Skip to content

File tree

21 files changed

+792
-4
lines changed

21 files changed

+792
-4
lines changed

advisories/unreviewed/2025/09/GHSA-6gx7-q299-g2j8/GHSA-6gx7-q299-g2j8.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6gx7-q299-g2j8",
4-
"modified": "2025-09-23T09:30:19Z",
4+
"modified": "2025-10-28T00:31:25Z",
55
"published": "2025-09-23T09:30:19Z",
66
"aliases": [
77
"CVE-2025-10844"
@@ -31,6 +31,14 @@
3131
"type": "WEB",
3232
"url": "https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/24.md#poc"
3333
},
34+
{
35+
"type": "WEB",
36+
"url": "https://karinagante.github.io/cve-2025-10844"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://karinagante.github.io/cve-2025-10844/#proof-of-concept-poc"
41+
},
3442
{
3543
"type": "WEB",
3644
"url": "https://vuldb.com/?ctiid.325206"

advisories/unreviewed/2025/09/GHSA-m43j-2jmj-r98g/GHSA-m43j-2jmj-r98g.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m43j-2jmj-r98g",
4-
"modified": "2025-09-23T09:30:19Z",
4+
"modified": "2025-10-28T00:31:25Z",
55
"published": "2025-09-23T09:30:19Z",
66
"aliases": [
77
"CVE-2025-10846"
@@ -31,6 +31,14 @@
3131
"type": "WEB",
3232
"url": "https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/27.md#poc"
3333
},
34+
{
35+
"type": "WEB",
36+
"url": "https://karinagante.github.io/cve-2025-10846"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://karinagante.github.io/cve-2025-10846/#proof-of-concept-poc"
41+
},
3442
{
3543
"type": "WEB",
3644
"url": "https://vuldb.com/?ctiid.325208"

advisories/unreviewed/2025/09/GHSA-q4qv-52x7-v238/GHSA-q4qv-52x7-v238.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q4qv-52x7-v238",
4-
"modified": "2025-09-23T09:30:20Z",
4+
"modified": "2025-10-28T00:31:25Z",
55
"published": "2025-09-23T09:30:19Z",
66
"aliases": [
77
"CVE-2025-10845"
@@ -31,6 +31,14 @@
3131
"type": "WEB",
3232
"url": "https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/26.md#poc"
3333
},
34+
{
35+
"type": "WEB",
36+
"url": "https://karinagante.github.io/cve-2025-10845"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://karinagante.github.io/cve-2025-10845/#proof-of-concept-poc"
41+
},
3442
{
3543
"type": "WEB",
3644
"url": "https://vuldb.com/?ctiid.325207"

advisories/unreviewed/2025/09/GHSA-xhc6-mmf6-vvgh/GHSA-xhc6-mmf6-vvgh.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xhc6-mmf6-vvgh",
4-
"modified": "2025-10-20T06:30:17Z",
4+
"modified": "2025-10-28T00:31:25Z",
55
"published": "2025-09-13T18:30:56Z",
66
"aliases": [
77
"CVE-2025-10372"
@@ -31,6 +31,10 @@
3131
"type": "WEB",
3232
"url": "https://karinagante.github.io/cve-2025-10372"
3333
},
34+
{
35+
"type": "WEB",
36+
"url": "https://karinagante.github.io/cve-2025-10372/#proof-of-concept-poc"
37+
},
3438
{
3539
"type": "WEB",
3640
"url": "https://vuldb.com/?ctiid.323780"
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4hx2-58xv-6gx8",
4+
"modified": "2025-10-28T00:31:25Z",
5+
"published": "2025-10-28T00:31:25Z",
6+
"aliases": [
7+
"CVE-2025-12328"
8+
],
9+
"details": "A vulnerability was identified in shawon100 RUET OJ up to 18fa45b0a669fa1098a0b8fc629cf6856369d9a5. Impacted is an unknown function of the file /contestproblem.php. Such manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12328"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://vuldb.com/?ctiid.330105"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?id.330105"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?submit.674399"
37+
}
38+
],
39+
"database_specific": {
40+
"cwe_ids": [
41+
"CWE-74"
42+
],
43+
"severity": "MODERATE",
44+
"github_reviewed": false,
45+
"github_reviewed_at": null,
46+
"nvd_published_at": "2025-10-27T22:15:39Z"
47+
}
48+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6cj3-32f8-w65v",
4+
"modified": "2025-10-28T00:31:26Z",
5+
"published": "2025-10-28T00:31:26Z",
6+
"aliases": [
7+
"CVE-2025-12333"
8+
],
9+
"details": "A vulnerability has been found in code-projects E-Commerce Website 1.0. This impacts an unknown function of the file /pages/supplier_add.php. The manipulation of the argument supp_name/supp_address leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12333"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://code-projects.org"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://figshare.com/s/b35b6f6f6a10d8fdc131?file=58703836"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.330120"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.330120"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.674483"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-79"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2025-10-27T23:15:37Z"
55+
}
56+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-89pp-7p3f-32x2",
4+
"modified": "2025-10-28T00:31:26Z",
5+
"published": "2025-10-28T00:31:26Z",
6+
"aliases": [
7+
"CVE-2025-12335"
8+
],
9+
"details": "A vulnerability was determined in code-projects E-Commerce Website 1.0. Affected by this vulnerability is an unknown functionality of the file /pages/supplier_update.php. This manipulation of the argument supp_name/supp_address causes cross site scripting. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12335"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://code-projects.org"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://figshare.com/s/3e547f5ef85470696c2a"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.330122"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.330122"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.674485"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-79"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2025-10-28T00:15:37Z"
55+
}
56+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-8fg8-r2x2-4mv9",
4+
"modified": "2025-10-28T00:31:26Z",
5+
"published": "2025-10-28T00:31:26Z",
6+
"aliases": [
7+
"CVE-2025-43024"
8+
],
9+
"details": "A GUI dialog of an application allows to view what files are in the file system without proper authorization.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43024"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://support.hp.com/us-en/document/ish_13164593-13164617-16/hpsbhf04066"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-497"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-10-28T00:15:38Z"
35+
}
36+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-9266-4xcc-jjfm",
4+
"modified": "2025-10-28T00:31:26Z",
5+
"published": "2025-10-28T00:31:26Z",
6+
"aliases": [
7+
"CVE-2025-33126"
8+
],
9+
"details": "IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to the incorrect calculation of a buffer size.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33126"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.ibm.com/support/pages/node/7249336"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-131"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-10-28T00:15:37Z"
35+
}
36+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-9wc5-vw6h-63g3",
4+
"modified": "2025-10-28T00:31:26Z",
5+
"published": "2025-10-28T00:31:25Z",
6+
"aliases": [
7+
"CVE-2025-12330"
8+
],
9+
"details": "A security flaw has been discovered in Willow CMS up to 1.4.0. This issue affects some unknown processing of the file /admin/articles/add of the component Add Post Page. The manipulation of the argument title/body results in cross site scripting. The attack may be launched remotely. The exploit has been released to the public and may be exploited.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12330"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/matthewdeaves/willow/issues/131"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.330115"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.330115"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.674404"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.youtube.com/watch?v=jhFCYpFu9qI"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-79"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2025-10-27T22:15:41Z"
55+
}
56+
}

0 commit comments

Comments
 (0)