Skip to content

File tree

12 files changed

+68
-16
lines changed

12 files changed

+68
-16
lines changed

advisories/github-reviewed/2024/06/GHSA-869c-j7wc-8jqv/GHSA-869c-j7wc-8jqv.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-869c-j7wc-8jqv",
4-
"modified": "2025-03-14T21:38:49Z",
4+
"modified": "2025-11-03T22:47:01Z",
55
"published": "2024-06-29T06:31:40Z",
66
"aliases": [
77
"CVE-2019-25211"
@@ -86,6 +86,10 @@
8686
{
8787
"type": "PACKAGE",
8888
"url": "https://github.com/gin-gonic/gin"
89+
},
90+
{
91+
"type": "WEB",
92+
"url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00024.html"
8993
}
9094
],
9195
"database_specific": {

advisories/github-reviewed/2024/07/GHSA-4xqq-m2hx-25v8/GHSA-4xqq-m2hx-25v8.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4xqq-m2hx-25v8",
4-
"modified": "2025-01-17T21:31:39Z",
4+
"modified": "2025-11-03T22:47:12Z",
55
"published": "2024-07-16T19:49:15Z",
66
"aliases": [
77
"CVE-2024-39908"
@@ -60,6 +60,10 @@
6060
"type": "WEB",
6161
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-39908.yml"
6262
},
63+
{
64+
"type": "WEB",
65+
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00011.html"
66+
},
6367
{
6468
"type": "WEB",
6569
"url": "https://security.netapp.com/advisory/ntap-20250117-0008"

advisories/github-reviewed/2024/08/GHSA-5866-49gr-22v4/GHSA-5866-49gr-22v4.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5866-49gr-22v4",
4-
"modified": "2025-01-17T21:31:39Z",
4+
"modified": "2025-11-03T22:47:32Z",
55
"published": "2024-08-02T12:33:15Z",
66
"aliases": [
77
"CVE-2024-41946"
@@ -60,6 +60,10 @@
6060
"type": "WEB",
6161
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-41946.yml"
6262
},
63+
{
64+
"type": "WEB",
65+
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00011.html"
66+
},
6367
{
6468
"type": "WEB",
6569
"url": "https://security.netapp.com/advisory/ntap-20250117-0007"

advisories/github-reviewed/2024/08/GHSA-r55c-59qm-vjw6/GHSA-r55c-59qm-vjw6.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-r55c-59qm-vjw6",
4-
"modified": "2024-12-27T18:30:26Z",
4+
"modified": "2025-11-03T22:47:22Z",
55
"published": "2024-08-01T22:05:10Z",
66
"aliases": [
77
"CVE-2024-41123"
@@ -64,6 +64,10 @@
6464
"type": "WEB",
6565
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-41123.yml"
6666
},
67+
{
68+
"type": "WEB",
69+
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00011.html"
70+
},
6771
{
6872
"type": "WEB",
6973
"url": "https://security.netapp.com/advisory/ntap-20241227-0005"

advisories/github-reviewed/2024/08/GHSA-vmwr-mc7x-5vc3/GHSA-vmwr-mc7x-5vc3.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vmwr-mc7x-5vc3",
4-
"modified": "2025-01-03T12:30:31Z",
4+
"modified": "2025-11-03T22:47:47Z",
55
"published": "2024-08-22T16:40:46Z",
66
"aliases": [
77
"CVE-2024-43398"
88
],
99
"summary": "REXML denial of service vulnerability",
10-
"details": "### Impact\n\nThe REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes.\n\nIf you need to parse untrusted XMLs with tree parser API like `REXML::Document.new`, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected.\n\n### Patches\n\nThe REXML gem 3.3.6 or later include the patch to fix the vulnerability.\n\n### Workarounds\n\nDon't parse untrusted XMLs with tree parser API.\n\n### References\n\n* https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398/ : An announce on www.ruby-lang.org\n",
10+
"details": "### Impact\n\nThe REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes.\n\nIf you need to parse untrusted XMLs with tree parser API like `REXML::Document.new`, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected.\n\n### Patches\n\nThe REXML gem 3.3.6 or later include the patch to fix the vulnerability.\n\n### Workarounds\n\nDon't parse untrusted XMLs with tree parser API.\n\n### References\n\n* https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398/ : An announce on www.ruby-lang.org",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
@@ -64,6 +64,10 @@
6464
"type": "WEB",
6565
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-43398.yml"
6666
},
67+
{
68+
"type": "WEB",
69+
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00011.html"
70+
},
6771
{
6872
"type": "WEB",
6973
"url": "https://security.netapp.com/advisory/ntap-20250103-0006"

advisories/github-reviewed/2024/09/GHSA-m6fv-jmcg-4jfg/GHSA-m6fv-jmcg-4jfg.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m6fv-jmcg-4jfg",
4-
"modified": "2024-11-18T16:27:11Z",
4+
"modified": "2025-11-03T22:48:03Z",
55
"published": "2024-09-10T19:42:41Z",
66
"aliases": [
77
"CVE-2024-43799"
88
],
99
"summary": "send vulnerable to template injection that can lead to XSS",
10-
"details": "### Impact\n\npassing untrusted user input - even after sanitizing it - to `SendStream.redirect()` may execute untrusted code\n\n### Patches\n\nthis issue is patched in send 0.19.0\n\n### Workarounds\n\nusers are encouraged to upgrade to the patched version of express, but otherwise can workaround this issue by making sure any untrusted inputs are safe, ideally by validating them against an explicit allowlist\n\n### Details\n\nsuccessful exploitation of this vector requires the following:\n\n1. The attacker MUST control the input to response.redirect()\n1. express MUST NOT redirect before the template appears\n1. the browser MUST NOT complete redirection before:\n1. the user MUST click on the link in the template\n",
10+
"details": "### Impact\n\npassing untrusted user input - even after sanitizing it - to `SendStream.redirect()` may execute untrusted code\n\n### Patches\n\nthis issue is patched in send 0.19.0\n\n### Workarounds\n\nusers are encouraged to upgrade to the patched version of express, but otherwise can workaround this issue by making sure any untrusted inputs are safe, ideally by validating them against an explicit allowlist\n\n### Details\n\nsuccessful exploitation of this vector requires the following:\n\n1. The attacker MUST control the input to response.redirect()\n1. express MUST NOT redirect before the template appears\n1. the browser MUST NOT complete redirection before:\n1. the user MUST click on the link in the template",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
@@ -55,6 +55,10 @@
5555
{
5656
"type": "PACKAGE",
5757
"url": "https://github.com/pillarjs/send"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://lists.debian.org/debian-lts-announce/2025/06/msg00022.html"
5862
}
5963
],
6064
"database_specific": {

advisories/github-reviewed/2024/09/GHSA-m9gf-397r-hwpg/GHSA-m9gf-397r-hwpg.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m9gf-397r-hwpg",
4-
"modified": "2025-04-28T15:32:18Z",
4+
"modified": "2025-11-03T22:48:13Z",
55
"published": "2024-09-09T15:30:41Z",
66
"aliases": [
77
"CVE-2024-8372"
@@ -52,6 +52,10 @@
5252
"type": "PACKAGE",
5353
"url": "https://github.com/angular/angular.js"
5454
},
55+
{
56+
"type": "WEB",
57+
"url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00005.html"
58+
},
5559
{
5660
"type": "WEB",
5761
"url": "https://security.netapp.com/advisory/ntap-20241122-0002"

advisories/github-reviewed/2024/09/GHSA-mqm9-c95h-x2p6/GHSA-mqm9-c95h-x2p6.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mqm9-c95h-x2p6",
4-
"modified": "2024-11-22T12:39:08Z",
4+
"modified": "2025-11-03T22:48:22Z",
55
"published": "2024-09-09T15:30:41Z",
66
"aliases": [
77
"CVE-2024-8373"
@@ -52,6 +52,10 @@
5252
"type": "PACKAGE",
5353
"url": "https://github.com/angular/angular.js"
5454
},
55+
{
56+
"type": "WEB",
57+
"url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00005.html"
58+
},
5559
{
5660
"type": "WEB",
5761
"url": "https://security.netapp.com/advisory/ntap-20241122-0003"

advisories/github-reviewed/2024/10/GHSA-2rxp-v6pw-ch6m/GHSA-2rxp-v6pw-ch6m.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2rxp-v6pw-ch6m",
4-
"modified": "2024-12-27T18:30:26Z",
4+
"modified": "2025-11-03T22:49:25Z",
55
"published": "2024-10-28T14:10:18Z",
66
"aliases": [
77
"CVE-2024-49761"
88
],
99
"summary": "REXML ReDoS vulnerability",
10-
"details": "### Impact\n\nThe REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between `&#` and `x...;` in a hex numeric character reference (`&#x...;`).\n\nThis does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. Note that Ruby 3.1 will reach EOL on 2025-03.\n\n### Patches\n\nThe REXML gem 3.3.9 or later include the patch to fix the vulnerability.\n\n### Workarounds\n\nUse Ruby 3.2 or later instead of Ruby 3.1.\n\n### References\n\n* https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761/: An announce on www.ruby-lang.org\n",
10+
"details": "### Impact\n\nThe REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between `&#` and `x...;` in a hex numeric character reference (`&#x...;`).\n\nThis does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. Note that Ruby 3.1 will reach EOL on 2025-03.\n\n### Patches\n\nThe REXML gem 3.3.9 or later include the patch to fix the vulnerability.\n\n### Workarounds\n\nUse Ruby 3.2 or later instead of Ruby 3.1.\n\n### References\n\n* https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761/: An announce on www.ruby-lang.org",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
@@ -60,6 +60,10 @@
6060
"type": "WEB",
6161
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-49761.yml"
6262
},
63+
{
64+
"type": "WEB",
65+
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00011.html"
66+
},
6367
{
6468
"type": "WEB",
6569
"url": "https://security.netapp.com/advisory/ntap-20241227-0004"

advisories/github-reviewed/2024/10/GHSA-g8m5-722r-8whq/GHSA-g8m5-722r-8whq.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g8m5-722r-8whq",
4-
"modified": "2024-10-14T21:08:39Z",
4+
"modified": "2025-11-03T22:49:11Z",
55
"published": "2024-10-14T21:08:38Z",
66
"aliases": [
77
"CVE-2024-8184"
@@ -124,6 +124,10 @@
124124
{
125125
"type": "WEB",
126126
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/30"
127+
},
128+
{
129+
"type": "WEB",
130+
"url": "https://lists.debian.org/debian-lts-announce/2025/04/msg00001.html"
127131
}
128132
],
129133
"database_specific": {

0 commit comments

Comments
 (0)