Skip to content

Commit c1db39f

Browse files
Advisory Database Sync
1 parent 17716c7 commit c1db39f

File tree

338 files changed

+10321
-84
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

338 files changed

+10321
-84
lines changed
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-7vmw-6c7h-rrrv",
4+
"modified": "2025-10-22T15:32:17Z",
5+
"published": "2022-05-24T17:21:01Z",
6+
"aliases": [
7+
"CVE-2016-11068"
8+
],
9+
"summary": "Mattermost Server is vulnerable to Code Injection through its LDAP fields",
10+
"details": "An issue was discovered in Mattermost Server before 3.2.0. Attackers could read LDAP fields via injection.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/mattermost/mattermost-server"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "3.2.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-11068"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/mattermost/mattermost/commit/6c5a8be6bfe1d6b9d8f71a6b0dc4d8cf93a03aab"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/mattermost/mattermost"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://mattermost.com/security-updates"
54+
}
55+
],
56+
"database_specific": {
57+
"cwe_ids": [],
58+
"severity": "MODERATE",
59+
"github_reviewed": true,
60+
"github_reviewed_at": "2025-10-22T15:32:17Z",
61+
"nvd_published_at": "2020-06-19T20:15:00Z"
62+
}
63+
}

advisories/unreviewed/2022/05/GHSA-7vmw-6c7h-rrrv/GHSA-7vmw-6c7h-rrrv.json

Lines changed: 0 additions & 29 deletions
This file was deleted.

advisories/unreviewed/2025/05/GHSA-5wx3-hjmf-qcgx/GHSA-5wx3-hjmf-qcgx.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@
2626
],
2727
"database_specific": {
2828
"cwe_ids": [
29+
"CWE-613",
2930
"CWE-922"
3031
],
3132
"severity": "MODERATE",

advisories/unreviewed/2025/06/GHSA-25ww-mhx2-69ff/GHSA-25ww-mhx2-69ff.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-25ww-mhx2-69ff",
4-
"modified": "2025-06-10T12:30:18Z",
4+
"modified": "2025-10-22T15:31:04Z",
55
"published": "2025-06-10T12:30:18Z",
66
"aliases": [
77
"CVE-2025-40659"
88
],
99
"details": "An Insecure Direct Object Reference (IDOR) vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to access the private area setting the option parameter equal to 0, 1 or 2 in /administer/selectionnode/framesSelectionNetworks.asp.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/06/GHSA-32vr-5hxf-x93f/GHSA-32vr-5hxf-x93f.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,8 @@
114114
],
115115
"database_specific": {
116116
"cwe_ids": [
117-
"CWE-121"
117+
"CWE-121",
118+
"CWE-787"
118119
],
119120
"severity": "HIGH",
120121
"github_reviewed": false,

advisories/unreviewed/2025/06/GHSA-4h25-6mgv-2q43/GHSA-4h25-6mgv-2q43.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4h25-6mgv-2q43",
4-
"modified": "2025-06-10T12:30:18Z",
4+
"modified": "2025-10-22T15:31:04Z",
55
"published": "2025-06-10T12:30:18Z",
66
"aliases": [
77
"CVE-2025-40662"
88
],
99
"details": "Absolute path disclosure vulnerability in DM Corporative CMS. This vulnerability allows an attacker to view the contents of webroot/file, if navigating to a non-existent file.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/06/GHSA-7p84-3xrw-mfhg/GHSA-7p84-3xrw-mfhg.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7p84-3xrw-mfhg",
4-
"modified": "2025-06-10T12:30:18Z",
4+
"modified": "2025-10-22T15:31:04Z",
55
"published": "2025-06-10T12:30:18Z",
66
"aliases": [
77
"CVE-2025-40657"
88
],
99
"details": "A SQL injection vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to retrieve, create, update and delete databases through the codform parameter in /modules/forms/collectform.asp.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/06/GHSA-c2wc-64f2-wxpp/GHSA-c2wc-64f2-wxpp.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c2wc-64f2-wxpp",
4-
"modified": "2025-06-10T12:30:18Z",
4+
"modified": "2025-10-22T15:31:04Z",
55
"published": "2025-06-10T12:30:18Z",
66
"aliases": [
77
"CVE-2025-40658"
88
],
99
"details": "An Insecure Direct Object Reference (IDOR) vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to access the private area setting the option parameter equal to 0, 1 or 2 in /administer/selectionnode/framesSelection.asp.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/06/GHSA-h5mc-fvr9-pr54/GHSA-h5mc-fvr9-pr54.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-h5mc-fvr9-pr54",
4-
"modified": "2025-06-10T12:30:18Z",
4+
"modified": "2025-10-22T15:31:04Z",
55
"published": "2025-06-10T12:30:18Z",
66
"aliases": [
77
"CVE-2025-40661"
88
],
99
"details": "An Insecure Direct Object Reference (IDOR) vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to access the private area setting the option parameter equal to 0, 1 or 2 in /administer/selectionnode/selection.asp.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/06/GHSA-vm6c-rqg9-5qqr/GHSA-vm6c-rqg9-5qqr.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vm6c-rqg9-5qqr",
4-
"modified": "2025-06-13T00:33:18Z",
4+
"modified": "2025-10-22T15:31:04Z",
55
"published": "2025-06-13T00:33:18Z",
66
"aliases": [
77
"CVE-2025-4231"
88
],
99
"details": "A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user.\n\nThe attacker must have network access to the management web interface and successfully authenticate to exploit this issue.\n\nCloud NGFW and Prisma Access are not impacted by this vulnerability.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber"

0 commit comments

Comments
 (0)