Skip to content

Commit bcf2445

Browse files
Advisory Database Sync
1 parent 7fccdfe commit bcf2445

52 files changed

Lines changed: 1318 additions & 45 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/unreviewed/2025/10/GHSA-7p24-rq5q-3rrv/GHSA-7p24-rq5q-3rrv.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7p24-rq5q-3rrv",
4-
"modified": "2025-10-16T18:30:23Z",
4+
"modified": "2026-02-03T00:30:16Z",
55
"published": "2025-10-16T15:30:43Z",
66
"aliases": [
77
"CVE-2025-22381"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://github.com/bugdotexe/Vulnerability-Research/tree/main/CVE-2025-22381"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/pescada-dev/CVE-2025-22381"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v6c5-9mp4-mwq4",
4-
"modified": "2026-02-02T12:31:14Z",
4+
"modified": "2026-02-03T00:30:17Z",
55
"published": "2025-11-26T15:34:12Z",
66
"aliases": [
77
"CVE-2025-13601"
@@ -35,6 +35,10 @@
3535
"type": "WEB",
3636
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
3737
},
38+
{
39+
"type": "WEB",
40+
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
41+
},
3842
{
3943
"type": "WEB",
4044
"url": "https://access.redhat.com/errata/RHSA-2026:1652"

advisories/unreviewed/2026/01/GHSA-39h2-3mq3-959g/GHSA-39h2-3mq3-959g.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-39h2-3mq3-959g",
4-
"modified": "2026-01-26T15:30:49Z",
4+
"modified": "2026-02-03T00:30:17Z",
55
"published": "2026-01-21T00:31:42Z",
66
"aliases": [
77
"CVE-2025-11468"
@@ -35,6 +35,10 @@
3535
"type": "WEB",
3636
"url": "https://github.com/python/cpython/commit/61614a5e5056e4f61ced65008d4576f3df34acb6"
3737
},
38+
{
39+
"type": "WEB",
40+
"url": "https://github.com/python/cpython/commit/a76e4cd62dd68e7cbe86e37e6ed988495a646b66"
41+
},
3842
{
3943
"type": "WEB",
4044
"url": "https://github.com/python/cpython/commit/e9970f077240c7c670e8a6fc6662f2b30d3b6ad0"

advisories/unreviewed/2026/01/GHSA-4wp9-cf5h-v2g5/GHSA-4wp9-cf5h-v2g5.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4wp9-cf5h-v2g5",
4-
"modified": "2026-01-28T18:30:41Z",
4+
"modified": "2026-02-03T00:30:17Z",
55
"published": "2026-01-21T00:31:43Z",
66
"aliases": [
77
"CVE-2026-21962"
@@ -27,6 +27,10 @@
2727
"type": "WEB",
2828
"url": "https://github.com/Ashwesker/Ashwesker-CVE-2026-21962"
2929
},
30+
{
31+
"type": "WEB",
32+
"url": "https://web.archive.org/web/20260129165916/https://github.com/Ashwesker/Ashwesker-CVE-2026-21962/issues/1"
33+
},
3034
{
3135
"type": "WEB",
3236
"url": "https://www.oracle.com/security-alerts/cpujan2026.html"

advisories/unreviewed/2026/01/GHSA-mr6c-6hx8-737r/GHSA-mr6c-6hx8-737r.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mr6c-6hx8-737r",
4-
"modified": "2026-01-29T21:30:30Z",
4+
"modified": "2026-02-03T00:30:17Z",
55
"published": "2026-01-29T21:30:30Z",
66
"aliases": [
77
"CVE-2025-63649"
88
],
99
"details": "An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_server/mk_http_parser.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted POST request to the server.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -24,8 +29,10 @@
2429
}
2530
],
2631
"database_specific": {
27-
"cwe_ids": [],
28-
"severity": null,
32+
"cwe_ids": [
33+
"CWE-125"
34+
],
35+
"severity": "HIGH",
2936
"github_reviewed": false,
3037
"github_reviewed_at": null,
3138
"nvd_published_at": "2026-01-29T20:16:08Z"

advisories/unreviewed/2026/01/GHSA-vmpg-m2mf-cwrv/GHSA-vmpg-m2mf-cwrv.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,8 @@
3030
],
3131
"database_specific": {
3232
"cwe_ids": [
33-
"CWE-120"
33+
"CWE-120",
34+
"CWE-20"
3435
],
3536
"severity": "HIGH",
3637
"github_reviewed": false,
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2rh6-mp5g-j2gf",
4+
"modified": "2026-02-03T00:30:18Z",
5+
"published": "2026-02-03T00:30:18Z",
6+
"aliases": [
7+
"CVE-2025-36436"
8+
],
9+
"details": "IBM Cloud Pak for Business Automation 25.0.0 through 25.0.0 Interim Fix 002, 24.0.1 through 24.0.1 Interim Fix 005, and 24.0.0 through 24.0.0 Interim Fix 007  is vulnerable to stored cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-36436"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.ibm.com/support/pages/node/7259318"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-79"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-02-02T23:15:59Z"
35+
}
36+
}

advisories/unreviewed/2026/02/GHSA-2rrf-rvr2-f97v/GHSA-2rrf-rvr2-f97v.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2rrf-rvr2-f97v",
4-
"modified": "2026-02-02T09:30:31Z",
4+
"modified": "2026-02-03T00:30:18Z",
55
"published": "2026-02-02T09:30:31Z",
66
"aliases": [
77
"CVE-2026-20403"
88
],
99
"details": "In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689254 (Note: For N15 and NR16) / MOLY01689259 (Note: For NR17 and NR17R); Issue ID: MSV-4843.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-787"
2530
],
26-
"severity": null,
31+
"severity": "HIGH",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-02-02T09:15:54Z"
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-33j4-gghf-cv63",
4+
"modified": "2026-02-03T00:30:18Z",
5+
"published": "2026-02-03T00:30:18Z",
6+
"aliases": [
7+
"CVE-2025-12679"
8+
],
9+
"details": "A vulnerability in Brocade SANnav before 2.4.0b prints the \nPassword-Based Encryption (PBE) key in plaintext in the system audit log\n file. The vulnerability could allow a remote authenticated attacker \nwith access to the audit logs to access the pbe key.\n\nNote: The vulnerability is only triggered during a migration and not \nin a new installation. The system audit logs are accessible only to a \nprivileged user on the server.\n\n\n\nThese audit logs are the local server VM’s audit logs and are not \ncontrolled by SANnav. These logs are only visible to the server admin of\n the host server and are not visible to the SANnav admin or any SANnav \nuser.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12679"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36845"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-312"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-02-02T23:15:58Z"
35+
}
36+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-39fr-2fph-j42r",
4+
"modified": "2026-02-03T00:30:19Z",
5+
"published": "2026-02-03T00:30:19Z",
6+
"aliases": [
7+
"CVE-2025-61640"
8+
],
9+
"details": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program files resources/src/mediawiki.Rcfilters/ui/RclToOrFromWidget.Js.\n\nThis issue affects MediaWiki: from * before 1.39.14, 1.43.4, 1.44.1.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61640"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://phabricator.wikimedia.org/T402075"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-79"
30+
],
31+
"severity": "LOW",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-02-03T00:16:09Z"
35+
}
36+
}

0 commit comments

Comments
 (0)