Skip to content

Commit b3e6e45

Browse files
Advisory Database Sync
1 parent 549dd2b commit b3e6e45

File tree

33 files changed

+322
-63
lines changed

33 files changed

+322
-63
lines changed

advisories/unreviewed/2024/03/GHSA-9ww7-cjcf-gq83/GHSA-9ww7-cjcf-gq83.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9ww7-cjcf-gq83",
4-
"modified": "2024-03-27T09:30:40Z",
4+
"modified": "2025-11-26T15:34:08Z",
55
"published": "2024-03-27T09:30:40Z",
66
"aliases": [
77
"CVE-2024-30198"
88
],
9-
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeKraft BuddyForms allows Reflected XSS.This issue affects BuddyForms: from n/a through 2.8.5.\n\n",
9+
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeKraft BuddyForms allows Reflected XSS.This issue affects BuddyForms: from n/a through 2.8.5.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2024/04/GHSA-jppj-cfrj-8qw6/GHSA-jppj-cfrj-8qw6.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jppj-cfrj-8qw6",
4-
"modified": "2024-04-20T03:30:33Z",
4+
"modified": "2025-11-26T15:34:08Z",
55
"published": "2024-04-20T03:30:33Z",
66
"aliases": [
77
"CVE-2024-1057"
@@ -29,7 +29,9 @@
2929
}
3030
],
3131
"database_specific": {
32-
"cwe_ids": [],
32+
"cwe_ids": [
33+
"CWE-79"
34+
],
3335
"severity": "MODERATE",
3436
"github_reviewed": false,
3537
"github_reviewed_at": null,

advisories/unreviewed/2024/04/GHSA-q6m7-j3hp-j7rg/GHSA-q6m7-j3hp-j7rg.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q6m7-j3hp-j7rg",
4-
"modified": "2024-04-09T21:32:00Z",
4+
"modified": "2025-11-26T15:34:08Z",
55
"published": "2024-04-09T21:32:00Z",
66
"aliases": [
77
"CVE-2024-2946"
@@ -29,7 +29,9 @@
2929
}
3030
],
3131
"database_specific": {
32-
"cwe_ids": [],
32+
"cwe_ids": [
33+
"CWE-79"
34+
],
3335
"severity": "MODERATE",
3436
"github_reviewed": false,
3537
"github_reviewed_at": null,

advisories/unreviewed/2024/05/GHSA-f9q7-v97w-mgm7/GHSA-f9q7-v97w-mgm7.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f9q7-v97w-mgm7",
4-
"modified": "2024-05-02T18:30:55Z",
4+
"modified": "2025-11-26T15:34:08Z",
55
"published": "2024-05-02T18:30:55Z",
66
"aliases": [
77
"CVE-2024-3991"
@@ -29,7 +29,9 @@
2929
}
3030
],
3131
"database_specific": {
32-
"cwe_ids": [],
32+
"cwe_ids": [
33+
"CWE-79"
34+
],
3335
"severity": "MODERATE",
3436
"github_reviewed": false,
3537
"github_reviewed_at": null,

advisories/unreviewed/2024/05/GHSA-h4cg-h27h-8rj3/GHSA-h4cg-h27h-8rj3.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-h4cg-h27h-8rj3",
4-
"modified": "2024-05-02T18:30:51Z",
4+
"modified": "2025-11-26T15:34:08Z",
55
"published": "2024-05-02T18:30:51Z",
66
"aliases": [
77
"CVE-2023-7067"
@@ -29,7 +29,9 @@
2929
}
3030
],
3131
"database_specific": {
32-
"cwe_ids": [],
32+
"cwe_ids": [
33+
"CWE-862"
34+
],
3335
"severity": "MODERATE",
3436
"github_reviewed": false,
3537
"github_reviewed_at": null,

advisories/unreviewed/2025/07/GHSA-pf4h-wcfc-95m7/GHSA-pf4h-wcfc-95m7.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pf4h-wcfc-95m7",
4-
"modified": "2025-07-31T15:35:50Z",
4+
"modified": "2025-11-26T15:34:09Z",
55
"published": "2025-07-31T15:35:50Z",
66
"aliases": [
77
"CVE-2013-10042"
88
],
99
"details": "A stack-based buffer overflow vulnerability exists in freeFTPd version 1.0.10 and earlier in the handling of the FTP PASS command. When an attacker sends a specially crafted password string, the application fails to validate input length, resulting in memory corruption. This can lead to denial of service or arbitrary code execution. Exploitation requires the anonymous user account to be enabled.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/08/GHSA-cpwx-wfp4-x368/GHSA-cpwx-wfp4-x368.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cpwx-wfp4-x368",
4-
"modified": "2025-11-05T00:31:25Z",
4+
"modified": "2025-11-26T15:34:09Z",
55
"published": "2025-08-21T03:30:25Z",
66
"aliases": [
77
"CVE-2025-43300"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43300"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/cisagov/vulnrichment/issues/201"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://github.com/b1n4r1b01/n-days/blob/main/CVE-2025-43300.md"

advisories/unreviewed/2025/08/GHSA-gfgm-2frc-x4f5/GHSA-gfgm-2frc-x4f5.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gfgm-2frc-x4f5",
4-
"modified": "2025-08-01T21:31:06Z",
4+
"modified": "2025-11-26T15:34:09Z",
55
"published": "2025-08-01T21:31:06Z",
66
"aliases": [
77
"CVE-2013-10044"
88
],
99
"details": "An authenticated SQL injection vulnerability exists in OpenEMR ≤ 4.1.1 Patch 14 that allows a low-privileged attacker to extract administrator credentials and subsequently escalate privileges. Once elevated, the attacker can exploit an unrestricted file upload flaw to achieve remote code execution, resulting in full compromise of the application and its host system.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
@@ -46,6 +50,7 @@
4650
],
4751
"database_specific": {
4852
"cwe_ids": [
53+
"CWE-434",
4954
"CWE-89"
5055
],
5156
"severity": "HIGH",

advisories/unreviewed/2025/09/GHSA-28fq-6473-mg5p/GHSA-28fq-6473-mg5p.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-28fq-6473-mg5p",
4-
"modified": "2025-09-30T12:30:52Z",
4+
"modified": "2025-11-26T15:34:09Z",
55
"published": "2025-09-30T12:30:52Z",
66
"aliases": [
77
"CVE-2025-8120"
88
],
99
"details": "Due to client-controlled permission check parameter, PAD CMS's upload photo functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution.This issue affects all 3 templates: www, bip and ww+bip.\n\nThis product is End-Of-Life and producent will not publish patches for this vulnerability.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/09/GHSA-28mw-j8x6-mf8x/GHSA-28mw-j8x6-mf8x.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-28mw-j8x6-mf8x",
4-
"modified": "2025-09-30T12:30:52Z",
4+
"modified": "2025-11-26T15:34:09Z",
55
"published": "2025-09-30T12:30:52Z",
66
"aliases": [
77
"CVE-2025-8119"
88
],
99
"details": "PAD CMS is vulnerable to Cross-Site Request Forgery in reset password's functionality. Malicious attacker can craft special website, which when visited by the victim, will automatically send a POST request changing currently logged user's password to defined by the attacker value. This issue affects all 3 templates: www, bip and www+bip.\n\nThis product is End-Of-Life and producent will not publish patches for this vulnerability.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

0 commit comments

Comments
 (0)