Skip to content

File tree

11 files changed

+104
-34
lines changed

11 files changed

+104
-34
lines changed

advisories/github-reviewed/2025/02/GHSA-76p7-773f-r4q5/GHSA-76p7-773f-r4q5.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-76p7-773f-r4q5",
4-
"modified": "2025-11-25T18:32:18Z",
4+
"modified": "2025-11-28T21:31:18Z",
55
"published": "2025-02-10T18:30:47Z",
66
"aliases": [
77
"CVE-2024-11831"
@@ -124,6 +124,10 @@
124124
"type": "WEB",
125125
"url": "https://access.redhat.com/errata/RHSA-2025:10853"
126126
},
127+
{
128+
"type": "WEB",
129+
"url": "https://access.redhat.com/errata/RHSA-2025:0381"
130+
},
127131
{
128132
"type": "WEB",
129133
"url": "https://access.redhat.com/errata/RHBA-2025:0304"

advisories/unreviewed/2022/05/GHSA-6pvv-xrf9-29m6/GHSA-6pvv-xrf9-29m6.json

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,32 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6pvv-xrf9-29m6",
4-
"modified": "2022-05-24T19:05:12Z",
4+
"modified": "2025-11-28T21:31:18Z",
55
"published": "2022-05-24T19:05:12Z",
66
"aliases": [
77
"CVE-2021-26829"
88
],
99
"details": "OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows stored XSS via system_settings.shtm.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
1419
"type": "ADVISORY",
1520
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26829"
1621
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-26829"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.forescout.com/blog/anatomy-of-a-hacktivist-attack-russian-aligned-group-targets-otics"
29+
},
1730
{
1831
"type": "WEB",
1932
"url": "https://youtu.be/Xh6LPCiLMa8"

advisories/unreviewed/2025/11/GHSA-458g-vvmf-jfgq/GHSA-458g-vvmf-jfgq.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-458g-vvmf-jfgq",
4-
"modified": "2025-11-28T18:30:23Z",
4+
"modified": "2025-11-28T21:31:18Z",
55
"published": "2025-11-28T18:30:23Z",
66
"aliases": [
77
"CVE-2025-13683"
88
],
99
"details": "Exposure of credentials in unintended requests in Devolutions Server, Remote Desktop Manager on Windows.This issue affects Devolutions Server: through 2025.3.8.0; Remote Desktop Manager: through 2025.3.23.0.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-200"
2530
],
26-
"severity": null,
31+
"severity": "MODERATE",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2025-11-28T17:16:08Z"

advisories/unreviewed/2025/11/GHSA-4p72-hvvm-vvpj/GHSA-4p72-hvvm-vvpj.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4p72-hvvm-vvpj",
4-
"modified": "2025-11-21T15:31:27Z",
4+
"modified": "2025-11-28T21:31:17Z",
55
"published": "2025-11-21T15:31:27Z",
66
"aliases": [
77
"CVE-2025-66093"
88
],
99
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hupe13 Extensions for Leaflet Map extensions-leaflet-map allows DOM-Based XSS.This issue affects Extensions for Leaflet Map: from n/a through <= 4.8.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-79"
2530
],
26-
"severity": null,
31+
"severity": "MODERATE",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2025-11-21T13:15:50Z"

advisories/unreviewed/2025/11/GHSA-4w79-7ch5-4xhw/GHSA-4w79-7ch5-4xhw.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4w79-7ch5-4xhw",
4-
"modified": "2025-11-26T18:31:03Z",
4+
"modified": "2025-11-28T21:31:18Z",
55
"published": "2025-11-26T18:31:03Z",
66
"aliases": [
77
"CVE-2025-45311"
88
],
99
"details": "Insecure permissions in fail2ban-client v0.11.2 allows attackers with limited sudo privileges to perform arbitrary operations as root.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -24,8 +29,10 @@
2429
}
2530
],
2631
"database_specific": {
27-
"cwe_ids": [],
28-
"severity": null,
32+
"cwe_ids": [
33+
"CWE-266"
34+
],
35+
"severity": "HIGH",
2936
"github_reviewed": false,
3037
"github_reviewed_at": null,
3138
"nvd_published_at": "2025-11-26T16:15:47Z"

advisories/unreviewed/2025/11/GHSA-78x5-c3xr-96fc/GHSA-78x5-c3xr-96fc.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-78x5-c3xr-96fc",
4-
"modified": "2025-11-21T15:31:27Z",
4+
"modified": "2025-11-28T21:31:17Z",
55
"published": "2025-11-21T15:31:27Z",
66
"aliases": [
77
"CVE-2025-66092"
88
],
99
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bqworks Accordion Slider accordion-slider allows Stored XSS.This issue affects Accordion Slider: from n/a through <= 1.9.13.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-79"
2530
],
26-
"severity": null,
31+
"severity": "MODERATE",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2025-11-21T13:15:50Z"

advisories/unreviewed/2025/11/GHSA-gq25-78jf-v78c/GHSA-gq25-78jf-v78c.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gq25-78jf-v78c",
4-
"modified": "2025-11-26T21:31:26Z",
4+
"modified": "2025-11-28T21:31:18Z",
55
"published": "2025-11-26T21:31:26Z",
66
"aliases": [
77
"CVE-2025-65681"
88
],
99
"details": "An issue was discovered in Overhang.IO (tutor-open-edx) (overhangio/tutor) 20.0.2 allowing local unauthorized attackers to gain access to sensitive information due to the absence of proper cache-control HTTP headers and client-side session checks.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -28,8 +33,10 @@
2833
}
2934
],
3035
"database_specific": {
31-
"cwe_ids": [],
32-
"severity": null,
36+
"cwe_ids": [
37+
"CWE-384"
38+
],
39+
"severity": "LOW",
3340
"github_reviewed": false,
3441
"github_reviewed_at": null,
3542
"nvd_published_at": "2025-11-26T19:15:49Z"

advisories/unreviewed/2025/11/GHSA-p43m-vh82-h4mp/GHSA-p43m-vh82-h4mp.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-p43m-vh82-h4mp",
4-
"modified": "2025-11-26T18:31:04Z",
4+
"modified": "2025-11-28T21:31:18Z",
55
"published": "2025-11-26T18:31:04Z",
66
"aliases": [
77
"CVE-2025-55471"
88
],
99
"details": "Incorrect access control in the getUserFormData function of youlai-boot v2.21.1 allows attackers to access sensitive information for other users.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -28,8 +33,10 @@
2833
}
2934
],
3035
"database_specific": {
31-
"cwe_ids": [],
32-
"severity": null,
36+
"cwe_ids": [
37+
"CWE-284"
38+
],
39+
"severity": "HIGH",
3340
"github_reviewed": false,
3441
"github_reviewed_at": null,
3542
"nvd_published_at": "2025-11-26T18:15:48Z"

advisories/unreviewed/2025/11/GHSA-px6j-wc84-gwhf/GHSA-px6j-wc84-gwhf.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-px6j-wc84-gwhf",
4-
"modified": "2025-11-26T21:31:26Z",
4+
"modified": "2025-11-28T21:31:18Z",
55
"published": "2025-11-26T21:31:26Z",
66
"aliases": [
77
"CVE-2025-65672"
88
],
99
"details": "Insecure Direct Object Reference (IDOR) in classroomio 0.1.13 allows unauthorized share and invite access to course settings.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -28,8 +33,10 @@
2833
}
2934
],
3035
"database_specific": {
31-
"cwe_ids": [],
32-
"severity": null,
36+
"cwe_ids": [
37+
"CWE-639"
38+
],
39+
"severity": "HIGH",
3340
"github_reviewed": false,
3441
"github_reviewed_at": null,
3542
"nvd_published_at": "2025-11-26T19:15:47Z"

advisories/unreviewed/2025/11/GHSA-v825-mc9m-64qr/GHSA-v825-mc9m-64qr.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v825-mc9m-64qr",
4-
"modified": "2025-11-27T00:30:27Z",
4+
"modified": "2025-11-28T21:31:18Z",
55
"published": "2025-11-27T00:30:27Z",
66
"aliases": [
77
"CVE-2025-40934"
88
],
99
"details": "XML-Sig versions 0.27 through 0.67 for Perl incorrectly validates XML files if signatures are omitted.\n\nAn attacker can remove the signature from the XML document to make it pass the verification check.\n\nXML-Sig is a Perl module to validate signatures on XML files.  An unsigned XML file should return an error message.  The affected versions return true when attempting to validate an XML file that contains no signatures.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -27,7 +32,7 @@
2732
"cwe_ids": [
2833
"CWE-347"
2934
],
30-
"severity": null,
35+
"severity": "CRITICAL",
3136
"github_reviewed": false,
3237
"github_reviewed_at": null,
3338
"nvd_published_at": "2025-11-26T23:15:47Z"

0 commit comments

Comments
 (0)