Skip to content

File tree

17 files changed

+282
-13
lines changed

17 files changed

+282
-13
lines changed

advisories/unreviewed/2023/12/GHSA-5rp3-83j5-w2g4/GHSA-5rp3-83j5-w2g4.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5rp3-83j5-w2g4",
4-
"modified": "2023-12-12T15:30:58Z",
4+
"modified": "2025-12-31T03:30:27Z",
55
"published": "2023-12-07T06:30:18Z",
66
"aliases": [
77
"CVE-2023-40238"

advisories/unreviewed/2024/01/GHSA-4425-3v92-m6q6/GHSA-4425-3v92-m6q6.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4425-3v92-m6q6",
4-
"modified": "2024-01-23T06:30:21Z",
4+
"modified": "2025-12-31T03:30:26Z",
55
"published": "2024-01-23T06:30:21Z",
66
"aliases": [
77
"CVE-2024-22772"

advisories/unreviewed/2024/01/GHSA-7695-f938-c2jf/GHSA-7695-f938-c2jf.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7695-f938-c2jf",
4-
"modified": "2024-01-23T06:30:21Z",
4+
"modified": "2025-12-31T03:30:26Z",
55
"published": "2024-01-23T06:30:21Z",
66
"aliases": [
77
"CVE-2024-22771"

advisories/unreviewed/2024/01/GHSA-78cp-c4p5-694f/GHSA-78cp-c4p5-694f.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-78cp-c4p5-694f",
4-
"modified": "2024-01-23T06:30:22Z",
4+
"modified": "2025-12-31T03:30:27Z",
55
"published": "2024-01-23T06:30:22Z",
66
"aliases": [
77
"CVE-2024-23842"

advisories/unreviewed/2024/01/GHSA-98h2-7j4h-7xc5/GHSA-98h2-7j4h-7xc5.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-98h2-7j4h-7xc5",
4-
"modified": "2024-01-23T06:30:21Z",
4+
"modified": "2025-12-31T03:30:26Z",
55
"published": "2024-01-23T06:30:21Z",
66
"aliases": [
77
"CVE-2024-22770"

advisories/unreviewed/2024/01/GHSA-crvx-w25m-8x7c/GHSA-crvx-w25m-8x7c.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-crvx-w25m-8x7c",
4-
"modified": "2024-01-23T06:30:21Z",
4+
"modified": "2025-12-31T03:30:26Z",
55
"published": "2024-01-23T06:30:21Z",
66
"aliases": [
77
"CVE-2024-22768"
88
],
9-
"details": "Improper Input Validation in Hitron Systems DVR HVR-4781 1.03~4.02 allows an attacker to cause network attack in case of using defalut admin ID/PW.\n",
9+
"details": "Improper Input Validation in Hitron Systems DVR HVR-4781 1.03~4.02 allows an attacker to cause network attack in case of using defalut admin ID/PW.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2024/01/GHSA-f282-55f7-242h/GHSA-f282-55f7-242h.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f282-55f7-242h",
4-
"modified": "2024-01-23T06:30:21Z",
4+
"modified": "2025-12-31T03:30:26Z",
55
"published": "2024-01-23T06:30:21Z",
66
"aliases": [
77
"CVE-2024-22769"

advisories/unreviewed/2024/03/GHSA-3j8r-26jq-jj7w/GHSA-3j8r-26jq-jj7w.json

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3j8r-26jq-jj7w",
4-
"modified": "2024-08-05T15:30:50Z",
4+
"modified": "2025-12-31T03:30:32Z",
55
"published": "2024-03-18T00:30:44Z",
66
"aliases": [
77
"CVE-2024-23138"
88
],
9-
"details": "A maliciously crafted DWG file when parsed through Autodesk DWG TrueView can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.\n",
9+
"details": "A maliciously crafted DWG file when parsed through Autodesk DWG TrueView can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",
@@ -26,7 +26,8 @@
2626
],
2727
"database_specific": {
2828
"cwe_ids": [
29-
"CWE-121"
29+
"CWE-121",
30+
"CWE-787"
3031
],
3132
"severity": "HIGH",
3233
"github_reviewed": false,

advisories/unreviewed/2025/03/GHSA-6952-99fq-g3mw/GHSA-6952-99fq-g3mw.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,9 @@
3737
}
3838
],
3939
"database_specific": {
40-
"cwe_ids": [],
40+
"cwe_ids": [
41+
"CWE-416"
42+
],
4143
"severity": "MODERATE",
4244
"github_reviewed": false,
4345
"github_reviewed_at": null,

advisories/unreviewed/2025/11/GHSA-777r-h845-392r/GHSA-777r-h845-392r.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-777r-h845-392r",
4-
"modified": "2025-11-18T18:32:53Z",
4+
"modified": "2025-12-31T03:30:32Z",
55
"published": "2025-11-18T18:32:53Z",
66
"aliases": [
77
"CVE-2025-34324"
88
],
99
"details": "GoSign Desktop versions 2.4.0 and earlier use an unsigned update manifest for distributing application updates. The manifest contains package URLs and SHA-256 hashes but is not digitally signed, so its authenticity relies solely on the underlying TLS channel. In affected versions, TLS certificate validation can be disabled when a proxy is configured, allowing an attacker who can intercept network traffic to supply a malicious update manifest and corresponding package with a matching hash. This can cause the client to download and install a tampered update, resulting in arbitrary code execution with the privileges of the GoSign Desktop user on Windows and macOS, or with elevated privileges on some Linux deployments. A local attacker who can modify proxy settings may also abuse this behavior to escalate privileges by forcing installation of a crafted update.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

0 commit comments

Comments
 (0)