mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2025-07-06T08:00:14.455300+00:00
This commit is contained in:
parent
15d2fc0b19
commit
fcc8757ea8
33
CVE-2025/CVE-2025-274xx/CVE-2025-27446.json
Normal file
33
CVE-2025/CVE-2025-274xx/CVE-2025-27446.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-27446",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2025-07-06T06:15:21.587",
|
||||
"lastModified": "2025-07-06T06:15:21.587",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Permission Assignment for Critical Resource vulnerability in Apache APISIX(java-plugin-runner).\n\nLocal listening file permissions in APISIX plugin runner allow a local attacker to elevate privileges.\nThis issue affects Apache APISIX(java-plugin-runner): from 0.2.0 through 0.5.0.\n\nUsers are recommended to upgrade to version 0.6.0 or higher, which fixes the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/qwxnxolt0j5nvjfpr0mlz6h7nrtvyzng",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-70xx/CVE-2025-7077.json
Normal file
141
CVE-2025/CVE-2025-70xx/CVE-2025-7077.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-7077",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-07-06T07:15:35.383",
|
||||
"lastModified": "2025-07-06T07:15:35.383",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in Shenzhen Libituo Technology LBT-T300-T310 up to 2.2.3.6. This affects the function config_3g_para of the file /appy.cgi. The manipulation of the argument username_3g/password_3g leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FLY200503/IoT-vul/tree/master/LBT-T300",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.314991",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.314991",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.603012",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
37
README.md
37
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-07-06T02:00:10.922955+00:00
|
||||
2025-07-06T08:00:14.455300+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-07-06T01:15:20.563000+00:00
|
||||
2025-07-06T07:15:35.383000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,46 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
300506
|
||||
300508
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2025-7075](CVE-2025/CVE-2025-70xx/CVE-2025-7075.json) (`2025-07-06T00:15:22.177`)
|
||||
- [CVE-2025-7076](CVE-2025/CVE-2025-70xx/CVE-2025-7076.json) (`2025-07-06T01:15:20.563`)
|
||||
- [CVE-2025-27446](CVE-2025/CVE-2025-274xx/CVE-2025-27446.json) (`2025-07-06T06:15:21.587`)
|
||||
- [CVE-2025-7077](CVE-2025/CVE-2025-70xx/CVE-2025-7077.json) (`2025-07-06T07:15:35.383`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1948`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2025-6903](CVE-2025/CVE-2025-69xx/CVE-2025-6903.json) (`2025-06-30T18:38:23.493`)
|
||||
- [CVE-2025-6904](CVE-2025/CVE-2025-69xx/CVE-2025-6904.json) (`2025-06-30T18:38:23.493`)
|
||||
- [CVE-2025-6905](CVE-2025/CVE-2025-69xx/CVE-2025-6905.json) (`2025-06-30T18:38:23.493`)
|
||||
- [CVE-2025-6908](CVE-2025/CVE-2025-69xx/CVE-2025-6908.json) (`2025-06-30T18:38:23.493`)
|
||||
- [CVE-2025-6909](CVE-2025/CVE-2025-69xx/CVE-2025-6909.json) (`2025-06-30T18:38:23.493`)
|
||||
- [CVE-2025-6910](CVE-2025/CVE-2025-69xx/CVE-2025-6910.json) (`2025-06-30T18:38:23.493`)
|
||||
- [CVE-2025-6911](CVE-2025/CVE-2025-69xx/CVE-2025-6911.json) (`2025-06-30T18:38:23.493`)
|
||||
- [CVE-2025-6912](CVE-2025/CVE-2025-69xx/CVE-2025-6912.json) (`2025-06-30T18:38:23.493`)
|
||||
- [CVE-2025-6913](CVE-2025/CVE-2025-69xx/CVE-2025-6913.json) (`2025-06-30T18:38:23.493`)
|
||||
- [CVE-2025-6914](CVE-2025/CVE-2025-69xx/CVE-2025-6914.json) (`2025-06-30T18:38:23.493`)
|
||||
- [CVE-2025-6915](CVE-2025/CVE-2025-69xx/CVE-2025-6915.json) (`2025-06-30T18:38:23.493`)
|
||||
- [CVE-2025-6916](CVE-2025/CVE-2025-69xx/CVE-2025-6916.json) (`2025-06-30T21:15:32.730`)
|
||||
- [CVE-2025-6917](CVE-2025/CVE-2025-69xx/CVE-2025-6917.json) (`2025-06-30T18:38:23.493`)
|
||||
- [CVE-2025-6925](CVE-2025/CVE-2025-69xx/CVE-2025-6925.json) (`2025-06-30T19:15:25.920`)
|
||||
- [CVE-2025-6926](CVE-2025/CVE-2025-69xx/CVE-2025-6926.json) (`2025-07-03T18:15:22.797`)
|
||||
- [CVE-2025-6938](CVE-2025/CVE-2025-69xx/CVE-2025-6938.json) (`2025-07-03T15:14:12.767`)
|
||||
- [CVE-2025-6939](CVE-2025/CVE-2025-69xx/CVE-2025-6939.json) (`2025-07-03T15:14:12.767`)
|
||||
- [CVE-2025-6940](CVE-2025/CVE-2025-69xx/CVE-2025-6940.json) (`2025-07-03T15:14:12.767`)
|
||||
- [CVE-2025-6944](CVE-2025/CVE-2025-69xx/CVE-2025-6944.json) (`2025-07-04T06:15:25.203`)
|
||||
- [CVE-2025-6953](CVE-2025/CVE-2025-69xx/CVE-2025-6953.json) (`2025-07-03T15:14:12.767`)
|
||||
- [CVE-2025-6954](CVE-2025/CVE-2025-69xx/CVE-2025-6954.json) (`2025-07-03T15:14:12.767`)
|
||||
- [CVE-2025-6955](CVE-2025/CVE-2025-69xx/CVE-2025-6955.json) (`2025-07-03T15:14:12.767`)
|
||||
- [CVE-2025-6956](CVE-2025/CVE-2025-69xx/CVE-2025-6956.json) (`2025-07-03T15:14:12.767`)
|
||||
- [CVE-2025-7046](CVE-2025/CVE-2025-70xx/CVE-2025-7046.json) (`2025-07-04T03:15:23.743`)
|
||||
- [CVE-2025-7053](CVE-2025/CVE-2025-70xx/CVE-2025-7053.json) (`2025-07-04T03:15:23.917`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
3902
_state.csv
3902
_state.csv
File diff suppressed because it is too large
Load Diff
Loading…
x
Reference in New Issue
Block a user