Skip to content

Commit 7e3ef51

Browse files
1 parent dc04a75 commit 7e3ef51

6 files changed

Lines changed: 277 additions & 1 deletion

File tree

advisories/unreviewed/2025/05/GHSA-wv79-2fc4-v4hj/GHSA-wv79-2fc4-v4hj.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wv79-2fc4-v4hj",
4-
"modified": "2025-05-27T21:32:17Z",
4+
"modified": "2025-06-16T00:31:38Z",
55
"published": "2025-05-27T21:32:17Z",
66
"aliases": [
77
"CVE-2025-5222"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368600"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://lists.debian.org/debian-lts-announce/2025/06/msg00015.html"
2933
}
3034
],
3135
"database_specific": {
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6gj4-wp95-h55h",
4+
"modified": "2025-06-16T00:31:39Z",
5+
"published": "2025-06-16T00:31:39Z",
6+
"aliases": [
7+
"CVE-2025-6093"
8+
],
9+
"details": "A vulnerability classified as critical was found in uYanki board-stm32f103rc-berial up to 84daed541609cb7b46854cc6672a275d1007e295. This vulnerability affects the function heartrate1_i2c_hal_write of the file 7.Example/hal/i2c/max30100/Manual/demo2/2/heartrate1_hal.c. The manipulation of the argument num leads to stack-based buffer overflow. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6093"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/uYanki/board-stm32f103rc-berial/issues/3"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.312562"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.312562"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.588106"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-119"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2025-06-15T22:15:19Z"
51+
}
52+
}
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-7935-596x-4p9v",
4+
"modified": "2025-06-16T00:31:39Z",
5+
"published": "2025-06-16T00:31:39Z",
6+
"aliases": [
7+
"CVE-2025-6095"
8+
],
9+
"details": "A vulnerability, which was classified as critical, was found in codesiddhant Jasmin Ransomware 1.0.1. Affected is an unknown function of the file /checklogin.php. The manipulation of the argument username/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6095"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/YZS17/CVE/blob/main/Jasmin-Ransomware/sqli_password.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/YZS17/CVE/blob/main/Jasmin-Ransomware/sqli_username.md"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.312564"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.312564"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.588833"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://vuldb.com/?submit.588834"
49+
}
50+
],
51+
"database_specific": {
52+
"cwe_ids": [
53+
"CWE-74"
54+
],
55+
"severity": "MODERATE",
56+
"github_reviewed": false,
57+
"github_reviewed_at": null,
58+
"nvd_published_at": "2025-06-15T23:15:18Z"
59+
}
60+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-cq5q-mc33-6v8q",
4+
"modified": "2025-06-16T00:31:39Z",
5+
"published": "2025-06-16T00:31:39Z",
6+
"aliases": [
7+
"CVE-2025-6096"
8+
],
9+
"details": "A vulnerability has been found in codesiddhant Jasmin Ransomware up to 1.0.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /dashboard.php. The manipulation of the argument Search leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6096"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/YZS17/CVE/blob/main/Jasmin-Ransomware/sqli_search.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.312565"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.312565"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.588836"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-74"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2025-06-16T00:15:18Z"
51+
}
52+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-gcq5-qc75-mh9g",
4+
"modified": "2025-06-16T00:31:39Z",
5+
"published": "2025-06-16T00:31:38Z",
6+
"aliases": [
7+
"CVE-2025-6094"
8+
],
9+
"details": "A vulnerability, which was classified as critical, has been found in FoxCMS up to 1.2.5. This issue affects the function batchCope of the file app/admin/controller/Download.php. The manipulation of the argument ids leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6094"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/FSRM1/CVE/blob/main/foxcms_%E5%90%8E%E5%8F%B0sql%E6%B3%A8%E5%85%A5.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.312563"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.312563"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.588807"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-74"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2025-06-15T23:15:18Z"
51+
}
52+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-w45m-h9p7-x2wf",
4+
"modified": "2025-06-16T00:31:39Z",
5+
"published": "2025-06-16T00:31:39Z",
6+
"aliases": [
7+
"CVE-2025-6097"
8+
],
9+
"details": "A vulnerability was found in UTT 进取 750W up to 5.0 and classified as critical. Affected by this issue is the function formDefineManagement of the file /goform/setSysAdm of the component Administrator Password Handler. The manipulation of the argument passwd1 leads to unverified password change. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6097"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/pfwqdxwdd/cve/blob/main/6.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/pfwqdxwdd/cve/blob/main/6.md#poc"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.312566"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.312566"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.589425"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-620"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2025-06-16T00:15:18Z"
55+
}
56+
}

0 commit comments

Comments
 (0)