Skip to content

Commit 3671bab

Browse files
1 parent 16c0893 commit 3671bab

File tree

4 files changed

+20
-4
lines changed

4 files changed

+20
-4
lines changed

advisories/github-reviewed/2025/03/GHSA-mgvx-rpfc-9mpv/GHSA-mgvx-rpfc-9mpv.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mgvx-rpfc-9mpv",
4-
"modified": "2025-11-03T22:55:15Z",
4+
"modified": "2025-11-15T02:13:04Z",
55
"published": "2025-03-25T00:30:26Z",
66
"aliases": [
77
"CVE-2025-1974"
@@ -63,6 +63,10 @@
6363
"type": "WEB",
6464
"url": "https://github.com/kubernetes/kubernetes/issues/131009"
6565
},
66+
{
67+
"type": "WEB",
68+
"url": "https://github.com/B1ack4sh/Blackash-CVE-2025-1974"
69+
},
6670
{
6771
"type": "PACKAGE",
6872
"url": "https://github.com/kubernetes/ingress-nginx"

advisories/github-reviewed/2025/10/GHSA-2j97-4jmq-c4xf/GHSA-2j97-4jmq-c4xf.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2j97-4jmq-c4xf",
4-
"modified": "2025-10-31T21:25:36Z",
4+
"modified": "2025-11-15T02:15:05Z",
55
"published": "2025-10-31T18:31:15Z",
66
"aliases": [
77
"CVE-2025-62264"
88
],
99
"summary": "Liferay Portal Vulnerable to Reflected XSS via the selectedLanguageId Parameter",
1010
"details": "Reflected cross-site scripting (XSS) vulnerability in Languauge Override in Liferay Portal 7.4.3.8 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, and 7.4 update 4 through update 92 allows remote attackers to inject arbitrary web script or HTML via the `_com_liferay_portal_language_override_web_internal_portlet_PLOPortlet_selectedLanguageId` parameter.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"

advisories/github-reviewed/2025/10/GHSA-q285-wfpg-93hr/GHSA-q285-wfpg-93hr.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q285-wfpg-93hr",
4-
"modified": "2025-11-03T20:16:18Z",
4+
"modified": "2025-11-15T02:15:25Z",
55
"published": "2025-10-31T21:31:02Z",
66
"aliases": [
77
"CVE-2025-62267"
88
],
99
"summary": "Liferay Portal and DXP affected by multiple cross-site scripting (XSS) vulnerabilities in web content template’s select structure page",
1010
"details": "Multiple cross-site scripting (XSS) vulnerabilities in web content template’s select structure page in Liferay Portal 7.4.3.35 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 update 35 through update 92 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a user’s (1) First Name, (2) Middle Name, or (3) Last Name text field.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"

advisories/github-reviewed/2025/11/GHSA-4v8w-gg5j-ph37/GHSA-4v8w-gg5j-ph37.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4v8w-gg5j-ph37",
4-
"modified": "2025-11-04T22:16:19Z",
4+
"modified": "2025-11-15T02:13:22Z",
55
"published": "2025-11-03T17:07:36Z",
66
"aliases": [
77
"CVE-2025-47776"
88
],
99
"summary": "MantisBT vulnerable to authentication bypass for some passwords due to PHP type juggling",
1010
"details": "Due to an incorrect use of loose (`==`) instead of strict (`===`) comparison in the [authentication code][1], PHP type juggling will cause interpretation of certain MD5 hashes as numbers, specifically those matching scientific notation.\n\n[1]: https://github.com/mantisbt/mantisbt/blob/0fb502dd613991e892ed2224ac5ea3e40ba632bc/core/authentication_api.php#L782\n\n### Impact\nOn MantisBT instances configured to use the *MD5* login method, user accounts having a password hash evaluating to zero (i.e. matching regex `^0+[Ee][0-9]+$`) are vulnerable, allowing an attacker knowing the victim's username to login without knowledge of their actual password, using any other password having a hash evaluating to zero, for example `comito5` (0e579603064547166083907005281618). \n\nNo password bruteforcing for individual users is needed, thus $g_max_failed_login_count does not protect against the attack.\n\n### Patches\nFixed in 2.27.2.\n\n### Workarounds\nCheck the database for vulnerable accounts, and change those users' passwords, e.g. for MySQL:\n```sql\nSELECT username, email FROM mantis_user_table WHERE password REGEXP '^0+[Ee][0-9]+$'\n```\n\n### Credits\nThanks to Harry Sintonen / Reversec for discovering and reporting the issue.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N"

0 commit comments

Comments
 (0)