Skip to content

Commit 5be69a0

Browse files
Advisory Database Sync
1 parent 1832373 commit 5be69a0

File tree

51 files changed

+2049
-43
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+2049
-43
lines changed

advisories/unreviewed/2025/05/GHSA-jm2j-x4xc-567m/GHSA-jm2j-x4xc-567m.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jm2j-x4xc-567m",
4-
"modified": "2025-05-07T15:31:44Z",
4+
"modified": "2025-12-31T00:31:06Z",
55
"published": "2025-05-07T15:31:44Z",
66
"aliases": [
77
"CVE-2025-47504"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://patchstack.com/database/wordpress/plugin/custom-checkout-fields-for-woocommerce/vulnerability/wordpress-custom-checkout-fields-for-woocommerce-1-8-3-cross-site-scripting-xss-vulnerability?_s_id=cve"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://patchstack.com/database/wordpress/plugin/emails-verification-for-woocommerce/vulnerability/wordpress-email-verification-for-woocommerce-plugin-3-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve"
2529
}
2630
],
2731
"database_specific": {

advisories/unreviewed/2025/12/GHSA-24x8-vf4r-m3v5/GHSA-24x8-vf4r-m3v5.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-24x8-vf4r-m3v5",
4-
"modified": "2025-12-30T12:30:27Z",
4+
"modified": "2025-12-31T00:31:09Z",
55
"published": "2025-12-30T12:30:27Z",
66
"aliases": [
77
"CVE-2025-68990"
88
],
99
"details": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in xenioushk BWL Pro Voting Manager bwl-pro-voting-manager allows Blind SQL Injection.This issue affects BWL Pro Voting Manager: from n/a through <= 1.4.9.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-89"
2530
],
26-
"severity": null,
31+
"severity": "CRITICAL",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2025-12-30T11:15:57Z"
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2v4h-c2w7-48pw",
4+
"modified": "2025-12-31T00:31:10Z",
5+
"published": "2025-12-31T00:31:10Z",
6+
"aliases": [
7+
"CVE-2022-50801"
8+
],
9+
"details": "JM-DATA ONU JF511-TV version 1.0.67 is vulnerable to authenticated stored cross-site scripting (XSS) attacks, allowing attackers with authenticated access to inject malicious scripts that will be executed in other users' browsers when they view the affected content.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50801"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://cxsecurity.com/issue/WLB-2022060058"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/229343"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://packetstormsecurity.com/files/167487"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://www.jm-data.com"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.vulncheck.com/advisories/jm-data-onu-jf-tv-authenticated-stored-cross-site-scripting-xss-vulnerability"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5708.php"
49+
}
50+
],
51+
"database_specific": {
52+
"cwe_ids": [
53+
"CWE-79"
54+
],
55+
"severity": "MODERATE",
56+
"github_reviewed": false,
57+
"github_reviewed_at": null,
58+
"nvd_published_at": "2025-12-30T23:15:47Z"
59+
}
60+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-32jx-jm5r-c6x7",
4+
"modified": "2025-12-31T00:31:10Z",
5+
"published": "2025-12-31T00:31:10Z",
6+
"aliases": [
7+
"CVE-2022-50790"
8+
],
9+
"details": "SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below contain an unauthenticated vulnerability that allows remote attackers to access live radio stream information through webplay or ffmpeg scripts. Attackers can exploit the vulnerability by calling specific web scripts to disclose radio stream details without requiring authentication.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50790"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/247923"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://packetstormsecurity.com/files/170261/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-Radio-Steam-Disclosure.html"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.sound4.com"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://www.vulncheck.com/advisories/sound-impactfirstpulseeco-x-unauthenticated-radio-stream-disclosure"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5734.php"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-306"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2025-12-30T23:15:45Z"
55+
}
56+
}
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3crj-9596-945w",
4+
"modified": "2025-12-31T00:31:10Z",
5+
"published": "2025-12-31T00:31:10Z",
6+
"aliases": [
7+
"CVE-2022-50803"
8+
],
9+
"details": "JM-DATA ONU JF511-TV version 1.0.67 uses default credentials that allow attackers to gain unauthorized access to the device with administrative privileges.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50803"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://cxsecurity.com/issue/WLB-2022060058"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/229344"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://packetstormsecurity.com/files/167487"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://www.jm-data.com"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.vulncheck.com/advisories/jm-data-onu-jf-tv-default-credentials-vulnerability"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5708.php"
49+
}
50+
],
51+
"database_specific": {
52+
"cwe_ids": [
53+
"CWE-1392"
54+
],
55+
"severity": "CRITICAL",
56+
"github_reviewed": false,
57+
"github_reviewed_at": null,
58+
"nvd_published_at": "2025-12-30T23:15:47Z"
59+
}
60+
}

advisories/unreviewed/2025/12/GHSA-3f3m-mgfh-hc2q/GHSA-3f3m-mgfh-hc2q.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3f3m-mgfh-hc2q",
4-
"modified": "2025-12-30T12:30:26Z",
4+
"modified": "2025-12-31T00:31:08Z",
55
"published": "2025-12-30T12:30:26Z",
66
"aliases": [
77
"CVE-2025-68976"
88
],
99
"details": "Missing Authorization vulnerability in Eagle-Themes Eagle Booking eagle-booking allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Eagle Booking: from n/a through <= 1.3.4.3.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-862"
2530
],
26-
"severity": null,
31+
"severity": "HIGH",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2025-12-30T11:15:56Z"
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3gq6-fx9q-4r9m",
4+
"modified": "2025-12-31T00:31:09Z",
5+
"published": "2025-12-31T00:31:09Z",
6+
"aliases": [
7+
"CVE-2025-15360"
8+
],
9+
"details": "A vulnerability was determined in newbee-mall-plus 2.0.0. This impacts the function Upload of the file src/main/java/ltd/newbee/mall/controller/common/UploadController.java of the component Product Information Edit Page. This manipulation of the argument File causes unrestricted upload. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15360"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/zyhzheng500-maker/cve/blob/main/%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.338744"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.338744"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.716785"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-284"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2025-12-30T22:15:42Z"
51+
}
52+
}

advisories/unreviewed/2025/12/GHSA-44r9-xqhr-r952/GHSA-44r9-xqhr-r952.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-44r9-xqhr-r952",
4-
"modified": "2025-12-30T12:30:27Z",
4+
"modified": "2025-12-31T00:31:09Z",
55
"published": "2025-12-30T12:30:27Z",
66
"aliases": [
77
"CVE-2025-68988"
88
],
99
"details": "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in o2oe E-Invoice App Malaysia einvoiceapp-malaysia allows Retrieve Embedded Sensitive Data.This issue affects E-Invoice App Malaysia: from n/a through <= 1.1.0.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-497"
2530
],
26-
"severity": null,
31+
"severity": "HIGH",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2025-12-30T11:15:57Z"

0 commit comments

Comments
 (0)