Skip to content

Commit 4041898

Browse files
Advisory Database Sync
1 parent 0deb6c4 commit 4041898

File tree

42 files changed

+469
-108
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

42 files changed

+469
-108
lines changed

advisories/github-reviewed/2025/09/GHSA-m68q-4hqr-mc6f/GHSA-m68q-4hqr-mc6f.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m68q-4hqr-mc6f",
4-
"modified": "2025-12-03T18:30:21Z",
4+
"modified": "2025-12-05T21:30:21Z",
55
"published": "2025-09-16T15:32:37Z",
66
"aliases": [
77
"CVE-2025-4953"
@@ -68,6 +68,10 @@
6868
"type": "WEB",
6969
"url": "https://access.redhat.com/errata/RHSA-2025:22265"
7070
},
71+
{
72+
"type": "WEB",
73+
"url": "https://access.redhat.com/errata/RHSA-2025:22275"
74+
},
7175
{
7276
"type": "WEB",
7377
"url": "https://access.redhat.com/errata/RHSA-2025:2703"

advisories/unreviewed/2024/04/GHSA-7mfg-57xp-v6gq/GHSA-7mfg-57xp-v6gq.json

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7mfg-57xp-v6gq",
4-
"modified": "2024-04-26T15:30:31Z",
4+
"modified": "2025-12-05T21:30:20Z",
55
"published": "2024-04-26T15:30:31Z",
66
"aliases": [
77
"CVE-2023-47222"
88
],
9-
"details": "An exposure of sensitive information vulnerability has been reported to affect Media Streaming add-on. If exploited, the vulnerability could allow users to compromise the security of the system via a network.\n\nWe have already fixed the vulnerability in the following version:\nMedia Streaming add-on 500.1.1.5 ( 2024/01/22 ) and later\n",
9+
"details": "An exposure of sensitive information vulnerability has been reported to affect Media Streaming add-on. If exploited, the vulnerability could allow users to compromise the security of the system via a network.\n\nWe have already fixed the vulnerability in the following version:\nMedia Streaming add-on 500.1.1.5 ( 2024/01/22 ) and later",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",
@@ -26,7 +26,8 @@
2626
],
2727
"database_specific": {
2828
"cwe_ids": [
29-
"CWE-200"
29+
"CWE-200",
30+
"CWE-22"
3031
],
3132
"severity": "CRITICAL",
3233
"github_reviewed": false,

advisories/unreviewed/2024/06/GHSA-4x4x-4g44-6g6p/GHSA-4x4x-4g44-6g6p.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4x4x-4g44-6g6p",
4-
"modified": "2024-06-19T06:30:35Z",
4+
"modified": "2025-12-05T21:30:20Z",
55
"published": "2024-06-19T06:30:35Z",
66
"aliases": [
77
"CVE-2024-5853"
@@ -29,7 +29,9 @@
2929
}
3030
],
3131
"database_specific": {
32-
"cwe_ids": [],
32+
"cwe_ids": [
33+
"CWE-434"
34+
],
3335
"severity": "CRITICAL",
3436
"github_reviewed": false,
3537
"github_reviewed_at": null,

advisories/unreviewed/2024/10/GHSA-6cpm-g48h-c92x/GHSA-6cpm-g48h-c92x.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6cpm-g48h-c92x",
4-
"modified": "2024-10-08T09:30:53Z",
4+
"modified": "2025-12-05T21:30:20Z",
55
"published": "2024-10-08T09:30:53Z",
66
"aliases": [
77
"CVE-2024-8964"

advisories/unreviewed/2025/06/GHSA-39w6-236w-7r42/GHSA-39w6-236w-7r42.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-39w6-236w-7r42",
4-
"modified": "2025-06-06T18:30:31Z",
4+
"modified": "2025-12-05T21:30:20Z",
55
"published": "2025-06-06T18:30:31Z",
66
"aliases": [
77
"CVE-2024-50406"
88
],
99
"details": "A cross-site scripting (XSS) vulnerability has been reported to affect License Center. If exploited, the vulnerability could allow remote attackers who have gained user access to bypass security mechanisms or read application data.\n\nWe have already fixed the vulnerability in the following version:\nLicense Center 1.9.49 and later",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/06/GHSA-98qw-prqm-9f4p/GHSA-98qw-prqm-9f4p.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-98qw-prqm-9f4p",
4-
"modified": "2025-11-27T18:30:26Z",
4+
"modified": "2025-12-05T21:30:21Z",
55
"published": "2025-06-26T21:31:08Z",
66
"aliases": [
77
"CVE-2025-5318"
@@ -31,6 +31,10 @@
3131
"type": "WEB",
3232
"url": "https://access.redhat.com/security/cve/CVE-2025-5318"
3333
},
34+
{
35+
"type": "WEB",
36+
"url": "https://access.redhat.com/errata/RHSA-2025:22275"
37+
},
3438
{
3539
"type": "WEB",
3640
"url": "https://access.redhat.com/errata/RHSA-2025:21829"

advisories/unreviewed/2025/08/GHSA-556x-fx4f-2hgg/GHSA-556x-fx4f-2hgg.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-556x-fx4f-2hgg",
4-
"modified": "2025-08-29T18:30:51Z",
4+
"modified": "2025-12-05T21:30:20Z",
55
"published": "2025-08-29T18:30:51Z",
66
"aliases": [
77
"CVE-2025-22483"
88
],
99
"details": "A cross-site scripting (XSS) vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to bypass security mechanisms or read application data.\n\nWe have already fixed the vulnerability in the following versions:\nLicense Center 1.8.51 and later\nLicense Center 1.9.51 and later",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/10/GHSA-879m-mhmf-vg5r/GHSA-879m-mhmf-vg5r.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-879m-mhmf-vg5r",
4-
"modified": "2025-10-21T18:30:34Z",
4+
"modified": "2025-12-05T21:30:21Z",
55
"published": "2025-10-21T18:30:34Z",
66
"aliases": [
77
"CVE-2025-22166"
88
],
99
"details": "This High severity DoS (Denial of Service) vulnerability was introduced in version 2.0 of Confluence Data Center.\n\nThis DoS (Denial of Service) vulnerability, with a CVSS Score of 8.3, allows an attacker to cause a resource to be unavailable for its intended users by temporarily or indefinitely disrupting services of a host connected to a network.\n\nAtlassian recommends that Confluence Data Center customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\n Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.25\n Confluence Data Center and Server 9.2: Upgrade to a release greater than or equal to 9.2.7\n Confluence Data Center and Server 10.0: Upgrade to a release greater than or equal to 10.0.2\n\nSee the release notes ([https://confluence.atlassian.com/doc/confluence-release-notes-327.html]). You can download the latest version of Confluence Data Center from the download center ([https://www.atlassian.com/software/confluence/download-archives]).\n\nThis vulnerability was reported via our Atlassian (Internal) program.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/11/GHSA-m7gj-j4fq-3x93/GHSA-m7gj-j4fq-3x93.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m7gj-j4fq-3x93",
4-
"modified": "2025-11-21T15:31:28Z",
4+
"modified": "2025-12-05T21:30:21Z",
55
"published": "2025-11-21T15:31:27Z",
66
"aliases": [
77
"CVE-2025-66110"
88
],
99
"details": "Missing Authorization vulnerability in bPlugins Tiktok Feed b-tiktok-feed allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tiktok Feed: from n/a through <= 1.0.22.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-862"
2530
],
26-
"severity": null,
31+
"severity": "MODERATE",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2025-11-21T13:15:52Z"

advisories/unreviewed/2025/12/GHSA-27fc-mjrp-6g7x/GHSA-27fc-mjrp-6g7x.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-27fc-mjrp-6g7x",
4-
"modified": "2025-12-03T21:31:05Z",
4+
"modified": "2025-12-05T21:30:22Z",
55
"published": "2025-12-03T21:31:05Z",
66
"aliases": [
77
"CVE-2025-65868"
88
],
99
"details": "XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -20,8 +25,10 @@
2025
}
2126
],
2227
"database_specific": {
23-
"cwe_ids": [],
24-
"severity": null,
28+
"cwe_ids": [
29+
"CWE-611"
30+
],
31+
"severity": "CRITICAL",
2532
"github_reviewed": false,
2633
"github_reviewed_at": null,
2734
"nvd_published_at": "2025-12-03T21:15:52Z"

0 commit comments

Comments
 (0)