Auto-Update: 2025-01-12T13:00:19.633643+00:00

This commit is contained in:
cad-safe-bot 2025-01-12 13:03:43 +00:00
parent a3043036d0
commit d9ce4912e4
3 changed files with 3357 additions and 3237 deletions

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-0396",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-12T12:15:17.963",
"lastModified": "2025-01-12T12:15:17.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in exelban stats up to 2.11.21. This issue affects the function shouldAcceptNewConnection of the component XPC Service. The manipulation leads to command injection. It is possible to launch the attack on the local host. Upgrading to version 2.11.22 is able to address this issue. It is recommended to upgrade the affected component."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 6.8,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.1,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/exelban/stats/releases/tag/v2.11.22",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.291269",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.291269",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.473229",
"source": "cna@vuldb.com"
},
{
"url": "https://winslow1984.com/books/cve-collection/page/stats-v21122-local-privilege-escalation",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-12T03:00:19.531309+00:00
2025-01-12T13:00:19.633643+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-12T02:15:18.973000+00:00
2025-01-12T12:15:17.963000+00:00
```
### Last Data Feed Release
@ -33,46 +33,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
276800
276801
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `1`
- [CVE-2021-29669](CVE-2021/CVE-2021-296xx/CVE-2021-29669.json) (`2025-01-12T02:15:18.750`)
- [CVE-2024-49785](CVE-2024/CVE-2024-497xx/CVE-2024-49785.json) (`2025-01-12T02:15:18.973`)
- [CVE-2025-0396](CVE-2025/CVE-2025-03xx/CVE-2025-0396.json) (`2025-01-12T12:15:17.963`)
### CVEs modified in the last Commit
Recently modified CVEs: `3203`
Recently modified CVEs: `0`
- [CVE-2025-22803](CVE-2025/CVE-2025-228xx/CVE-2025-22803.json) (`2025-01-09T16:16:29.627`)
- [CVE-2025-22804](CVE-2025/CVE-2025-228xx/CVE-2025-22804.json) (`2025-01-09T16:16:29.787`)
- [CVE-2025-22805](CVE-2025/CVE-2025-228xx/CVE-2025-22805.json) (`2025-01-09T16:16:29.937`)
- [CVE-2025-22806](CVE-2025/CVE-2025-228xx/CVE-2025-22806.json) (`2025-01-09T16:16:30.090`)
- [CVE-2025-22807](CVE-2025/CVE-2025-228xx/CVE-2025-22807.json) (`2025-01-09T16:16:30.253`)
- [CVE-2025-22808](CVE-2025/CVE-2025-228xx/CVE-2025-22808.json) (`2025-01-09T16:16:30.403`)
- [CVE-2025-22809](CVE-2025/CVE-2025-228xx/CVE-2025-22809.json) (`2025-01-09T16:16:30.557`)
- [CVE-2025-22810](CVE-2025/CVE-2025-228xx/CVE-2025-22810.json) (`2025-01-09T16:16:30.713`)
- [CVE-2025-22811](CVE-2025/CVE-2025-228xx/CVE-2025-22811.json) (`2025-01-09T16:16:30.880`)
- [CVE-2025-22812](CVE-2025/CVE-2025-228xx/CVE-2025-22812.json) (`2025-01-09T16:16:31.047`)
- [CVE-2025-22813](CVE-2025/CVE-2025-228xx/CVE-2025-22813.json) (`2025-01-09T16:16:31.200`)
- [CVE-2025-22814](CVE-2025/CVE-2025-228xx/CVE-2025-22814.json) (`2025-01-09T16:16:31.370`)
- [CVE-2025-22815](CVE-2025/CVE-2025-228xx/CVE-2025-22815.json) (`2025-01-09T16:16:31.543`)
- [CVE-2025-22817](CVE-2025/CVE-2025-228xx/CVE-2025-22817.json) (`2025-01-09T16:16:31.693`)
- [CVE-2025-22818](CVE-2025/CVE-2025-228xx/CVE-2025-22818.json) (`2025-01-09T16:16:31.850`)
- [CVE-2025-22819](CVE-2025/CVE-2025-228xx/CVE-2025-22819.json) (`2025-01-09T16:16:32.000`)
- [CVE-2025-22820](CVE-2025/CVE-2025-228xx/CVE-2025-22820.json) (`2025-01-09T16:16:32.173`)
- [CVE-2025-22821](CVE-2025/CVE-2025-228xx/CVE-2025-22821.json) (`2025-01-09T16:16:32.363`)
- [CVE-2025-22822](CVE-2025/CVE-2025-228xx/CVE-2025-22822.json) (`2025-01-09T16:16:32.557`)
- [CVE-2025-22823](CVE-2025/CVE-2025-228xx/CVE-2025-22823.json) (`2025-01-09T16:16:32.717`)
- [CVE-2025-22824](CVE-2025/CVE-2025-228xx/CVE-2025-22824.json) (`2025-01-09T16:16:32.893`)
- [CVE-2025-22826](CVE-2025/CVE-2025-228xx/CVE-2025-22826.json) (`2025-01-09T16:16:33.047`)
- [CVE-2025-22827](CVE-2025/CVE-2025-228xx/CVE-2025-22827.json) (`2025-01-09T16:16:33.200`)
- [CVE-2025-22946](CVE-2025/CVE-2025-229xx/CVE-2025-22946.json) (`2025-01-10T15:15:16.710`)
- [CVE-2025-23016](CVE-2025/CVE-2025-230xx/CVE-2025-23016.json) (`2025-01-10T12:15:25.480`)
## Download and Usage

6411
_state.csv

File diff suppressed because it is too large Load Diff