Skip to content

Commit 15a13bf

Browse files
1 parent f8591a1 commit 15a13bf

File tree

3 files changed

+48
-24
lines changed

3 files changed

+48
-24
lines changed

advisories/github-reviewed/2020/04/GHSA-g2f6-v5qh-h2mq/GHSA-g2f6-v5qh-h2mq.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g2f6-v5qh-h2mq",
4-
"modified": "2021-07-28T21:48:57Z",
4+
"modified": "2025-10-22T17:49:49Z",
55
"published": "2020-04-14T15:27:05Z",
66
"aliases": [
77
"CVE-2020-10199"
@@ -11,7 +11,7 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H"
1515
}
1616
],
1717
"affected": [
@@ -44,6 +44,10 @@
4444
"type": "WEB",
4545
"url": "https://cwe.mitre.org/data/definitions/917.html"
4646
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/sonatype/nexus-public"
50+
},
4751
{
4852
"type": "ADVISORY",
4953
"url": "https://securitylab.github.com/advisories/GHSL-2020-015-nxrm-sonatype"
@@ -52,6 +56,10 @@
5256
"type": "WEB",
5357
"url": "https://support.sonatype.com/hc/en-us/articles/360044882533"
5458
},
59+
{
60+
"type": "WEB",
61+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-10199"
62+
},
5563
{
5664
"type": "WEB",
5765
"url": "http://packetstormsecurity.com/files/157261/Nexus-Repository-Manager-3.21.1-01-Remote-Code-Execution.html"

advisories/github-reviewed/2020/04/GHSA-jpcq-cgw6-v4j6/GHSA-jpcq-cgw6-v4j6.json

Lines changed: 23 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jpcq-cgw6-v4j6",
4-
"modified": "2025-01-31T20:50:03Z",
4+
"modified": "2025-10-22T17:52:02Z",
55
"published": "2020-04-29T22:19:14Z",
66
"aliases": [
77
"CVE-2020-11023"
@@ -11,7 +11,7 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N"
14+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N/E:H"
1515
}
1616
],
1717
"affected": [
@@ -124,10 +124,6 @@
124124
"type": "WEB",
125125
"url": "https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77"
126126
},
127-
{
128-
"type": "WEB",
129-
"url": "https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679%40%3Ccommits.nifi.apache.org%3E"
130-
},
131127
{
132128
"type": "WEB",
133129
"url": "https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E"
@@ -180,6 +176,14 @@
180176
"type": "WEB",
181177
"url": "https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248@%3Cdev.hive.apache.org%3E"
182178
},
179+
{
180+
"type": "WEB",
181+
"url": "https://www.tenable.com/security/tns-2021-10"
182+
},
183+
{
184+
"type": "WEB",
185+
"url": "https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679%40%3Ccommits.nifi.apache.org%3E"
186+
},
183187
{
184188
"type": "WEB",
185189
"url": "https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9@%3Cissues.hive.apache.org%3E"
@@ -234,11 +238,7 @@
234238
},
235239
{
236240
"type": "WEB",
237-
"url": "https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6%40%3Cissues.hive.apache.org%3E"
238-
},
239-
{
240-
"type": "WEB",
241-
"url": "https://www.tenable.com/security/tns-2021-10"
241+
"url": "https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@%3Cissues.hive.apache.org%3E"
242242
},
243243
{
244244
"type": "WEB",
@@ -288,6 +288,10 @@
288288
"type": "WEB",
289289
"url": "https://www.debian.org/security/2020/dsa-4693"
290290
},
291+
{
292+
"type": "WEB",
293+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-11023"
294+
},
291295
{
292296
"type": "WEB",
293297
"url": "https://snyk.io/vuln/SNYK-JS-JQUERY-565129"
@@ -348,10 +352,6 @@
348352
"type": "WEB",
349353
"url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html"
350354
},
351-
{
352-
"type": "WEB",
353-
"url": "https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@%3Cgitbox.hive.apache.org%3E"
354-
},
355355
{
356356
"type": "WEB",
357357
"url": "https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5%40%3Cissues.hive.apache.org%3E"
@@ -464,6 +464,14 @@
464464
"type": "WEB",
465465
"url": "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released"
466466
},
467+
{
468+
"type": "WEB",
469+
"url": "https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6%40%3Cissues.hive.apache.org%3E"
470+
},
471+
{
472+
"type": "WEB",
473+
"url": "https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@%3Cgitbox.hive.apache.org%3E"
474+
},
467475
{
468476
"type": "WEB",
469477
"url": "https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c%40%3Cgitbox.hive.apache.org%3E"
@@ -572,10 +580,6 @@
572580
"type": "WEB",
573581
"url": "https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16%40%3Cdev.felix.apache.org%3E"
574582
},
575-
{
576-
"type": "WEB",
577-
"url": "https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@%3Cissues.hive.apache.org%3E"
578-
},
579583
{
580584
"type": "WEB",
581585
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html"

advisories/github-reviewed/2022/05/GHSA-vp49-2g4r-m3x3/GHSA-vp49-2g4r-m3x3.json

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vp49-2g4r-m3x3",
4-
"modified": "2024-10-26T22:48:08Z",
4+
"modified": "2025-10-22T17:50:48Z",
55
"published": "2022-05-24T17:16:58Z",
66
"aliases": [
77
"CVE-2020-11652"
@@ -11,11 +11,11 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:H"
1515
},
1616
{
1717
"type": "CVSS_V4",
18-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:A"
1919
}
2020
],
2121
"affected": [
@@ -63,6 +63,10 @@
6363
"type": "ADVISORY",
6464
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11652"
6565
},
66+
{
67+
"type": "WEB",
68+
"url": "https://docs.saltstack.com/en/latest/topics/releases/2019.2.4.html"
69+
},
6670
{
6771
"type": "WEB",
6872
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2020-103.yaml"
@@ -87,6 +91,10 @@
8791
"type": "WEB",
8892
"url": "https://usn.ubuntu.com/4459-1"
8993
},
94+
{
95+
"type": "WEB",
96+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-11652"
97+
},
9098
{
9199
"type": "WEB",
92100
"url": "https://www.debian.org/security/2020/dsa-4676"
@@ -107,6 +115,10 @@
107115
"type": "WEB",
108116
"url": "http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html"
109117
},
118+
{
119+
"type": "WEB",
120+
"url": "http://support.blackberry.com/kb/articleDetail?articleNumber=000063758"
121+
},
110122
{
111123
"type": "WEB",
112124
"url": "http://www.vmware.com/security/advisories/VMSA-2020-0009.html"

0 commit comments

Comments
 (0)