Skip to content

Commit 25cde81

Browse files
Advisory Database Sync
1 parent 06927a6 commit 25cde81

File tree

28 files changed

+912
-10
lines changed

28 files changed

+912
-10
lines changed

advisories/unreviewed/2025/09/GHSA-g6q4-chqv-724q/GHSA-g6q4-chqv-724q.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g6q4-chqv-724q",
4-
"modified": "2025-11-12T18:31:04Z",
4+
"modified": "2025-11-13T15:30:28Z",
55
"published": "2025-09-17T09:30:44Z",
66
"aliases": [
77
"CVE-2025-9242"
88
],
99
"details": "An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.3 and 2025.1.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-38r9-v43g-rpq7",
4+
"modified": "2025-11-13T15:30:31Z",
5+
"published": "2025-11-13T15:30:31Z",
6+
"aliases": [
7+
"CVE-2025-62482"
8+
],
9+
"details": "Cross-site scripting in Zoom Workplace for Windows before version 6.5.10 may allow an unauthenticated user to impact integrity via network access.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62482"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25046"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-79"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-11-13T15:15:51Z"
35+
}
36+
}

advisories/unreviewed/2025/11/GHSA-3r87-4xwq-xh86/GHSA-3r87-4xwq-xh86.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,9 @@
2929
}
3030
],
3131
"database_specific": {
32-
"cwe_ids": [],
32+
"cwe_ids": [
33+
"CWE-326"
34+
],
3335
"severity": "MODERATE",
3436
"github_reviewed": false,
3537
"github_reviewed_at": null,
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-5f88-rr7v-c4qv",
4+
"modified": "2025-11-13T15:30:31Z",
5+
"published": "2025-11-13T15:30:31Z",
6+
"aliases": [
7+
"CVE-2025-62483"
8+
],
9+
"details": "Improper removal of sensitive information in certain Zoom Clients before version 6.5.10 may allow an unauthenticated user to conduct a disclosure of information via network access.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62483"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25047"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-212"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-11-13T15:15:51Z"
35+
}
36+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-5p3h-545h-3hhq",
4+
"modified": "2025-11-13T15:30:31Z",
5+
"published": "2025-11-13T15:30:31Z",
6+
"aliases": [
7+
"CVE-2025-13115"
8+
],
9+
"details": "A security flaw has been discovered in macrozheng mall-swarm up to 1.0.3. This impacts the function detail of the file /order/detail/ of the component Order Details Handler. Performing manipulation of the argument orderId results in improper authorization. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13115"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/Hwwg/cve/issues/6"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.332320"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.332320"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.683222"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-266"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2025-11-13T14:15:48Z"
51+
}
52+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-8mr3-4h49-rv3h",
4+
"modified": "2025-11-13T15:30:30Z",
5+
"published": "2025-11-13T15:30:30Z",
6+
"aliases": [
7+
"CVE-2025-13114"
8+
],
9+
"details": "A vulnerability was identified in macrozheng mall-swarm up to 1.0.3. This affects the function updateAttr of the file /cart/update/attr. Such manipulation leads to improper authorization. The attack may be performed from remote. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13114"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/Hwwg/cve/issues/5"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.332319"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.332319"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.683221"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-266"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2025-11-13T14:15:48Z"
51+
}
52+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-99gr-hh5m-m76m",
4+
"modified": "2025-11-13T15:30:31Z",
5+
"published": "2025-11-13T15:30:31Z",
6+
"aliases": [
7+
"CVE-2025-64738"
8+
],
9+
"details": "External control of file name or path in Zoom Workplace for macOS before version 6.5.10 may allow an authenticated user to conduct a disclosure of information via local access.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64738"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25040"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-73"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-11-13T15:15:53Z"
35+
}
36+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-99qj-9hw7-85x8",
4+
"modified": "2025-11-13T15:30:30Z",
5+
"published": "2025-11-13T15:30:30Z",
6+
"aliases": [
7+
"CVE-2025-12817"
8+
],
9+
"details": "Missing authorization in PostgreSQL CREATE STATISTICS command allows a table owner to achieve denial of service against other CREATE STATISTICS users by creating in any schema. A later CREATE STATISTICS for the same name, from a user having the CREATE privilege, would then fail. Versions before PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 are affected.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12817"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.postgresql.org/support/security/CVE-2025-12817"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-862"
30+
],
31+
"severity": "LOW",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-11-13T13:15:45Z"
35+
}
36+
}

advisories/unreviewed/2025/11/GHSA-9jfx-65hv-g39h/GHSA-9jfx-65hv-g39h.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,8 @@
2626
],
2727
"database_specific": {
2828
"cwe_ids": [
29-
"CWE-122"
29+
"CWE-122",
30+
"CWE-787"
3031
],
3132
"severity": "HIGH",
3233
"github_reviewed": false,
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-c4m5-ghw8-h8qf",
4+
"modified": "2025-11-13T15:30:31Z",
5+
"published": "2025-11-13T15:30:31Z",
6+
"aliases": [
7+
"CVE-2025-64739"
8+
],
9+
"details": "External control of file name or path in certain Zoom Clients may allow an unauthenticated user to conduct a disclosure of information via network access.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64739"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25041"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-73"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-11-13T15:15:53Z"
35+
}
36+
}

0 commit comments

Comments
 (0)