Skip to content

Commit 0d31ea1

Browse files
Advisory Database Sync
1 parent 614e75e commit 0d31ea1

File tree

34 files changed

+273
-55
lines changed

34 files changed

+273
-55
lines changed

advisories/unreviewed/2023/10/GHSA-398q-w43p-26hx/GHSA-398q-w43p-26hx.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-398q-w43p-26hx",
4-
"modified": "2024-04-04T08:29:34Z",
4+
"modified": "2025-11-28T18:30:16Z",
55
"published": "2023-10-10T15:30:51Z",
66
"aliases": [
77
"CVE-2023-30805"
88
],
9-
"details": "The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary commands by sending a crafted HTTP POST request to the /LogInOut.php endpoint. This is due to mishandling of shell meta-characters in the \"un\" parameter.\n\n\n",
9+
"details": "The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary commands by sending a crafted HTTP POST request to the /LogInOut.php endpoint. This is due to mishandling of shell meta-characters in the \"un\" parameter.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2023/10/GHSA-59w3-fc6m-5c93/GHSA-59w3-fc6m-5c93.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-59w3-fc6m-5c93",
4-
"modified": "2024-04-04T08:29:35Z",
4+
"modified": "2025-11-28T18:30:16Z",
55
"published": "2023-10-10T15:30:51Z",
66
"aliases": [
77
"CVE-2023-30804"
88
],
9-
"details": "The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an authenticated file disclosure vulnerability. A remote and authenticated attacker can read arbitrary system files using the svpn_html/loadfile.php endpoint. This issue is exploitable by a remote and unauthenticated attacker when paired with CVE-2023-30803.\n\n\n",
9+
"details": "The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an authenticated file disclosure vulnerability. A remote and authenticated attacker can read arbitrary system files using the svpn_html/loadfile.php endpoint. This issue is exploitable by a remote and unauthenticated attacker when paired with CVE-2023-30803.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2023/10/GHSA-9j86-wqqw-j67h/GHSA-9j86-wqqw-j67h.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9j86-wqqw-j67h",
4-
"modified": "2024-04-04T08:29:25Z",
4+
"modified": "2025-11-28T18:30:16Z",
55
"published": "2023-10-10T15:30:51Z",
66
"aliases": [
77
"CVE-2023-30802"
88
],
9-
"details": "The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to a source code disclosure vulnerability. A remote and unauthenticated attacker can obtain PHP source code by sending an HTTP request with an invalid Content-Length field.\n\n\n",
9+
"details": "The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to a source code disclosure vulnerability. A remote and unauthenticated attacker can obtain PHP source code by sending an HTTP request with an invalid Content-Length field.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2023/10/GHSA-rch9-592x-rrw8/GHSA-rch9-592x-rrw8.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rch9-592x-rrw8",
4-
"modified": "2024-04-04T08:29:27Z",
4+
"modified": "2025-11-28T18:30:16Z",
55
"published": "2023-10-10T15:30:51Z",
66
"aliases": [
77
"CVE-2023-30803"
88
],
9-
"details": "The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can bypass authentication and access administrative functionality by sending HTTP requests using a crafted Y-forwarded-for header.\n\n\n",
9+
"details": "The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can bypass authentication and access administrative functionality by sending HTTP requests using a crafted Y-forwarded-for header.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2025/10/GHSA-3r6w-f62x-hc2h/GHSA-3r6w-f62x-hc2h.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3r6w-f62x-hc2h",
4-
"modified": "2025-10-29T21:30:33Z",
4+
"modified": "2025-11-28T18:30:21Z",
55
"published": "2025-10-29T21:30:33Z",
66
"aliases": [
77
"CVE-2018-25120"
88
],
99
"details": "D-Link DNS-343 ShareCenter devices running firmware versions up to and including 1.05 contain a command injection vulnerability in the Mail Test functionality. The web maintenance script posts to the internal goForm endpoint '/goform/Mail_Test' and uses several form parameters directly in a call to a system email utility without proper input validation. An unauthenticated remote attacker can supply crafted form data that injects shell commands, resulting in execution as root on the device. NOTE: The DNS-343 product line has been declared end-of-life.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/11/GHSA-24q7-5rc2-3hrp/GHSA-24q7-5rc2-3hrp.json

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-24q7-5rc2-3hrp",
4-
"modified": "2025-11-28T15:30:30Z",
4+
"modified": "2025-11-28T18:30:23Z",
55
"published": "2025-11-28T15:30:30Z",
66
"aliases": [
77
"CVE-2025-59790"
88
],
99
"details": "Improper Privilege Management vulnerability in Apache Kvrocks.\n\nThis issue affects Apache Kvrocks: from v2.9.0 through v2.13.0.\n\nUsers are recommended to upgrade to version 2.14.0, which fixes the issue.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -17,13 +22,17 @@
1722
{
1823
"type": "WEB",
1924
"url": "https://lists.apache.org/thread/dlbz5hmm4ts3npzqnvhofxmqg9w9zt0o"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "http://www.openwall.com/lists/oss-security/2025/11/28/2"
2029
}
2130
],
2231
"database_specific": {
2332
"cwe_ids": [
2433
"CWE-269"
2534
],
26-
"severity": null,
35+
"severity": "MODERATE",
2736
"github_reviewed": false,
2837
"github_reviewed_at": null,
2938
"nvd_published_at": "2025-11-28T15:16:02Z"

advisories/unreviewed/2025/11/GHSA-2949-r76x-4vc4/GHSA-2949-r76x-4vc4.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2949-r76x-4vc4",
4-
"modified": "2025-11-24T18:31:11Z",
4+
"modified": "2025-11-28T18:30:22Z",
55
"published": "2025-11-24T15:30:29Z",
66
"aliases": [
77
"CVE-2025-12969"
@@ -22,6 +22,14 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://fluentbit.io/announcements/v4.1.0"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://fluentbit.io/blog/2025/10/28/security-vulnerabilities-addressed-in-fluent-bit-v4.1-and-backported-to-v4.0"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.oligo.security/blog/critical-vulnerabilities-in-fluent-bit-expose-cloud-environments-to-remote-takeover"
2533
}
2634
],
2735
"database_specific": {

advisories/unreviewed/2025/11/GHSA-2mm6-624x-fqrr/GHSA-2mm6-624x-fqrr.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@
2525
}
2626
],
2727
"database_specific": {
28-
"cwe_ids": [],
28+
"cwe_ids": [
29+
"CWE-116"
30+
],
2931
"severity": "LOW",
3032
"github_reviewed": false,
3133
"github_reviewed_at": null,
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-458g-vvmf-jfgq",
4+
"modified": "2025-11-28T18:30:23Z",
5+
"published": "2025-11-28T18:30:23Z",
6+
"aliases": [
7+
"CVE-2025-13683"
8+
],
9+
"details": "Exposure of credentials in unintended requests in Devolutions Server, Remote Desktop Manager on Windows.This issue affects Devolutions Server: through 2025.3.8.0; Remote Desktop Manager: through 2025.3.23.0.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13683"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://devolutions.net/security/advisories/DEVO-2025-0017"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-200"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-11-28T17:16:08Z"
30+
}
31+
}

advisories/unreviewed/2025/11/GHSA-4j92-6j9c-j5g7/GHSA-4j92-6j9c-j5g7.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4j92-6j9c-j5g7",
4-
"modified": "2025-11-06T21:31:31Z",
4+
"modified": "2025-11-28T18:30:22Z",
55
"published": "2025-11-06T21:31:31Z",
66
"aliases": [
77
"CVE-2025-34247"
88
],
99
"details": "Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in NetworksController.addNetworkAction() that allows an authenticated low-privileged observer user to inject SQL via datatable search parameters, leading to disclosure of database information.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

0 commit comments

Comments
 (0)