Skip to content

Commit fb2da9b

Browse files
Advisory Database Sync
1 parent a3fc9d1 commit fb2da9b

File tree

25 files changed

+663
-19
lines changed

25 files changed

+663
-19
lines changed

advisories/github-reviewed/2025/08/GHSA-856v-8qm2-9wjv/GHSA-856v-8qm2-9wjv.json

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-856v-8qm2-9wjv",
4-
"modified": "2025-12-01T12:30:27Z",
4+
"modified": "2025-12-01T15:30:16Z",
55
"published": "2025-08-07T21:31:08Z",
66
"aliases": [
77
"CVE-2025-7195"
@@ -64,10 +64,22 @@
6464
"type": "WEB",
6565
"url": "https://access.redhat.com/errata/RHSA-2025:21885"
6666
},
67+
{
68+
"type": "WEB",
69+
"url": "https://access.redhat.com/errata/RHSA-2025:22415"
70+
},
6771
{
6872
"type": "WEB",
6973
"url": "https://access.redhat.com/errata/RHSA-2025:22416"
7074
},
75+
{
76+
"type": "WEB",
77+
"url": "https://access.redhat.com/errata/RHSA-2025:22418"
78+
},
79+
{
80+
"type": "WEB",
81+
"url": "https://access.redhat.com/errata/RHSA-2025:22420"
82+
},
7183
{
7284
"type": "WEB",
7385
"url": "https://access.redhat.com/security/cve/CVE-2025-7195"

advisories/unreviewed/2025/11/GHSA-4w79-7ch5-4xhw/GHSA-4w79-7ch5-4xhw.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4w79-7ch5-4xhw",
4-
"modified": "2025-11-28T21:31:18Z",
4+
"modified": "2025-12-01T15:30:16Z",
55
"published": "2025-11-26T18:31:03Z",
66
"aliases": [
77
"CVE-2025-45311"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45311"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/fail2ban/fail2ban/issues/4110"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://gist.github.com/R-Security/1c707a08f9c7f9a91d9d84b5010aaed2"

advisories/unreviewed/2025/11/GHSA-q82r-57vj-xrfh/GHSA-q82r-57vj-xrfh.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q82r-57vj-xrfh",
4-
"modified": "2025-11-29T06:30:13Z",
4+
"modified": "2025-12-01T15:30:17Z",
55
"published": "2025-11-29T06:30:13Z",
66
"aliases": [
77
"CVE-2025-65892"
88
],
99
"details": "Reflected Cross-Site Scripting (rXSS) in krpano before version 1.23.2 allows a remote unauthenticated attacker to execute arbitrary JavaScript in the victim's browser via a crafted URL to the passQueryParameters function with the xml parameter enabled.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -24,8 +29,10 @@
2429
}
2530
],
2631
"database_specific": {
27-
"cwe_ids": [],
28-
"severity": null,
32+
"cwe_ids": [
33+
"CWE-79"
34+
],
35+
"severity": "MODERATE",
2936
"github_reviewed": false,
3037
"github_reviewed_at": null,
3138
"nvd_published_at": "2025-11-29T04:15:57Z"

advisories/unreviewed/2025/11/GHSA-wq3v-qm63-hhj6/GHSA-wq3v-qm63-hhj6.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wq3v-qm63-hhj6",
4-
"modified": "2025-11-29T06:30:13Z",
4+
"modified": "2025-12-01T15:30:16Z",
55
"published": "2025-11-29T06:30:13Z",
66
"aliases": [
77
"CVE-2025-65540"
88
],
99
"details": "Multiple Cross-Site Scripting (XSS) vulnerabilities exist in xmall v1.1 due to improper handling of user-supplied data. User input fields such as username and description are directly rendered into HTML without proper sanitization or encoding, allowing attackers to inject and execute malicious scripts.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -20,8 +25,10 @@
2025
}
2126
],
2227
"database_specific": {
23-
"cwe_ids": [],
24-
"severity": null,
28+
"cwe_ids": [
29+
"CWE-79"
30+
],
31+
"severity": "MODERATE",
2532
"github_reviewed": false,
2633
"github_reviewed_at": null,
2734
"nvd_published_at": "2025-11-29T04:15:56Z"

advisories/unreviewed/2025/11/GHSA-xmfq-xm97-g58p/GHSA-xmfq-xm97-g58p.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xmfq-xm97-g58p",
4-
"modified": "2025-11-25T15:31:33Z",
4+
"modified": "2025-12-01T15:30:16Z",
55
"published": "2025-11-25T15:31:33Z",
66
"aliases": [
77
"CVE-2025-36134"
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-728r-qj99-48p2",
4+
"modified": "2025-12-01T15:30:17Z",
5+
"published": "2025-12-01T15:30:17Z",
6+
"aliases": [
7+
"CVE-2025-49643"
8+
],
9+
"details": "An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49643"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://support.zabbix.com/browse/ZBX-27284"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-405"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-12-01T14:16:06Z"
35+
}
36+
}

advisories/unreviewed/2025/12/GHSA-8444-jvgr-g6c6/GHSA-8444-jvgr-g6c6.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8444-jvgr-g6c6",
4-
"modified": "2025-12-01T03:30:26Z",
4+
"modified": "2025-12-01T15:30:17Z",
55
"published": "2025-12-01T03:30:26Z",
66
"aliases": [
77
"CVE-2025-13798"
@@ -38,6 +38,10 @@
3838
{
3939
"type": "WEB",
4040
"url": "https://www.notion.so/2a60c75766a8805a8973d2ff6a6bcb26"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.notion.so/Report-8-2a60c75766a8805a8973d2ff6a6bcb26"
4145
}
4246
],
4347
"database_specific": {
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-96fr-rv8q-2885",
4+
"modified": "2025-12-01T15:30:18Z",
5+
"published": "2025-12-01T15:30:18Z",
6+
"aliases": [
7+
"CVE-2025-13129"
8+
],
9+
"details": "Improper Enforcement of Behavioral Workflow vulnerability in Seneka Software Hardware Information Technology Trade Contracting and Industry Ltd. Co. Onaylarım allows Functionality Misuse.This issue affects Onaylarım: from 25.09.26.01 through 18112025.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13129"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.usom.gov.tr/bildirim/tr-25-0422"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-841"
30+
],
31+
"severity": "LOW",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-12-01T15:15:48Z"
35+
}
36+
}
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-c2vx-rx6x-m9wj",
4+
"modified": "2025-12-01T15:30:18Z",
5+
"published": "2025-12-01T15:30:18Z",
6+
"aliases": [
7+
"CVE-2025-63520"
8+
],
9+
"details": "Cross Site Scripting (XSS) vulnerability in FeehiCMS 2.1.1 via the id parameter of the User Update function (?r=user%2Fupdate).",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-63520"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/liufee/cms/issues/74"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://github.com/kiwi865/CVEs/blob/main/CVE-2025-63520.md"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [],
28+
"severity": null,
29+
"github_reviewed": false,
30+
"github_reviewed_at": null,
31+
"nvd_published_at": "2025-12-01T15:15:50Z"
32+
}
33+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-gm93-3f63-r64c",
4+
"modified": "2025-12-01T15:30:17Z",
5+
"published": "2025-12-01T15:30:17Z",
6+
"aliases": [
7+
"CVE-2025-49642"
8+
],
9+
"details": "Library loading on AIX Zabbix Agent builds can be hijacked by local users with write access to the /home/cecuser directory.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49642"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://support.zabbix.com/browse/ZBX-27283"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-426"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-12-01T14:16:05Z"
35+
}
36+
}

0 commit comments

Comments
 (0)