Skip to content

File tree

11 files changed

+359
-15
lines changed

11 files changed

+359
-15
lines changed

advisories/github-reviewed/2025/11/GHSA-xh5w-g8gq-r3v9/GHSA-xh5w-g8gq-r3v9.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xh5w-g8gq-r3v9",
4-
"modified": "2025-12-22T09:31:23Z",
4+
"modified": "2025-12-22T12:30:20Z",
55
"published": "2025-11-24T18:31:14Z",
66
"aliases": [
77
"CVE-2025-13609"
@@ -64,6 +64,10 @@
6464
"type": "WEB",
6565
"url": "https://access.redhat.com/errata/RHSA-2025:23735"
6666
},
67+
{
68+
"type": "WEB",
69+
"url": "https://access.redhat.com/errata/RHSA-2025:23852"
70+
},
6771
{
6872
"type": "WEB",
6973
"url": "https://access.redhat.com/security/cve/CVE-2025-13609"

advisories/unreviewed/2025/01/GHSA-9x68-7qq6-v523/GHSA-9x68-7qq6-v523.json

Lines changed: 22 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9x68-7qq6-v523",
4-
"modified": "2025-12-17T15:34:51Z",
4+
"modified": "2025-12-22T12:30:21Z",
55
"published": "2025-01-14T18:32:00Z",
66
"aliases": [
77
"CVE-2024-12087"
@@ -25,59 +25,67 @@
2525
},
2626
{
2727
"type": "WEB",
28-
"url": "https://access.redhat.com/errata/RHSA-2025:23154"
28+
"url": "https://www.kb.cert.org/vuls/id/952657"
2929
},
3030
{
3131
"type": "WEB",
32-
"url": "https://access.redhat.com/errata/RHSA-2025:23235"
32+
"url": "https://security.netapp.com/advisory/ntap-20250131-0002"
3333
},
3434
{
3535
"type": "WEB",
36-
"url": "https://access.redhat.com/errata/RHSA-2025:23407"
36+
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00008.html"
3737
},
3838
{
3939
"type": "WEB",
40-
"url": "https://access.redhat.com/errata/RHSA-2025:23415"
40+
"url": "https://kb.cert.org/vuls/id/952657"
4141
},
4242
{
4343
"type": "WEB",
44-
"url": "https://access.redhat.com/errata/RHSA-2025:23416"
44+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330672"
4545
},
4646
{
4747
"type": "WEB",
48-
"url": "https://access.redhat.com/errata/RHSA-2025:2600"
48+
"url": "https://access.redhat.com/security/cve/CVE-2024-12087"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://access.redhat.com/errata/RHSA-2025:8385"
4953
},
5054
{
5155
"type": "WEB",
5256
"url": "https://access.redhat.com/errata/RHSA-2025:7050"
5357
},
5458
{
5559
"type": "WEB",
56-
"url": "https://access.redhat.com/errata/RHSA-2025:8385"
60+
"url": "https://access.redhat.com/errata/RHSA-2025:2600"
5761
},
5862
{
5963
"type": "WEB",
60-
"url": "https://access.redhat.com/security/cve/CVE-2024-12087"
64+
"url": "https://access.redhat.com/errata/RHSA-2025:23853"
6165
},
6266
{
6367
"type": "WEB",
64-
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330672"
68+
"url": "https://access.redhat.com/errata/RHSA-2025:23842"
6569
},
6670
{
6771
"type": "WEB",
68-
"url": "https://kb.cert.org/vuls/id/952657"
72+
"url": "https://access.redhat.com/errata/RHSA-2025:23416"
6973
},
7074
{
7175
"type": "WEB",
72-
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00008.html"
76+
"url": "https://access.redhat.com/errata/RHSA-2025:23415"
7377
},
7478
{
7579
"type": "WEB",
76-
"url": "https://security.netapp.com/advisory/ntap-20250131-0002"
80+
"url": "https://access.redhat.com/errata/RHSA-2025:23407"
7781
},
7882
{
7983
"type": "WEB",
80-
"url": "https://www.kb.cert.org/vuls/id/952657"
84+
"url": "https://access.redhat.com/errata/RHSA-2025:23235"
85+
},
86+
{
87+
"type": "WEB",
88+
"url": "https://access.redhat.com/errata/RHSA-2025:23154"
8189
}
8290
],
8391
"database_specific": {
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6635-2fcv-crph",
4+
"modified": "2025-12-22T12:30:21Z",
5+
"published": "2025-12-22T12:30:21Z",
6+
"aliases": [
7+
"CVE-2025-61739"
8+
],
9+
"details": "Due to Nonce reuse, attackers can perform reply attack or decrypt captured packets.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61739"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-350-02"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-323"
34+
],
35+
"severity": "HIGH",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2025-12-22T11:15:58Z"
39+
}
40+
}
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-8953-5927-ff93",
4+
"modified": "2025-12-22T12:30:21Z",
5+
"published": "2025-12-22T12:30:21Z",
6+
"aliases": [
7+
"CVE-2025-61738"
8+
],
9+
"details": "Under certain circumstances, attacker can capture the network key, read or write encrypted packets on the PowerG network.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61738"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-350-02"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-319"
34+
],
35+
"severity": "LOW",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2025-12-22T11:15:58Z"
39+
}
40+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-9v23-62w5-4mfm",
4+
"modified": "2025-12-22T12:30:21Z",
5+
"published": "2025-12-22T12:30:21Z",
6+
"aliases": [
7+
"CVE-2025-54890"
8+
],
9+
"details": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Hostgroup configuration page) allows Stored \n\nXSS by users with elevated privileges.This issue affects Infra Monitoring: from 24.10.0 before 24.10.15, from 24.04.0 before 24.04.19, from 23.10.0 before 23.10.29.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54890"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/centreon/centreon/releases"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-79"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-12-22T11:15:57Z"
35+
}
36+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-fwr9-mwqr-4wq5",
4+
"modified": "2025-12-22T12:30:21Z",
5+
"published": "2025-12-22T12:30:21Z",
6+
"aliases": [
7+
"CVE-2025-12514"
8+
],
9+
"details": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Centreon Infra Monitoring - Open-tickets (Notification rules configuration parameters, Open tickets modules) allows \n\nSQL Injection to user with elevated privileges.This issue affects Infra Monitoring - Open-tickets: from 24.10.0 before 24.10.5, from 24.04.0 before 24.04.5, from 23.10.0 before 23.10.4.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12514"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/centreon/centreon/releases"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-89"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-12-22T11:15:56Z"
35+
}
36+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-gxfh-vrcv-h6m7",
4+
"modified": "2025-12-22T12:30:20Z",
5+
"published": "2025-12-22T12:30:20Z",
6+
"aliases": [
7+
"CVE-2025-62107"
8+
],
9+
"details": "Cross-Site Request Forgery (CSRF) vulnerability in PluginOps Feather Login Page allows Cross Site Request Forgery.This issue affects Feather Login Page: from n/a through 1.1.7.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62107"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://vdp.patchstack.com/database/wordpress/plugin/feather-login-page/vulnerability/wordpress-feather-login-page-plugin-1-1-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-352"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-12-22T10:16:00Z"
35+
}
36+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-qvmc-92vg-6r35",
4+
"modified": "2025-12-22T12:30:21Z",
5+
"published": "2025-12-22T12:30:21Z",
6+
"aliases": [
7+
"CVE-2025-14273"
8+
],
9+
"details": "Mattermost versions 11.1.x <= 11.1.0, 11.0.x <= 11.0.5, 10.12.x <= 10.12.3, 10.11.x <= 10.11.7 with the Jira plugin enabled and Mattermost Jira plugin versions <=4.4.0 fail to enforce authentication and issue-key path restrictions in the Jira plugin, which allows an unauthenticated attacker who knows a valid user ID to issue authenticated GET and POST requests to the Jira server via crafted plugin payloads that spoof the user ID and inject arbitrary issue key paths. Mattermost Advisory ID: MMSA-2025-00555",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14273"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://mattermost.com/security-updates"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-303"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-12-22T12:16:19Z"
35+
}
36+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-rh9w-725c-v2x8",
4+
"modified": "2025-12-22T12:30:21Z",
5+
"published": "2025-12-22T12:30:21Z",
6+
"aliases": [
7+
"CVE-2025-8460"
8+
],
9+
"details": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Notification rules, Open tickets module) \n\nallows Stored \n\nXSS by users with elevated privileges.This issue affects Infra Monitoring: from 24.10.0 before 24.10.5, from 24.04.0 before 24.04.5, from 23.10.0 before 23.10.4.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8460"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/centreon/centreon/releases"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-79"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-12-22T11:15:58Z"
35+
}
36+
}

0 commit comments

Comments
 (0)