Skip to content

File tree

advisories/unreviewed/2022/12/GHSA-qhw8-gxv4-588x/GHSA-qhw8-gxv4-588x.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,8 @@
4646
],
4747
"database_specific": {
4848
"cwe_ids": [
49-
"CWE-119"
49+
"CWE-119",
50+
"CWE-20"
5051
],
5152
"severity": "HIGH",
5253
"github_reviewed": false,

advisories/unreviewed/2024/04/GHSA-5j47-gwc2-fhfc/GHSA-5j47-gwc2-fhfc.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@
2525
}
2626
],
2727
"database_specific": {
28-
"cwe_ids": [],
28+
"cwe_ids": [
29+
"CWE-79"
30+
],
2931
"severity": "MODERATE",
3032
"github_reviewed": false,
3133
"github_reviewed_at": null,
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3c6p-c4v9-m5mw",
4+
"modified": "2025-04-18T21:31:20Z",
5+
"published": "2025-04-18T21:31:20Z",
6+
"aliases": [
7+
"CVE-2024-57493"
8+
],
9+
"details": "An issue in redoxOS relibc before commit 98aa4ea5 allows a local attacker to cause a denial of service via the setsockopt function.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57493"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/Marsman1996/pocs/tree/master/redox/CVE-2024-57493"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://gitlab.redox-os.org/redox-os/relibc/-/issues/201"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://gitlab.redox-os.org/redox-os/relibc/-/merge_requests/566"
28+
}
29+
],
30+
"database_specific": {
31+
"cwe_ids": [],
32+
"severity": null,
33+
"github_reviewed": false,
34+
"github_reviewed_at": null,
35+
"nvd_published_at": "2025-04-18T20:15:15Z"
36+
}
37+
}
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3h49-gmxg-3c7g",
4+
"modified": "2025-04-18T21:31:20Z",
5+
"published": "2025-04-18T21:31:20Z",
6+
"aliases": [
7+
"CVE-2025-25983"
8+
],
9+
"details": "An issue in Macro-video Technologies Co.,Ltd V380 Pro android application 2.1.44 and V380 Pro android application 2.1.64 allows an attacker to obtain sensitive information via the QE code based sharing component.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25983"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/vladko312/Research_v380_IP_camera"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/vladko312/Research_v380_IP_camera/blob/main/CVE-2025-25983.md"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-257"
34+
],
35+
"severity": "LOW",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2025-04-18T20:15:16Z"
39+
}
40+
}
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3xfr-5qpm-hvr4",
4+
"modified": "2025-04-18T21:31:21Z",
5+
"published": "2025-04-18T21:31:21Z",
6+
"aliases": [
7+
"CVE-2024-53591"
8+
],
9+
"details": "An issue in the login page of Seclore v3.27.5.0 allows attackers to bypass authentication via a brute force attack.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53591"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/aljoharasubaie/CVE-2024-53591"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [],
24+
"severity": null,
25+
"github_reviewed": false,
26+
"github_reviewed_at": null,
27+
"nvd_published_at": "2025-04-18T21:15:43Z"
28+
}
29+
}
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-445m-27cf-gr3x",
4+
"modified": "2025-04-18T21:31:20Z",
5+
"published": "2025-04-18T21:31:20Z",
6+
"aliases": [
7+
"CVE-2025-28197"
8+
],
9+
"details": "Crawl4AI <=0.4.247 is vulnerable to SSRF in /crawl4ai/async_dispatcher.py.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-28197"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://gist.github.com/AndrewDzzz/f49e79b09ce0643ee1fc2a829e8875e0"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [],
24+
"severity": null,
25+
"github_reviewed": false,
26+
"github_reviewed_at": null,
27+
"nvd_published_at": "2025-04-18T20:15:16Z"
28+
}
29+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4w9g-4h2x-7qxq",
4+
"modified": "2025-04-18T21:31:21Z",
5+
"published": "2025-04-18T21:31:21Z",
6+
"aliases": [
7+
"CVE-2025-43903"
8+
],
9+
"details": "NSSCryptoSignBackend.cc in Poppler before 25.04.0 does not verify the adbe.pkcs7.sha1 signatures on documents, resulting in potential signature forgeries.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43903"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://gitlab.freedesktop.org/poppler/poppler/-/commit/f1b9c830f145a0042e853d6462b2f9ca4016c669"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-347"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-04-18T21:15:44Z"
35+
}
36+
}
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-cf79-3x47-jx24",
4+
"modified": "2025-04-18T21:31:19Z",
5+
"published": "2025-04-18T21:31:19Z",
6+
"aliases": [
7+
"CVE-2025-28355"
8+
],
9+
"details": "Volmarg Personal Management System 1.4.65 is vulnerable to Cross Site Request Forgery (CSRF) allowing attackers to execute arbitrary code and obtain sensitive information via the SameSite cookie attribute defaults value set to none",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-28355"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/Volmarg/personal-management-system/issues/149"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/Volmarg/personal-management-system"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/abbisQQ/CVE-2025-28355/tree/main"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-352"
38+
],
39+
"severity": "MODERATE",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2025-04-18T19:15:45Z"
43+
}
44+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-cjfc-vqf6-fvgw",
4+
"modified": "2025-04-18T21:31:19Z",
5+
"published": "2025-04-18T21:31:19Z",
6+
"aliases": [
7+
"CVE-2025-24914"
8+
],
9+
"details": "When installing Nessus to a non-default location on a Windows host, Nessus versions prior to 10.8.4 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the non-default installation location. - CVE-2025-24914",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24914"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.tenable.com/security/tns-2025-05"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-276"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-04-18T19:15:45Z"
35+
}
36+
}

advisories/unreviewed/2025/04/GHSA-fgvj-q3hx-cpwr/GHSA-fgvj-q3hx-cpwr.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fgvj-q3hx-cpwr",
4-
"modified": "2025-04-18T15:31:37Z",
4+
"modified": "2025-04-18T21:31:19Z",
55
"published": "2025-04-18T03:31:22Z",
66
"aliases": [
77
"CVE-2025-25427"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://github.com/slin99/2025-25427/blob/master/readme.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.tp-link.com/en/support/download/tl-wr841n/#Firmware"
2933
}
3034
],
3135
"database_specific": {

0 commit comments

Comments
 (0)