Skip to content

File tree

21 files changed

+236
-20
lines changed

21 files changed

+236
-20
lines changed

advisories/github-reviewed/2025/11/GHSA-4g74-7cff-xcv8/GHSA-4g74-7cff-xcv8.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4g74-7cff-xcv8",
4-
"modified": "2025-11-05T18:44:18Z",
4+
"modified": "2025-11-06T15:29:34Z",
55
"published": "2025-11-05T18:44:18Z",
66
"aliases": [
77
"CVE-2025-62161"
@@ -44,6 +44,10 @@
4444
"type": "WEB",
4545
"url": "https://github.com/youki-dev/youki/security/advisories/GHSA-4g74-7cff-xcv8"
4646
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62161"
50+
},
4751
{
4852
"type": "WEB",
4953
"url": "https://github.com/youki-dev/youki/commit/5886c91073b9be748bd8d5aed49c4a820548030a"
@@ -61,6 +65,6 @@
6165
"severity": "HIGH",
6266
"github_reviewed": true,
6367
"github_reviewed_at": "2025-11-05T18:44:18Z",
64-
"nvd_published_at": null
68+
"nvd_published_at": "2025-11-06T00:15:36Z"
6569
}
6670
}

advisories/github-reviewed/2025/11/GHSA-gf93-xccm-5g6j/GHSA-gf93-xccm-5g6j.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gf93-xccm-5g6j",
4-
"modified": "2025-11-04T15:43:52Z",
4+
"modified": "2025-11-06T15:30:15Z",
55
"published": "2025-11-04T15:43:52Z",
66
"aliases": [
77
"CVE-2025-64171"
@@ -43,10 +43,18 @@
4343
"type": "WEB",
4444
"url": "https://github.com/3scale-sre/marin3r/security/advisories/GHSA-gf93-xccm-5g6j"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64171"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://github.com/3scale-sre/marin3r/pull/294"
4953
},
54+
{
55+
"type": "WEB",
56+
"url": "https://github.com/3scale-sre/marin3r/commit/859b14115fde1d67620e645cd1b62e90e30d9981"
57+
},
5058
{
5159
"type": "WEB",
5260
"url": "https://github.com/3scale-sre/marin3r/commit/c60246a43ae8c0c38dd7267f298d68a121a159fa"
@@ -63,6 +71,6 @@
6371
"severity": "HIGH",
6472
"github_reviewed": true,
6573
"github_reviewed_at": "2025-11-04T15:43:52Z",
66-
"nvd_published_at": null
74+
"nvd_published_at": "2025-11-06T01:15:38Z"
6775
}
6876
}

advisories/github-reviewed/2025/11/GHSA-vf95-55w6-qmrf/GHSA-vf95-55w6-qmrf.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vf95-55w6-qmrf",
4-
"modified": "2025-11-05T18:45:19Z",
4+
"modified": "2025-11-06T15:29:58Z",
55
"published": "2025-11-05T18:45:18Z",
66
"aliases": [
77
"CVE-2025-62596"
@@ -44,6 +44,10 @@
4444
"type": "WEB",
4545
"url": "https://github.com/youki-dev/youki/security/advisories/GHSA-vf95-55w6-qmrf"
4646
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62596"
50+
},
4751
{
4852
"type": "WEB",
4953
"url": "https://github.com/youki-dev/youki/commit/5886c91073b9be748bd8d5aed49c4a820548030a"
@@ -73,6 +77,6 @@
7377
"severity": "HIGH",
7478
"github_reviewed": true,
7579
"github_reviewed_at": "2025-11-05T18:45:18Z",
76-
"nvd_published_at": null
80+
"nvd_published_at": "2025-11-06T00:15:37Z"
7781
}
7882
}

advisories/unreviewed/2025/02/GHSA-4m27-833c-75q4/GHSA-4m27-833c-75q4.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4m27-833c-75q4",
4-
"modified": "2025-02-06T18:31:05Z",
4+
"modified": "2025-11-06T15:31:01Z",
55
"published": "2025-02-06T06:31:26Z",
66
"aliases": [
77
"CVE-2024-57520"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57520"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/asterisk/asterisk/issues/1122"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://gist.github.com/hyp164D1/ae76ab25acfbe263b2ed7b24b6e5c621"

advisories/unreviewed/2025/10/GHSA-2jv9-jhfm-qj68/GHSA-2jv9-jhfm-qj68.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2jv9-jhfm-qj68",
4-
"modified": "2025-10-31T00:30:30Z",
4+
"modified": "2025-11-06T15:31:02Z",
55
"published": "2025-10-31T00:30:30Z",
66
"aliases": [
77
"CVE-2011-10039"
88
],
99
"details": "Nagios XI versions prior to 2011R1.9 are vulnerable to cross-site scripting (XSS) via the Alert Heatmap report and the “My Reports” listing of the web interface. Insufficient validation or escaping of user-supplied input may allow an attacker to inject and execute arbitrary script in the context of a victim's browser.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/10/GHSA-2qr8-8m5h-4c3j/GHSA-2qr8-8m5h-4c3j.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2qr8-8m5h-4c3j",
4-
"modified": "2025-10-31T00:30:30Z",
4+
"modified": "2025-11-06T15:31:02Z",
55
"published": "2025-10-31T00:30:30Z",
66
"aliases": [
77
"CVE-2012-10063"
88
],
99
"details": "Nagios XI versions prior to 2012R1.3 contain a SQL injection vulnerability in the legacy Core Configuration Manager (CCM) interface. Authenticated users could manipulate SQL queries by supplying crafted input to specific CCM parameters, potentially allowing access to configuration data stored in the application database. Successful exploitation could disclose or modify notification data and, in some cases, impact the application database more broadly.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/10/GHSA-3vg4-6fgq-6952/GHSA-3vg4-6fgq-6952.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3vg4-6fgq-6952",
4-
"modified": "2025-10-31T00:30:30Z",
4+
"modified": "2025-11-06T15:31:02Z",
55
"published": "2025-10-31T00:30:30Z",
66
"aliases": [
77
"CVE-2013-10071"
88
],
99
"details": "Nagios XI versions prior to 2012R1.6 contain a reflected cross-site scripting (XSS) vulnerability in the dashboard dashlet AJAX load functionality. Insufficient validation or escaping of user-supplied input may allow an attacker to inject and execute arbitrary script in the context of a victim's browser.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/10/GHSA-49pm-cgmh-hw25/GHSA-49pm-cgmh-hw25.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-49pm-cgmh-hw25",
4-
"modified": "2025-11-05T00:31:32Z",
4+
"modified": "2025-11-06T15:31:02Z",
55
"published": "2025-10-30T06:30:53Z",
66
"aliases": [
77
"CVE-2025-62229"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://access.redhat.com/errata/RHSA-2025:19623"
4545
},
46+
{
47+
"type": "WEB",
48+
"url": "https://access.redhat.com/errata/RHSA-2025:19909"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"

advisories/unreviewed/2025/10/GHSA-892r-x96w-jh76/GHSA-892r-x96w-jh76.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-892r-x96w-jh76",
4-
"modified": "2025-11-05T00:31:32Z",
4+
"modified": "2025-11-06T15:31:02Z",
55
"published": "2025-10-30T06:30:54Z",
66
"aliases": [
77
"CVE-2025-62230"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://access.redhat.com/errata/RHSA-2025:19623"
4545
},
46+
{
47+
"type": "WEB",
48+
"url": "https://access.redhat.com/errata/RHSA-2025:19909"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"

advisories/unreviewed/2025/10/GHSA-8pr9-vvj4-gx32/GHSA-8pr9-vvj4-gx32.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8pr9-vvj4-gx32",
4-
"modified": "2025-10-31T00:30:30Z",
4+
"modified": "2025-11-06T15:31:02Z",
55
"published": "2025-10-31T00:30:30Z",
66
"aliases": [
77
"CVE-2011-10037"
88
],
99
"details": "Nagios XI versions prior to 2011R1.9 are vulnerable to cross-site scripting (XSS) via the handling of xiwindow variables used to build permalinks in the web interface. Insufficient validation or escaping of user-supplied input may allow an attacker to inject and execute arbitrary script in the context of a victim's browser.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

0 commit comments

Comments
 (0)