Skip to content

Commit fea65fb

Browse files
1 parent 0d92b11 commit fea65fb

File tree

2 files changed

+28
-4
lines changed

2 files changed

+28
-4
lines changed

advisories/github-reviewed/2019/10/GHSA-85rf-xh54-whp3/GHSA-85rf-xh54-whp3.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,19 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-85rf-xh54-whp3",
4-
"modified": "2024-01-05T15:29:09Z",
4+
"modified": "2025-11-15T03:10:40Z",
55
"published": "2019-10-07T16:52:13Z",
66
"aliases": [
77
"CVE-2024-22050"
88
],
99
"summary": "Malicious URL drafting attack against iodines static file server may allow path traversal",
1010
"details": "### Impact\n\nA path traversal vulnerability was detected in iodine's static file service. This vulnerability effects any application running iodine's static file server on an effected iodine version.\n\nMalicious URL drafting may cause the static file server to attempt a response containing data from files that shouldn't be normally accessible from the public folder.\n\n### Patches\n\nThe vulnerability was patched in version 0.7.34. Please upgrade to the latest version.\n\n### Workarounds\n\nA possible workaround would be to disable the static file service and it's `X-Sendfile` support, sending static files using nginx or a source code solution (sending the data dynamically).\n\nHowever, it would be better to upgrade iodine to the latest version, as it also contains non-security related fixes.\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email [Boaz Segev](https://github.com/boazsegev)",
11-
"severity": [],
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
15+
}
16+
],
1217
"affected": [
1318
{
1419
"package": {
@@ -56,7 +61,7 @@
5661
"cwe_ids": [
5762
"CWE-22"
5863
],
59-
"severity": "LOW",
64+
"severity": "HIGH",
6065
"github_reviewed": true,
6166
"github_reviewed_at": "2020-04-24T20:13:10Z",
6267
"nvd_published_at": null

advisories/github-reviewed/2025/11/GHSA-38jw-g2qx-4286/GHSA-38jw-g2qx-4286.json

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-38jw-g2qx-4286",
4-
"modified": "2025-11-07T21:56:08Z",
4+
"modified": "2025-11-15T03:09:50Z",
55
"published": "2025-11-06T23:32:54Z",
66
"aliases": [
77
"CVE-2025-64432"
@@ -71,6 +71,25 @@
7171
]
7272
}
7373
]
74+
},
75+
{
76+
"package": {
77+
"ecosystem": "Go",
78+
"name": "kubevirt.io/kubevirt"
79+
},
80+
"ranges": [
81+
{
82+
"type": "ECOSYSTEM",
83+
"events": [
84+
{
85+
"introduced": "1.6.2"
86+
},
87+
{
88+
"fixed": "1.7.0-rc.0"
89+
}
90+
]
91+
}
92+
]
7493
}
7594
],
7695
"references": [

0 commit comments

Comments
 (0)