-2346](CVE-2025/CVE-2025-23xx/CVE-2025-2346.json) (`2025-03-16T20:15:11.603`)
|
||||
- [CVE-2025-2347](CVE-2025/CVE-2025-23xx/CVE-2025-2347.json) (`2025-03-16T21:15:37.617`)
|
||||
- [CVE-2025-2348](CVE-2025/CVE-2025-23xx/CVE-2025-2348.json) (`2025-03-16T21:15:37.783`)
|
||||
- [CVE-2025-2349](CVE-2025/CVE-2025-23xx/CVE-2025-2349.json) (`2025-03-16T22:15:11.747`)
|
||||
- [CVE-2025-2350](CVE-2025/CVE-2025-23xx/CVE-2025-2350.json) (`2025-03-16T22:15:13.023`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
@ -283169,7 +283169,7 @@ CVE-2025-23445,0,0,641133bc0863203a2790eaa4ca8b7599bd8c7c6922be0e426f2e225feec30
|
||||
CVE-2025-23446,0,0,e6f9e978833a7871e5161c7568ac19d4275eea8b1b6a93cc3e1abd71a8d20aed,2025-03-03T14:15:35.500000
|
||||
CVE-2025-23447,0,0,eb5ca7ad3f4a8ae4ae11ec7bdaa46eb4cce3b1511628fa2b58ed43f7b495f6df,2025-03-03T14:15:35.637000
|
||||
CVE-2025-23449,0,0,9861de2bb02130e19fdbef202b482545d141110bfd57643033355d06e9dabdca,2025-01-22T15:15:15.650000
|
||||
CVE-2025-2345,1,1,c943899a8d870f03a1e81c0a5654034c46d798fdb4c840b60b2cecc3f70a5bc4,2025-03-16T19:15:36.510000
|
||||
CVE-2025-2345,0,0,c943899a8d870f03a1e81c0a5654034c46d798fdb4c840b60b2cecc3f70a5bc4,2025-03-16T19:15:36.510000
|
||||
CVE-2025-23450,0,0,ffde507d42dc6c5721d5d8f203b57f84d570a6fa59f6007c92ef432b218ca44b,2025-03-03T14:15:35.780000
|
||||
CVE-2025-23451,0,0,a313555798bd3856c6ce8808f0153b1b43635388cd9badfe1b4d9f9c2ddc80d9,2025-03-03T14:15:35.920000
|
||||
CVE-2025-23452,0,0,9ae20555b511c9e710c7a052682906033b9071856145809833c544b191d171ae,2025-01-16T20:15:35.730000
|
||||
@ -283178,7 +283178,7 @@ CVE-2025-23454,0,0,ace1a82fe5cff36bdca7766343683a02cd2df950eb3a0de3ea36f28eddda7
|
||||
CVE-2025-23455,0,0,b68e42bf1b83a50e0ae3f133160e0d1ee1a7c47161ff1547208b101f38e9ccf6,2025-01-16T20:15:36.033000
|
||||
CVE-2025-23456,0,0,b9d69f441ecef487989469cbcdd543bce473422ca06c51c0b02404c7506af3d0,2025-01-16T20:15:36.247000
|
||||
CVE-2025-23457,0,0,986871805bb278c802f2d565eaf70f336dd71bac5bf52dcdc838d471378e54a5,2025-01-27T14:15:28.373000
|
||||
CVE-2025-2346,1,1,ac993a36f4e59fe20b5902ca5479eb0aa7a2a5bfe17081e8b0ad38e0fdb6bfa5,2025-03-16T20:15:11.603000
|
||||
CVE-2025-2346,0,0,ac993a36f4e59fe20b5902ca5479eb0aa7a2a5bfe17081e8b0ad38e0fdb6bfa5,2025-03-16T20:15:11.603000
|
||||
CVE-2025-23461,0,0,98b2580e5c2e45a2882850561564e0c4ed549e275719c2e53782b2517aab4e0b,2025-01-21T18:15:16.387000
|
||||
CVE-2025-23462,0,0,f1d946acd1b6b97ba142139f225fbf51751f08a101be4aaf7927889e6462f843,2025-01-22T15:15:15.800000
|
||||
CVE-2025-23463,0,0,98d57f4a46d47d157b5ed19edc615443bfb511b5852b7cb0045c98e9789a1faf,2025-01-16T20:15:36.397000
|
||||
@ -283186,6 +283186,7 @@ CVE-2025-23464,0,0,2d2dec24b28420bd0cc62f320b0cd789ea9ec6fe1293ce5d1d92b41bfb20a
|
||||
CVE-2025-23465,0,0,5453b3fbdaaf8a6c6dae1cf225d47e064bf67f3d39cf8a5f667393b17cc9666c,2025-03-03T14:15:36.213000
|
||||
CVE-2025-23467,0,0,2bf367475f14e1f3924f0a4f22a4aea1a79671e1b9e87972e80793a0f370189e,2025-01-16T20:15:36.547000
|
||||
CVE-2025-23468,0,0,146612e9c0cde7fecc23e59a0f5a84ad09e5f947fb41b9a85847d1878aa53ed4,2025-03-03T14:15:36.357000
|
||||
CVE-2025-2347,1,1,80fc2161ec781f778201d85eae58374e71ef4ba69373c8d0a7a45302d1513fbd,2025-03-16T21:15:37.617000
|
||||
CVE-2025-23470,0,0,8848375424af5ed790014076bbf48be372e428fab979e2d67fe4f034138fca32,2025-01-16T20:15:36.700000
|
||||
CVE-2025-23471,0,0,8559e2ce78e3acc0fab057aadfea445292e3f0c4980827d748c143f09c30fffa,2025-01-16T20:15:36.840000
|
||||
CVE-2025-23472,0,0,6bff6916383e657faa5792ff801452713358809d9c8eb7837e6db20971dbe26b,2025-03-03T14:15:36.497000
|
||||
@ -283196,6 +283197,7 @@ CVE-2025-23476,0,0,2e73d00e315595f7a053681ff301d905967319719056a5b9f811682d4d934
|
||||
CVE-2025-23477,0,0,5c6098808319de4505951baebf1a586e4793ae0be4627c3cf65438e22beac475,2025-01-21T18:15:16.570000
|
||||
CVE-2025-23478,0,0,7816e5f1a295946efb2ccc23f508bf79e3db4e9b2c3901a72fa3ffbf972b8770,2025-03-03T14:15:36.777000
|
||||
CVE-2025-23479,0,0,cdcb9a9761a2d09c079e487aee389b609788690d2b6aacadc7127bf962e5326a,2025-03-03T14:15:36.920000
|
||||
CVE-2025-2348,1,1,5c2e1dedf4a28feda86b67975957771328f14ff98c3741863bf8339214a82334,2025-03-16T21:15:37.783000
|
||||
CVE-2025-23480,0,0,da73376d49c59465468f55e3dad692b0ad87164665dc8c174e57f224c1a91b58,2025-03-03T14:15:37.060000
|
||||
CVE-2025-23481,0,0,7735e60f515443d36a8e8421ee1c9666bc06bd0c0a7fa56464454e844755b02c,2025-03-03T14:15:37.207000
|
||||
CVE-2025-23482,0,0,c17caebb775970fa58c03f48c04f5b353183bc0a916a66355b8dea35fcb084f2,2025-03-03T14:15:37.367000
|
||||
@ -283206,6 +283208,7 @@ CVE-2025-23486,0,0,db15fe8e353e3dbb641397d86d33ed6d64f36b2de802bd430384278f6b43f
|
||||
CVE-2025-23487,0,0,16345e2992279b3ef951f4bbc770e2fed59e7af149e5bf1b0a21dc98e22382df,2025-03-03T14:15:37.787000
|
||||
CVE-2025-23488,0,0,a39c51053c4ec97bbc9699aebd5caaea319e89cf525bb91db78b6079b8e31071,2025-03-03T14:15:37.930000
|
||||
CVE-2025-23489,0,0,a8502fb4e83bb7ba28297e2543a85c84c18f12fcd380f120406bbfcdc0815675,2025-01-21T18:15:16.740000
|
||||
CVE-2025-2349,1,1,58dc1498d316d95ecaf4e5b480aec251c744828e4006b8088176bbb59ec3f6b9,2025-03-16T22:15:11.747000
|
||||
CVE-2025-23490,0,0,8b8bb0e45d151766ce75bb2cd7b73b6e4f35c9dbbdf35d395780a7869ad64947,2025-03-03T14:15:38.077000
|
||||
CVE-2025-23491,0,0,b6e04909bb37731409bf7190d1070864f039d5a61566e683ba212ff3dd649d05,2025-02-03T15:15:20.640000
|
||||
CVE-2025-23492,0,0,acff49799bed9b05d17cef1cd5fc93691c99856666ac52115fd66570fdfffd16,2025-02-14T13:15:43.573000
|
||||
@ -283216,6 +283219,7 @@ CVE-2025-23496,0,0,099f95bf73114288ca27feea3bf546897da191376f2d3f822c90194deb630
|
||||
CVE-2025-23497,0,0,e94acfea44c4d198d5a805782578eef8be632de6ca980583b81a625d10980e86,2025-01-16T20:15:37.293000
|
||||
CVE-2025-23498,0,0,636b120a74cbfb3524538ea103d8fb93424975cb4826227d74647c0da497f2d4,2025-01-22T15:15:16.370000
|
||||
CVE-2025-23499,0,0,18de021795ada6e9003ac109fee0e567e9be54c39a2e050c169b423a62e8fca7,2025-01-16T20:15:37.440000
|
||||
CVE-2025-2350,1,1,28e8d685012e5ca9585e626b8a9b487b473d35cd1015656b907354f3cc6fb8ee,2025-03-16T22:15:13.023000
|
||||
CVE-2025-23500,0,0,194d70a41828aed88d1340c39622c2eea4fe93a355a56d82c66d50fb6a7ee75a,2025-01-22T15:15:16.500000
|
||||
CVE-2025-23501,0,0,2ca3004ea38a2bebeea912643e9114dc05292b671294dc56e8b3bf1f4edc5f4c,2025-01-16T20:15:37.593000
|
||||
CVE-2025-23502,0,0,57675ab4eb277e81bf38525805d9f7acfc03203c7f00a1ad5ad7431af0fcaa90,2025-03-03T14:15:38.633000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user