diff --git a/data/cve/CVE-2025-30346.json b/data/cve/CVE-2025-30346.json new file mode 100644 index 0000000000000000000000000000000000000000..31acb3ff5c758f662cb40f87fe9dfe50f6e8db33 --- /dev/null +++ b/data/cve/CVE-2025-30346.json @@ -0,0 +1,45 @@ +{ + "id": 28775, + "cve_id": "CVE-2025-30346", + "creator": null, + "publisher": "cve-center", + "publish_third_party_token": "cve-center", + "publish_date": "2025-03-21 15:15:37", + "cvss": { + "nvd_cvss": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", + "openanolis_cvss": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" + }, + "product": [ + { + "product_id": 5, + "name_version": "Anolis OS 8", + "product_package_info": { + "src": [ + { + "rpm_name": "varnish:6", + "rpm_status": "unaffected" + } + ] + } + } + ], + "affected_packages": [ + "varnish:6" + ], + "score": 5.4, + "severity": "Moderate", + "status": 1, + "source": "Mitre", + "cve_source_link": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30346", + "abstract": "Varnish Cache before 7.6.2 and Varnish Enterprise before 6.0.13r10 allow client-side desync via HTTP/1 requests.", + "description": null, + "issue": null, + "acknowledgements": null, + "acknowledgements_en": null, + "reference": null, + "diagnose": null, + "statement": null, + "mitigation": null, + "update_user": null, + "errata": [] +} \ No newline at end of file diff --git a/data/cve/CVE-2025-30347.json b/data/cve/CVE-2025-30347.json new file mode 100644 index 0000000000000000000000000000000000000000..ac230838d228a2262b78645900012531a3760438 --- /dev/null +++ b/data/cve/CVE-2025-30347.json @@ -0,0 +1,45 @@ +{ + "id": 28774, + "cve_id": "CVE-2025-30347", + "creator": null, + "publisher": "cve-center", + "publish_third_party_token": "cve-center", + "publish_date": "2025-03-21 15:15:37", + "cvss": { + "nvd_cvss": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", + "openanolis_cvss": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" + }, + "product": [ + { + "product_id": 5, + "name_version": "Anolis OS 8", + "product_package_info": { + "src": [ + { + "rpm_name": "varnish:6", + "rpm_status": "unaffected" + } + ] + } + } + ], + "affected_packages": [ + "varnish:6" + ], + "score": 4.0, + "severity": "Moderate", + "status": 1, + "source": "Mitre", + "cve_source_link": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30347", + "abstract": "Varnish Enterprise before 6.0.13r13 allows remote attackers to obtain sensitive information via an out-of-bounds read for range requests on ephemeral MSE4 stevedore objects.", + "description": null, + "issue": null, + "acknowledgements": null, + "acknowledgements_en": null, + "reference": null, + "diagnose": null, + "statement": null, + "mitigation": null, + "update_user": null, + "errata": [] +} \ No newline at end of file