Skip to content

Commit 9eb944b

Browse files
Advisory Database Sync
1 parent a5ea72a commit 9eb944b

File tree

34 files changed

+1151
-7
lines changed

34 files changed

+1151
-7
lines changed

advisories/unreviewed/2022/05/GHSA-2rfj-vp7f-g45f/GHSA-2rfj-vp7f-g45f.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2rfj-vp7f-g45f",
4-
"modified": "2022-10-06T18:52:05Z",
4+
"modified": "2025-12-08T09:30:17Z",
55
"published": "2022-05-24T19:04:14Z",
66
"aliases": [
77
"CVE-2021-20699"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20699"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://sharp-displays.jp.sharp/global/support/info/A5-1_vulnerability.html"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://www.sharp-nec-displays.com/global/support/info/A5-1_vulnerability.html"

advisories/unreviewed/2024/02/GHSA-4x63-78pq-hqc9/GHSA-4x63-78pq-hqc9.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4x63-78pq-hqc9",
4-
"modified": "2024-02-14T21:30:31Z",
4+
"modified": "2025-12-08T09:30:17Z",
55
"published": "2024-02-05T09:30:28Z",
66
"aliases": [
77
"CVE-2023-7077"
88
],
9-
"details": "Sharp NEC Displays (P403, P463, P553, P703, P801, X554UN, X464UN, X554UNS, X464UNV, X474HB, X464UNS, X554UNV, X555UNS, X555UNV, X754HB, X554HB, E705, E805, E905, UN551S, UN551VS, X551UHD, X651UHD, X841UHD, X981UHD, MD551C8) allows an attacker execute remote code by sending unintended parameters in http request.\n\n",
9+
"details": "Sharp NEC Displays (P403, P463, P553, P703, P801, X554UN, X464UN, X554UNS, X464UNV, X474HB, X464UNS, X554UNV, X555UNS, X555UNV, X754HB, X554HB, E705, E805, E905, UN551S, UN551VS, X551UHD, X651UHD, X841UHD, X981UHD, MD551C8) allows an attacker execute remote code by sending unintended parameters in http request.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-7077"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://sharp-displays.jp.sharp/global/support/info/A4_vulnerability.html"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://www.sharp-nec-displays.com/global/support/info/A4_vulnerability.html"

advisories/unreviewed/2024/09/GHSA-c2vh-2vcm-gqjq/GHSA-c2vh-2vcm-gqjq.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c2vh-2vcm-gqjq",
4-
"modified": "2024-11-05T21:30:32Z",
4+
"modified": "2025-12-08T09:30:17Z",
55
"published": "2024-09-27T03:30:29Z",
66
"aliases": [
77
"CVE-2024-7011"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7011"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://sharp-displays.jp.sharp/global/support/info/Projector_vulnerability_202408.html"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://www.sharp-nec-displays.com/global/support/info/Projector_vulnerability_202408.html"

advisories/unreviewed/2025/11/GHSA-r6gx-fcg6-8hhj/GHSA-r6gx-fcg6-8hhj.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-r6gx-fcg6-8hhj",
4-
"modified": "2025-12-08T03:31:00Z",
4+
"modified": "2025-12-08T09:30:17Z",
55
"published": "2025-11-25T09:31:24Z",
66
"aliases": [
77
"CVE-2025-13502"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13502"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-22x7-mc8g-7jg9",
4+
"modified": "2025-12-08T09:30:18Z",
5+
"published": "2025-12-08T09:30:18Z",
6+
"aliases": [
7+
"CVE-2025-66326"
8+
],
9+
"details": "Race condition vulnerability in the audio module. Impact: Successful exploitation of this vulnerability may affect availability.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66326"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://consumer.huawei.com/en/support/bulletin/2025/12"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-416"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-12-08T08:15:54Z"
35+
}
36+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-282p-p74m-mx9r",
4+
"modified": "2025-12-08T09:30:19Z",
5+
"published": "2025-12-08T09:30:19Z",
6+
"aliases": [
7+
"CVE-2025-66333"
8+
],
9+
"details": "Denial of service (DoS) vulnerability in the office service. Impact: Successful exploitation of this vulnerability may affect availability.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66333"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://consumer.huawei.com/en/support/bulletin/2025/12"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-494"
30+
],
31+
"severity": "LOW",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-12-08T09:15:48Z"
35+
}
36+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2rh7-xqm7-m994",
4+
"modified": "2025-12-08T09:30:18Z",
5+
"published": "2025-12-08T09:30:18Z",
6+
"aliases": [
7+
"CVE-2025-12956"
8+
],
9+
"details": "A reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12956"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.3ds.com/trust-center/security/security-advisories/cve-2025-12956"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-79"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-12-08T09:15:46Z"
35+
}
36+
}
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3673-w8f8-x9q3",
4+
"modified": "2025-12-08T09:30:17Z",
5+
"published": "2025-12-08T09:30:17Z",
6+
"aliases": [
7+
"CVE-2025-14255"
8+
],
9+
"details": "Vitals ESP developed by Galaxy Software Services has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read database contents.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14255"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.twcert.org.tw/en/cp-139-10543-380bd-2.html"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.twcert.org.tw/tw/cp-132-10542-4c682-1.html"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-89"
38+
],
39+
"severity": "HIGH",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2025-12-08T08:15:52Z"
43+
}
44+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3fj7-8wvw-vhf5",
4+
"modified": "2025-12-08T09:30:19Z",
5+
"published": "2025-12-08T09:30:19Z",
6+
"aliases": [
7+
"CVE-2025-66334"
8+
],
9+
"details": "Denial of service (DoS) vulnerability in the office service. Impact: Successful exploitation of this vulnerability may affect availability.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66334"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://consumer.huawei.com/en/support/bulletin/2025/12"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-494"
30+
],
31+
"severity": "LOW",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-12-08T09:15:48Z"
35+
}
36+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-65p6-q569-qv43",
4+
"modified": "2025-12-08T09:30:17Z",
5+
"published": "2025-12-08T09:30:17Z",
6+
"aliases": [
7+
"CVE-2025-14223"
8+
],
9+
"details": "A vulnerability has been found in code-projects Simple Leave Manager 1.0. Affected by this vulnerability is an unknown functionality of the file /request.php. Such manipulation of the argument staff_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14223"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/woshilaiyi/cve/issues/4"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://code-projects.org"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.334665"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.334665"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.701639"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-74"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2025-12-08T08:15:51Z"
55+
}
56+
}

0 commit comments

Comments
 (0)