Skip to content

Commit f591fdd

Browse files
Advisory Database Sync
1 parent c9d2924 commit f591fdd

File tree

240 files changed

+8141
-20
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

240 files changed

+8141
-20
lines changed

advisories/unreviewed/2024/03/GHSA-5g62-9q93-xrv9/GHSA-5g62-9q93-xrv9.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5g62-9q93-xrv9",
4-
"modified": "2024-03-07T03:30:41Z",
4+
"modified": "2025-10-14T18:30:25Z",
55
"published": "2024-03-07T03:30:41Z",
66
"aliases": [
77
"CVE-2024-1460"

advisories/unreviewed/2024/07/GHSA-c2q4-mfpf-x8wh/GHSA-c2q4-mfpf-x8wh.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c2q4-mfpf-x8wh",
4-
"modified": "2024-07-10T18:32:17Z",
4+
"modified": "2025-10-14T18:30:26Z",
55
"published": "2024-07-10T18:32:17Z",
66
"aliases": [
77
"CVE-2024-3325"
88
],
99
"details": "Vulnerability in Jaspersoft JasperReport Servers.This issue affects JasperReport Servers: from 8.0.4 through 9.0.0.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2024/10/GHSA-856w-qx7w-v664/GHSA-856w-qx7w-v664.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-856w-qx7w-v664",
4-
"modified": "2024-10-02T18:31:32Z",
4+
"modified": "2025-10-14T18:30:26Z",
55
"published": "2024-10-02T18:31:32Z",
66
"aliases": [
77
"CVE-2024-6360"
88
],
99
"details": "Incorrect Permission Assignment for Critical Resource vulnerability in OpenText™ Vertica could allow Privilege Abuse and result in unauthorized access or privileges to Vertica agent apikey.\nThis issue affects Vertica: from 10.0 through 10.X, from 11.0 through 11.X, from 12.0 through 12.X, from 23.0 through 23.X, from 24.0 through 24.X.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:L/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:L/U:Green"

advisories/unreviewed/2024/10/GHSA-cm3c-fgqh-p9r2/GHSA-cm3c-fgqh-p9r2.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cm3c-fgqh-p9r2",
4-
"modified": "2024-10-28T21:30:34Z",
4+
"modified": "2025-10-14T18:30:26Z",
55
"published": "2024-10-28T21:30:34Z",
66
"aliases": [
77
"CVE-2024-5532"
88
],
99
"details": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in OpenText™ Operations Agent. \n\nThe XSS vulnerability could allow an attacker with local admin permissions to manipulate the content of the internal status page of the Agent on the local system. \n\nThis issue affects Operations Agent: 12.20, 12.21, 12.22, 12.23, 12.24, 12.25, 12.26.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:C/RE:M/U:Red"

advisories/unreviewed/2025/04/GHSA-2cp9-r2rg-qvgg/GHSA-2cp9-r2rg-qvgg.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2cp9-r2rg-qvgg",
4-
"modified": "2025-04-07T21:32:03Z",
4+
"modified": "2025-10-14T18:30:26Z",
55
"published": "2025-04-01T06:30:44Z",
66
"aliases": [
77
"CVE-2025-1534"
88
],
99
"details": "CVE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Payara Platform Payara Server allows : Remote Code Inclusion.This issue affects Payara Server: from 4.1.2.1919.1 before 4.1.2.191.51, from 5.20.0 before 5.68.0, from 6.0.0 before 6.23.0, from 6.2022.1 before 6.2025.2.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:X/RE:X/U:X"

advisories/unreviewed/2025/06/GHSA-2q8m-2xcf-6rrj/GHSA-2q8m-2xcf-6rrj.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2q8m-2xcf-6rrj",
4-
"modified": "2025-06-26T09:32:37Z",
4+
"modified": "2025-10-14T18:30:26Z",
55
"published": "2025-06-26T09:32:37Z",
66
"aliases": [
77
"CVE-2025-5459"
88
],
99
"details": "A user with specific node group editing permissions and a specially crafted class parameter could be used to execute commands as root on the primary host. It affects Puppet Enterprise versions 2018.1.8 through 2023.8.3 and 2025.3 and has been resolved in versions 2023.8.4 and 2025.4.0.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/06/GHSA-pww7-j9v6-xc6j/GHSA-pww7-j9v6-xc6j.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pww7-j9v6-xc6j",
4-
"modified": "2025-06-10T15:30:42Z",
4+
"modified": "2025-10-14T18:30:26Z",
55
"published": "2025-06-05T15:31:32Z",
66
"aliases": [
77
"CVE-2025-47827"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://github.com/Zedeldi/igelfs"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47827"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2025/07/GHSA-pmfv-5ppm-9fqc/GHSA-pmfv-5ppm-9fqc.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pmfv-5ppm-9fqc",
4-
"modified": "2025-07-23T18:30:36Z",
4+
"modified": "2025-10-14T18:30:26Z",
55
"published": "2025-07-23T18:30:36Z",
66
"aliases": [
77
"CVE-2025-8069"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://aws.amazon.com/security/security-bulletins/AWS-2025-014"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://docs.aws.amazon.com/vpn/latest/clientvpn-user/client-vpn-connect-windows-release-notes.html"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2025/08/GHSA-hf8h-76fm-735v/GHSA-hf8h-76fm-735v.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hf8h-76fm-735v",
4-
"modified": "2025-09-19T12:30:19Z",
4+
"modified": "2025-10-14T18:30:26Z",
55
"published": "2025-08-13T18:31:25Z",
66
"aliases": [
77
"CVE-2025-8904"
@@ -27,6 +27,10 @@
2727
"type": "WEB",
2828
"url": "https://aws.amazon.com/security/security-bulletins/AWS-2025-017"
2929
},
30+
{
31+
"type": "WEB",
32+
"url": "https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-750-release.html"
33+
},
3034
{
3135
"type": "WEB",
3236
"url": "https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-release-app-versions-7.x.html"
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-23c7-w4rj-j8hh",
4+
"modified": "2025-10-14T18:30:29Z",
5+
"published": "2025-10-14T18:30:28Z",
6+
"aliases": [
7+
"CVE-2025-37140"
8+
],
9+
"details": "Arbitrary file download vulnerabilities exist in the CLI binary of AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an authenticated malicious actor to download arbitrary files through carefully constructed exploits.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-37140"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04957en_us&docLocale=en_US"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [],
29+
"severity": "MODERATE",
30+
"github_reviewed": false,
31+
"github_reviewed_at": null,
32+
"nvd_published_at": "2025-10-14T17:15:40Z"
33+
}
34+
}

0 commit comments

Comments
 (0)