{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T00:56:25.701","vulnerabilities":[{"cve":{"id":"CVE-2025-30347","sourceIdentifier":"cve@mitre.org","published":"2025-03-21T07:15:37.527","lastModified":"2025-03-24T14:19:23.963","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Varnish Enterprise before 6.0.13r13 allows remote attackers to obtain sensitive information via an out-of-bounds read for range requests on ephemeral MSE4 stevedore objects."},{"lang":"es","value":"Varnish Enterprise anterior a 6.0.13r13 permite a atacantes remotos obtener información confidencial a través de una lectura fuera de los límites para solicitudes de rango en objetos efímeros de estibador MSE4."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N","baseScore":4.0,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-125"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r10:*:*:*:*:*:*","matchCriteriaId":"D5975FD1-9072-41BC-90DD-2623499C0596"},{"vulnerable":true,"criteria":"cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r11:*:*:*:*:*:*","matchCriteriaId":"0E789035-901F-4D2D-B2A5-A59D7027C774"},{"vulnerable":true,"criteria":"cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r12:*:*:*:*:*:*","matchCriteriaId":"2D8B185D-B4A9-42DE-8997-8E6ECF3B4DE7"},{"vulnerable":true,"criteria":"cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r2:*:*:*:*:*:*","matchCriteriaId":"5C977CB4-E9E8-49B4-9D2A-B5DFA088EA1A"},{"vulnerable":true,"criteria":"cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r3:*:*:*:*:*:*","matchCriteriaId":"F0FEF673-0DED-4646-B5C2-3D5A4617380F"},{"vulnerable":true,"criteria":"cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r4:*:*:*:*:*:*","matchCriteriaId":"E2128880-BA15-414B-84F0-E57B96DF376C"},{"vulnerable":true,"criteria":"cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r5:*:*:*:*:*:*","matchCriteriaId":"A9C9D8DF-86F8-4020-AC66-EF8367A11EDC"},{"vulnerable":true,"criteria":"cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r6:*:*:*:*:*:*","matchCriteriaId":"132F60B2-FADA-479E-B45E-166046A2567C"},{"vulnerable":true,"criteria":"cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r7:*:*:*:*:*:*","matchCriteriaId":"E4FB05CB-0966-43CD-84AA-B4F2DA181446"},{"vulnerable":true,"criteria":"cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r8:*:*:*:*:*:*","matchCriteriaId":"2AAA8F5B-F974-4493-9573-F60CC9E084A4"},{"vulnerable":true,"criteria":"cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r9:*:*:*:*:*:*","matchCriteriaId":"B67CD7FB-4810-4AFA-BD4D-F2AB2A41D0A4"}]}]}],"references":[{"url":"https://docs.varnish-software.com/security/VEV00001/","source":"cve@mitre.org","tags":["Mitigation","Vendor Advisory"]}]}}]}