Skip to content

Commit 1bf66a1

Browse files

File tree

6 files changed

+152
-3
lines changed

6 files changed

+152
-3
lines changed

advisories/unreviewed/2025/09/GHSA-7vvg-4g6w-39mf/GHSA-7vvg-4g6w-39mf.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7vvg-4g6w-39mf",
4-
"modified": "2025-09-13T21:31:36Z",
4+
"modified": "2025-10-20T06:30:17Z",
55
"published": "2025-09-13T21:31:36Z",
66
"aliases": [
77
"CVE-2025-10373"
@@ -27,6 +27,14 @@
2727
"type": "WEB",
2828
"url": "https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/22.md"
2929
},
30+
{
31+
"type": "WEB",
32+
"url": "https://karinagante.github.io/cve-2025-10373"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://karinagante.github.io/cve-2025-10373/#proof-of-concept-poc"
37+
},
3038
{
3139
"type": "WEB",
3240
"url": "https://vuldb.com/?ctiid.323781"

advisories/unreviewed/2025/09/GHSA-vwfw-9fqw-jjvp/GHSA-vwfw-9fqw-jjvp.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vwfw-9fqw-jjvp",
4-
"modified": "2025-09-17T06:30:22Z",
4+
"modified": "2025-10-20T06:30:17Z",
55
"published": "2025-09-17T06:30:22Z",
66
"aliases": [
77
"CVE-2025-10584"
@@ -27,6 +27,14 @@
2727
"type": "WEB",
2828
"url": "https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/25.md"
2929
},
30+
{
31+
"type": "WEB",
32+
"url": "https://karinagante.github.io/cve-2025-10584"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://karinagante.github.io/cve-2025-10584/#proof-of-concept-poc"
37+
},
3038
{
3139
"type": "WEB",
3240
"url": "https://vuldb.com/?ctiid.324561"

advisories/unreviewed/2025/09/GHSA-xhc6-mmf6-vvgh/GHSA-xhc6-mmf6-vvgh.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xhc6-mmf6-vvgh",
4-
"modified": "2025-09-13T18:30:56Z",
4+
"modified": "2025-10-20T06:30:17Z",
55
"published": "2025-09-13T18:30:56Z",
66
"aliases": [
77
"CVE-2025-10372"
@@ -27,6 +27,10 @@
2727
"type": "WEB",
2828
"url": "https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/21.md"
2929
},
30+
{
31+
"type": "WEB",
32+
"url": "https://karinagante.github.io/cve-2025-10372"
33+
},
3034
{
3135
"type": "WEB",
3236
"url": "https://vuldb.com/?ctiid.323780"
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-68g6-84fp-8hf9",
4+
"modified": "2025-10-20T06:30:17Z",
5+
"published": "2025-10-20T06:30:17Z",
6+
"aliases": [
7+
"CVE-2025-11948"
8+
],
9+
"details": "Document Management System developed by Excellent Infotek has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11948"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.twcert.org.tw/en/cp-139-10453-43e63-2.html"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.twcert.org.tw/tw/cp-132-10452-72cb6-1.html"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-434"
38+
],
39+
"severity": "CRITICAL",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2025-10-20T04:15:36Z"
43+
}
44+
}
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-7p6w-xg84-v7c5",
4+
"modified": "2025-10-20T06:30:17Z",
5+
"published": "2025-10-20T06:30:17Z",
6+
"aliases": [
7+
"CVE-2025-40004"
8+
],
9+
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: Fix buffer overflow in USB transport layer\n\nA buffer overflow vulnerability exists in the USB 9pfs transport layer\nwhere inconsistent size validation between packet header parsing and\nactual data copying allows a malicious USB host to overflow heap buffers.\n\nThe issue occurs because:\n- usb9pfs_rx_header() validates only the declared size in packet header\n- usb9pfs_rx_complete() uses req->actual (actual received bytes) for\nmemcpy\n\nThis allows an attacker to craft packets with small declared size\n(bypassing validation) but large actual payload (triggering overflow\nin memcpy).\n\nAdd validation in usb9pfs_rx_complete() to ensure req->actual does not\nexceed the buffer capacity before copying data.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40004"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://git.kernel.org/stable/c/0da18d49f874d444ad83c8a546fa33bfcf2f582c"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://git.kernel.org/stable/c/c04db81cd0288dfc68b7a0f7d09bd49b40bba451"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://git.kernel.org/stable/c/df8462f0fc045b4475dc494a5787a03c972ba2a2"
28+
}
29+
],
30+
"database_specific": {
31+
"cwe_ids": [],
32+
"severity": null,
33+
"github_reviewed": false,
34+
"github_reviewed_at": null,
35+
"nvd_published_at": "2025-10-20T06:15:36Z"
36+
}
37+
}
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-874f-wxq7-gpmm",
4+
"modified": "2025-10-20T06:30:17Z",
5+
"published": "2025-10-20T06:30:17Z",
6+
"aliases": [
7+
"CVE-2025-62577"
8+
],
9+
"details": "ETERNUS SF provided by Fsas Technologies Inc. contains an incorrect default permissions vulnerability. A low-privileged user with access to the management server may obtain database credentials, potentially allowing execution of OS commands with administrator privileges.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62577"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://jvn.jp/en/jp/JVN44266462"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.fsastech.com/ja-jp/resources/security/2025/1020.html"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.fujitsu.com/global/support/products/computing/storage/20251020/index.html"
37+
}
38+
],
39+
"database_specific": {
40+
"cwe_ids": [
41+
"CWE-276"
42+
],
43+
"severity": "HIGH",
44+
"github_reviewed": false,
45+
"github_reviewed_at": null,
46+
"nvd_published_at": "2025-10-20T06:15:36Z"
47+
}
48+
}

0 commit comments

Comments
 (0)