Skip to content

Commit ed6505a

Browse files
committed
Auto-Update: 2025-03-17T05:00:20.298229+00:00
1 parent 3d99bcc commit ed6505a

14 files changed

+585
-37
lines changed

CVE-2025/CVE-2025-06xx/CVE-2025-0624.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"id": "CVE-2025-0624",
33
"sourceIdentifier": "[email protected]",
44
"published": "2025-02-19T19:15:15.120",
5-
"lastModified": "2025-03-13T16:15:26.310",
5+
"lastModified": "2025-03-17T03:15:37.830",
66
"vulnStatus": "Awaiting Analysis",
77
"cveTags": [],
88
"descriptions": [
@@ -76,6 +76,10 @@
7676
"url": "https://access.redhat.com/errata/RHSA-2025:2799",
7777
"source": "[email protected]"
7878
},
79+
{
80+
"url": "https://access.redhat.com/errata/RHSA-2025:2867",
81+
"source": "[email protected]"
82+
},
7983
{
8084
"url": "https://access.redhat.com/security/cve/CVE-2025-0624",
8185
"source": "[email protected]"
Lines changed: 141 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,141 @@
1+
{
2+
"id": "CVE-2025-2358",
3+
"sourceIdentifier": "[email protected]",
4+
"published": "2025-03-17T03:15:39.000",
5+
"lastModified": "2025-03-17T03:15:39.000",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "A vulnerability was found in Shenzhen Mingyuan Cloud Technology Mingyuan Real Estate ERP System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /Kfxt/Service.asmx of the component HTTP Header Handler. The manipulation of the argument X-Forwarded-For leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV40": [
16+
{
17+
"source": "[email protected]",
18+
"type": "Secondary",
19+
"cvssData": {
20+
"version": "4.0",
21+
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
22+
"baseScore": 5.3,
23+
"baseSeverity": "MEDIUM",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "LOW",
26+
"attackRequirements": "NONE",
27+
"privilegesRequired": "LOW",
28+
"userInteraction": "NONE",
29+
"vulnConfidentialityImpact": "LOW",
30+
"vulnIntegrityImpact": "LOW",
31+
"vulnAvailabilityImpact": "LOW",
32+
"subConfidentialityImpact": "NONE",
33+
"subIntegrityImpact": "NONE",
34+
"subAvailabilityImpact": "NONE",
35+
"exploitMaturity": "NOT_DEFINED",
36+
"confidentialityRequirement": "NOT_DEFINED",
37+
"integrityRequirement": "NOT_DEFINED",
38+
"availabilityRequirement": "NOT_DEFINED",
39+
"modifiedAttackVector": "NOT_DEFINED",
40+
"modifiedAttackComplexity": "NOT_DEFINED",
41+
"modifiedAttackRequirements": "NOT_DEFINED",
42+
"modifiedPrivilegesRequired": "NOT_DEFINED",
43+
"modifiedUserInteraction": "NOT_DEFINED",
44+
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
45+
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
46+
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
47+
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
48+
"modifiedSubIntegrityImpact": "NOT_DEFINED",
49+
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
50+
"Safety": "NOT_DEFINED",
51+
"Automatable": "NOT_DEFINED",
52+
"Recovery": "NOT_DEFINED",
53+
"valueDensity": "NOT_DEFINED",
54+
"vulnerabilityResponseEffort": "NOT_DEFINED",
55+
"providerUrgency": "NOT_DEFINED"
56+
}
57+
}
58+
],
59+
"cvssMetricV31": [
60+
{
61+
"source": "[email protected]",
62+
"type": "Primary",
63+
"cvssData": {
64+
"version": "3.1",
65+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
66+
"baseScore": 6.3,
67+
"baseSeverity": "MEDIUM",
68+
"attackVector": "NETWORK",
69+
"attackComplexity": "LOW",
70+
"privilegesRequired": "LOW",
71+
"userInteraction": "NONE",
72+
"scope": "UNCHANGED",
73+
"confidentialityImpact": "LOW",
74+
"integrityImpact": "LOW",
75+
"availabilityImpact": "LOW"
76+
},
77+
"exploitabilityScore": 2.8,
78+
"impactScore": 3.4
79+
}
80+
],
81+
"cvssMetricV2": [
82+
{
83+
"source": "[email protected]",
84+
"type": "Secondary",
85+
"cvssData": {
86+
"version": "2.0",
87+
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
88+
"baseScore": 6.5,
89+
"accessVector": "NETWORK",
90+
"accessComplexity": "LOW",
91+
"authentication": "SINGLE",
92+
"confidentialityImpact": "PARTIAL",
93+
"integrityImpact": "PARTIAL",
94+
"availabilityImpact": "PARTIAL"
95+
},
96+
"baseSeverity": "MEDIUM",
97+
"exploitabilityScore": 8.0,
98+
"impactScore": 6.4,
99+
"acInsufInfo": false,
100+
"obtainAllPrivilege": false,
101+
"obtainUserPrivilege": false,
102+
"obtainOtherPrivilege": false,
103+
"userInteractionRequired": false
104+
}
105+
]
106+
},
107+
"weaknesses": [
108+
{
109+
"source": "[email protected]",
110+
"type": "Primary",
111+
"description": [
112+
{
113+
"lang": "en",
114+
"value": "CWE-74"
115+
},
116+
{
117+
"lang": "en",
118+
"value": "CWE-89"
119+
}
120+
]
121+
}
122+
],
123+
"references": [
124+
{
125+
"url": "https://flowus.cn/share/fa5b99da-2e88-4efd-9266-ae8582782eaa?code=HC3R4E",
126+
"source": "[email protected]"
127+
},
128+
{
129+
"url": "https://vuldb.com/?ctiid.299825",
130+
"source": "[email protected]"
131+
},
132+
{
133+
"url": "https://vuldb.com/?id.299825",
134+
"source": "[email protected]"
135+
},
136+
{
137+
"url": "https://vuldb.com/?submit.513708",
138+
"source": "[email protected]"
139+
}
140+
]
141+
}
Lines changed: 152 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,152 @@
1+
{
2+
"id": "CVE-2025-2359",
3+
"sourceIdentifier": "[email protected]",
4+
"published": "2025-03-17T04:15:11.320",
5+
"lastModified": "2025-03-17T04:15:11.320",
6+
"vulnStatus": "Received",
7+
"cveTags": [
8+
{
9+
"sourceIdentifier": "[email protected]",
10+
"tags": [
11+
"unsupported-when-assigned"
12+
]
13+
}
14+
],
15+
"descriptions": [
16+
{
17+
"lang": "en",
18+
"value": "A vulnerability classified as critical has been found in D-Link DIR-823G 1.0.2B05_20181207. Affected is the function SetDDNSSettings of the file /HNAP1/ of the component DDNS Service. The manipulation of the argument SOAPAction leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
19+
}
20+
],
21+
"metrics": {
22+
"cvssMetricV40": [
23+
{
24+
"source": "[email protected]",
25+
"type": "Secondary",
26+
"cvssData": {
27+
"version": "4.0",
28+
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
29+
"baseScore": 6.9,
30+
"baseSeverity": "MEDIUM",
31+
"attackVector": "NETWORK",
32+
"attackComplexity": "LOW",
33+
"attackRequirements": "NONE",
34+
"privilegesRequired": "NONE",
35+
"userInteraction": "NONE",
36+
"vulnConfidentialityImpact": "LOW",
37+
"vulnIntegrityImpact": "LOW",
38+
"vulnAvailabilityImpact": "LOW",
39+
"subConfidentialityImpact": "NONE",
40+
"subIntegrityImpact": "NONE",
41+
"subAvailabilityImpact": "NONE",
42+
"exploitMaturity": "NOT_DEFINED",
43+
"confidentialityRequirement": "NOT_DEFINED",
44+
"integrityRequirement": "NOT_DEFINED",
45+
"availabilityRequirement": "NOT_DEFINED",
46+
"modifiedAttackVector": "NOT_DEFINED",
47+
"modifiedAttackComplexity": "NOT_DEFINED",
48+
"modifiedAttackRequirements": "NOT_DEFINED",
49+
"modifiedPrivilegesRequired": "NOT_DEFINED",
50+
"modifiedUserInteraction": "NOT_DEFINED",
51+
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
52+
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
53+
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
54+
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
55+
"modifiedSubIntegrityImpact": "NOT_DEFINED",
56+
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
57+
"Safety": "NOT_DEFINED",
58+
"Automatable": "NOT_DEFINED",
59+
"Recovery": "NOT_DEFINED",
60+
"valueDensity": "NOT_DEFINED",
61+
"vulnerabilityResponseEffort": "NOT_DEFINED",
62+
"providerUrgency": "NOT_DEFINED"
63+
}
64+
}
65+
],
66+
"cvssMetricV31": [
67+
{
68+
"source": "[email protected]",
69+
"type": "Primary",
70+
"cvssData": {
71+
"version": "3.1",
72+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
73+
"baseScore": 7.3,
74+
"baseSeverity": "HIGH",
75+
"attackVector": "NETWORK",
76+
"attackComplexity": "LOW",
77+
"privilegesRequired": "NONE",
78+
"userInteraction": "NONE",
79+
"scope": "UNCHANGED",
80+
"confidentialityImpact": "LOW",
81+
"integrityImpact": "LOW",
82+
"availabilityImpact": "LOW"
83+
},
84+
"exploitabilityScore": 3.9,
85+
"impactScore": 3.4
86+
}
87+
],
88+
"cvssMetricV2": [
89+
{
90+
"source": "[email protected]",
91+
"type": "Secondary",
92+
"cvssData": {
93+
"version": "2.0",
94+
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
95+
"baseScore": 7.5,
96+
"accessVector": "NETWORK",
97+
"accessComplexity": "LOW",
98+
"authentication": "NONE",
99+
"confidentialityImpact": "PARTIAL",
100+
"integrityImpact": "PARTIAL",
101+
"availabilityImpact": "PARTIAL"
102+
},
103+
"baseSeverity": "HIGH",
104+
"exploitabilityScore": 10.0,
105+
"impactScore": 6.4,
106+
"acInsufInfo": false,
107+
"obtainAllPrivilege": false,
108+
"obtainUserPrivilege": false,
109+
"obtainOtherPrivilege": false,
110+
"userInteractionRequired": false
111+
}
112+
]
113+
},
114+
"weaknesses": [
115+
{
116+
"source": "[email protected]",
117+
"type": "Primary",
118+
"description": [
119+
{
120+
"lang": "en",
121+
"value": "CWE-266"
122+
},
123+
{
124+
"lang": "en",
125+
"value": "CWE-285"
126+
}
127+
]
128+
}
129+
],
130+
"references": [
131+
{
132+
"url": "https://lavender-bicycle-a5a.notion.site/D-Link-DIR-823G-SetDDNSSettings-1ac53a41781f80d98649dd3cbe106e9b?pvs=4",
133+
"source": "[email protected]"
134+
},
135+
{
136+
"url": "https://vuldb.com/?ctiid.299826",
137+
"source": "[email protected]"
138+
},
139+
{
140+
"url": "https://vuldb.com/?id.299826",
141+
"source": "[email protected]"
142+
},
143+
{
144+
"url": "https://vuldb.com/?submit.513750",
145+
"source": "[email protected]"
146+
},
147+
{
148+
"url": "https://www.dlink.com/",
149+
"source": "[email protected]"
150+
}
151+
]
152+
}

0 commit comments

Comments
 (0)