mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2025-04-09T04:00:20.081154+00:00
This commit is contained in:
parent
0607da18d3
commit
4694a2c254
56
CVE-2025/CVE-2025-299xx/CVE-2025-29988.json
Normal file
56
CVE-2025/CVE-2025-299xx/CVE-2025-29988.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-29988",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2025-04-09T03:15:15.737",
|
||||
"lastModified": "2025-04-09T03:15:15.737",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell Client Platform BIOS contains a Stack-based Buffer Overflow Vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:H",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.1,
|
||||
"impactScore": 5.3
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-in/000283859/dsa-2025-088",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-324xx/CVE-2025-32460.json
Normal file
64
CVE-2025/CVE-2025-324xx/CVE-2025-32460.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-32460",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-09T02:15:15.137",
|
||||
"lastModified": "2025-04-09T02:15:15.137",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GraphicsMagick before 8e56520 has a heap-based buffer over-read in ReadJXLImage in coders/jxl.c, related to an ImportViewPixelArea call."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/8e56520435df50f618a03f2721a39a70a515f1cb",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.oss-fuzz.com/issues/406320404",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://tracker.debian.org/news/1636753/accepted-graphicsmagick-14really1345hg17696-1-source-into-unstable/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-324xx/CVE-2025-32461.json
Normal file
80
CVE-2025/CVE-2025-324xx/CVE-2025-32461.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-32461",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-09T02:15:16.253",
|
||||
"lastModified": "2025-04-09T02:15:16.253",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "wikiplugin_includetpl in lib/wiki-plugins/wikiplugin_includetpl.php in Tiki before 28.3 mishandles input to an eval. The fixed versions are 21.12, 24.8, 27.2, and 28.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1336"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/tikiwiki/tiki/-/commit/406bea4f6c379a23903ecfd55e538d90fd669ab0",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/tikiwiki/tiki/-/commit/801ed912390c2aa6caf12b7b953e200f5d4bc0b1",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/tikiwiki/tiki/-/commit/9ffb4ab21bd86837370666ecd6afd868f3d7877a",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/tikiwiki/tiki/-/commit/be8dc1aa220fbceb07a7a5dc36416243afccd358",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/tikiwiki/tiki/-/commit/f3f36c1ac702479209acfcaec5789d2fd1f996bc",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://tiki.org/article517",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://tiki.org/article518",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-324xx/CVE-2025-32464.json
Normal file
56
CVE-2025/CVE-2025-324xx/CVE-2025-32464.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-32464",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-09T03:15:16.847",
|
||||
"lastModified": "2025-04-09T03:15:16.847",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HAProxy 2.2 through 3.1.6, in certain uncommon configurations, has a sample_conv_regsub heap-based buffer overflow because of mishandling of the replacement of multiple short patterns with a longer one."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1025"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/haproxy/haproxy/commit/3e3b9eebf871510aee36c3a3336faac2f38c9559",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
39
README.md
39
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-09T02:02:01.564573+00:00
|
||||
2025-04-09T04:00:20.081154+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-09T01:00:02.927000+00:00
|
||||
2025-04-09T03:15:16.847000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,44 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
289254
|
||||
289258
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2025-29988](CVE-2025/CVE-2025-299xx/CVE-2025-29988.json) (`2025-04-09T03:15:15.737`)
|
||||
- [CVE-2025-32460](CVE-2025/CVE-2025-324xx/CVE-2025-32460.json) (`2025-04-09T02:15:15.137`)
|
||||
- [CVE-2025-32461](CVE-2025/CVE-2025-324xx/CVE-2025-32461.json) (`2025-04-09T02:15:16.253`)
|
||||
- [CVE-2025-32464](CVE-2025/CVE-2025-324xx/CVE-2025-32464.json) (`2025-04-09T03:15:16.847`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `20002`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2010-0279](CVE-2010/CVE-2010-02xx/CVE-2010-0279.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0280](CVE-2010/CVE-2010-02xx/CVE-2010-0280.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0310](CVE-2010/CVE-2010-03xx/CVE-2010-0310.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0311](CVE-2010/CVE-2010-03xx/CVE-2010-0311.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0312](CVE-2010/CVE-2010-03xx/CVE-2010-0312.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0313](CVE-2010/CVE-2010-03xx/CVE-2010-0313.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0314](CVE-2010/CVE-2010-03xx/CVE-2010-0314.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0315](CVE-2010/CVE-2010-03xx/CVE-2010-0315.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0316](CVE-2010/CVE-2010-03xx/CVE-2010-0316.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0317](CVE-2010/CVE-2010-03xx/CVE-2010-0317.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0318](CVE-2010/CVE-2010-03xx/CVE-2010-0318.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0319](CVE-2010/CVE-2010-03xx/CVE-2010-0319.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0320](CVE-2010/CVE-2010-03xx/CVE-2010-0320.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0321](CVE-2010/CVE-2010-03xx/CVE-2010-0321.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0322](CVE-2010/CVE-2010-03xx/CVE-2010-0322.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0323](CVE-2010/CVE-2010-03xx/CVE-2010-0323.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0324](CVE-2010/CVE-2010-03xx/CVE-2010-0324.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0325](CVE-2010/CVE-2010-03xx/CVE-2010-0325.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0326](CVE-2010/CVE-2010-03xx/CVE-2010-0326.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0327](CVE-2010/CVE-2010-03xx/CVE-2010-0327.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0328](CVE-2010/CVE-2010-03xx/CVE-2010-0328.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0329](CVE-2010/CVE-2010-03xx/CVE-2010-0329.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2010-0330](CVE-2010/CVE-2010-03xx/CVE-2010-0330.json) (`2025-04-09T00:30:58.490`)
|
||||
- [CVE-2025-29824](CVE-2025/CVE-2025-298xx/CVE-2025-29824.json) (`2025-04-09T01:00:02.927`)
|
||||
- [CVE-2025-30406](CVE-2025/CVE-2025-304xx/CVE-2025-30406.json) (`2025-04-09T01:00:02.927`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
40008
_state.csv
40008
_state.csv
File diff suppressed because it is too large
Load Diff
Loading…
x
Reference in New Issue
Block a user