Skip to content

Commit c0cd332

Browse files
Advisory Database Sync
1 parent b4ab676 commit c0cd332

File tree

40 files changed

+627
-41
lines changed

40 files changed

+627
-41
lines changed

advisories/unreviewed/2023/07/GHSA-vgvm-wwrq-c4xw/GHSA-vgvm-wwrq-c4xw.json

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vgvm-wwrq-c4xw",
4-
"modified": "2024-04-04T05:39:17Z",
4+
"modified": "2025-09-18T21:30:54Z",
55
"published": "2023-07-06T21:14:53Z",
66
"aliases": [
77
"CVE-2023-29240"
88
],
9-
"details": "\nAn authenticated attacker granted a Viewer or Auditor role on a BIG-IQ can upload arbitrary files using an undisclosed iControl REST endpoint.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.",
9+
"details": "An authenticated attacker granted a Viewer or Auditor role on a BIG-IQ can upload arbitrary files using an undisclosed iControl REST endpoint.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",
@@ -27,7 +27,8 @@
2727
"database_specific": {
2828
"cwe_ids": [
2929
"CWE-269",
30-
"CWE-434"
30+
"CWE-434",
31+
"CWE-863"
3132
],
3233
"severity": "MODERATE",
3334
"github_reviewed": false,

advisories/unreviewed/2023/10/GHSA-m6pg-q484-64g9/GHSA-m6pg-q484-64g9.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m6pg-q484-64g9",
4-
"modified": "2024-04-04T08:28:58Z",
4+
"modified": "2025-09-18T21:30:55Z",
55
"published": "2023-10-10T15:30:50Z",
66
"aliases": [
77
"CVE-2023-40542"
88
],
9-
"details": "\nWhen TCP Verified Accept is enabled on a TCP profile that is configured on a Virtual Server, undisclosed requests can cause an increase in memory resource utilization.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated",
9+
"details": "When TCP Verified Accept is enabled on a TCP profile that is configured on a Virtual Server, undisclosed requests can cause an increase in memory resource utilization.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2024/05/GHSA-fj43-9cjj-qw2v/GHSA-fj43-9cjj-qw2v.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fj43-9cjj-qw2v",
4-
"modified": "2024-12-12T21:30:45Z",
4+
"modified": "2025-09-18T21:30:55Z",
55
"published": "2024-05-08T15:30:42Z",
66
"aliases": [
77
"CVE-2024-26026"
88
],
9-
"details": "\n\n\nAn SQL injection vulnerability exists in the BIG-IP Next Central Manager API (URI).  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated\n\n",
9+
"details": "An SQL injection vulnerability exists in the BIG-IP Next Central Manager API (URI).  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2024/05/GHSA-w9q2-p57h-r357/GHSA-w9q2-p57h-r357.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-w9q2-p57h-r357",
4-
"modified": "2024-12-12T21:30:45Z",
4+
"modified": "2025-09-18T21:30:55Z",
55
"published": "2024-05-08T15:30:42Z",
66
"aliases": [
77
"CVE-2024-21793"
88
],
9-
"details": "\nAn OData injection vulnerability exists in the BIG-IP Next Central Manager API (URI).  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.",
9+
"details": "An OData injection vulnerability exists in the BIG-IP Next Central Manager API (URI).  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2025/09/GHSA-222w-wff7-mff2/GHSA-222w-wff7-mff2.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-222w-wff7-mff2",
4-
"modified": "2025-09-18T15:30:35Z",
4+
"modified": "2025-09-18T21:30:56Z",
55
"published": "2025-09-18T15:30:35Z",
66
"aliases": [
77
"CVE-2025-55911"
88
],
99
"details": "An issue Clip Bucket v.5.5.2 Build#90 allows a remote attacker to execute arbitrary codes via the file_downloader.php and the file parameter",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -20,8 +25,10 @@
2025
}
2126
],
2227
"database_specific": {
23-
"cwe_ids": [],
24-
"severity": null,
28+
"cwe_ids": [
29+
"CWE-77"
30+
],
31+
"severity": "MODERATE",
2532
"github_reviewed": false,
2633
"github_reviewed_at": null,
2734
"nvd_published_at": "2025-09-18T15:15:38Z"

advisories/unreviewed/2025/09/GHSA-3fcf-vq7f-5hpg/GHSA-3fcf-vq7f-5hpg.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,8 @@
4646
],
4747
"database_specific": {
4848
"cwe_ids": [
49-
"CWE-284"
49+
"CWE-284",
50+
"CWE-434"
5051
],
5152
"severity": "MODERATE",
5253
"github_reviewed": false,
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3fgm-3m4r-2x8g",
4+
"modified": "2025-09-18T21:30:57Z",
5+
"published": "2025-09-18T21:30:57Z",
6+
"aliases": [
7+
"CVE-2025-30519"
8+
],
9+
"details": "Dover Fueling Solutions ProGauge MagLink LX4 Devices have default root credentials that cannot be changed through standard \nadministrative means. An attacker with network access to the device can \ngain administrative access to the system.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30519"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-261-07"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.doverfuelingsolutions.com/mea/en/products-and-solutions/automatic-tank-gauging/consoles/progauge-maglink-lx-4-console.html"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-1391"
38+
],
39+
"severity": "CRITICAL",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2025-09-18T21:15:47Z"
43+
}
44+
}

advisories/unreviewed/2025/09/GHSA-4894-phvw-pmxv/GHSA-4894-phvw-pmxv.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,8 @@
4646
],
4747
"database_specific": {
4848
"cwe_ids": [
49-
"CWE-74"
49+
"CWE-74",
50+
"CWE-89"
5051
],
5152
"severity": "MODERATE",
5253
"github_reviewed": false,

advisories/unreviewed/2025/09/GHSA-5qj7-cv36-4gxh/GHSA-5qj7-cv36-4gxh.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,9 @@
4141
}
4242
],
4343
"database_specific": {
44-
"cwe_ids": [],
44+
"cwe_ids": [
45+
"CWE-693"
46+
],
4547
"severity": "HIGH",
4648
"github_reviewed": false,
4749
"github_reviewed_at": null,
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-65x9-r46v-g944",
4+
"modified": "2025-09-18T21:30:57Z",
5+
"published": "2025-09-18T21:30:57Z",
6+
"aliases": [
7+
"CVE-2025-53947"
8+
],
9+
"details": "A local attacker with low privileges on the Windows system where the \nsoftware is installed can exploit this vulnerability to corrupt \nsensitive data. A data folder is created with very weak privileges, \nallowing any user logged into the Windows system to modify its content.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53947"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-261-06"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-276"
34+
],
35+
"severity": "MODERATE",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2025-09-18T21:15:48Z"
39+
}
40+
}

0 commit comments

Comments
 (0)