Skip to content

Commit ad54d69

Browse files
Advisory Database Sync
1 parent b6e6397 commit ad54d69

173 files changed

Lines changed: 5364 additions & 37 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/unreviewed/2022/05/GHSA-x3rh-6g9g-gp22/GHSA-x3rh-6g9g-gp22.json

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-x3rh-6g9g-gp22",
4-
"modified": "2022-05-24T16:51:52Z",
4+
"modified": "2026-02-10T18:30:30Z",
55
"published": "2022-05-24T16:51:52Z",
66
"aliases": [
77
"CVE-2019-14193"
88
],
99
"details": "An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with an unvalidated length at nfs_readlink_reply, in the \"if\" block after calculating the new path length.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -21,10 +26,16 @@
2126
{
2227
"type": "WEB",
2328
"url": "https://gitlab.com/u-boot/u-boot"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://web.archive.org/web/20191130052117/https://blog.semmle.com/uboot-rce-nfs-vulnerability"
2433
}
2534
],
2635
"database_specific": {
27-
"cwe_ids": [],
36+
"cwe_ids": [
37+
"CWE-787"
38+
],
2839
"severity": "CRITICAL",
2940
"github_reviewed": false,
3041
"github_reviewed_at": null,

advisories/unreviewed/2025/03/GHSA-m92w-x6j2-5gc5/GHSA-m92w-x6j2-5gc5.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m92w-x6j2-5gc5",
4-
"modified": "2025-11-04T00:32:21Z",
4+
"modified": "2026-02-10T18:30:30Z",
55
"published": "2025-03-01T00:31:55Z",
66
"aliases": [
77
"CVE-2025-26466"
@@ -59,6 +59,14 @@
5959
"type": "WEB",
6060
"url": "https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt"
6161
},
62+
{
63+
"type": "WEB",
64+
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-26466-detection-script-memory-consumption-vulnerability-in-openssh"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-26466-mitigation-script-memory-consumption-vulnerability-in-openssh"
69+
},
6270
{
6371
"type": "WEB",
6472
"url": "http://seclists.org/fulldisclosure/2025/Feb/18"

advisories/unreviewed/2025/10/GHSA-2g3v-rq5j-m37f/GHSA-2g3v-rq5j-m37f.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2g3v-rq5j-m37f",
4-
"modified": "2025-10-14T18:30:36Z",
4+
"modified": "2026-02-10T18:30:32Z",
55
"published": "2025-10-14T18:30:36Z",
66
"aliases": [
77
"CVE-2025-59282"
@@ -22,6 +22,14 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59282"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-59282-detection-script-race-condition-in-microsoft-inbox-com-objects"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-59282-mitigation-script-race-condition-in-microsoft-inbox-com-objects"
2533
}
2634
],
2735
"database_specific": {

advisories/unreviewed/2025/10/GHSA-fpq4-r87v-g246/GHSA-fpq4-r87v-g246.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fpq4-r87v-g246",
4-
"modified": "2025-12-16T12:30:27Z",
4+
"modified": "2026-02-10T18:30:32Z",
55
"published": "2025-10-17T21:31:17Z",
66
"aliases": [
77
"CVE-2025-34281"
@@ -35,6 +35,10 @@
3535
"type": "WEB",
3636
"url": "https://advisory.checkmarx.net/advisory/CVE-2025-3261"
3737
},
38+
{
39+
"type": "WEB",
40+
"url": "https://advisory.checkmarx.net/advisory/CVE-2025-34281"
41+
},
3842
{
3943
"type": "WEB",
4044
"url": "https://github.com/thingsboard/thingsboard/releases/tag/v4.2.1"

advisories/unreviewed/2025/10/GHSA-x7f8-7938-4jm9/GHSA-x7f8-7938-4jm9.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,8 @@
4242
],
4343
"database_specific": {
4444
"cwe_ids": [
45-
"CWE-119"
45+
"CWE-119",
46+
"CWE-120"
4647
],
4748
"severity": "HIGH",
4849
"github_reviewed": false,

advisories/unreviewed/2025/11/GHSA-r879-mf96-p9qf/GHSA-r879-mf96-p9qf.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-r879-mf96-p9qf",
4-
"modified": "2025-11-05T00:31:33Z",
4+
"modified": "2026-02-10T18:30:32Z",
55
"published": "2025-11-05T00:31:33Z",
66
"aliases": [
77
"CVE-2025-59596"
88
],
99
"details": "CVE-2025-59596 is a denial-of-service vulnerability in Secure Access \nWindows client versions 12.0 to 14.10 that is addressed in version \n14.12. If a local networking policy is active, attackers on an adjacent \nnetwork may be able to send a crafted packet and cause the client system\n to crash.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2026/01/GHSA-5qvx-3gp5-6m7q/GHSA-5qvx-3gp5-6m7q.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,8 @@
4242
],
4343
"database_specific": {
4444
"cwe_ids": [
45-
"CWE-74"
45+
"CWE-74",
46+
"CWE-89"
4647
],
4748
"severity": "MODERATE",
4849
"github_reviewed": false,

advisories/unreviewed/2026/01/GHSA-7v6v-gxc3-52qv/GHSA-7v6v-gxc3-52qv.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,8 @@
4242
],
4343
"database_specific": {
4444
"cwe_ids": [
45-
"CWE-74"
45+
"CWE-74",
46+
"CWE-89"
4647
],
4748
"severity": "MODERATE",
4849
"github_reviewed": false,

advisories/unreviewed/2026/01/GHSA-8prm-7g9f-q54x/GHSA-8prm-7g9f-q54x.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8prm-7g9f-q54x",
4-
"modified": "2026-01-21T00:31:42Z",
4+
"modified": "2026-02-10T18:30:33Z",
55
"published": "2026-01-21T00:31:42Z",
66
"aliases": [
77
"CVE-2025-58743"
88
],
99
"details": "Use of a Broken or Risky Cryptographic Algorithm (DES) vulnerability \n\nin the Password class in C2SConnections.dll in Milner ImageDirector Capture on Windows allows Encryption Brute Forcing to obtain database credentials.This issue affects ImageDirector Capture: from 7.0.9.0 before 7.6.3.25808.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2026/01/GHSA-9259-996q-pvq8/GHSA-9259-996q-pvq8.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9259-996q-pvq8",
4-
"modified": "2026-01-21T00:31:42Z",
4+
"modified": "2026-02-10T18:30:33Z",
55
"published": "2026-01-21T00:31:42Z",
66
"aliases": [
77
"CVE-2025-58744"
88
],
99
"details": "Use of Default Credentials, Hard-coded Credentials vulnerability in C2SGlobalSettings.dll in \n\n Milner ImageDirector Capture on Windows allows decryption of document archive files using credentials decrypted with hard-coded application encryption key.\n\nThis issue affects ImageDirector Capture: from 7.0.9.0 before 7.6.3.25808.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

0 commit comments

Comments
 (0)