Skip to content

Commit 95f5d2c

Browse files
1 parent bfb695d commit 95f5d2c

File tree

2 files changed

+110
-0
lines changed

2 files changed

+110
-0
lines changed
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-49f8-xpw4-j5hh",
4+
"modified": "2025-12-07T03:30:54Z",
5+
"published": "2025-12-07T03:30:54Z",
6+
"aliases": [
7+
"CVE-2025-14183"
8+
],
9+
"details": "A vulnerability was found in SGAI Space1 NAS N1211DS up to 1.0.915. This issue affects the function GET_FACTORY_INFO/GET_USER_INFO of the file /cgi-bin/JSONAPI of the component gsaiagent. The manipulation results in unprotected storage of credentials. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14183"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://vuldb.com/?ctiid.334603"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?id.334603"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?submit.698566"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.698567"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.notion.so/2b16cf4e528a8000b30bd543247fa1bd"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://www.notion.so/2b16cf4e528a80859264db63f2340d7a"
49+
}
50+
],
51+
"database_specific": {
52+
"cwe_ids": [],
53+
"severity": "MODERATE",
54+
"github_reviewed": false,
55+
"github_reviewed_at": null,
56+
"nvd_published_at": "2025-12-07T03:15:59Z"
57+
}
58+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-gphh-v52r-j3fw",
4+
"modified": "2025-12-07T03:30:54Z",
5+
"published": "2025-12-07T03:30:54Z",
6+
"aliases": [
7+
"CVE-2025-14182"
8+
],
9+
"details": "A vulnerability has been found in Sobey Media Convergence System 2.0/2.1. This vulnerability affects unknown code of the file /sobey-mchEditor/watermark/upload. The manipulation of the argument File leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14182"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/hacker-routing/cve/issues/1"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.334602"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.334602"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.698561"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-22"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2025-12-07T03:15:58Z"
51+
}
52+
}

0 commit comments

Comments
 (0)