Skip to content

Commit b061ede

Browse files
Advisory Database Sync
1 parent c270a93 commit b061ede

46 files changed

Lines changed: 800 additions & 90 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/unreviewed/2025/05/GHSA-fh7c-x2jh-rc4w/GHSA-fh7c-x2jh-rc4w.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fh7c-x2jh-rc4w",
4-
"modified": "2025-05-23T15:31:10Z",
4+
"modified": "2026-01-29T18:31:29Z",
55
"published": "2025-05-23T15:31:10Z",
66
"aliases": [
77
"CVE-2025-39494"

advisories/unreviewed/2025/09/GHSA-m5cv-rq77-5q44/GHSA-m5cv-rq77-5q44.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m5cv-rq77-5q44",
4-
"modified": "2025-09-10T12:30:20Z",
4+
"modified": "2026-01-29T18:31:30Z",
55
"published": "2025-09-10T12:30:20Z",
66
"aliases": [
77
"CVE-2025-10214"
88
],
99
"details": "DLL search path hijacking vulnerability in the UPDF.exe executable for Windows version 1.8.5.0 allows attackers with local access to execute arbitrary code by placing a FREngine.dll file of their choice in the 'C:\\Users\\<user>\\AppData\\Local\\UPDF\\FREngine\\Bin64\\' directory, which could lead to arbitrary code execution and persistence.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/10/GHSA-7wwx-xj66-r44x/GHSA-7wwx-xj66-r44x.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,9 @@
4141
}
4242
],
4343
"database_specific": {
44-
"cwe_ids": [],
44+
"cwe_ids": [
45+
"CWE-295"
46+
],
4547
"severity": "HIGH",
4648
"github_reviewed": false,
4749
"github_reviewed_at": null,

advisories/unreviewed/2025/10/GHSA-cxq7-xw9v-rcv3/GHSA-cxq7-xw9v-rcv3.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,9 @@
4141
}
4242
],
4343
"database_specific": {
44-
"cwe_ids": [],
44+
"cwe_ids": [
45+
"CWE-532"
46+
],
4547
"severity": "MODERATE",
4648
"github_reviewed": false,
4749
"github_reviewed_at": null,

advisories/unreviewed/2025/10/GHSA-frhw-mqj2-wxw2/GHSA-frhw-mqj2-wxw2.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,9 @@
4141
}
4242
],
4343
"database_specific": {
44-
"cwe_ids": [],
44+
"cwe_ids": [
45+
"CWE-407"
46+
],
4547
"severity": "MODERATE",
4648
"github_reviewed": false,
4749
"github_reviewed_at": null,

advisories/unreviewed/2025/10/GHSA-hjx7-fpxx-mj48/GHSA-hjx7-fpxx-mj48.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,9 @@
4141
}
4242
],
4343
"database_specific": {
44-
"cwe_ids": [],
44+
"cwe_ids": [
45+
"CWE-770"
46+
],
4547
"severity": "MODERATE",
4648
"github_reviewed": false,
4749
"github_reviewed_at": null,

advisories/unreviewed/2025/10/GHSA-wcw9-47fp-rrfr/GHSA-wcw9-47fp-rrfr.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,9 @@
4141
}
4242
],
4343
"database_specific": {
44-
"cwe_ids": [],
44+
"cwe_ids": [
45+
"CWE-770"
46+
],
4547
"severity": "MODERATE",
4648
"github_reviewed": false,
4749
"github_reviewed_at": null,

advisories/unreviewed/2025/12/GHSA-4973-8mgr-386v/GHSA-4973-8mgr-386v.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4973-8mgr-386v",
4-
"modified": "2025-12-31T21:30:59Z",
4+
"modified": "2026-01-29T18:31:31Z",
55
"published": "2025-12-31T21:30:59Z",
66
"aliases": [
77
"CVE-2015-10145"
88
],
99
"details": "Gargoyle router management utility versions 1.5.x contain an authenticated OS command execution vulnerability in /utility/run_commands.sh. The application fails to properly restrict or validate input supplied via the 'commands' parameter, allowing an authenticated attacker to execute arbitrary shell commands on the underlying system. Successful exploitation may result in full compromise of the device, including unauthorized access to system files and execution of attacker-controlled commands.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/12/GHSA-4qpp-gxm3-h9vw/GHSA-4qpp-gxm3-h9vw.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4qpp-gxm3-h9vw",
4-
"modified": "2026-01-29T12:30:25Z",
4+
"modified": "2026-01-29T18:31:31Z",
55
"published": "2025-12-11T15:30:32Z",
66
"aliases": [
77
"CVE-2025-14523"
@@ -27,6 +27,10 @@
2727
"type": "WEB",
2828
"url": "https://access.redhat.com/security/cve/CVE-2025-14523"
2929
},
30+
{
31+
"type": "WEB",
32+
"url": "https://access.redhat.com/errata/RHSA-2026:1572"
33+
},
3034
{
3135
"type": "WEB",
3236
"url": "https://access.redhat.com/errata/RHSA-2026:1571"
@@ -35,6 +39,10 @@
3539
"type": "WEB",
3640
"url": "https://access.redhat.com/errata/RHSA-2026:1570"
3741
},
42+
{
43+
"type": "WEB",
44+
"url": "https://access.redhat.com/errata/RHSA-2026:1569"
45+
},
3846
{
3947
"type": "WEB",
4048
"url": "https://access.redhat.com/errata/RHSA-2026:1509"

advisories/unreviewed/2025/12/GHSA-f5cx-j2cw-pgfg/GHSA-f5cx-j2cw-pgfg.json

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f5cx-j2cw-pgfg",
4-
"modified": "2026-01-28T18:30:37Z",
4+
"modified": "2026-01-29T18:31:31Z",
55
"published": "2025-12-18T21:31:42Z",
66
"aliases": [
77
"CVE-2025-56157"
@@ -19,6 +19,18 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-56157"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/langgenius/dify/issues/15285"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/langgenius/dify/pull/15286"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/langgenius/dify/pull/15286.diff"
33+
},
2234
{
2335
"type": "WEB",
2436
"url": "https://gist.github.com/Cristliu/216ddbadaf3258498c93d408683ecabd"

0 commit comments

Comments
 (0)