Skip to content

Commit 389924d

Browse files

File tree

6 files changed

+128
-6
lines changed

6 files changed

+128
-6
lines changed

advisories/unreviewed/2022/05/GHSA-23h3-v846-4gxf/GHSA-23h3-v846-4gxf.json

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-23h3-v846-4gxf",
4-
"modified": "2022-05-17T04:04:45Z",
4+
"modified": "2025-09-25T00:30:27Z",
55
"published": "2022-05-17T04:04:45Z",
66
"aliases": [
77
"CVE-2014-0774"
@@ -14,6 +14,14 @@
1414
"type": "ADVISORY",
1515
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0774"
1616
},
17+
{
18+
"type": "WEB",
19+
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-031-01"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-058-02"
24+
},
1725
{
1826
"type": "WEB",
1927
"url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-031-01"
@@ -29,7 +37,8 @@
2937
],
3038
"database_specific": {
3139
"cwe_ids": [
32-
"CWE-119"
40+
"CWE-119",
41+
"CWE-121"
3342
],
3443
"severity": "MODERATE",
3544
"github_reviewed": false,

advisories/unreviewed/2022/05/GHSA-4g3g-9jv2-fhx5/GHSA-4g3g-9jv2-fhx5.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4g3g-9jv2-fhx5",
4-
"modified": "2022-05-17T04:46:09Z",
4+
"modified": "2025-09-25T00:30:27Z",
55
"published": "2022-05-17T04:46:09Z",
66
"aliases": [
77
"CVE-2014-0778"
@@ -14,9 +14,17 @@
1414
"type": "ADVISORY",
1515
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0778"
1616
},
17+
{
18+
"type": "WEB",
19+
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-105-01"
20+
},
1721
{
1822
"type": "WEB",
1923
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-105-01"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "http://www.progea.com/it-it/downloads/software.aspx"
2028
}
2129
],
2230
"database_specific": {

advisories/unreviewed/2022/05/GHSA-p75m-894q-gmxh/GHSA-p75m-894q-gmxh.json

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-p75m-894q-gmxh",
4-
"modified": "2022-05-17T04:47:23Z",
4+
"modified": "2025-09-25T00:30:27Z",
55
"published": "2022-05-17T04:47:23Z",
66
"aliases": [
77
"CVE-2014-0777"
@@ -14,14 +14,23 @@
1414
"type": "ADVISORY",
1515
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0777"
1616
},
17+
{
18+
"type": "WEB",
19+
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-100-01"
20+
},
1721
{
1822
"type": "WEB",
1923
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-100-01"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "http://www.ioserver.com"
2028
}
2129
],
2230
"database_specific": {
2331
"cwe_ids": [
24-
"CWE-119"
32+
"CWE-119",
33+
"CWE-125"
2534
],
2635
"severity": "HIGH",
2736
"github_reviewed": false,

advisories/unreviewed/2022/05/GHSA-w3fm-7p4x-vf2h/GHSA-w3fm-7p4x-vf2h.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-w3fm-7p4x-vf2h",
4-
"modified": "2022-05-14T01:44:13Z",
4+
"modified": "2025-09-25T00:30:27Z",
55
"published": "2022-05-14T01:44:13Z",
66
"aliases": [
77
"CVE-2014-0779"
@@ -14,6 +14,10 @@
1414
"type": "ADVISORY",
1515
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0779"
1616
},
17+
{
18+
"type": "WEB",
19+
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-072-01"
20+
},
1721
{
1822
"type": "WEB",
1923
"url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-024-01"
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-8mjq-32x3-22qf",
4+
"modified": "2025-09-25T00:30:27Z",
5+
"published": "2025-09-25T00:30:27Z",
6+
"aliases": [
7+
"CVE-2025-10894"
8+
],
9+
"details": "Malicious code was inserted into the Nx (build system) package and several related plugins. The tampered package was published to the npm software registry, via a supply-chain attack. Affected versions contain code that scans the file system, collects credentials, and posts them to GitHub as a repo under user's accounts.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "WEB",
20+
"url": "https://github.com/nrwl/nx/security/advisories/GHSA-cxm3-wv7p-598c"
21+
},
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10894"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://access.redhat.com/security/cve/CVE-2025-10894"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://access.redhat.com/security/supply-chain-attacks-NPM-packages"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396282"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://www.stepsecurity.io/blog/supply-chain-security-alert-popular-nx-build-system-package-compromised-with-data-stealing-malware"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.wiz.io/blog/s1ngularity-supply-chain-attack"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-506"
50+
],
51+
"severity": "CRITICAL",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2025-09-24T22:15:35Z"
55+
}
56+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-pm99-pv2w-ghvr",
4+
"modified": "2025-09-25T00:30:28Z",
5+
"published": "2025-09-25T00:30:28Z",
6+
"aliases": [
7+
"CVE-2025-54520"
8+
],
9+
"details": "Improper Protection Against Voltage and Clock Glitches in FPGA devices, could allow an attacker with physical access to undervolt the platform resulting in a loss of confidentiality.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54520"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-8018.html"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-1247"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-09-24T22:15:35Z"
35+
}
36+
}

0 commit comments

Comments
 (0)