Skip to content

Commit 461d4e3

Browse files
1 parent 3fa140e commit 461d4e3

File tree

4 files changed

+25
-9
lines changed

4 files changed

+25
-9
lines changed

advisories/github-reviewed/2022/03/GHSA-36p3-wjmg-h94x/GHSA-36p3-wjmg-h94x.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-36p3-wjmg-h94x",
4-
"modified": "2025-01-29T18:38:36Z",
4+
"modified": "2025-10-22T19:18:34Z",
55
"published": "2022-03-31T18:30:50Z",
66
"aliases": [
77
"CVE-2022-22965"
@@ -11,7 +11,7 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
1515
}
1616
],
1717
"affected": [
@@ -255,6 +255,10 @@
255255
"type": "WEB",
256256
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67"
257257
},
258+
{
259+
"type": "WEB",
260+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22965"
261+
},
258262
{
259263
"type": "WEB",
260264
"url": "https://www.kb.cert.org/vuls/id/970766"

advisories/github-reviewed/2022/04/GHSA-6v73-fgf6-w5j7/GHSA-6v73-fgf6-w5j7.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6v73-fgf6-w5j7",
4-
"modified": "2022-08-11T21:35:54Z",
4+
"modified": "2025-10-22T19:18:02Z",
55
"published": "2022-04-03T00:00:59Z",
66
"aliases": [
77
"CVE-2022-22963"
@@ -11,7 +11,7 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
1515
}
1616
],
1717
"affected": [
@@ -75,6 +75,10 @@
7575
"type": "WEB",
7676
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH"
7777
},
78+
{
79+
"type": "WEB",
80+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22963"
81+
},
7882
{
7983
"type": "WEB",
8084
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"

advisories/github-reviewed/2022/07/GHSA-4x9r-j582-cgr8/GHSA-4x9r-j582-cgr8.json

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4x9r-j582-cgr8",
4-
"modified": "2025-07-30T11:44:29Z",
4+
"modified": "2025-10-22T19:19:14Z",
55
"published": "2022-07-19T00:00:29Z",
66
"aliases": [
77
"CVE-2022-33891"
@@ -11,11 +11,11 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H"
1515
},
1616
{
1717
"type": "CVSS_V4",
18-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:A"
1919
}
2020
],
2121
"affected": [
@@ -117,6 +117,10 @@
117117
"type": "WEB",
118118
"url": "https://packetstormsecurity.com/files/168309/Apache-Spark-Unauthenticated-Command-Injection.html"
119119
},
120+
{
121+
"type": "WEB",
122+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-33891"
123+
},
120124
{
121125
"type": "WEB",
122126
"url": "https://www.openwall.com/lists/oss-security/2023/05/02/1"

advisories/github-reviewed/2023/09/GHSA-v92f-jx6p-73rx/GHSA-v92f-jx6p-73rx.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v92f-jx6p-73rx",
4-
"modified": "2025-02-18T22:39:30Z",
4+
"modified": "2025-10-22T19:17:43Z",
55
"published": "2023-09-19T20:35:16Z",
66
"aliases": [
77
"CVE-2022-24816"
@@ -11,7 +11,7 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
1515
}
1616
],
1717
"affected": [
@@ -70,6 +70,10 @@
7070
{
7171
"type": "PACKAGE",
7272
"url": "https://github.com/geosolutions-it/jai-ext"
73+
},
74+
{
75+
"type": "WEB",
76+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-24816"
7377
}
7478
],
7579
"database_specific": {

0 commit comments

Comments
 (0)