Skip to content

Commit 6d5fec7

Browse files
Advisory Database Sync
1 parent b73ee62 commit 6d5fec7

File tree

108 files changed

+3021
-84
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

108 files changed

+3021
-84
lines changed

advisories/github-reviewed/2025/08/GHSA-856v-8qm2-9wjv/GHSA-856v-8qm2-9wjv.json

Lines changed: 21 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-856v-8qm2-9wjv",
4-
"modified": "2025-12-04T00:30:57Z",
4+
"modified": "2025-12-08T18:30:24Z",
55
"published": "2025-08-07T21:31:08Z",
66
"aliases": [
77
"CVE-2025-7195"
@@ -41,64 +41,68 @@
4141
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7195"
4242
},
4343
{
44-
"type": "WEB",
45-
"url": "https://access.redhat.com/errata/RHSA-2025:19332"
44+
"type": "PACKAGE",
45+
"url": "https://github.com/operator-framework/operator-sdk"
4646
},
4747
{
4848
"type": "WEB",
49-
"url": "https://access.redhat.com/errata/RHSA-2025:19335"
49+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2376300"
5050
},
5151
{
5252
"type": "WEB",
53-
"url": "https://access.redhat.com/errata/RHSA-2025:19958"
53+
"url": "https://access.redhat.com/security/cve/CVE-2025-7195"
5454
},
5555
{
5656
"type": "WEB",
57-
"url": "https://access.redhat.com/errata/RHSA-2025:19961"
57+
"url": "https://access.redhat.com/errata/RHSA-2025:22684"
5858
},
5959
{
6060
"type": "WEB",
61-
"url": "https://access.redhat.com/errata/RHSA-2025:21368"
61+
"url": "https://access.redhat.com/errata/RHSA-2025:22683"
6262
},
6363
{
6464
"type": "WEB",
65-
"url": "https://access.redhat.com/errata/RHSA-2025:21885"
65+
"url": "https://access.redhat.com/errata/RHSA-2025:22420"
6666
},
6767
{
6868
"type": "WEB",
69-
"url": "https://access.redhat.com/errata/RHSA-2025:22415"
69+
"url": "https://access.redhat.com/errata/RHSA-2025:22418"
7070
},
7171
{
7272
"type": "WEB",
7373
"url": "https://access.redhat.com/errata/RHSA-2025:22416"
7474
},
7575
{
7676
"type": "WEB",
77-
"url": "https://access.redhat.com/errata/RHSA-2025:22418"
77+
"url": "https://access.redhat.com/errata/RHSA-2025:22415"
7878
},
7979
{
8080
"type": "WEB",
81-
"url": "https://access.redhat.com/errata/RHSA-2025:22420"
81+
"url": "https://access.redhat.com/errata/RHSA-2025:21885"
8282
},
8383
{
8484
"type": "WEB",
85-
"url": "https://access.redhat.com/errata/RHSA-2025:22683"
85+
"url": "https://access.redhat.com/errata/RHSA-2025:21368"
8686
},
8787
{
8888
"type": "WEB",
89-
"url": "https://access.redhat.com/errata/RHSA-2025:22684"
89+
"url": "https://access.redhat.com/errata/RHSA-2025:19961"
9090
},
9191
{
9292
"type": "WEB",
93-
"url": "https://access.redhat.com/security/cve/CVE-2025-7195"
93+
"url": "https://access.redhat.com/errata/RHSA-2025:19958"
9494
},
9595
{
9696
"type": "WEB",
97-
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2376300"
97+
"url": "https://access.redhat.com/errata/RHSA-2025:19335"
9898
},
9999
{
100-
"type": "PACKAGE",
101-
"url": "https://github.com/operator-framework/operator-sdk"
100+
"type": "WEB",
101+
"url": "https://access.redhat.com/errata/RHSA-2025:19332"
102+
},
103+
{
104+
"type": "WEB",
105+
"url": "https://access.redhat.com/errata/RHBA-2024:11569"
102106
}
103107
],
104108
"database_specific": {

advisories/unreviewed/2022/05/GHSA-82gq-xhgq-4fqw/GHSA-82gq-xhgq-4fqw.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-82gq-xhgq-4fqw",
4-
"modified": "2022-05-14T01:30:42Z",
4+
"modified": "2025-12-08T18:30:24Z",
55
"published": "2022-05-14T01:30:42Z",
66
"aliases": [
77
"CVE-2019-9182"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9182"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.exploit-db.com/exploits/46488"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "http://www.iwantacve.cn/index.php/archives/119"

advisories/unreviewed/2022/05/GHSA-qpgr-mp84-gp92/GHSA-qpgr-mp84-gp92.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qpgr-mp84-gp92",
4-
"modified": "2025-10-22T00:31:37Z",
4+
"modified": "2025-12-08T18:30:24Z",
55
"published": "2022-05-13T01:02:54Z",
66
"aliases": [
77
"CVE-2019-9082"
@@ -31,6 +31,10 @@
3131
"type": "WEB",
3232
"url": "https://www.exploit-db.com/exploits/46488"
3333
},
34+
{
35+
"type": "WEB",
36+
"url": "http://packetstormsecurity.com/files/151967/zzzphp-CMS-1.6.1-Cross-Site-Request-Forgery.html"
37+
},
3438
{
3539
"type": "WEB",
3640
"url": "http://packetstormsecurity.com/files/157218/ThinkPHP-5.0.23-Remote-Code-Execution.html"

advisories/unreviewed/2023/08/GHSA-52qf-8fcc-9f9g/GHSA-52qf-8fcc-9f9g.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-52qf-8fcc-9f9g",
4-
"modified": "2023-11-14T18:30:20Z",
4+
"modified": "2025-12-08T18:30:24Z",
55
"published": "2023-08-18T21:30:24Z",
66
"aliases": [
77
"CVE-2023-38890"
@@ -22,6 +22,14 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://github.com/akshadjoshi/CVE-2023-38890"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://tagmachan.com/online-shopping-portal-3-1-sql-injection-to-remote-code-execution-unauthenticated.tagox"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.exploit-db.com/exploits/50029"
2533
}
2634
],
2735
"database_specific": {

advisories/unreviewed/2023/10/GHSA-qh48-5646-82cv/GHSA-qh48-5646-82cv.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qh48-5646-82cv",
4-
"modified": "2024-04-04T08:57:43Z",
4+
"modified": "2025-12-08T18:30:24Z",
55
"published": "2023-10-27T21:30:23Z",
66
"aliases": [
77
"CVE-2023-40130"
@@ -23,9 +23,17 @@
2323
"type": "WEB",
2424
"url": "https://android.googlesource.com/platform/packages/services/Telecomm/+/5b335401d1c8de7d1c85f4a0cf353f7f9fc30218"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://android.googlesource.com/platform/packages/services/Telecomm/+/a43a880beaa6a64348a1d0c821e8c7e98d741a79"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://source.android.com/security/bulletin/2023-10-01"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://source.android.com/security/bulletin/2025-12-01"
2937
}
3038
],
3139
"database_specific": {

advisories/unreviewed/2024/03/GHSA-49x6-w2c9-99x9/GHSA-49x6-w2c9-99x9.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-49x6-w2c9-99x9",
4-
"modified": "2024-03-16T03:30:59Z",
4+
"modified": "2025-12-08T18:30:24Z",
55
"published": "2024-03-16T03:30:59Z",
66
"aliases": [
77
"CVE-2024-27195"
88
],
9-
"details": "Cross-Site Request Forgery (CSRF) vulnerability in Sandi Verdev Watermark RELOADED allows Stored XSS.This issue affects Watermark RELOADED: from n/a through 1.3.5.\n\n",
9+
"details": "Cross-Site Request Forgery (CSRF) vulnerability in Sandi Verdev Watermark RELOADED allows Stored XSS.This issue affects Watermark RELOADED: from n/a through 1.3.5.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://patchstack.com/database/vulnerability/watermark-reloaded/wordpress-watermark-reloaded-plugin-1-3-5-csrf-to-xss-vulnerability?_s_id=cve"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://wordpress.org/plugins/watermark-reloaded/#developers"
2529
}
2630
],
2731
"database_specific": {

advisories/unreviewed/2024/11/GHSA-2hrg-xmqp-9q4v/GHSA-2hrg-xmqp-9q4v.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2hrg-xmqp-9q4v",
4-
"modified": "2025-07-07T18:32:15Z",
4+
"modified": "2025-12-08T18:30:24Z",
55
"published": "2024-11-20T21:30:50Z",
66
"aliases": [
77
"CVE-2024-52702"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://github.com/mybb/mybb/issues/4859"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/mybb/mybb/issues/4859#issuecomment-2468480756"
2529
}
2630
],
2731
"database_specific": {

advisories/unreviewed/2024/12/GHSA-5x22-49wv-3m34/GHSA-5x22-49wv-3m34.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5x22-49wv-3m34",
4-
"modified": "2024-12-06T18:30:45Z",
4+
"modified": "2025-12-08T18:30:24Z",
55
"published": "2024-12-06T18:30:45Z",
66
"aliases": [
77
"CVE-2024-50387"
88
],
99
"details": "A SQL injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to inject malicious code.\n\nWe have already fixed the vulnerability in the following version:\nSMB Service 4.15.002 and later\nSMB Service h4.15.002 and later",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2024/12/GHSA-9c26-wm2f-5pm9/GHSA-9c26-wm2f-5pm9.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9c26-wm2f-5pm9",
4-
"modified": "2024-12-06T18:30:45Z",
4+
"modified": "2025-12-08T18:30:24Z",
55
"published": "2024-12-06T18:30:45Z",
66
"aliases": [
77
"CVE-2024-48863"
88
],
99
"details": "A command injection vulnerability has been reported to affect License Center. If exploited, the vulnerability could allow remote attackers to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nLicense Center 1.9.43 and later",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/08/GHSA-8r4m-h8m7-mf8v/GHSA-8r4m-h8m7-mf8v.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8r4m-h8m7-mf8v",
4-
"modified": "2025-08-29T18:30:54Z",
4+
"modified": "2025-12-08T18:30:24Z",
55
"published": "2025-08-29T18:30:54Z",
66
"aliases": [
77
"CVE-2025-44015"
88
],
99
"details": "A command injection vulnerability has been reported to affect HybridDesk Station. If an attacker gains local network access, they can then exploit the vulnerability to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nHybridDesk Station 4.2.18 and later",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

0 commit comments

Comments
 (0)