Skip to content

Commit d5cdd89

Browse files
1 parent 191cddd commit d5cdd89

2 files changed

Lines changed: 61 additions & 9 deletions

File tree

advisories/github-reviewed/2025/06/GHSA-ww28-4m4v-cq4j/GHSA-ww28-4m4v-cq4j.json

Lines changed: 33 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-ww28-4m4v-cq4j",
4-
"modified": "2025-06-11T17:37:45Z",
4+
"modified": "2026-01-20T18:50:59Z",
55
"published": "2025-06-09T18:32:17Z",
66
"aliases": [
77
"CVE-2025-49652"
@@ -28,7 +28,26 @@
2828
"introduced": "0"
2929
},
3030
{
31-
"last_affected": "25.3.3"
31+
"fixed": "25.15.6"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "PyPI",
40+
"name": "backend.ai"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "25.16.0rc1"
48+
},
49+
{
50+
"fixed": "25.19.0rc1"
3251
}
3352
]
3453
}
@@ -40,6 +59,18 @@
4059
"type": "ADVISORY",
4160
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49652"
4261
},
62+
{
63+
"type": "WEB",
64+
"url": "https://github.com/lablup/backend.ai/commit/37fc8f70f9bad2dd01fe2e288f9006e96f9914ed"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://github.com/lablup/backend.ai/commit/b6d3ddd9e285a7ce59722a37585b9298681eb82f"
69+
},
70+
{
71+
"type": "WEB",
72+
"url": "https://github.com/lablup/backend.ai/commit/d7704f506e319acff205d91bfca6e2ca92939983"
73+
},
4374
{
4475
"type": "PACKAGE",
4576
"url": "https://github.com/lablup/backend.ai"

advisories/unreviewed/2026/01/GHSA-vhcx-7rpg-hp39/GHSA-vhcx-7rpg-hp39.json renamed to advisories/github-reviewed/2026/01/GHSA-vhcx-7rpg-hp39/GHSA-vhcx-7rpg-hp39.json

Lines changed: 28 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vhcx-7rpg-hp39",
4-
"modified": "2026-01-17T18:30:20Z",
4+
"modified": "2026-01-20T18:51:19Z",
55
"published": "2026-01-17T18:30:20Z",
66
"aliases": [
77
"CVE-2026-1050"
88
],
9+
"summary": "risesoft-y9 Digital-Infrastructure has a SQL injection vulnerability",
910
"details": "A flaw has been found in risesoft-y9 Digital-Infrastructure up to 9.6.7. This affects an unknown function of the file source-code/src/main/java/net/risesoft/util/Y9PlatformUtil.java of the component REST Authenticate Endpoint. Executing a manipulation can lead to sql injection. The attack can be launched remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.",
1011
"severity": [
1112
{
@@ -14,10 +15,30 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "Maven",
25+
"name": "net.risesoft:risenet-y9boot-support-platform-service"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"last_affected": "9.7.0-M5"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
@@ -28,8 +49,8 @@
2849
"url": "https://github.com/risesoft-y9/Digital-Infrastructure/issues/2"
2950
},
3051
{
31-
"type": "WEB",
32-
"url": "https://github.com/risesoft-y9/Digital-Infrastructure/issues/2#issue-3777863959"
52+
"type": "PACKAGE",
53+
"url": "https://github.com/risesoft-y9/Digital-Infrastructure"
3354
},
3455
{
3556
"type": "WEB",
@@ -49,8 +70,8 @@
4970
"CWE-74"
5071
],
5172
"severity": "MODERATE",
52-
"github_reviewed": false,
53-
"github_reviewed_at": null,
73+
"github_reviewed": true,
74+
"github_reviewed_at": "2026-01-20T18:51:19Z",
5475
"nvd_published_at": "2026-01-17T18:15:48Z"
5576
}
5677
}

0 commit comments

Comments
 (0)