diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1816.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1816.json new file mode 100644 index 00000000000..78c731644aa --- /dev/null +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1816.json @@ -0,0 +1,153 @@ +{ + "id": "CVE-2025-1816", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-02T14:15:34.123", + "lastModified": "2025-03-02T14:15:34.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in FFmpeg up to 6e26f57f672b05e7b8b052007a83aef99dc81ccb. This affects the function audio_element_obu of the file libavformat/iamf_parse.c of the component IAMF File Handler. The manipulation of the argument num_parameters leads to memory leak. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 0526535cd58444dd264e810b2f3348b4d96cff3b. It is recommended to apply a patch to fix this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + }, + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], + "references": [ + { + "url": "https://ffmpeg.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/0526535cd58444dd264e810b2f3348b4d96cff3b", + "source": "cna@vuldb.com" + }, + { + "url": "https://trac.ffmpeg.org/attachment/ticket/11475/poc", + "source": "cna@vuldb.com" + }, + { + "url": "https://trac.ffmpeg.org/ticket/11475", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298089", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298089", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.506575", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 11d39c81f5a..bb03690f0c1 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-02T13:00:19.945598+00:00 +2025-03-02T15:00:20.168889+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-02T12:15:36.507000+00:00 +2025-03-02T14:15:34.123000+00:00 ``` ### Last Data Feed Release @@ -33,15 +33,14 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -283610 +283611 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `1` -- [CVE-2025-1814](CVE-2025/CVE-2025-18xx/CVE-2025-1814.json) (`2025-03-02T11:15:10.133`) -- [CVE-2025-1815](CVE-2025/CVE-2025-18xx/CVE-2025-1815.json) (`2025-03-02T12:15:36.507`) +- [CVE-2025-1816](CVE-2025/CVE-2025-18xx/CVE-2025-1816.json) (`2025-03-02T14:15:34.123`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 0853c22e2e0..fdf439f5282 100644 --- a/_state.csv +++ b/_state.csv @@ -280816,8 +280816,9 @@ CVE-2025-1810,0,0,13aa797b776cd13924053a4151a14d23c5a8ca6d6ced5a3bd21291dde19c4a CVE-2025-1811,0,0,24a1f5681a904f2edac43f7084ce3eba91ec9354d3dc7356043870af02759c98,2025-03-02T09:15:09.843000 CVE-2025-1812,0,0,55735165c1d5560ec96f221524acb234a14d95736162e66bd936650dd6c9138a,2025-03-02T09:15:10.903000 CVE-2025-1813,0,0,02ae6ad1ffdefd5aeb6eb7e2654a3edb0871de09a85ec36c91ba84639e7d059c,2025-03-02T10:15:09.947000 -CVE-2025-1814,1,1,f32f303f45c0d5175642c5f837f279040d610ef80b5baab57e9f2806480cde1b,2025-03-02T11:15:10.133000 -CVE-2025-1815,1,1,a34c30dda4b911432b4b2b780f4af0dad0a2b4112829890565e05e2f2e8dfd92,2025-03-02T12:15:36.507000 +CVE-2025-1814,0,0,f32f303f45c0d5175642c5f837f279040d610ef80b5baab57e9f2806480cde1b,2025-03-02T11:15:10.133000 +CVE-2025-1815,0,0,a34c30dda4b911432b4b2b780f4af0dad0a2b4112829890565e05e2f2e8dfd92,2025-03-02T12:15:36.507000 +CVE-2025-1816,1,1,b9a8d73a53c33b886b17728345a6e936b4d7513f0874340a3269630d4a8274b4,2025-03-02T14:15:34.123000 CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,d9e3ca63dc18f9436b5043ebae0bcb543cc6452f75921963fed59e1df065c2d7,2025-02-05T18:15:29.573000