Skip to content

File tree

16 files changed

+608
-4
lines changed

16 files changed

+608
-4
lines changed

advisories/unreviewed/2025/11/GHSA-5p3h-545h-3hhq/GHSA-5p3h-545h-3hhq.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5p3h-545h-3hhq",
4-
"modified": "2025-11-13T15:30:31Z",
4+
"modified": "2025-11-15T09:30:25Z",
55
"published": "2025-11-13T15:30:31Z",
66
"aliases": [
77
"CVE-2025-13115"
@@ -23,6 +23,10 @@
2323
"type": "ADVISORY",
2424
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13115"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/Hwwg/cve/issues/11"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://github.com/Hwwg/cve/issues/6"
@@ -38,6 +42,10 @@
3842
{
3943
"type": "WEB",
4044
"url": "https://vuldb.com/?submit.683222"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://vuldb.com/?submit.686528"
4149
}
4250
],
4351
"database_specific": {
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-5vpg-xw87-4738",
4+
"modified": "2025-11-15T09:30:25Z",
5+
"published": "2025-11-15T09:30:25Z",
6+
"aliases": [
7+
"CVE-2025-11865"
8+
],
9+
"details": "An issue has been discovered in GitLab EE affecting all versions from 18.1 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2 that, under certain circumstances, could have allowed an attacker to remove Duo flows of another user.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11865"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://about.gitlab.com/releases/2025/11/12/patch-release-gitlab-18-5-2-released"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/561399"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-863"
34+
],
35+
"severity": "MODERATE",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2025-11-15T08:15:43Z"
39+
}
40+
}
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-7hhv-h469-wc4q",
4+
"modified": "2025-11-15T09:30:25Z",
5+
"published": "2025-11-15T09:30:25Z",
6+
"aliases": [
7+
"CVE-2025-7736"
8+
],
9+
"details": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.9 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2 that could have allowed an authenticated attacker to bypass access control restrictions and view GitLab Pages content intended only for project members by authenticating through OAuth providers.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7736"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://hackerone.com/reports/3250156"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://about.gitlab.com/releases/2025/11/12/patch-release-gitlab-18-5-2-released"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/556098"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-863"
38+
],
39+
"severity": "LOW",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2025-11-15T08:15:48Z"
43+
}
44+
}
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-9mv9-gw4x-7xw4",
4+
"modified": "2025-11-15T09:30:25Z",
5+
"published": "2025-11-15T09:30:25Z",
6+
"aliases": [
7+
"CVE-2025-12983"
8+
],
9+
"details": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.9 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2 that could have allowed an authenticated attacker to cause a denial of service condition by submitting specially crafted markdown content with nested formatting patterns.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12983"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://hackerone.com/reports/3419588"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://about.gitlab.com/releases/2025/11/12/patch-release-gitlab-18-5-2-released"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/296257"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-789"
38+
],
39+
"severity": "LOW",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2025-11-15T09:15:41Z"
43+
}
44+
}
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-cf8f-2f35-r5wx",
4+
"modified": "2025-11-15T09:30:25Z",
5+
"published": "2025-11-15T09:30:25Z",
6+
"aliases": [
7+
"CVE-2025-11990"
8+
],
9+
"details": "GitLab has remediated an issue in GitLab EE affecting all versions from 18.4 before 18.4.4, and 18.5 before 18.5.2 that could have allowed an authenticated user to gain CSRF tokens by exploiting improper input validation in repository references combined with redirect handling weaknesses.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11990"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://hackerone.com/reports/3257843"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://about.gitlab.com/releases/2025/11/12/patch-release-gitlab-18-5-2-released"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/577850"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-177"
38+
],
39+
"severity": "LOW",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2025-11-15T08:15:45Z"
43+
}
44+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-f4hm-5v9c-8vx2",
4+
"modified": "2025-11-15T09:30:25Z",
5+
"published": "2025-11-15T09:30:25Z",
6+
"aliases": [
7+
"CVE-2025-13190"
8+
],
9+
"details": "A vulnerability was found in D-Link DIR-816L 2_06_b09_beta. This vulnerability affects the function scandir_main of the file /portal/__ajax_exporer.sgi. The manipulation of the argument en results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13190"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/scanleale/IOT_sec/blob/main/DIR-816L%20stack%20overflow(scandir.sgi).pdf"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.332479"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.332479"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.685541"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.dlink.com"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-119"
50+
],
51+
"severity": "HIGH",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2025-11-15T07:15:46Z"
55+
}
56+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-fj3w-7rxg-jxhm",
4+
"modified": "2025-11-15T09:30:25Z",
5+
"published": "2025-11-15T09:30:25Z",
6+
"aliases": [
7+
"CVE-2025-13191"
8+
],
9+
"details": "A vulnerability was determined in D-Link DIR-816L 2_06_b09_beta. This issue affects the function soapcgi_main of the file /soap.cgi. This manipulation causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13191"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/scanleale/IOT_sec/blob/main/DIR-816L%20stack%20overflow(soap.cgi).pdf"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.332480"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.332480"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.685543"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.dlink.com"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-119"
50+
],
51+
"severity": "HIGH",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2025-11-15T07:15:46Z"
55+
}
56+
}

advisories/unreviewed/2025/11/GHSA-fppm-ghp9-2597/GHSA-fppm-ghp9-2597.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fppm-ghp9-2597",
4-
"modified": "2025-11-13T15:30:31Z",
4+
"modified": "2025-11-15T09:30:25Z",
55
"published": "2025-11-13T15:30:30Z",
66
"aliases": [
77
"CVE-2025-13117"
@@ -23,6 +23,10 @@
2323
"type": "ADVISORY",
2424
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13117"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/Hwwg/cve/issues/12"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://github.com/Hwwg/cve/issues/7"
@@ -38,6 +42,10 @@
3842
{
3943
"type": "WEB",
4044
"url": "https://vuldb.com/?submit.683340"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://vuldb.com/?submit.686529"
4149
}
4250
],
4351
"database_specific": {

advisories/unreviewed/2025/11/GHSA-gc9m-cqr9-5r48/GHSA-gc9m-cqr9-5r48.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gc9m-cqr9-5r48",
4-
"modified": "2025-11-13T15:30:31Z",
4+
"modified": "2025-11-15T09:30:25Z",
55
"published": "2025-11-13T15:30:30Z",
66
"aliases": [
77
"CVE-2025-13116"
@@ -23,6 +23,10 @@
2323
"type": "ADVISORY",
2424
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13116"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/Hwwg/cve/issues/13"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://github.com/Hwwg/cve/issues/8"
@@ -38,6 +42,10 @@
3842
{
3943
"type": "WEB",
4044
"url": "https://vuldb.com/?submit.683339"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://vuldb.com/?submit.686530"
4149
}
4250
],
4351
"database_specific": {

0 commit comments

Comments
 (0)