Skip to content

File tree

11 files changed

+334
-6
lines changed

11 files changed

+334
-6
lines changed

advisories/unreviewed/2025/04/GHSA-xmgf-j324-j5xq/GHSA-xmgf-j324-j5xq.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xmgf-j324-j5xq",
4-
"modified": "2026-01-11T18:30:27Z",
4+
"modified": "2026-01-17T18:30:19Z",
55
"published": "2025-04-16T15:34:45Z",
66
"aliases": [
77
"CVE-2025-22121"
@@ -34,6 +34,10 @@
3434
{
3535
"type": "WEB",
3636
"url": "https://git.kernel.org/stable/c/5701875f9609b000d91351eaa6bfd97fe2f157f4"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://git.kernel.org/stable/c/c000a8a9b5343a5ef867df173c6349672dacbd0f"
3741
}
3842
],
3943
"database_specific": {

advisories/unreviewed/2025/05/GHSA-jc2j-hqm3-7764/GHSA-jc2j-hqm3-7764.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jc2j-hqm3-7764",
4-
"modified": "2025-11-10T18:30:31Z",
4+
"modified": "2026-01-17T18:30:19Z",
55
"published": "2025-05-08T09:30:25Z",
66
"aliases": [
77
"CVE-2025-37822"
@@ -23,6 +23,10 @@
2323
"type": "WEB",
2424
"url": "https://git.kernel.org/stable/c/1dbb95a36499374c51b47ee8ae258a8862c20978"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://git.kernel.org/stable/c/77c956152a3a7c7a18b68f3654f70565b2181d03"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://git.kernel.org/stable/c/7d1d19a11cfbfd8bae1d89cc010b2cc397cd0c48"

advisories/unreviewed/2025/11/GHSA-f2w5-mmwp-c76h/GHSA-f2w5-mmwp-c76h.json

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f2w5-mmwp-c76h",
4-
"modified": "2025-11-12T12:30:27Z",
4+
"modified": "2026-01-17T18:30:19Z",
55
"published": "2025-11-12T12:30:27Z",
66
"aliases": [
77
"CVE-2025-40149"
@@ -14,10 +14,22 @@
1414
"type": "ADVISORY",
1515
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40149"
1616
},
17+
{
18+
"type": "WEB",
19+
"url": "https://git.kernel.org/stable/c/13159c7125636371543a82cb7bbae00ab36730cc"
20+
},
1721
{
1822
"type": "WEB",
1923
"url": "https://git.kernel.org/stable/c/c65f27b9c3be2269918e1cbad6d8884741f835c5"
2024
},
25+
{
26+
"type": "WEB",
27+
"url": "https://git.kernel.org/stable/c/e37ca0092ddace60833790b4ad7a390408fb1be9"
28+
},
29+
{
30+
"type": "WEB",
31+
"url": "https://git.kernel.org/stable/c/f09cd209359a23f88d4f3fa3d2379d057027e53c"
32+
},
2133
{
2234
"type": "WEB",
2335
"url": "https://git.kernel.org/stable/c/feb474ddbf26b51f462ae2e60a12013bdcfc5407"

advisories/unreviewed/2025/12/GHSA-qhqr-mc3h-hmjp/GHSA-qhqr-mc3h-hmjp.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qhqr-mc3h-hmjp",
4-
"modified": "2025-12-16T15:30:45Z",
4+
"modified": "2026-01-17T18:30:19Z",
55
"published": "2025-12-16T15:30:45Z",
66
"aliases": [
77
"CVE-2025-68211"
@@ -14,10 +14,18 @@
1414
"type": "ADVISORY",
1515
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68211"
1616
},
17+
{
18+
"type": "WEB",
19+
"url": "https://git.kernel.org/stable/c/67137b715b7db28d82e4ed07a7092c2fa6ba7adb"
20+
},
1721
{
1822
"type": "WEB",
1923
"url": "https://git.kernel.org/stable/c/74f78421c925b6d17695566f0c5941de57fd44b3"
2024
},
25+
{
26+
"type": "WEB",
27+
"url": "https://git.kernel.org/stable/c/9c2f8a9b68024e5ebb4813665845ec0a95f2eac3"
28+
},
2129
{
2230
"type": "WEB",
2331
"url": "https://git.kernel.org/stable/c/f5548c318d6520d4fa3c5ed6003eeb710763cbc5"
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-27fq-8xxm-gqgw",
4+
"modified": "2026-01-17T18:30:19Z",
5+
"published": "2026-01-17T18:30:19Z",
6+
"aliases": [
7+
"CVE-2025-15532"
8+
],
9+
"details": "A security flaw has been discovered in Open5GS up to 2.7.5. This issue affects some unknown processing of the component Timer Handler. The manipulation results in resource consumption. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The patch is identified as c7c131f8d2cb1195ada5e0e691b6868ebcd8a845. It is best practice to apply a patch to resolve this issue.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15532"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/open5gs/open5gs/issues/4220"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/open5gs/open5gs/issues/4220#issue-3766066853"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://github.com/open5gs/open5gs/issues/4221"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://github.com/open5gs/open5gs/commit/c7c131f8d2cb1195ada5e0e691b6868ebcd8a845"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?ctiid.341599"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://vuldb.com/?id.341599"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://vuldb.com/?submit.729354"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://vuldb.com/?submit.729357"
57+
}
58+
],
59+
"database_specific": {
60+
"cwe_ids": [
61+
"CWE-400"
62+
],
63+
"severity": "MODERATE",
64+
"github_reviewed": false,
65+
"github_reviewed_at": null,
66+
"nvd_published_at": "2026-01-17T17:15:47Z"
67+
}
68+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2m9v-rwcf-g57m",
4+
"modified": "2026-01-17T18:30:20Z",
5+
"published": "2026-01-17T18:30:20Z",
6+
"aliases": [
7+
"CVE-2026-1049"
8+
],
9+
"details": "A security vulnerability has been detected in LigeroSmart up to 6.1.26. The affected element is an unknown function of the file /otrs/index.pl. Such manipulation of the argument TicketID leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1049"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/LigeroSmart/ligerosmart/issues/280"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/LigeroSmart/ligerosmart/issues/280#issue-3776580352"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.341601"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.341601"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.729402"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-79"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2026-01-17T18:15:48Z"
55+
}
56+
}

advisories/unreviewed/2026/01/GHSA-2wfq-pvgx-w5wx/GHSA-2wfq-pvgx-w5wx.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2wfq-pvgx-w5wx",
4-
"modified": "2026-01-13T18:31:04Z",
4+
"modified": "2026-01-17T18:30:19Z",
55
"published": "2026-01-13T18:31:03Z",
66
"aliases": [
77
"CVE-2025-68792"
@@ -18,6 +18,10 @@
1818
"type": "WEB",
1919
"url": "https://git.kernel.org/stable/c/04a3aa6e8c5f878cc51a8a1c90b6d3c54079bc43"
2020
},
21+
{
22+
"type": "WEB",
23+
"url": "https://git.kernel.org/stable/c/47e676ce4d68f461dfcab906f6aeb254f7276deb"
24+
},
2125
{
2226
"type": "WEB",
2327
"url": "https://git.kernel.org/stable/c/6e9722e9a7bfe1bbad649937c811076acf86e1fd"
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-359g-wg43-pfv8",
4+
"modified": "2026-01-17T18:30:19Z",
5+
"published": "2026-01-17T18:30:19Z",
6+
"aliases": [
7+
"CVE-2025-15531"
8+
],
9+
"details": "A vulnerability was identified in Open5GS up to 2.7.5. This vulnerability affects the function sgwc_bearer_add of the file src/sgwc/context.c. The manipulation leads to reachable assertion. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. The issue report is flagged as already-fixed.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15531"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/open5gs/open5gs/issues/4233"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/open5gs/open5gs/issues/4233#issue-3776216182"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.341598"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.341598"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.729339"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-617"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2026-01-17T16:16:05Z"
55+
}
56+
}

advisories/unreviewed/2026/01/GHSA-69qx-3mcm-9wpc/GHSA-69qx-3mcm-9wpc.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-69qx-3mcm-9wpc",
4-
"modified": "2026-01-13T18:31:04Z",
4+
"modified": "2026-01-17T18:30:19Z",
55
"published": "2026-01-13T18:31:04Z",
66
"aliases": [
77
"CVE-2025-68803"
@@ -18,6 +18,10 @@
1818
"type": "WEB",
1919
"url": "https://git.kernel.org/stable/c/214b396480061cbc8b16f2c518b2add7fbfa5192"
2020
},
21+
{
22+
"type": "WEB",
23+
"url": "https://git.kernel.org/stable/c/381261f24f4e4b41521c0e5ef5cc0b9a786a9862"
24+
},
2125
{
2226
"type": "WEB",
2327
"url": "https://git.kernel.org/stable/c/60dbdef2ebc2317266a385e4debdb1bb0e57afe1"
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-jvvr-947r-5jcr",
4+
"modified": "2026-01-17T18:30:19Z",
5+
"published": "2026-01-17T18:30:19Z",
6+
"aliases": [
7+
"CVE-2026-1048"
8+
],
9+
"details": "A weakness has been identified in LigeroSmart up to 6.1.26. Impacted is an unknown function of the file /otrs/index.pl?Action=AgentTicketZoom. This manipulation of the argument TicketID causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1048"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/LigeroSmart/ligerosmart/issues/279"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/LigeroSmart/ligerosmart/issues/279#issue-3775562926"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.341600"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.341600"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.729399"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-79"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2026-01-17T17:15:48Z"
55+
}
56+
}

0 commit comments

Comments
 (0)