Skip to content

Commit 3a7b9b2

Browse files
1 parent 2343826 commit 3a7b9b2

File tree

4 files changed

+234
-0
lines changed

4 files changed

+234
-0
lines changed
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4696-58w6-rqw4",
4+
"modified": "2026-01-18T09:30:27Z",
5+
"published": "2026-01-18T09:30:27Z",
6+
"aliases": [
7+
"CVE-2025-15534"
8+
],
9+
"details": "A vulnerability was identified in raysan5 raylib up to 909f040. Affected by this issue is the function LoadFontData of the file src/rtext.c. The manipulation leads to integer overflow. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The identifier of the patch is 5a3391fdce046bc5473e52afbd835dd2dc127146. It is suggested to install a patch to address this issue.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15534"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/raysan5/raylib/issues/5436"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/raysan5/raylib/pull/5450"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://github.com/raysan5/raylib/commit/5a3391fdce046bc5473e52afbd835dd2dc127146"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://github.com/oneafter/1224/blob/main/segv1"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?ctiid.341706"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://vuldb.com/?id.341706"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://vuldb.com/?submit.733343"
53+
}
54+
],
55+
"database_specific": {
56+
"cwe_ids": [],
57+
"severity": "MODERATE",
58+
"github_reviewed": false,
59+
"github_reviewed_at": null,
60+
"nvd_published_at": "2026-01-18T07:16:01Z"
61+
}
62+
}
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-5pr6-crvp-2j9f",
4+
"modified": "2026-01-18T09:30:27Z",
5+
"published": "2026-01-18T09:30:27Z",
6+
"aliases": [
7+
"CVE-2025-15536"
8+
],
9+
"details": "A weakness has been identified in BYVoid OpenCC up to 1.1.9. This vulnerability affects the function opencc::MaxMatchSegmentation of the file src/MaxMatchSegmentation.cpp. This manipulation causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. Patch name: 345c9a50ab07018f1b4439776bad78a0d40778ec. To fix this issue, it is recommended to deploy a patch.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15536"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/BYVoid/OpenCC/issues/997"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/BYVoid/OpenCC/pull/1005"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://github.com/BYVoid/OpenCC/commit/345c9a50ab07018f1b4439776bad78a0d40778ec"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://github.com/oneafter/1222/blob/main/repro"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?ctiid.341708"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://vuldb.com/?id.341708"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://vuldb.com/?submit.733347"
53+
}
54+
],
55+
"database_specific": {
56+
"cwe_ids": [
57+
"CWE-119"
58+
],
59+
"severity": "MODERATE",
60+
"github_reviewed": false,
61+
"github_reviewed_at": null,
62+
"nvd_published_at": "2026-01-18T09:15:46Z"
63+
}
64+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-hp5r-hrqw-jp8g",
4+
"modified": "2026-01-18T09:30:27Z",
5+
"published": "2026-01-18T09:30:27Z",
6+
"aliases": [
7+
"CVE-2026-1112"
8+
],
9+
"details": "A vulnerability was found in Sanluan PublicCMS up to 5.202506.d. Affected is the function delete of the file publiccms-trade/src/main/java/com/publiccms/controller/web/trade/TradeAddressController.java of the component Trade Address Deletion Endpoint. Performing a manipulation of the argument ids results in improper authorization. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1112"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/AnalogyC0de/public_exp/issues/4"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.341704"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.341704"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.732771"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-266"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2026-01-18T07:16:03Z"
51+
}
52+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-xvvx-g2mg-wqw5",
4+
"modified": "2026-01-18T09:30:27Z",
5+
"published": "2026-01-18T09:30:27Z",
6+
"aliases": [
7+
"CVE-2025-15535"
8+
],
9+
"details": "A security flaw has been discovered in nicbarker clay up to 0.14. This affects the function Clay__MeasureTextCached in the library clay.h. The manipulation results in null pointer dereference. The attack is only possible with local access. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15535"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/nicbarker/clay/issues/566"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/oneafter/1215/blob/main/repro"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.341707"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.341707"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.733346"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-404"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2026-01-18T08:15:49Z"
55+
}
56+
}

0 commit comments

Comments
 (0)