Skip to content

Commit 97747e9

Browse files
Advisory Database Sync
1 parent 3cf568b commit 97747e9

255 files changed

Lines changed: 9582 additions & 29 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/unreviewed/2026/01/GHSA-mjjp-xjfg-97wg/GHSA-mjjp-xjfg-97wg.json renamed to advisories/github-reviewed/2026/01/GHSA-mjjp-xjfg-97wg/GHSA-mjjp-xjfg-97wg.json

Lines changed: 50 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mjjp-xjfg-97wg",
4-
"modified": "2026-01-10T12:30:16Z",
4+
"modified": "2026-01-13T18:31:53Z",
55
"published": "2026-01-10T12:30:16Z",
66
"aliases": [
77
"CVE-2025-15504"
88
],
9+
"summary": "LIEF is vulnerable to segmentation fault",
910
"details": "A security flaw has been discovered in lief-project LIEF up to 0.17.1. Affected by this issue is the function Parser::parse_binary of the file src/ELF/Parser.tcc of the component ELF Binary Parser. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. Upgrading to version 0.17.2 can resolve this issue. The patch is identified as 81bd5d7ea0c390563f1c4c017c9019d154802978. It is recommended to upgrade the affected component.",
1011
"severity": [
1112
{
@@ -14,10 +15,49 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "PyPI",
25+
"name": "lief"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"fixed": "0.17.2"
36+
}
37+
]
38+
}
39+
]
40+
},
41+
{
42+
"package": {
43+
"ecosystem": "crates.io",
44+
"name": "lief"
45+
},
46+
"ranges": [
47+
{
48+
"type": "ECOSYSTEM",
49+
"events": [
50+
{
51+
"introduced": "0"
52+
},
53+
{
54+
"fixed": "0.17.2"
55+
}
56+
]
57+
}
58+
]
1859
}
1960
],
20-
"affected": [],
2161
"references": [
2262
{
2363
"type": "ADVISORY",
@@ -35,6 +75,10 @@
3575
"type": "WEB",
3676
"url": "https://github.com/lief-project/LIEF/commit/81bd5d7ea0c390563f1c4c017c9019d154802978"
3777
},
78+
{
79+
"type": "PACKAGE",
80+
"url": "https://github.com/lief-project/LIEF"
81+
},
3882
{
3983
"type": "WEB",
4084
"url": "https://github.com/lief-project/LIEF/releases/tag/0.17.2"
@@ -60,9 +104,9 @@
60104
"cwe_ids": [
61105
"CWE-404"
62106
],
63-
"severity": "MODERATE",
64-
"github_reviewed": false,
65-
"github_reviewed_at": null,
107+
"severity": "LOW",
108+
"github_reviewed": true,
109+
"github_reviewed_at": "2026-01-13T18:31:53Z",
66110
"nvd_published_at": "2026-01-10T12:15:49Z"
67111
}
68112
}

advisories/unreviewed/2022/02/GHSA-xfch-762x-q3v9/GHSA-xfch-762x-q3v9.json

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xfch-762x-q3v9",
4-
"modified": "2022-02-08T00:00:41Z",
4+
"modified": "2026-01-13T18:31:01Z",
55
"published": "2022-02-08T00:00:41Z",
66
"aliases": [
77
"CVE-2021-36193"
88
],
99
"details": "Multiple stack-based buffer overflows in the command line interpreter of FortiWeb before 6.4.2 may allow an authenticated attacker to achieve arbitrary code execution via specially crafted commands.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -21,6 +26,7 @@
2126
],
2227
"database_specific": {
2328
"cwe_ids": [
29+
"CWE-121",
2430
"CWE-787"
2531
],
2632
"severity": "HIGH",

advisories/unreviewed/2025/03/GHSA-673g-crrq-7x55/GHSA-673g-crrq-7x55.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@
2525
}
2626
],
2727
"database_specific": {
28-
"cwe_ids": [],
28+
"cwe_ids": [
29+
"CWE-352"
30+
],
2931
"severity": "MODERATE",
3032
"github_reviewed": false,
3133
"github_reviewed_at": null,

advisories/unreviewed/2025/03/GHSA-8jxr-w3j2-x85w/GHSA-8jxr-w3j2-x85w.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@
2525
}
2626
],
2727
"database_specific": {
28-
"cwe_ids": [],
28+
"cwe_ids": [
29+
"CWE-79"
30+
],
2931
"severity": "LOW",
3032
"github_reviewed": false,
3133
"github_reviewed_at": null,

advisories/unreviewed/2025/12/GHSA-4mm6-6c2q-x3fp/GHSA-4mm6-6c2q-x3fp.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@
4242
],
4343
"database_specific": {
4444
"cwe_ids": [
45+
"CWE-119",
4546
"CWE-787"
4647
],
4748
"severity": "HIGH",
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-229q-96qr-8qq9",
4+
"modified": "2026-01-13T18:31:07Z",
5+
"published": "2026-01-13T18:31:07Z",
6+
"aliases": [
7+
"CVE-2025-59922"
8+
],
9+
"details": "An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiClientEMS 7.4.3 through 7.4.4, FortiClientEMS 7.4.0 through 7.4.1, FortiClientEMS 7.2.0 through 7.2.10, FortiClientEMS 7.0 all versions may allow an authenticated attacker with at least read-only admin permission to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59922"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-735"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-89"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-01-13T17:15:58Z"
35+
}
36+
}
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-22c9-2rqw-7g84",
4+
"modified": "2026-01-13T18:31:05Z",
5+
"published": "2026-01-13T18:31:05Z",
6+
"aliases": [
7+
"CVE-2025-71075"
8+
],
9+
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: aic94xx: fix use-after-free in device removal path\n\nThe asd_pci_remove() function fails to synchronize with pending tasklets\nbefore freeing the asd_ha structure, leading to a potential\nuse-after-free vulnerability.\n\nWhen a device removal is triggered (via hot-unplug or module unload),\nrace condition can occur.\n\nThe fix adds tasklet_kill() before freeing the asd_ha structure,\nensuring all scheduled tasklets complete before cleanup proceeds.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71075"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://git.kernel.org/stable/c/751c19635c2bfaaf2836a533caa3663633066dcf"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://git.kernel.org/stable/c/a41dc180b6e1229ae49ca290ae14d82101c148c3"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://git.kernel.org/stable/c/b3e655e52b98a1d3df41c8e42035711e083099f8"
28+
},
29+
{
30+
"type": "WEB",
31+
"url": "https://git.kernel.org/stable/c/e354793a7ab9bb0934ea699a9d57bcd1b48fc27b"
32+
},
33+
{
34+
"type": "WEB",
35+
"url": "https://git.kernel.org/stable/c/f6ab594672d4cba08540919a4e6be2e202b60007"
36+
}
37+
],
38+
"database_specific": {
39+
"cwe_ids": [],
40+
"severity": null,
41+
"github_reviewed": false,
42+
"github_reviewed_at": null,
43+
"nvd_published_at": "2026-01-13T16:16:06Z"
44+
}
45+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2397-gxj5-7465",
4+
"modified": "2026-01-13T18:31:07Z",
5+
"published": "2026-01-13T18:31:07Z",
6+
"aliases": [
7+
"CVE-2025-58693"
8+
],
9+
"details": "An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in Fortinet FortiVoice 7.2.0 through 7.2.2, FortiVoice 7.0.0 through 7.0.7 allows a privileged attacker to delete files from the underlying filesystem via crafted HTTP or HTTPs requests.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58693"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-778"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-22"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-01-13T17:15:57Z"
35+
}
36+
}
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-23jw-wj29-xjcv",
4+
"modified": "2026-01-13T18:31:05Z",
5+
"published": "2026-01-13T18:31:05Z",
6+
"aliases": [
7+
"CVE-2025-70753"
8+
],
9+
"details": "Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the security_5g parameter of the sub_4CA50 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70753"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/0-fool/VulnbyCola/blob/main/Tenda/AX-1806/8/1.md"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [],
24+
"severity": null,
25+
"github_reviewed": false,
26+
"github_reviewed_at": null,
27+
"nvd_published_at": "2026-01-13T16:16:05Z"
28+
}
29+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-25wh-jjx3-jq6q",
4+
"modified": "2026-01-13T18:31:09Z",
5+
"published": "2026-01-13T18:31:09Z",
6+
"aliases": [
7+
"CVE-2026-20863"
8+
],
9+
"details": "Double free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20863"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20863"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-415"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-01-13T18:16:15Z"
35+
}
36+
}

0 commit comments

Comments
 (0)