Skip to content

Commit 302422c

Browse files
1 parent 76d43c7 commit 302422c

File tree

3 files changed

+122
-10
lines changed

3 files changed

+122
-10
lines changed
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-58xc-hpvq-8473",
4+
"modified": "2025-05-06T20:00:17Z",
5+
"published": "2025-05-06T20:00:17Z",
6+
"aliases": [],
7+
"summary": "Redox UEFI Safe API can cause heap-buffer-overflow",
8+
"details": "ffi::nstr() should be marked unsafe, since a pointer to a buffer without a trailing 0 value will cause a heap buffer overflow.",
9+
"severity": [],
10+
"affected": [
11+
{
12+
"package": {
13+
"ecosystem": "crates.io",
14+
"name": "redox_uefi_std"
15+
},
16+
"ranges": [
17+
{
18+
"type": "ECOSYSTEM",
19+
"events": [
20+
{
21+
"introduced": "0.1.8"
22+
},
23+
{
24+
"fixed": "0.1.14"
25+
}
26+
]
27+
}
28+
]
29+
}
30+
],
31+
"references": [
32+
{
33+
"type": "PACKAGE",
34+
"url": "https://gitlab.redox-os.org/redox-os/uefi"
35+
},
36+
{
37+
"type": "WEB",
38+
"url": "https://gitlab.redox-os.org/redox-os/uefi/-/commit/b711d47e815665b0ec8949e39292ad8e3fdd0756"
39+
},
40+
{
41+
"type": "WEB",
42+
"url": "https://rustsec.org/advisories/RUSTSEC-2025-0032.html"
43+
}
44+
],
45+
"database_specific": {
46+
"cwe_ids": [
47+
"CWE-122"
48+
],
49+
"severity": "LOW",
50+
"github_reviewed": true,
51+
"github_reviewed_at": "2025-05-06T20:00:17Z",
52+
"nvd_published_at": null
53+
}
54+
}

advisories/unreviewed/2025/05/GHSA-8w8f-h4cm-c4pg/GHSA-8w8f-h4cm-c4pg.json renamed to advisories/github-reviewed/2025/05/GHSA-8w8f-h4cm-c4pg/GHSA-8w8f-h4cm-c4pg.json

Lines changed: 34 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8w8f-h4cm-c4pg",
4-
"modified": "2025-05-02T18:31:38Z",
4+
"modified": "2025-05-06T19:59:54Z",
55
"published": "2025-05-02T18:31:38Z",
66
"aliases": [
77
"CVE-2025-4210"
88
],
9+
"summary": "Casdoor SCIM User Creation Endpoint scim.go HandleScim authorization in github.com/casdoor/casdoor",
910
"details": "A vulnerability classified as critical was found in Casdoor up to 1.811.0. This vulnerability affects the function HandleScim of the file controllers/scim.go of the component SCIM User Creation Endpoint. The manipulation leads to authorization bypass. The attack can be initiated remotely. Upgrading to version 1.812.0 is able to address this issue. The name of the patch is 3d12ac8dc2282369296c3386815c00a06c6a92fe. It is recommended to upgrade the affected component.",
1011
"severity": [
1112
{
@@ -14,10 +15,30 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "Go",
25+
"name": "github.com/casdoor/casdoor"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"fixed": "1.812.0"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
@@ -27,10 +48,18 @@
2748
"type": "WEB",
2849
"url": "https://github.com/casdoor/casdoor/commit/3d12ac8dc2282369296c3386815c00a06c6a92fe"
2950
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/casdoor/casdoor"
54+
},
3055
{
3156
"type": "WEB",
3257
"url": "https://github.com/casdoor/casdoor/releases/tag/v1.812.0"
3358
},
59+
{
60+
"type": "WEB",
61+
"url": "https://pkg.go.dev/vuln/GO-2024-3661"
62+
},
3463
{
3564
"type": "WEB",
3665
"url": "https://vuldb.com/?ctiid.307180"
@@ -49,8 +78,8 @@
4978
"CWE-285"
5079
],
5180
"severity": "MODERATE",
52-
"github_reviewed": false,
53-
"github_reviewed_at": null,
81+
"github_reviewed": true,
82+
"github_reviewed_at": "2025-05-06T19:59:54Z",
5483
"nvd_published_at": "2025-05-02T16:15:36Z"
5584
}
5685
}
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,53 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-p2f8-vq4r-gqg3",
4-
"modified": "2025-05-06T18:30:39Z",
4+
"modified": "2025-05-06T20:00:44Z",
55
"published": "2025-05-06T18:30:39Z",
66
"aliases": [
77
"CVE-2025-4388"
88
],
9+
"summary": "Liferay Portal Reflected XSS in marketplace-app-manager-web",
910
"details": "A reflected cross-site scripting (XSS) vulnerability in the Liferay Portal 7.4.0 through 7.4.3.131, and Liferay DXP 2024.Q4.0 through 2024.Q4.5, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.12, 7.4 GA through update 92 allows an remote non-authenticated attacker to inject JavaScript into the modules/apps/marketplace/marketplace-app-manager-web.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V4",
13-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "com.liferay:com.liferay.marketplace.app.manager.web"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "5.0.50"
32+
}
33+
]
34+
}
35+
]
1436
}
1537
],
16-
"affected": [],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4388"
2142
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/liferay/liferay-portal/commit/0c3ab8936429a1bc48d915fdd801580de592fd9e"
46+
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/liferay/liferay-portal"
50+
},
2251
{
2352
"type": "WEB",
2453
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-4388"
@@ -29,8 +58,8 @@
2958
"CWE-79"
3059
],
3160
"severity": "MODERATE",
32-
"github_reviewed": false,
33-
"github_reviewed_at": null,
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2025-05-06T20:00:44Z",
3463
"nvd_published_at": "2025-05-06T18:15:39Z"
3564
}
3665
}

0 commit comments

Comments
 (0)