Auto-Update: 2025-04-09T04:00:20.081154+00:00

This commit is contained in:
cad-safe-bot 2025-04-09 04:03:56 +00:00
parent 0607da18d3
commit 4694a2c254
6 changed files with 20271 additions and 20032 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-29988",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-04-09T03:15:15.737",
"lastModified": "2025-04-09T03:15:15.737",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Client Platform BIOS contains a Stack-based Buffer Overflow Vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:H",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.1,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-in/000283859/dsa-2025-088",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-32460",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-09T02:15:15.137",
"lastModified": "2025-04-09T02:15:15.137",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GraphicsMagick before 8e56520 has a heap-based buffer over-read in ReadJXLImage in coders/jxl.c, related to an ImportViewPixelArea call."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/8e56520435df50f618a03f2721a39a70a515f1cb",
"source": "cve@mitre.org"
},
{
"url": "https://issues.oss-fuzz.com/issues/406320404",
"source": "cve@mitre.org"
},
{
"url": "https://tracker.debian.org/news/1636753/accepted-graphicsmagick-14really1345hg17696-1-source-into-unstable/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,80 @@
{
"id": "CVE-2025-32461",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-09T02:15:16.253",
"lastModified": "2025-04-09T02:15:16.253",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "wikiplugin_includetpl in lib/wiki-plugins/wikiplugin_includetpl.php in Tiki before 28.3 mishandles input to an eval. The fixed versions are 21.12, 24.8, 27.2, and 28.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1336"
}
]
}
],
"references": [
{
"url": "https://gitlab.com/tikiwiki/tiki/-/commit/406bea4f6c379a23903ecfd55e538d90fd669ab0",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.com/tikiwiki/tiki/-/commit/801ed912390c2aa6caf12b7b953e200f5d4bc0b1",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.com/tikiwiki/tiki/-/commit/9ffb4ab21bd86837370666ecd6afd868f3d7877a",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.com/tikiwiki/tiki/-/commit/be8dc1aa220fbceb07a7a5dc36416243afccd358",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.com/tikiwiki/tiki/-/commit/f3f36c1ac702479209acfcaec5789d2fd1f996bc",
"source": "cve@mitre.org"
},
{
"url": "https://tiki.org/article517",
"source": "cve@mitre.org"
},
{
"url": "https://tiki.org/article518",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-32464",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-09T03:15:16.847",
"lastModified": "2025-04-09T03:15:16.847",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HAProxy 2.2 through 3.1.6, in certain uncommon configurations, has a sample_conv_regsub heap-based buffer overflow because of mishandling of the replacement of multiple short patterns with a longer one."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1025"
}
]
}
],
"references": [
{
"url": "https://github.com/haproxy/haproxy/commit/3e3b9eebf871510aee36c3a3336faac2f38c9559",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-04-09T02:02:01.564573+00:00 2025-04-09T04:00:20.081154+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-04-09T01:00:02.927000+00:00 2025-04-09T03:15:16.847000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,44 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
289254 289258
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `0` Recently added CVEs: `4`
- [CVE-2025-29988](CVE-2025/CVE-2025-299xx/CVE-2025-29988.json) (`2025-04-09T03:15:15.737`)
- [CVE-2025-32460](CVE-2025/CVE-2025-324xx/CVE-2025-32460.json) (`2025-04-09T02:15:15.137`)
- [CVE-2025-32461](CVE-2025/CVE-2025-324xx/CVE-2025-32461.json) (`2025-04-09T02:15:16.253`)
- [CVE-2025-32464](CVE-2025/CVE-2025-324xx/CVE-2025-32464.json) (`2025-04-09T03:15:16.847`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `20002` Recently modified CVEs: `0`
- [CVE-2010-0279](CVE-2010/CVE-2010-02xx/CVE-2010-0279.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0280](CVE-2010/CVE-2010-02xx/CVE-2010-0280.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0310](CVE-2010/CVE-2010-03xx/CVE-2010-0310.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0311](CVE-2010/CVE-2010-03xx/CVE-2010-0311.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0312](CVE-2010/CVE-2010-03xx/CVE-2010-0312.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0313](CVE-2010/CVE-2010-03xx/CVE-2010-0313.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0314](CVE-2010/CVE-2010-03xx/CVE-2010-0314.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0315](CVE-2010/CVE-2010-03xx/CVE-2010-0315.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0316](CVE-2010/CVE-2010-03xx/CVE-2010-0316.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0317](CVE-2010/CVE-2010-03xx/CVE-2010-0317.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0318](CVE-2010/CVE-2010-03xx/CVE-2010-0318.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0319](CVE-2010/CVE-2010-03xx/CVE-2010-0319.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0320](CVE-2010/CVE-2010-03xx/CVE-2010-0320.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0321](CVE-2010/CVE-2010-03xx/CVE-2010-0321.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0322](CVE-2010/CVE-2010-03xx/CVE-2010-0322.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0323](CVE-2010/CVE-2010-03xx/CVE-2010-0323.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0324](CVE-2010/CVE-2010-03xx/CVE-2010-0324.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0325](CVE-2010/CVE-2010-03xx/CVE-2010-0325.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0326](CVE-2010/CVE-2010-03xx/CVE-2010-0326.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0327](CVE-2010/CVE-2010-03xx/CVE-2010-0327.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0328](CVE-2010/CVE-2010-03xx/CVE-2010-0328.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0329](CVE-2010/CVE-2010-03xx/CVE-2010-0329.json) (`2025-04-09T00:30:58.490`)
- [CVE-2010-0330](CVE-2010/CVE-2010-03xx/CVE-2010-0330.json) (`2025-04-09T00:30:58.490`)
- [CVE-2025-29824](CVE-2025/CVE-2025-298xx/CVE-2025-29824.json) (`2025-04-09T01:00:02.927`)
- [CVE-2025-30406](CVE-2025/CVE-2025-304xx/CVE-2025-30406.json) (`2025-04-09T01:00:02.927`)
## Download and Usage ## Download and Usage

40008
_state.csv

File diff suppressed because it is too large Load Diff