Skip to content

Commit 37873db

Browse files
Advisory Database Sync
1 parent 61bb77f commit 37873db

File tree

86 files changed

+3136
-7
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

86 files changed

+3136
-7
lines changed

advisories/unreviewed/2025/06/GHSA-5pvc-qgx7-mhr5/GHSA-5pvc-qgx7-mhr5.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5pvc-qgx7-mhr5",
4-
"modified": "2025-06-26T21:31:21Z",
4+
"modified": "2026-02-12T00:31:02Z",
55
"published": "2025-06-26T21:31:21Z",
66
"aliases": [
77
"CVE-2025-3773"
88
],
99
"details": "A sensitive information exposure vulnerability in System Information Reporter (SIR) 1.0.3 and prior allows an authenticated non-admin local user to extract sensitive information stored in a registry backup folder.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/06/GHSA-6fjf-g26h-9mff/GHSA-6fjf-g26h-9mff.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6fjf-g26h-9mff",
4-
"modified": "2025-06-26T21:31:21Z",
4+
"modified": "2026-02-12T00:31:02Z",
55
"published": "2025-06-26T21:31:21Z",
66
"aliases": [
77
"CVE-2025-3722"
88
],
99
"details": "A path traversal vulnerability in System Information Reporter (SIR) 1.0.3 and prior allowed an authenticated high privileged user to issue malicious ePO post requests to System Information Reporter, leading to creation of files anywhere on the filesystem and possibly overwriting existing files and exposing sensitive information disclosure.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/06/GHSA-9c4h-xhg9-x3gj/GHSA-9c4h-xhg9-x3gj.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9c4h-xhg9-x3gj",
4-
"modified": "2025-06-26T21:31:21Z",
4+
"modified": "2026-02-12T00:31:02Z",
55
"published": "2025-06-26T21:31:21Z",
66
"aliases": [
77
"CVE-2025-3771"
88
],
99
"details": "A path or symbolic link manipulation vulnerability in SIR 1.0.3 and prior versions allows an authenticated non-admin local user to overwrite system files with SIR backup files, which can potentially cause a system crash. This was achieved by adding a malicious entry to the registry under the Trellix SIR registry folder or via policy or with a junction symbolic link to files that the user would not normally have permission to acces",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-25q2-mm9v-fcj8",
4+
"modified": "2026-02-12T00:31:04Z",
5+
"published": "2026-02-12T00:31:04Z",
6+
"aliases": [
7+
"CVE-2026-20612"
8+
],
9+
"details": "A privacy issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An app may be able to access sensitive user data.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20612"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://support.apple.com/en-us/126348"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://support.apple.com/en-us/126349"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://support.apple.com/en-us/126350"
28+
}
29+
],
30+
"database_specific": {
31+
"cwe_ids": [],
32+
"severity": null,
33+
"github_reviewed": false,
34+
"github_reviewed_at": null,
35+
"nvd_published_at": "2026-02-11T23:16:04Z"
36+
}
37+
}
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-26vr-h5vf-58cq",
4+
"modified": "2026-02-12T00:31:05Z",
5+
"published": "2026-02-12T00:31:05Z",
6+
"aliases": [
7+
"CVE-2026-20674"
8+
],
9+
"details": "A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 26.3 and iPadOS 26.3. An attacker with physical access to a locked device may be able to view sensitive user information.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20674"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://support.apple.com/en-us/126346"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [],
24+
"severity": null,
25+
"github_reviewed": false,
26+
"github_reviewed_at": null,
27+
"nvd_published_at": "2026-02-11T23:16:09Z"
28+
}
29+
}
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2cmj-fc9r-6h5j",
4+
"modified": "2026-02-12T00:31:03Z",
5+
"published": "2026-02-12T00:31:03Z",
6+
"aliases": [
7+
"CVE-2025-46300"
8+
],
9+
"details": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46300"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://support.apple.com/en-us/126347"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://support.apple.com/en-us/126349"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://support.apple.com/en-us/126350"
28+
}
29+
],
30+
"database_specific": {
31+
"cwe_ids": [],
32+
"severity": null,
33+
"github_reviewed": false,
34+
"github_reviewed_at": null,
35+
"nvd_published_at": "2026-02-11T23:16:02Z"
36+
}
37+
}
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2hr4-372m-m24q",
4+
"modified": "2026-02-12T00:31:04Z",
5+
"published": "2026-02-12T00:31:04Z",
6+
"aliases": [
7+
"CVE-2026-20626"
8+
],
9+
"details": "This issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, visionOS 26.3. A malicious app may be able to gain root privileges.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20626"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://support.apple.com/en-us/126346"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://support.apple.com/en-us/126348"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://support.apple.com/en-us/126349"
28+
},
29+
{
30+
"type": "WEB",
31+
"url": "https://support.apple.com/en-us/126353"
32+
}
33+
],
34+
"database_specific": {
35+
"cwe_ids": [],
36+
"severity": null,
37+
"github_reviewed": false,
38+
"github_reviewed_at": null,
39+
"nvd_published_at": "2026-02-11T23:16:06Z"
40+
}
41+
}
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2jp6-x3f3-3m72",
4+
"modified": "2026-02-12T00:31:05Z",
5+
"published": "2026-02-12T00:31:05Z",
6+
"aliases": [
7+
"CVE-2026-20667"
8+
],
9+
"details": "A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 26.3 and iPadOS 26.3. An app may be able to break out of its sandbox.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20667"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://support.apple.com/en-us/126346"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://support.apple.com/en-us/126348"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://support.apple.com/en-us/126349"
28+
},
29+
{
30+
"type": "WEB",
31+
"url": "https://support.apple.com/en-us/126350"
32+
},
33+
{
34+
"type": "WEB",
35+
"url": "https://support.apple.com/en-us/126352"
36+
}
37+
],
38+
"database_specific": {
39+
"cwe_ids": [],
40+
"severity": null,
41+
"github_reviewed": false,
42+
"github_reviewed_at": null,
43+
"nvd_published_at": "2026-02-11T23:16:09Z"
44+
}
45+
}
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2jw9-xm3m-75jh",
4+
"modified": "2026-02-12T00:31:04Z",
5+
"published": "2026-02-12T00:31:04Z",
6+
"aliases": [
7+
"CVE-2025-46305"
8+
],
9+
"details": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46305"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://support.apple.com/en-us/126347"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://support.apple.com/en-us/126349"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://support.apple.com/en-us/126350"
28+
}
29+
],
30+
"database_specific": {
31+
"cwe_ids": [],
32+
"severity": null,
33+
"github_reviewed": false,
34+
"github_reviewed_at": null,
35+
"nvd_published_at": "2026-02-11T23:16:03Z"
36+
}
37+
}
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2vhc-whvm-6f6g",
4+
"modified": "2026-02-12T00:31:04Z",
5+
"published": "2026-02-12T00:31:04Z",
6+
"aliases": [
7+
"CVE-2026-20641"
8+
],
9+
"details": "A privacy issue was addressed with improved checks. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An app may be able to identify what other apps a user has installed.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20641"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://support.apple.com/en-us/126346"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://support.apple.com/en-us/126347"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://support.apple.com/en-us/126348"
28+
},
29+
{
30+
"type": "WEB",
31+
"url": "https://support.apple.com/en-us/126349"
32+
},
33+
{
34+
"type": "WEB",
35+
"url": "https://support.apple.com/en-us/126350"
36+
},
37+
{
38+
"type": "WEB",
39+
"url": "https://support.apple.com/en-us/126351"
40+
},
41+
{
42+
"type": "WEB",
43+
"url": "https://support.apple.com/en-us/126352"
44+
},
45+
{
46+
"type": "WEB",
47+
"url": "https://support.apple.com/en-us/126353"
48+
}
49+
],
50+
"database_specific": {
51+
"cwe_ids": [],
52+
"severity": null,
53+
"github_reviewed": false,
54+
"github_reviewed_at": null,
55+
"nvd_published_at": "2026-02-11T23:16:07Z"
56+
}
57+
}

0 commit comments

Comments
 (0)