Auto-Update: 2025-02-16T05:00:27.373983+00:00

This commit is contained in:
cad-safe-bot 2025-02-16 05:03:57 +00:00
parent 03e4a37847
commit a057b87228
5 changed files with 1379 additions and 1138 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-57970",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-16T04:15:21.843",
"lastModified": "2025-02-16T04:15:21.843",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://github.com/libarchive/libarchive/issues/2415",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/libarchive/libarchive/pull/2422",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-57971",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-16T04:15:23.077",
"lastModified": "2025-02-16T04:15:23.077",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DataSourceResource.java in the SpagoBI API support in Knowage Server in KNOWAGE before 8.1.30 does not ensure that java:comp/env/jdbc/ occurs at the beginning of a JNDI Name."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-99"
}
]
}
],
"references": [
{
"url": "https://github.com/KnowageLabs/Knowage-Server/commit/f7d0362f737e1b0db1cc9cc95b1236d62d83dd0c",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/KnowageLabs/Knowage-Server/compare/v8.1.29...v8.1.30",
"source": "cve@mitre.org"
},
{
"url": "https://spagobi.readthedocs.io",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-1335",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-16T04:15:23.230",
"lastModified": "2025-02-16T04:15:23.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in CmsEasy 7.7.7.9. Affected is the function deleteimg_action in the library lib/admin/file_admin.php. The manipulation of the argument imgname leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasy-v7.7.7.9-PathTraversal-2-2-1.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.295950",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.295950",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.493682",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-02-16T03:00:21.640882+00:00 2025-02-16T05:00:27.373983+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-02-16T01:15:20.440000+00:00 2025-02-16T04:15:23.230000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,45 +33,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
281473 281476
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `1` Recently added CVEs: `3`
- [CVE-2025-1332](CVE-2025/CVE-2025-13xx/CVE-2025-1332.json) (`2025-02-16T01:15:20.440`) - [CVE-2024-57970](CVE-2024/CVE-2024-579xx/CVE-2024-57970.json) (`2025-02-16T04:15:21.843`)
- [CVE-2024-57971](CVE-2024/CVE-2024-579xx/CVE-2024-57971.json) (`2025-02-16T04:15:23.077`)
- [CVE-2025-1335](CVE-2025/CVE-2025-13xx/CVE-2025-1335.json) (`2025-02-16T04:15:23.230`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `1106` Recently modified CVEs: `0`
- [CVE-2025-26511](CVE-2025/CVE-2025-265xx/CVE-2025-26511.json) (`2025-02-14T00:15:07.667`)
- [CVE-2025-26520](CVE-2025/CVE-2025-265xx/CVE-2025-26520.json) (`2025-02-12T07:15:08.617`)
- [CVE-2025-26538](CVE-2025/CVE-2025-265xx/CVE-2025-26538.json) (`2025-02-13T14:16:19.100`)
- [CVE-2025-26539](CVE-2025/CVE-2025-265xx/CVE-2025-26539.json) (`2025-02-13T14:16:19.383`)
- [CVE-2025-26543](CVE-2025/CVE-2025-265xx/CVE-2025-26543.json) (`2025-02-13T15:15:21.080`)
- [CVE-2025-26545](CVE-2025/CVE-2025-265xx/CVE-2025-26545.json) (`2025-02-13T14:16:20.043`)
- [CVE-2025-26547](CVE-2025/CVE-2025-265xx/CVE-2025-26547.json) (`2025-02-13T14:16:20.347`)
- [CVE-2025-26549](CVE-2025/CVE-2025-265xx/CVE-2025-26549.json) (`2025-02-13T14:16:20.663`)
- [CVE-2025-26550](CVE-2025/CVE-2025-265xx/CVE-2025-26550.json) (`2025-02-13T14:16:20.993`)
- [CVE-2025-26551](CVE-2025/CVE-2025-265xx/CVE-2025-26551.json) (`2025-02-13T14:16:21.450`)
- [CVE-2025-26552](CVE-2025/CVE-2025-265xx/CVE-2025-26552.json) (`2025-02-13T14:16:21.787`)
- [CVE-2025-26558](CVE-2025/CVE-2025-265xx/CVE-2025-26558.json) (`2025-02-13T14:16:22.130`)
- [CVE-2025-26561](CVE-2025/CVE-2025-265xx/CVE-2025-26561.json) (`2025-02-13T14:16:22.450`)
- [CVE-2025-26562](CVE-2025/CVE-2025-265xx/CVE-2025-26562.json) (`2025-02-13T14:16:22.607`)
- [CVE-2025-26567](CVE-2025/CVE-2025-265xx/CVE-2025-26567.json) (`2025-02-13T14:16:22.763`)
- [CVE-2025-26568](CVE-2025/CVE-2025-265xx/CVE-2025-26568.json) (`2025-02-13T14:16:22.910`)
- [CVE-2025-26569](CVE-2025/CVE-2025-265xx/CVE-2025-26569.json) (`2025-02-13T14:16:23.070`)
- [CVE-2025-26570](CVE-2025/CVE-2025-265xx/CVE-2025-26570.json) (`2025-02-13T14:16:23.223`)
- [CVE-2025-26571](CVE-2025/CVE-2025-265xx/CVE-2025-26571.json) (`2025-02-13T14:16:23.360`)
- [CVE-2025-26572](CVE-2025/CVE-2025-265xx/CVE-2025-26572.json) (`2025-02-13T14:16:23.507`)
- [CVE-2025-26574](CVE-2025/CVE-2025-265xx/CVE-2025-26574.json) (`2025-02-13T14:16:23.653`)
- [CVE-2025-26577](CVE-2025/CVE-2025-265xx/CVE-2025-26577.json) (`2025-02-13T14:16:23.797`)
- [CVE-2025-26578](CVE-2025/CVE-2025-265xx/CVE-2025-26578.json) (`2025-02-13T14:16:23.990`)
- [CVE-2025-26580](CVE-2025/CVE-2025-265xx/CVE-2025-26580.json) (`2025-02-13T14:16:24.250`)
- [CVE-2025-26582](CVE-2025/CVE-2025-265xx/CVE-2025-26582.json) (`2025-02-13T14:16:24.407`)
## Download and Usage ## Download and Usage

2217
_state.csv

File diff suppressed because it is too large Load Diff