Skip to content

Commit 3395ce2

Browse files
Advisory Database Sync
1 parent 8fde7a4 commit 3395ce2

File tree

30 files changed

+1048
-0
lines changed

30 files changed

+1048
-0
lines changed
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-334j-33qm-fwx4",
4+
"modified": "2025-10-14T12:31:30Z",
5+
"published": "2025-10-14T12:31:30Z",
6+
"aliases": [
7+
"CVE-2025-20711"
8+
],
9+
"details": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00422399; Issue ID: MSV-3748.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-20711"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://corp.mediatek.com/product-security-bulletin/October-2025"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-1287"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-10-14T10:15:35Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-33cp-wjp9-mgp2",
4+
"modified": "2025-10-14T12:31:30Z",
5+
"published": "2025-10-14T12:31:30Z",
6+
"aliases": [
7+
"CVE-2025-20716"
8+
],
9+
"details": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00421149; Issue ID: MSV-3728.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-20716"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://corp.mediatek.com/product-security-bulletin/October-2025"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-787"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-10-14T10:15:36Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-35xv-2qm4-86w9",
4+
"modified": "2025-10-14T12:31:31Z",
5+
"published": "2025-10-14T12:31:31Z",
6+
"aliases": [
7+
"CVE-2025-20720"
8+
],
9+
"details": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418954; Issue ID: MSV-3569.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-20720"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://corp.mediatek.com/product-security-bulletin/October-2025"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-122"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-10-14T10:15:36Z"
30+
}
31+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3p4f-g732-2rg3",
4+
"modified": "2025-10-14T12:31:31Z",
5+
"published": "2025-10-14T12:31:31Z",
6+
"aliases": [
7+
"CVE-2025-9437"
8+
],
9+
"details": "A security issue exists within the Studio 5000 Logix Designer add-on profile (AOP) for the ArmorStart Classic distributed motor controller, resulting in denial-of-service. This vulnerability is possible due to the input of invalid values into Component Object Model (COM) methods.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9437"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1751.html"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-755"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-10-14T12:15:34Z"
35+
}
36+
}
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3p9h-r6fg-7r7h",
4+
"modified": "2025-10-14T12:31:30Z",
5+
"published": "2025-10-14T12:31:30Z",
6+
"aliases": [
7+
"CVE-2011-20002"
8+
],
9+
"details": "A vulnerability has been identified in SIMATIC S7-1200 CPU V1 family (incl. SIPLUS variants) (All versions < V2.0.2), SIMATIC S7-1200 CPU V2 family (incl. SIPLUS variants) (All versions < V2.0.2). Affected controllers are vulnerable to capture-replay in the communication with the engineering software. This could allow an on-path attacker between the engineering software and the controller to execute any previously recorded commands at a later time (e.g. set the controller to STOP), regardless whether or not the controller had a password configured.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-20002"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-625789.html"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-294"
34+
],
35+
"severity": "HIGH",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2025-10-14T10:15:33Z"
39+
}
40+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6fw8-xrwm-jjcg",
4+
"modified": "2025-10-14T12:31:30Z",
5+
"published": "2025-10-14T12:31:30Z",
6+
"aliases": [
7+
"CVE-2025-20715"
8+
],
9+
"details": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00421152; Issue ID: MSV-3731.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-20715"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://corp.mediatek.com/product-security-bulletin/October-2025"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-787"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-10-14T10:15:36Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-72qq-pm4p-2xwf",
4+
"modified": "2025-10-14T12:31:31Z",
5+
"published": "2025-10-14T12:31:31Z",
6+
"aliases": [
7+
"CVE-2025-20717"
8+
],
9+
"details": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00419946; Issue ID: MSV-3582.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-20717"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://corp.mediatek.com/product-security-bulletin/October-2025"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-121"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-10-14T10:15:36Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-7fvf-phgc-7gpv",
4+
"modified": "2025-10-14T12:31:30Z",
5+
"published": "2025-10-14T12:31:30Z",
6+
"aliases": [
7+
"CVE-2025-20713"
8+
],
9+
"details": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00432661; Issue ID: MSV-3904.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-20713"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://corp.mediatek.com/product-security-bulletin/October-2025"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-121"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-10-14T10:15:35Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-8gx7-747g-j239",
4+
"modified": "2025-10-14T12:31:31Z",
5+
"published": "2025-10-14T12:31:31Z",
6+
"aliases": [
7+
"CVE-2025-20718"
8+
],
9+
"details": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00419945; Issue ID: MSV-3581.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-20718"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://corp.mediatek.com/product-security-bulletin/October-2025"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-121"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-10-14T10:15:36Z"
30+
}
31+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-8rm3-gwg6-x29g",
4+
"modified": "2025-10-14T12:31:30Z",
5+
"published": "2025-10-14T12:31:30Z",
6+
"aliases": [
7+
"CVE-2025-10228"
8+
],
9+
"details": "Session Fixation vulnerability in Rolantis Information Technologies Agentis allows Session Hijacking.This issue affects Agentis: before 4.44.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10228"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.usom.gov.tr/bildirim/tr-25-0336"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-384"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-10-14T10:15:35Z"
35+
}
36+
}

0 commit comments

Comments
 (0)