diff --git a/advisories/github-reviewed/2022/05/GHSA-g434-3q2j-hj4r/GHSA-g434-3q2j-hj4r.json b/advisories/github-reviewed/2022/05/GHSA-g434-3q2j-hj4r/GHSA-g434-3q2j-hj4r.json index c3dfdd266fc02..94bc583e3ba08 100644 --- a/advisories/github-reviewed/2022/05/GHSA-g434-3q2j-hj4r/GHSA-g434-3q2j-hj4r.json +++ b/advisories/github-reviewed/2022/05/GHSA-g434-3q2j-hj4r/GHSA-g434-3q2j-hj4r.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-g434-3q2j-hj4r", - "modified": "2023-07-25T21:28:58Z", + "modified": "2025-06-09T12:11:11Z", "published": "2022-05-14T03:08:36Z", "aliases": [ "CVE-2018-12071" @@ -48,9 +48,17 @@ "type": "WEB", "url": "https://github.com/bcit-ci/CodeIgniter/commit/800a20d6c4662d99ae0988b2f8f2238bb8bb29db" }, + { + "type": "PACKAGE", + "url": "https://github.com/bcit-ci/CodeIgniter" + }, { "type": "WEB", "url": "https://web.archive.org/web/20181115214804/https://www.codeigniter.com/user_guide/changelog.html#version-3-1-9" + }, + { + "type": "WEB", + "url": "https://www.codeigniter.com/user_guide/changelog.html" } ], "database_specific": { diff --git a/advisories/github-reviewed/2023/10/GHSA-qppj-fm5r-hxr3/GHSA-qppj-fm5r-hxr3.json b/advisories/github-reviewed/2023/10/GHSA-qppj-fm5r-hxr3/GHSA-qppj-fm5r-hxr3.json index 1a94b6fb0e638..2a071760d5769 100644 --- a/advisories/github-reviewed/2023/10/GHSA-qppj-fm5r-hxr3/GHSA-qppj-fm5r-hxr3.json +++ b/advisories/github-reviewed/2023/10/GHSA-qppj-fm5r-hxr3/GHSA-qppj-fm5r-hxr3.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-qppj-fm5r-hxr3", - "modified": "2025-03-07T21:33:50Z", + "modified": "2025-06-09T12:10:41Z", "published": "2023-10-10T21:28:24Z", "aliases": [ "CVE-2023-44487" @@ -522,11 +522,11 @@ }, { "type": "WEB", - "url": "https://github.com/akka/akka-http/issues/4323" + "url": "https://github.com/dotnet/announcements/issues/277" }, { "type": "WEB", - "url": "https://github.com/dotnet/announcements/issues/277" + "url": "https://github.com/akka/akka-http/issues/4323" }, { "type": "WEB", @@ -652,6 +652,10 @@ "type": "WEB", "url": "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61" }, + { + "type": "WEB", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY" + }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ" @@ -682,11 +686,11 @@ }, { "type": "WEB", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI" + "url": "https://my.f5.com/manage/s/article/K000137106" }, { "type": "WEB", - "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487" + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI" }, { "type": "WEB", @@ -710,7 +714,7 @@ }, { "type": "WEB", - "url": "https://access.redhat.com/security/cve/cve-2023-44487" + "url": "https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html" }, { "type": "WEB", @@ -718,27 +722,27 @@ }, { "type": "WEB", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3" + "url": "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html" }, { "type": "WEB", - "url": "https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html" + "url": "https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html" }, { "type": "WEB", - "url": "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html" + "url": "https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2" }, { "type": "WEB", - "url": "https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487" }, { "type": "WEB", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT" + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3" }, { "type": "WEB", - "url": "https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2" + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT" }, { "type": "WEB", @@ -776,10 +780,6 @@ "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE" }, - { - "type": "WEB", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY" - }, { "type": "WEB", "url": "https://ubuntu.com/security/CVE-2023-44487" @@ -852,10 +852,6 @@ "type": "WEB", "url": "https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause" }, - { - "type": "WEB", - "url": "https://my.f5.com/manage/s/article/K000137106" - }, { "type": "WEB", "url": "https://netty.io/news/2023/10/10/4-1-100-Final.html" @@ -884,6 +880,10 @@ "type": "WEB", "url": "https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected" }, + { + "type": "WEB", + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ" + }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202311-09" @@ -924,6 +924,10 @@ "type": "WEB", "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.81" }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/cve-2023-44487" + }, { "type": "WEB", "url": "https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve" diff --git a/advisories/github-reviewed/2024/08/GHSA-jwhx-xcg6-8xhj/GHSA-jwhx-xcg6-8xhj.json b/advisories/github-reviewed/2024/08/GHSA-jwhx-xcg6-8xhj/GHSA-jwhx-xcg6-8xhj.json index 83aa2a22e6f31..6e613e8ab3a1b 100644 --- a/advisories/github-reviewed/2024/08/GHSA-jwhx-xcg6-8xhj/GHSA-jwhx-xcg6-8xhj.json +++ b/advisories/github-reviewed/2024/08/GHSA-jwhx-xcg6-8xhj/GHSA-jwhx-xcg6-8xhj.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-jwhx-xcg6-8xhj", - "modified": "2024-08-12T16:02:22Z", + "modified": "2025-06-09T12:17:20Z", "published": "2024-08-09T16:49:58Z", "aliases": [ "CVE-2024-42367" @@ -29,7 +29,7 @@ "type": "ECOSYSTEM", "events": [ { - "introduced": "0" + "introduced": "3.10.0b1" }, { "fixed": "3.10.2" diff --git a/advisories/github-reviewed/2025/06/GHSA-62gc-8jr5-x9pm/GHSA-62gc-8jr5-x9pm.json b/advisories/github-reviewed/2025/06/GHSA-62gc-8jr5-x9pm/GHSA-62gc-8jr5-x9pm.json new file mode 100644 index 0000000000000..f2bfcd3ec652f --- /dev/null +++ b/advisories/github-reviewed/2025/06/GHSA-62gc-8jr5-x9pm/GHSA-62gc-8jr5-x9pm.json @@ -0,0 +1,77 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-62gc-8jr5-x9pm", + "modified": "2025-06-09T11:58:45Z", + "published": "2025-06-06T15:30:53Z", + "aliases": [ + "CVE-2025-27531" + ], + "summary": "Apache InLong Deserialization of Untrusted Data Vulnerability", + "details": "Deserialization of Untrusted Data vulnerability in Apache InLong. This issue affects Apache InLong: from 1.13.0 before 2.1.0, this issue would allow an authenticated attacker to read arbitrary files by double writing the param. Users are recommended to upgrade to version 2.1.0, which fixes the issue.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.inlong:inlong-manager" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.13.0" + }, + { + "fixed": "2.1.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27531" + }, + { + "type": "WEB", + "url": "https://github.com/apache/inlong/issues/11585" + }, + { + "type": "WEB", + "url": "https://github.com/apache/inlong/pull/11586" + }, + { + "type": "WEB", + "url": "https://github.com/apache/inlong/commit/ebcd6d3230b73abdc41edb93619be2a26c9b8c97" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/inlong" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/r62lkqrr739wvcb60j6ql6q63rh4bxx5" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2025/02/28/2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-06-09T11:58:45Z", + "nvd_published_at": "2025-06-06T15:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2025/06/GHSA-8j8w-wwqc-x596/GHSA-8j8w-wwqc-x596.json b/advisories/github-reviewed/2025/06/GHSA-8j8w-wwqc-x596/GHSA-8j8w-wwqc-x596.json index 759bd98bdd3d9..88810cbf16a09 100644 --- a/advisories/github-reviewed/2025/06/GHSA-8j8w-wwqc-x596/GHSA-8j8w-wwqc-x596.json +++ b/advisories/github-reviewed/2025/06/GHSA-8j8w-wwqc-x596/GHSA-8j8w-wwqc-x596.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-8j8w-wwqc-x596", - "modified": "2025-06-06T22:17:35Z", + "modified": "2025-06-09T06:30:21Z", "published": "2025-06-02T06:30:32Z", "aliases": [ "CVE-2025-49113" @@ -91,6 +91,10 @@ "type": "WEB", "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.6.11" }, + { + "type": "WEB", + "url": "https://lists.debian.org/debian-lts-announce/2025/06/msg00008.html" + }, { "type": "WEB", "url": "https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10" diff --git a/advisories/unreviewed/2025/06/GHSA-gw97-cqwg-xmh4/GHSA-gw97-cqwg-xmh4.json b/advisories/github-reviewed/2025/06/GHSA-gw97-cqwg-xmh4/GHSA-gw97-cqwg-xmh4.json similarity index 55% rename from advisories/unreviewed/2025/06/GHSA-gw97-cqwg-xmh4/GHSA-gw97-cqwg-xmh4.json rename to advisories/github-reviewed/2025/06/GHSA-gw97-cqwg-xmh4/GHSA-gw97-cqwg-xmh4.json index 979962981ab3f..a783c4ff13b6b 100644 --- a/advisories/unreviewed/2025/06/GHSA-gw97-cqwg-xmh4/GHSA-gw97-cqwg-xmh4.json +++ b/advisories/github-reviewed/2025/06/GHSA-gw97-cqwg-xmh4/GHSA-gw97-cqwg-xmh4.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-gw97-cqwg-xmh4", - "modified": "2025-06-06T18:30:30Z", + "modified": "2025-06-09T11:59:18Z", "published": "2025-06-06T15:30:53Z", "aliases": [ "CVE-2025-5806" ], + "summary": "Jenkins Gatling Plugin Vulnerable to Cross-Site Scripting (XSS)", "details": "Jenkins Gatling Plugin 136.vb_9009b_3d33a_e serves Gatling reports in a manner that bypasses the Content-Security-Policy protection introduced in Jenkins 1.641 and 1.625, resulting in a cross-site scripting (XSS) vulnerability exploitable by users able to change report content.", "severity": [ { @@ -13,12 +14,38 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.jenkins-ci.plugins:gatling" + }, + "versions": [ + "136.vb" + ] + } + ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5806" }, + { + "type": "WEB", + "url": "https://github.com/jenkinsci/gatling-plugin/pull/27" + }, + { + "type": "WEB", + "url": "https://github.com/jenkinsci/gatling-plugin/commit/141bd3a811ab641bf618ec588b615cf87469b222" + }, + { + "type": "PACKAGE", + "url": "https://github.com/jenkinsci/gatling-plugin" + }, + { + "type": "WEB", + "url": "https://github.com/jenkinsci/gatling-plugin/releases/tag/136.vb_9009b_3d33a_e" + }, { "type": "WEB", "url": "https://www.jenkins.io/security/advisory/2025-06-06/#SECURITY-3588" @@ -33,8 +60,8 @@ "CWE-79" ], "severity": "HIGH", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-06-09T11:59:18Z", "nvd_published_at": "2025-06-06T14:15:23Z" } } \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-h92g-3xc3-ww2r/GHSA-h92g-3xc3-ww2r.json b/advisories/github-reviewed/2025/06/GHSA-h92g-3xc3-ww2r/GHSA-h92g-3xc3-ww2r.json similarity index 51% rename from advisories/unreviewed/2025/06/GHSA-h92g-3xc3-ww2r/GHSA-h92g-3xc3-ww2r.json rename to advisories/github-reviewed/2025/06/GHSA-h92g-3xc3-ww2r/GHSA-h92g-3xc3-ww2r.json index 12ca9decb08b4..efb4ab0d9bfea 100644 --- a/advisories/unreviewed/2025/06/GHSA-h92g-3xc3-ww2r/GHSA-h92g-3xc3-ww2r.json +++ b/advisories/github-reviewed/2025/06/GHSA-h92g-3xc3-ww2r/GHSA-h92g-3xc3-ww2r.json @@ -1,19 +1,40 @@ { "schema_version": "1.4.0", "id": "GHSA-h92g-3xc3-ww2r", - "modified": "2025-06-07T21:30:30Z", + "modified": "2025-06-09T13:04:44Z", "published": "2025-06-07T15:30:18Z", "aliases": [ "CVE-2025-49619" ], - "details": "Skyvern through 0.1.85 has a Jinja runtime leak in sdk/workflow/models/block.py.", + "summary": "Skyvern has a Jinja runtime leak", + "details": "Skyvern through 0.2.0 has a Jinja runtime leak in sdk/workflow/models/block.py.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "skyvern" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "0.2.0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -26,6 +47,10 @@ { "type": "WEB", "url": "https://cristibtz.github.io/posts/CVE-2025-49619" + }, + { + "type": "PACKAGE", + "url": "https://github.com/Skyvern-AI/skyvern" } ], "database_specific": { @@ -33,8 +58,8 @@ "CWE-1336" ], "severity": "HIGH", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2025-06-09T13:04:44Z", "nvd_published_at": "2025-06-07T14:15:21Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2025/06/GHSA-j226-63j7-qrqh/GHSA-j226-63j7-qrqh.json b/advisories/github-reviewed/2025/06/GHSA-j226-63j7-qrqh/GHSA-j226-63j7-qrqh.json new file mode 100644 index 0000000000000..519f749d69220 --- /dev/null +++ b/advisories/github-reviewed/2025/06/GHSA-j226-63j7-qrqh/GHSA-j226-63j7-qrqh.json @@ -0,0 +1,69 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j226-63j7-qrqh", + "modified": "2025-06-09T13:15:19Z", + "published": "2025-06-09T13:15:19Z", + "aliases": [ + "CVE-2025-49130" + ], + "summary": "Laravel Translation Manager Vulnerable to Stored Cross-site Scripting", + "details": "### Impact\nThe application is vulnerable to Cross-Site Scripting (XSS) attacks due to incorrect input validation and sanitization of user-input data. An attacker can inject arbitrary HTML code, including JavaScript scripts, into the page processed by the user's browser, allowing them to steal sensitive data, hijack user sessions, or conduct other malicious activities.\n\n### Patches\nThe issue is fixed in https://github.com/barryvdh/laravel-translation-manager/pull/475 which is released in version 0.6.8\n\n### Workarounds\nOnly authenticated users with access to the translation manager are impacted.\n\n### References\n[[PT-2025-04] laravel translation manager.pdf](https://github.com/user-attachments/files/20639250/PT-2025-04.laravel.translation.manager.pdf)\n\n### Reported by\nPositive Technologies (Artem Deikov, Ilya Tsaturov, Daniil Satyaev, Roman Cheremnykh, Artem Danilov, Stanislav Gleym)", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "barryvdh/laravel-translation-manager" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.6.8" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/barryvdh/laravel-translation-manager/security/advisories/GHSA-j226-63j7-qrqh" + }, + { + "type": "WEB", + "url": "https://github.com/barryvdh/laravel-translation-manager/pull/475" + }, + { + "type": "WEB", + "url": "https://github.com/barryvdh/laravel-translation-manager/commit/527446ed419f90f2319675fc5211cb8f851d7a1f" + }, + { + "type": "PACKAGE", + "url": "https://github.com/barryvdh/laravel-translation-manager" + }, + { + "type": "WEB", + "url": "https://github.com/barryvdh/laravel-translation-manager/releases/tag/v0.6.8" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-06-09T13:15:19Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2025/06/GHSA-jc7g-x28f-3v3h/GHSA-jc7g-x28f-3v3h.json b/advisories/github-reviewed/2025/06/GHSA-jc7g-x28f-3v3h/GHSA-jc7g-x28f-3v3h.json new file mode 100644 index 0000000000000..80ce438201e43 --- /dev/null +++ b/advisories/github-reviewed/2025/06/GHSA-jc7g-x28f-3v3h/GHSA-jc7g-x28f-3v3h.json @@ -0,0 +1,61 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jc7g-x28f-3v3h", + "modified": "2025-06-09T13:09:24Z", + "published": "2025-06-09T13:09:24Z", + "aliases": [], + "summary": "listmonk's Sprig template Injection vulnerability leads to reading of Environment Variable for low privilege user", + "details": "### Summary\nThe `env` and `expandenv` template functions which is enabled by default in [Sprig](https://masterminds.github.io/sprig/) enables capturing of env variables on host. While this may not be a problem on single-user (super admin) installations, on multi-user installations, this allows non-super-admin users with campaign or template permissions to use the `{{ env }}` template expression to capture sensitive environment variables.\n\n**Upgrade to [v5.0.2](https://github.com/knadh/listmonk/releases/tag/v5.0.2)** to mitigate.\n\n---------\n\n# Demonstration\n\n### Description\nA critical template injection vulnerability exists in Listmonk's campaign preview functionality that allows authenticated users with minimal privileges (campaigns:get & campaigns:get_all) to extract sensitive system data, including database credentials, SMTP passwords, and admin credentials due to some dangerous function being allowed.\n\n### Proof of Concept\n\n- Create a user and give him `campaigns:get` and `campaigns:get_all` privileges\n\n\n\n- Now login with that user, go to any campaign, go the Content section and here lies the vulnerability, we're able to execute template content which allows us to get environment variables, execute Sprig functions...\n\n- Now in the text field you can input the following and press Preview:\n```\n{{ env \"AWS_KEY\" }}\n{{ env \"LISTMONK_db__user\" }}\n{{ env \"LISTMONK_db__password\" }}\n````\n\n\n\n# Preview:\n\n\n\nI had the AWS_KEY variable set like that to confirm the vulnerability:\n\n\n\n### Impact\n\n- Through these environment variables the attacker can access, they can fully compromise the database, cloud accounts, admin credentials, and more depending on what was setup leading to total system takeover and data breach.\n\n### Suggested Fix\n\n- Blacklist some function for templates like env, expandEnv and fail as they can be used to leak environment variables which leads to a full takeover.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/knadh/listmonk" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "4.0.0" + }, + { + "fixed": "5.0.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/knadh/listmonk/security/advisories/GHSA-jc7g-x28f-3v3h" + }, + { + "type": "WEB", + "url": "https://github.com/knadh/listmonk/commit/d27d2c32cf3af2d0b24e29ea5a686ba149b49b3e" + }, + { + "type": "PACKAGE", + "url": "https://github.com/knadh/listmonk" + }, + { + "type": "WEB", + "url": "https://github.com/knadh/listmonk/releases/tag/v5.0.2" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2025-06-09T13:09:24Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2025/06/GHSA-r8xr-pgv5-gxw3/GHSA-r8xr-pgv5-gxw3.json b/advisories/github-reviewed/2025/06/GHSA-r8xr-pgv5-gxw3/GHSA-r8xr-pgv5-gxw3.json new file mode 100644 index 0000000000000..07bb59ecc9075 --- /dev/null +++ b/advisories/github-reviewed/2025/06/GHSA-r8xr-pgv5-gxw3/GHSA-r8xr-pgv5-gxw3.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r8xr-pgv5-gxw3", + "modified": "2025-06-09T13:10:32Z", + "published": "2025-06-09T06:30:21Z", + "aliases": [ + "CVE-2025-25207" + ], + "summary": "Authorino Uncontrolled Resource Consumption vulnerability", + "details": "The Authorino service in the Red Hat Connectivity Link is the authorization service for zero trust API security. Authorino allows the users with developer persona to add callbacks to be executed to HTTP endpoints once the authorization process is completed. It was found that an attacker with developer persona access can add a large number of those callbacks to be executed by Authorino and as the authentication policy is enforced by a single instance of the service, this leada to a Denial of Service in Authorino while processing the post-authorization callbacks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/kuadrant/authorino" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "0.20.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25207" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2025-25207" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347421" + }, + { + "type": "PACKAGE", + "url": "https://github.com/Kuadrant/authorino" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-06-09T13:10:32Z", + "nvd_published_at": "2025-06-09T06:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2025/06/GHSA-vqvv-2wj5-q34w/GHSA-vqvv-2wj5-q34w.json b/advisories/github-reviewed/2025/06/GHSA-vqvv-2wj5-q34w/GHSA-vqvv-2wj5-q34w.json new file mode 100644 index 0000000000000..aec50f786465f --- /dev/null +++ b/advisories/github-reviewed/2025/06/GHSA-vqvv-2wj5-q34w/GHSA-vqvv-2wj5-q34w.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vqvv-2wj5-q34w", + "modified": "2025-06-09T13:13:27Z", + "published": "2025-06-09T06:30:22Z", + "aliases": [ + "CVE-2025-25208" + ], + "summary": "Authorino Uncontrolled Resource Consumption vulnerability", + "details": "A Developer persona can bring down the Authorino service, preventing the evaluation of all AuthPolicies on the cluster", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/kuadrant/authorino" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "0.20.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25208" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2025-25208" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347436" + }, + { + "type": "PACKAGE", + "url": "https://github.com/Kuadrant/authorino" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2025-06-09T13:13:26Z", + "nvd_published_at": "2025-06-09T06:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/04/GHSA-5qxx-2mqf-3v7g/GHSA-5qxx-2mqf-3v7g.json b/advisories/unreviewed/2025/04/GHSA-5qxx-2mqf-3v7g/GHSA-5qxx-2mqf-3v7g.json index 94031b2657396..7da95881115e8 100644 --- a/advisories/unreviewed/2025/04/GHSA-5qxx-2mqf-3v7g/GHSA-5qxx-2mqf-3v7g.json +++ b/advisories/unreviewed/2025/04/GHSA-5qxx-2mqf-3v7g/GHSA-5qxx-2mqf-3v7g.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-5qxx-2mqf-3v7g", - "modified": "2025-06-04T06:30:24Z", + "modified": "2025-06-09T12:31:02Z", "published": "2025-04-03T04:41:19Z", "aliases": [ "CVE-2025-2784" @@ -55,6 +55,10 @@ "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2025:8482" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:8663" + }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2025-2784" diff --git a/advisories/unreviewed/2025/04/GHSA-89g2-jrcc-p8r7/GHSA-89g2-jrcc-p8r7.json b/advisories/unreviewed/2025/04/GHSA-89g2-jrcc-p8r7/GHSA-89g2-jrcc-p8r7.json index cd542122577d6..5c44ff9706cc9 100644 --- a/advisories/unreviewed/2025/04/GHSA-89g2-jrcc-p8r7/GHSA-89g2-jrcc-p8r7.json +++ b/advisories/unreviewed/2025/04/GHSA-89g2-jrcc-p8r7/GHSA-89g2-jrcc-p8r7.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-89g2-jrcc-p8r7", - "modified": "2025-06-04T06:30:25Z", + "modified": "2025-06-09T12:31:02Z", "published": "2025-04-14T15:31:59Z", "aliases": [ "CVE-2025-32914" @@ -55,6 +55,10 @@ "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2025:8482" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:8663" + }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2025-32914" diff --git a/advisories/unreviewed/2025/04/GHSA-fqvp-p5gx-qqhg/GHSA-fqvp-p5gx-qqhg.json b/advisories/unreviewed/2025/04/GHSA-fqvp-p5gx-qqhg/GHSA-fqvp-p5gx-qqhg.json index a80b055cb81e8..905516a4a365d 100644 --- a/advisories/unreviewed/2025/04/GHSA-fqvp-p5gx-qqhg/GHSA-fqvp-p5gx-qqhg.json +++ b/advisories/unreviewed/2025/04/GHSA-fqvp-p5gx-qqhg/GHSA-fqvp-p5gx-qqhg.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-fqvp-p5gx-qqhg", - "modified": "2025-06-04T06:30:25Z", + "modified": "2025-06-09T12:31:02Z", "published": "2025-04-03T15:31:19Z", "aliases": [ "CVE-2025-32049" @@ -55,6 +55,10 @@ "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2025:8482" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:8663" + }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2025-32049" diff --git a/advisories/unreviewed/2025/05/GHSA-5c6q-hvvg-576r/GHSA-5c6q-hvvg-576r.json b/advisories/unreviewed/2025/05/GHSA-5c6q-hvvg-576r/GHSA-5c6q-hvvg-576r.json index 83c8052c69289..c8993b89d9c08 100644 --- a/advisories/unreviewed/2025/05/GHSA-5c6q-hvvg-576r/GHSA-5c6q-hvvg-576r.json +++ b/advisories/unreviewed/2025/05/GHSA-5c6q-hvvg-576r/GHSA-5c6q-hvvg-576r.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-5c6q-hvvg-576r", - "modified": "2025-06-04T06:30:25Z", + "modified": "2025-06-09T12:31:02Z", "published": "2025-05-19T18:30:46Z", "aliases": [ "CVE-2025-4948" @@ -55,6 +55,10 @@ "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2025:8482" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:8663" + }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2025-4948" diff --git a/advisories/unreviewed/2025/06/GHSA-2425-2c7p-9cg9/GHSA-2425-2c7p-9cg9.json b/advisories/unreviewed/2025/06/GHSA-2425-2c7p-9cg9/GHSA-2425-2c7p-9cg9.json new file mode 100644 index 0000000000000..1531651b7fd76 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-2425-2c7p-9cg9/GHSA-2425-2c7p-9cg9.json @@ -0,0 +1,54 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2425-2c7p-9cg9", + "modified": "2025-06-09T12:31:12Z", + "published": "2025-06-09T12:31:12Z", + "aliases": [ + "CVE-2025-5874" + ], + "details": "A vulnerability was found in Redash up to 10.1.0/25.1.0. It has been rated as critical. This issue affects the function run_query of the file /query_runner/python.py of the component getattr Handler. The manipulation leads to sandbox issue. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5874" + }, + { + "type": "WEB", + "url": "https://gist.github.com/superboy-zjc/1f89d375e2408ed843dc2cf0bb1bb894" + }, + { + "type": "WEB", + "url": "https://gist.github.com/superboy-zjc/1f89d375e2408ed843dc2cf0bb1bb894#proof-of-concept" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311633" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311633" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.580255" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T11:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-2f8j-mg23-4j24/GHSA-2f8j-mg23-4j24.json b/advisories/unreviewed/2025/06/GHSA-2f8j-mg23-4j24/GHSA-2f8j-mg23-4j24.json new file mode 100644 index 0000000000000..e2406ebf9dfde --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-2f8j-mg23-4j24/GHSA-2f8j-mg23-4j24.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2f8j-mg23-4j24", + "modified": "2025-06-09T12:31:11Z", + "published": "2025-06-09T12:31:10Z", + "aliases": [ + "CVE-2025-5871" + ], + "details": "A vulnerability was found in Papendorf SOL Connect Center 3.3.0.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Web Interface. The manipulation leads to missing authentication. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5871" + }, + { + "type": "WEB", + "url": "https://github.com/zeke2997/CVE_request_Papendorf_Software_Engineering_GmbH" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311630" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311630" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.585459" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T10:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-37vh-www3-8crv/GHSA-37vh-www3-8crv.json b/advisories/unreviewed/2025/06/GHSA-37vh-www3-8crv/GHSA-37vh-www3-8crv.json new file mode 100644 index 0000000000000..70a5990942253 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-37vh-www3-8crv/GHSA-37vh-www3-8crv.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-37vh-www3-8crv", + "modified": "2025-06-09T12:31:11Z", + "published": "2025-06-09T12:31:11Z", + "aliases": [ + "CVE-2025-5872" + ], + "details": "A vulnerability was found in eGauge EG3000 Energy Monitor 3.6.3. It has been classified as problematic. This affects an unknown part of the component Setting Handler. The manipulation leads to missing authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5872" + }, + { + "type": "WEB", + "url": "https://github.com/zeke2997/CVE_request_eGauge_Systems_LLC" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311631" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311631" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.585486" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T10:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-3c2j-gj86-4xvq/GHSA-3c2j-gj86-4xvq.json b/advisories/unreviewed/2025/06/GHSA-3c2j-gj86-4xvq/GHSA-3c2j-gj86-4xvq.json new file mode 100644 index 0000000000000..34555e95070ff --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-3c2j-gj86-4xvq/GHSA-3c2j-gj86-4xvq.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3c2j-gj86-4xvq", + "modified": "2025-06-09T00:30:31Z", + "published": "2025-06-09T00:30:31Z", + "aliases": [ + "CVE-2025-5849" + ], + "details": "A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been classified as critical. This affects the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5849" + }, + { + "type": "WEB", + "url": "https://candle-throne-f75.notion.site/Tenda-AC15-formSetSafeWanWebMan-20adf0aa1185806daab3ebe0036266cb" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311595" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311595" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.591375" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T23:15:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-3c6f-2796-jxc4/GHSA-3c6f-2796-jxc4.json b/advisories/unreviewed/2025/06/GHSA-3c6f-2796-jxc4/GHSA-3c6f-2796-jxc4.json new file mode 100644 index 0000000000000..9857e6f13511b --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-3c6f-2796-jxc4/GHSA-3c6f-2796-jxc4.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3c6f-2796-jxc4", + "modified": "2025-06-09T12:31:13Z", + "published": "2025-06-09T12:31:13Z", + "aliases": [ + "CVE-2025-5875" + ], + "details": "A vulnerability classified as critical has been found in TP-Link TL-IPC544EP-W4 1.0.9 Build 240428 Rel 69493n. Affected is the function sub_69064 of the file /bin/main. The manipulation of the argument text leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5875" + }, + { + "type": "WEB", + "url": "https://locrian-lightning-dc7.notion.site/TL-IPC544EP-W4-1f98e5e2b1a280ae9862d49391d95651" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311634" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311634" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.581366" + }, + { + "type": "WEB", + "url": "https://www.tp-link.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T12:15:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-3qvj-q9mh-gv5x/GHSA-3qvj-q9mh-gv5x.json b/advisories/unreviewed/2025/06/GHSA-3qvj-q9mh-gv5x/GHSA-3qvj-q9mh-gv5x.json new file mode 100644 index 0000000000000..6c2c3f92fa821 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-3qvj-q9mh-gv5x/GHSA-3qvj-q9mh-gv5x.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3qvj-q9mh-gv5x", + "modified": "2025-06-08T21:30:29Z", + "published": "2025-06-08T21:30:29Z", + "aliases": [ + "CVE-2025-32456" + ], + "details": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_to_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32456" + }, + { + "type": "WEB", + "url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices" + }, + { + "type": "WEB", + "url": "https://takeonme.org/cves/cve-2025-3460" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-88" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T21:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-3xgx-5fr5-rcrq/GHSA-3xgx-5fr5-rcrq.json b/advisories/unreviewed/2025/06/GHSA-3xgx-5fr5-rcrq/GHSA-3xgx-5fr5-rcrq.json new file mode 100644 index 0000000000000..cdc2034472223 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-3xgx-5fr5-rcrq/GHSA-3xgx-5fr5-rcrq.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3xgx-5fr5-rcrq", + "modified": "2025-06-09T06:30:23Z", + "published": "2025-06-09T06:30:22Z", + "aliases": [ + "CVE-2025-5863" + ], + "details": "A vulnerability was found in Tenda AC5 15.03.06.47. It has been classified as critical. Affected is the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument rebootTime leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5863" + }, + { + "type": "WEB", + "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC5-formSetRebootTimer-20a53a41781f80a6b9a8f6e5915cf256?source=copy_link" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311622" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311622" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.591981" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T06:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-4287-9xx6-3794/GHSA-4287-9xx6-3794.json b/advisories/unreviewed/2025/06/GHSA-4287-9xx6-3794/GHSA-4287-9xx6-3794.json new file mode 100644 index 0000000000000..1c746b53040b8 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-4287-9xx6-3794/GHSA-4287-9xx6-3794.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4287-9xx6-3794", + "modified": "2025-06-09T00:30:32Z", + "published": "2025-06-09T00:30:31Z", + "aliases": [ + "CVE-2025-5850" + ], + "details": "A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been declared as critical. This vulnerability affects the function formsetschedled of the file /goform/SetLEDCf of the component HTTP POST Request Handler. The manipulation of the argument Time leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5850" + }, + { + "type": "WEB", + "url": "https://candle-throne-f75.notion.site/Tenda-AC15-formsetschedled-20adf0aa118580d984d8fcdb98d9959c" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311596" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311596" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.591376" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T23:15:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-45jv-wv9v-qqfr/GHSA-45jv-wv9v-qqfr.json b/advisories/unreviewed/2025/06/GHSA-45jv-wv9v-qqfr/GHSA-45jv-wv9v-qqfr.json new file mode 100644 index 0000000000000..fd993b4cb3d08 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-45jv-wv9v-qqfr/GHSA-45jv-wv9v-qqfr.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-45jv-wv9v-qqfr", + "modified": "2025-06-09T12:31:13Z", + "published": "2025-06-09T12:31:13Z", + "aliases": [ + "CVE-2025-5876" + ], + "details": "A vulnerability classified as problematic was found in Lucky LM-520-SC, LM-520-FSC and LM-520-FSC-SAM up to 20250321. Affected by this vulnerability is an unknown functionality. The manipulation leads to missing authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5876" + }, + { + "type": "WEB", + "url": "https://github.com/zeke2997/cve_request_LuckyTechnologyLtd" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311635" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311635" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.585821" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T12:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-4xh2-4xwh-6pgr/GHSA-4xh2-4xwh-6pgr.json b/advisories/unreviewed/2025/06/GHSA-4xh2-4xwh-6pgr/GHSA-4xh2-4xwh-6pgr.json new file mode 100644 index 0000000000000..3dce0259f67e5 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-4xh2-4xwh-6pgr/GHSA-4xh2-4xwh-6pgr.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4xh2-4xwh-6pgr", + "modified": "2025-06-09T09:31:04Z", + "published": "2025-06-09T09:31:03Z", + "aliases": [ + "CVE-2025-5865" + ], + "details": "A vulnerability was found in RT-Thread 5.1.0. It has been rated as critical. Affected by this issue is the function sys_select of the file rt-thread/components/lwp/lwp_syscall.c of the component Parameter Handler. The manipulation of the argument timeout leads to memory corruption. The vendor explains, that \"[t]he timeout parameter should be checked to check if it can be accessed correctly in kernel mode and used temporarily in kernel memory.\"", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5865" + }, + { + "type": "WEB", + "url": "https://github.com/RT-Thread/rt-thread/issues/10298" + }, + { + "type": "WEB", + "url": "https://github.com/RT-Thread/rt-thread/issues/10298#issuecomment-2894952150" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311624" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311624" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.584124" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T07:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-5cq9-g28q-5w6r/GHSA-5cq9-g28q-5w6r.json b/advisories/unreviewed/2025/06/GHSA-5cq9-g28q-5w6r/GHSA-5cq9-g28q-5w6r.json new file mode 100644 index 0000000000000..01c4100a5c211 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-5cq9-g28q-5w6r/GHSA-5cq9-g28q-5w6r.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5cq9-g28q-5w6r", + "modified": "2025-06-09T09:31:04Z", + "published": "2025-06-09T09:31:04Z", + "aliases": [ + "CVE-2025-5868" + ], + "details": "A vulnerability, which was classified as critical, has been found in RT-Thread 5.1.0. This issue affects the function sys_thread_sigprocmask of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument how leads to improper validation of array index.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5868" + }, + { + "type": "WEB", + "url": "https://github.com/RT-Thread/rt-thread/issues/10303" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311627" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311627" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.584130" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T08:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-629p-hwcg-x88h/GHSA-629p-hwcg-x88h.json b/advisories/unreviewed/2025/06/GHSA-629p-hwcg-x88h/GHSA-629p-hwcg-x88h.json new file mode 100644 index 0000000000000..cb924ac1a4c85 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-629p-hwcg-x88h/GHSA-629p-hwcg-x88h.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-629p-hwcg-x88h", + "modified": "2025-06-09T00:30:31Z", + "published": "2025-06-09T00:30:31Z", + "aliases": [ + "CVE-2025-5851" + ], + "details": "A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been rated as critical. This issue affects the function fromadvsetlanip of the file /goform/AdvSetLanip of the component HTTP POST Request Handler. The manipulation of the argument lanMask leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5851" + }, + { + "type": "WEB", + "url": "https://candle-throne-f75.notion.site/Tenda-AC15-fromadvsetlanip-20adf0aa118580a09182c1c5c42079fc" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311597" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311597" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.591384" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T00:15:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-62gc-8jr5-x9pm/GHSA-62gc-8jr5-x9pm.json b/advisories/unreviewed/2025/06/GHSA-62gc-8jr5-x9pm/GHSA-62gc-8jr5-x9pm.json deleted file mode 100644 index 1c60bb984f44c..0000000000000 --- a/advisories/unreviewed/2025/06/GHSA-62gc-8jr5-x9pm/GHSA-62gc-8jr5-x9pm.json +++ /dev/null @@ -1,35 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-62gc-8jr5-x9pm", - "modified": "2025-06-06T15:30:53Z", - "published": "2025-06-06T15:30:53Z", - "aliases": [ - "CVE-2025-27531" - ], - "details": "Deserialization of Untrusted Data vulnerability in Apache InLong. \n\nThis issue affects Apache InLong: from 1.13.0 before 2.1.0, \n\nthis issue would allow an authenticated attacker to read arbitrary files by double writing the param.\n\n\n\n\n\nUsers are recommended to upgrade to version 2.1.0, which fixes the issue.", - "severity": [], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27531" - }, - { - "type": "WEB", - "url": "https://lists.apache.org/thread/r62lkqrr739wvcb60j6ql6q63rh4bxx5" - }, - { - "type": "WEB", - "url": "http://www.openwall.com/lists/oss-security/2025/02/28/2" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-502" - ], - "severity": null, - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2025-06-06T15:15:23Z" - } -} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-6cqj-wv5p-8qf4/GHSA-6cqj-wv5p-8qf4.json b/advisories/unreviewed/2025/06/GHSA-6cqj-wv5p-8qf4/GHSA-6cqj-wv5p-8qf4.json new file mode 100644 index 0000000000000..dfcebc92d4941 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-6cqj-wv5p-8qf4/GHSA-6cqj-wv5p-8qf4.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6cqj-wv5p-8qf4", + "modified": "2025-06-09T12:31:12Z", + "published": "2025-06-09T12:31:12Z", + "aliases": [ + "CVE-2025-41444" + ], + "details": "Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to authenticated SQL injection in the alerts module.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41444" + }, + { + "type": "WEB", + "url": "https://www.manageengine.com/products/active-directory-audit/cve-2025-41444.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T12:15:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-6vfc-8w2v-vx36/GHSA-6vfc-8w2v-vx36.json b/advisories/unreviewed/2025/06/GHSA-6vfc-8w2v-vx36/GHSA-6vfc-8w2v-vx36.json new file mode 100644 index 0000000000000..0d1186af1d442 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-6vfc-8w2v-vx36/GHSA-6vfc-8w2v-vx36.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6vfc-8w2v-vx36", + "modified": "2025-06-09T06:30:21Z", + "published": "2025-06-09T06:30:21Z", + "aliases": [ + "CVE-2025-5862" + ], + "details": "A vulnerability was found in Tenda AC7 15.03.06.44 and classified as critical. This issue affects the function formSetPPTPUserList of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5862" + }, + { + "type": "WEB", + "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC7-formSetPPTPUserList-20a53a41781f806ca124cbdf99bff931?source=copy_link" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311621" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311621" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.591980" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T05:15:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-796j-mc2v-jwpj/GHSA-796j-mc2v-jwpj.json b/advisories/unreviewed/2025/06/GHSA-796j-mc2v-jwpj/GHSA-796j-mc2v-jwpj.json new file mode 100644 index 0000000000000..9b5cc1541889d --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-796j-mc2v-jwpj/GHSA-796j-mc2v-jwpj.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-796j-mc2v-jwpj", + "modified": "2025-06-09T06:30:22Z", + "published": "2025-06-09T06:30:22Z", + "aliases": [ + "CVE-2025-3582" + ], + "details": "The Newsletter WordPress plugin before 8.85 does not sanitise and escape some of its Form settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3582" + }, + { + "type": "WEB", + "url": "https://wpscan.com/vulnerability/19db8521-8dff-48c5-b21a-1001895292e0" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T06:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-7m77-2m34-vfr8/GHSA-7m77-2m34-vfr8.json b/advisories/unreviewed/2025/06/GHSA-7m77-2m34-vfr8/GHSA-7m77-2m34-vfr8.json new file mode 100644 index 0000000000000..6ea66e46e76af --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-7m77-2m34-vfr8/GHSA-7m77-2m34-vfr8.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7m77-2m34-vfr8", + "modified": "2025-06-08T21:30:30Z", + "published": "2025-06-08T21:30:30Z", + "aliases": [ + "CVE-2025-35007" + ], + "details": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFRULE command that can lead to privilege escalation. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-35007" + }, + { + "type": "WEB", + "url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware" + }, + { + "type": "WEB", + "url": "https://takeonme.org/cves/cve-2025-35007" + }, + { + "type": "WEB", + "url": "https://www.microhardcorp.com/BulletLTE-NA2.php" + }, + { + "type": "WEB", + "url": "https://www.microhardcorp.com/IPn4Gii-NA2.php" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-88" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T21:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-84ch-w4f5-gxjw/GHSA-84ch-w4f5-gxjw.json b/advisories/unreviewed/2025/06/GHSA-84ch-w4f5-gxjw/GHSA-84ch-w4f5-gxjw.json new file mode 100644 index 0000000000000..1cbba9d776c28 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-84ch-w4f5-gxjw/GHSA-84ch-w4f5-gxjw.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-84ch-w4f5-gxjw", + "modified": "2025-06-08T21:30:31Z", + "published": "2025-06-08T21:30:31Z", + "aliases": [ + "CVE-2025-3459" + ], + "details": "The Quantenna Wi-Fi chipset ships with a local control script, transmit_file, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3459" + }, + { + "type": "WEB", + "url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices" + }, + { + "type": "WEB", + "url": "https://takeonme.org/cves/cve-2025-3459" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-88" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T21:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-8frm-3xf6-7ff2/GHSA-8frm-3xf6-7ff2.json b/advisories/unreviewed/2025/06/GHSA-8frm-3xf6-7ff2/GHSA-8frm-3xf6-7ff2.json new file mode 100644 index 0000000000000..acea913eaa870 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-8frm-3xf6-7ff2/GHSA-8frm-3xf6-7ff2.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8frm-3xf6-7ff2", + "modified": "2025-06-09T09:31:04Z", + "published": "2025-06-09T09:31:04Z", + "aliases": [ + "CVE-2025-5870" + ], + "details": "A vulnerability has been found in TRENDnet TV-IP121W 1.1.1 Build 36 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/setup.cgi of the component Web Interface. The manipulation leads to improper authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5870" + }, + { + "type": "WEB", + "url": "https://github.com/zeke2997/CVE_request_TRENDnet" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311629" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311629" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.585435" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T09:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-8qf9-3v8p-qxx6/GHSA-8qf9-3v8p-qxx6.json b/advisories/unreviewed/2025/06/GHSA-8qf9-3v8p-qxx6/GHSA-8qf9-3v8p-qxx6.json new file mode 100644 index 0000000000000..32bf84ff07ab7 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-8qf9-3v8p-qxx6/GHSA-8qf9-3v8p-qxx6.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8qf9-3v8p-qxx6", + "modified": "2025-06-08T21:30:30Z", + "published": "2025-06-08T21:30:30Z", + "aliases": [ + "CVE-2025-35008" + ], + "details": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MMNAME command that can lead to privilege escalation. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-35008" + }, + { + "type": "WEB", + "url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware" + }, + { + "type": "WEB", + "url": "https://takeonme.org/cves/cve-2025-35008" + }, + { + "type": "WEB", + "url": "https://www.microhardcorp.com/BulletLTE-NA2.php" + }, + { + "type": "WEB", + "url": "https://www.microhardcorp.com/IPn4Gii-NA2.php" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-88" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T21:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-9p3j-mhgp-fq28/GHSA-9p3j-mhgp-fq28.json b/advisories/unreviewed/2025/06/GHSA-9p3j-mhgp-fq28/GHSA-9p3j-mhgp-fq28.json new file mode 100644 index 0000000000000..8f57097be3f49 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-9p3j-mhgp-fq28/GHSA-9p3j-mhgp-fq28.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9p3j-mhgp-fq28", + "modified": "2025-06-09T12:31:12Z", + "published": "2025-06-09T12:31:12Z", + "aliases": [ + "CVE-2025-36528" + ], + "details": "Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to authenticated SQL injection in Service Account Auditing reports.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-36528" + }, + { + "type": "WEB", + "url": "https://www.manageengine.com/products/active-directory-audit/cve-2025-36528.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T11:15:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-9xmr-64r7-vfjx/GHSA-9xmr-64r7-vfjx.json b/advisories/unreviewed/2025/06/GHSA-9xmr-64r7-vfjx/GHSA-9xmr-64r7-vfjx.json new file mode 100644 index 0000000000000..43db60565ed05 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-9xmr-64r7-vfjx/GHSA-9xmr-64r7-vfjx.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9xmr-64r7-vfjx", + "modified": "2025-06-09T03:32:38Z", + "published": "2025-06-09T03:32:38Z", + "aliases": [ + "CVE-2025-5854" + ], + "details": "A vulnerability, which was classified as critical, has been found in Tenda AC6 15.03.05.16. Affected by this issue is the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5854" + }, + { + "type": "WEB", + "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC6-fromadvsetlanip-20a53a41781f80a29bdff7dca9a4773e?source=copy_link" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311600" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311600" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.591420" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T01:15:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-c8xj-fr2w-pjfc/GHSA-c8xj-fr2w-pjfc.json b/advisories/unreviewed/2025/06/GHSA-c8xj-fr2w-pjfc/GHSA-c8xj-fr2w-pjfc.json new file mode 100644 index 0000000000000..c05fb49486b50 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-c8xj-fr2w-pjfc/GHSA-c8xj-fr2w-pjfc.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c8xj-fr2w-pjfc", + "modified": "2025-06-09T06:30:22Z", + "published": "2025-06-09T06:30:22Z", + "aliases": [ + "CVE-2025-47711" + ], + "details": "There's a flaw in the nbdkit server when handling responses from its plugins regarding the status of data blocks. If a client makes a specific request for a very large data range, and a plugin responds with an even larger single block, the nbdkit server can encounter a critical internal error, leading to a denial-of-service.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47711" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2025-47711" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365687" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-193" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T06:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-cgwq-jph9-cvc2/GHSA-cgwq-jph9-cvc2.json b/advisories/unreviewed/2025/06/GHSA-cgwq-jph9-cvc2/GHSA-cgwq-jph9-cvc2.json new file mode 100644 index 0000000000000..5f24f54561ac5 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-cgwq-jph9-cvc2/GHSA-cgwq-jph9-cvc2.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cgwq-jph9-cvc2", + "modified": "2025-06-08T21:30:29Z", + "published": "2025-06-08T21:30:29Z", + "aliases": [ + "CVE-2025-32458" + ], + "details": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_syslog_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32458" + }, + { + "type": "WEB", + "url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices" + }, + { + "type": "WEB", + "url": "https://takeonme.org/cves/cve-2025-3460" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-88" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T21:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-f5vv-5ch7-632x/GHSA-f5vv-5ch7-632x.json b/advisories/unreviewed/2025/06/GHSA-f5vv-5ch7-632x/GHSA-f5vv-5ch7-632x.json new file mode 100644 index 0000000000000..1bcccb250b1b0 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-f5vv-5ch7-632x/GHSA-f5vv-5ch7-632x.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f5vv-5ch7-632x", + "modified": "2025-06-08T21:30:31Z", + "published": "2025-06-08T21:30:31Z", + "aliases": [ + "CVE-2025-3461" + ], + "details": "The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default. This is an instance of CWE-306, \"Missing Authentication for Critical Function,\" and is estimated as a CVSS 9.1 ( CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3461" + }, + { + "type": "WEB", + "url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices" + }, + { + "type": "WEB", + "url": "https://takeonme.org/cves/cve-2025-3461" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-306" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T21:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-f673-3fxm-5g94/GHSA-f673-3fxm-5g94.json b/advisories/unreviewed/2025/06/GHSA-f673-3fxm-5g94/GHSA-f673-3fxm-5g94.json new file mode 100644 index 0000000000000..ac34844c63b31 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-f673-3fxm-5g94/GHSA-f673-3fxm-5g94.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f673-3fxm-5g94", + "modified": "2025-06-08T21:30:30Z", + "published": "2025-06-08T21:30:30Z", + "aliases": [ + "CVE-2025-35004" + ], + "details": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFIP command that can lead to privilege escalation. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-35004" + }, + { + "type": "WEB", + "url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware" + }, + { + "type": "WEB", + "url": "https://takeonme.org/cves/cve-2025-35004" + }, + { + "type": "WEB", + "url": "https://www.microhardcorp.com/BulletLTE-NA2.php" + }, + { + "type": "WEB", + "url": "https://www.microhardcorp.com/IPn4Gii-NA2.php" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-88" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T21:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-f9xh-499r-w9qx/GHSA-f9xh-499r-w9qx.json b/advisories/unreviewed/2025/06/GHSA-f9xh-499r-w9qx/GHSA-f9xh-499r-w9qx.json new file mode 100644 index 0000000000000..a90ba87be44b4 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-f9xh-499r-w9qx/GHSA-f9xh-499r-w9qx.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f9xh-499r-w9qx", + "modified": "2025-06-09T06:30:22Z", + "published": "2025-06-09T06:30:22Z", + "aliases": [ + "CVE-2025-3581" + ], + "details": "The Newsletter WordPress plugin before 8.8.5 does not validate and escape some of its Widget options before outputting them back in a page/post where the block is embed, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3581" + }, + { + "type": "WEB", + "url": "https://wpscan.com/vulnerability/2d96f018-510d-40ab-9e73-76fa44784813" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T06:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-fpfc-3gjg-hfhp/GHSA-fpfc-3gjg-hfhp.json b/advisories/unreviewed/2025/06/GHSA-fpfc-3gjg-hfhp/GHSA-fpfc-3gjg-hfhp.json new file mode 100644 index 0000000000000..10facd7ae3e8f --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-fpfc-3gjg-hfhp/GHSA-fpfc-3gjg-hfhp.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fpfc-3gjg-hfhp", + "modified": "2025-06-09T06:30:22Z", + "published": "2025-06-09T06:30:22Z", + "aliases": [ + "CVE-2025-47712" + ], + "details": "A flaw exists in the nbdkit \"blocksize\" filter that can be triggered by a specific type of client request. When a client requests block status information for a very large data range, exceeding a certain limit, it causes an internal error in the nbdkit, leading to a denial of service.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47712" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2025-47712" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365724" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-190" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T06:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-gx3m-44w2-wmgh/GHSA-gx3m-44w2-wmgh.json b/advisories/unreviewed/2025/06/GHSA-gx3m-44w2-wmgh/GHSA-gx3m-44w2-wmgh.json new file mode 100644 index 0000000000000..870b2a8a240b1 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-gx3m-44w2-wmgh/GHSA-gx3m-44w2-wmgh.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gx3m-44w2-wmgh", + "modified": "2025-06-08T15:30:24Z", + "published": "2025-06-08T15:30:24Z", + "aliases": [ + "CVE-2025-5847" + ], + "details": "A vulnerability has been found in Tenda AC9 15.03.02.13 and classified as critical. Affected by this vulnerability is the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5847" + }, + { + "type": "WEB", + "url": "https://candle-throne-f75.notion.site/Tenda-AC9-formSetSafeWanWebMan-20adf0aa118580a29e80cef9109c947a" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311593" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311593" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.591362" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T14:15:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-gxj7-jffw-wpvg/GHSA-gxj7-jffw-wpvg.json b/advisories/unreviewed/2025/06/GHSA-gxj7-jffw-wpvg/GHSA-gxj7-jffw-wpvg.json new file mode 100644 index 0000000000000..ff37f5598cc42 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-gxj7-jffw-wpvg/GHSA-gxj7-jffw-wpvg.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gxj7-jffw-wpvg", + "modified": "2025-06-08T21:30:30Z", + "published": "2025-06-08T21:30:30Z", + "aliases": [ + "CVE-2025-35005" + ], + "details": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFMAC command that can lead to privilege escalation. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-35005" + }, + { + "type": "WEB", + "url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware" + }, + { + "type": "WEB", + "url": "https://takeonme.org/cves/cve-2025-35005" + }, + { + "type": "WEB", + "url": "https://www.microhardcorp.com/BulletLTE-NA2.php" + }, + { + "type": "WEB", + "url": "https://www.microhardcorp.com/IPn4Gii-NA2.php" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-88" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T21:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-hh8x-xr4m-qghx/GHSA-hh8x-xr4m-qghx.json b/advisories/unreviewed/2025/06/GHSA-hh8x-xr4m-qghx/GHSA-hh8x-xr4m-qghx.json new file mode 100644 index 0000000000000..66325709d398c --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-hh8x-xr4m-qghx/GHSA-hh8x-xr4m-qghx.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hh8x-xr4m-qghx", + "modified": "2025-06-09T09:31:04Z", + "published": "2025-06-09T09:31:04Z", + "aliases": [ + "CVE-2025-5894" + ], + "details": "Smart Parking Management System from Honding Technology has a Missing Authorization vulnerability, allowing remote attackers with regular privileges to access a specific functionality to create administrator accounts, and subsequently log into the system using those accounts.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5894" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/en/cp-139-10171-44c0a-2.html" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/tw/cp-132-10170-e2435-1.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T08:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-hwgr-8pw8-m35m/GHSA-hwgr-8pw8-m35m.json b/advisories/unreviewed/2025/06/GHSA-hwgr-8pw8-m35m/GHSA-hwgr-8pw8-m35m.json new file mode 100644 index 0000000000000..56c7838e94cc7 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-hwgr-8pw8-m35m/GHSA-hwgr-8pw8-m35m.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hwgr-8pw8-m35m", + "modified": "2025-06-09T12:31:12Z", + "published": "2025-06-09T12:31:12Z", + "aliases": [ + "CVE-2025-5873" + ], + "details": "A vulnerability was found in eCharge Hardy Barth Salia PLCC 2.2.0. It has been declared as critical. This vulnerability affects unknown code of the file /firmware.php of the component Web UI. The manipulation of the argument media leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5873" + }, + { + "type": "WEB", + "url": "https://github.com/YZS17/CVE/blob/main/Salia_PLCC/Salia_PLCC_Slave_v2.2.0_File_Upload.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311632" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311632" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.585733" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T11:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-jx3m-4496-3hgp/GHSA-jx3m-4496-3hgp.json b/advisories/unreviewed/2025/06/GHSA-jx3m-4496-3hgp/GHSA-jx3m-4496-3hgp.json new file mode 100644 index 0000000000000..5b76f922156a5 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-jx3m-4496-3hgp/GHSA-jx3m-4496-3hgp.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jx3m-4496-3hgp", + "modified": "2025-06-09T03:32:38Z", + "published": "2025-06-09T03:32:38Z", + "aliases": [ + "CVE-2025-5852" + ], + "details": "A vulnerability classified as critical has been found in Tenda AC6 15.03.05.16. Affected is the function formSetPPTPUserList of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5852" + }, + { + "type": "WEB", + "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC6-formSetPPTPUserList-20a53a41781f801280e7e2dbdbd8625c?source=copy_link" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311598" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311598" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.591392" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T01:15:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-mcj5-584q-96c5/GHSA-mcj5-584q-96c5.json b/advisories/unreviewed/2025/06/GHSA-mcj5-584q-96c5/GHSA-mcj5-584q-96c5.json new file mode 100644 index 0000000000000..93029153493c9 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-mcj5-584q-96c5/GHSA-mcj5-584q-96c5.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mcj5-584q-96c5", + "modified": "2025-06-09T03:32:38Z", + "published": "2025-06-09T03:32:38Z", + "aliases": [ + "CVE-2025-5857" + ], + "details": "A vulnerability was found in code-projects Patient Record Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /urinalysis_record.php. The manipulation of the argument itr_no leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5857" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://github.com/yuyuchenchen/vuln-pdf0605/blob/main/0605CVE.pdf" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311603" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311603" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.591430" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T03:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-mq4q-q9rw-jvph/GHSA-mq4q-q9rw-jvph.json b/advisories/unreviewed/2025/06/GHSA-mq4q-q9rw-jvph/GHSA-mq4q-q9rw-jvph.json new file mode 100644 index 0000000000000..1cdae5d1d6c17 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-mq4q-q9rw-jvph/GHSA-mq4q-q9rw-jvph.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mq4q-q9rw-jvph", + "modified": "2025-06-09T09:31:04Z", + "published": "2025-06-09T09:31:04Z", + "aliases": [ + "CVE-2025-5867" + ], + "details": "A vulnerability classified as critical was found in RT-Thread 5.1.0. This vulnerability affects the function csys_sendto of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument to leads to null pointer dereference.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5867" + }, + { + "type": "WEB", + "url": "https://github.com/RT-Thread/rt-thread/issues/10299" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311626" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311626" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.584129" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-404" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T08:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-pj5v-grmp-4755/GHSA-pj5v-grmp-4755.json b/advisories/unreviewed/2025/06/GHSA-pj5v-grmp-4755/GHSA-pj5v-grmp-4755.json new file mode 100644 index 0000000000000..1aacf188a4ee4 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-pj5v-grmp-4755/GHSA-pj5v-grmp-4755.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pj5v-grmp-4755", + "modified": "2025-06-08T21:30:31Z", + "published": "2025-06-08T21:30:31Z", + "aliases": [ + "CVE-2025-35010" + ], + "details": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNPINGTM command that can lead to privilege escalation. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-35010" + }, + { + "type": "WEB", + "url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware" + }, + { + "type": "WEB", + "url": "https://takeonme.org/cves/cve-2025-35010" + }, + { + "type": "WEB", + "url": "https://www.microhardcorp.com/BulletLTE-NA2.php" + }, + { + "type": "WEB", + "url": "https://www.microhardcorp.com/IPn4Gii-NA2.php" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-88" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T21:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-pvmg-5w26-65m7/GHSA-pvmg-5w26-65m7.json b/advisories/unreviewed/2025/06/GHSA-pvmg-5w26-65m7/GHSA-pvmg-5w26-65m7.json new file mode 100644 index 0000000000000..2be750931a727 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-pvmg-5w26-65m7/GHSA-pvmg-5w26-65m7.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pvmg-5w26-65m7", + "modified": "2025-06-08T21:30:30Z", + "published": "2025-06-08T21:30:30Z", + "aliases": [ + "CVE-2025-35006" + ], + "details": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFPORTFWD command that can lead to privilege escalation. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-35006" + }, + { + "type": "WEB", + "url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware" + }, + { + "type": "WEB", + "url": "https://takeonme.org/cves/cve-2025-35006" + }, + { + "type": "WEB", + "url": "https://www.microhardcorp.com/BulletLTE-NA2.php" + }, + { + "type": "WEB", + "url": "https://www.microhardcorp.com/IPn4Gii-NA2.php" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-88" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T21:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-r7f5-84f4-jjx8/GHSA-r7f5-84f4-jjx8.json b/advisories/unreviewed/2025/06/GHSA-r7f5-84f4-jjx8/GHSA-r7f5-84f4-jjx8.json new file mode 100644 index 0000000000000..c787d01d25ba8 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-r7f5-84f4-jjx8/GHSA-r7f5-84f4-jjx8.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r7f5-84f4-jjx8", + "modified": "2025-06-09T12:31:12Z", + "published": "2025-06-09T12:31:12Z", + "aliases": [ + "CVE-2025-3835" + ], + "details": "Zohocorp ManageEngine Exchange Reporter Plus versions 5721 and prior are vulnerable to Remote code execution in the Content Search module.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3835" + }, + { + "type": "WEB", + "url": "https://www.manageengine.com/products/exchange-reports/advisory/CVE-2025-3835.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T11:15:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-rf7g-v8g6-48q6/GHSA-rf7g-v8g6-48q6.json b/advisories/unreviewed/2025/06/GHSA-rf7g-v8g6-48q6/GHSA-rf7g-v8g6-48q6.json new file mode 100644 index 0000000000000..4f3c9e665caf5 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-rf7g-v8g6-48q6/GHSA-rf7g-v8g6-48q6.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rf7g-v8g6-48q6", + "modified": "2025-06-08T21:30:29Z", + "published": "2025-06-08T21:30:29Z", + "aliases": [ + "CVE-2025-32457" + ], + "details": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_file_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32457" + }, + { + "type": "WEB", + "url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices" + }, + { + "type": "WEB", + "url": "https://takeonme.org/cves/cve-2025-3460" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-88" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T21:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-rmr3-f2f2-5gjh/GHSA-rmr3-f2f2-5gjh.json b/advisories/unreviewed/2025/06/GHSA-rmr3-f2f2-5gjh/GHSA-rmr3-f2f2-5gjh.json new file mode 100644 index 0000000000000..e7b59d24b857e --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-rmr3-f2f2-5gjh/GHSA-rmr3-f2f2-5gjh.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rmr3-f2f2-5gjh", + "modified": "2025-06-08T21:30:31Z", + "published": "2025-06-08T21:30:31Z", + "aliases": [ + "CVE-2025-3460" + ], + "details": "The Quantenna Wi-Fi chipset ships with a local control script, set_tx_pow, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3460" + }, + { + "type": "WEB", + "url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices" + }, + { + "type": "WEB", + "url": "https://takeonme.org/cves/cve-2025-3460" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-88" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T21:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-rqj6-6f2c-2g2c/GHSA-rqj6-6f2c-2g2c.json b/advisories/unreviewed/2025/06/GHSA-rqj6-6f2c-2g2c/GHSA-rqj6-6f2c-2g2c.json new file mode 100644 index 0000000000000..eebbe07914a32 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-rqj6-6f2c-2g2c/GHSA-rqj6-6f2c-2g2c.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rqj6-6f2c-2g2c", + "modified": "2025-06-09T00:30:31Z", + "published": "2025-06-09T00:30:31Z", + "aliases": [ + "CVE-2025-5848" + ], + "details": "A vulnerability was found in Tenda AC15 15.03.05.19_multi and classified as critical. Affected by this issue is the function formSetPPTPUserList of the file /goform/setPptpUserList of the component HTTP POST Request Handler. The manipulation of the argument list leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5848" + }, + { + "type": "WEB", + "url": "https://candle-throne-f75.notion.site/Tenda-AC15-formSetPPTPUserList-20adf0aa118580d080eacb031b89ddc6" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311594" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311594" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.591372" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T22:15:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-rw8p-95qv-rmgj/GHSA-rw8p-95qv-rmgj.json b/advisories/unreviewed/2025/06/GHSA-rw8p-95qv-rmgj/GHSA-rw8p-95qv-rmgj.json new file mode 100644 index 0000000000000..83ab92beb9d44 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-rw8p-95qv-rmgj/GHSA-rw8p-95qv-rmgj.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rw8p-95qv-rmgj", + "modified": "2025-06-09T06:30:21Z", + "published": "2025-06-09T06:30:21Z", + "aliases": [ + "CVE-2025-5860" + ], + "details": "A vulnerability, which was classified as critical, was found in PHPGurukul Maid Hiring Management System 1.0. This affects an unknown part of the file /admin/search-booking-request.php. The manipulation of the argument searchdata leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5860" + }, + { + "type": "WEB", + "url": "https://github.com/kakalalaww/CVE/issues/2" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311619" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311619" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.591910" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T04:15:48Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-v57j-pmmv-88c8/GHSA-v57j-pmmv-88c8.json b/advisories/unreviewed/2025/06/GHSA-v57j-pmmv-88c8/GHSA-v57j-pmmv-88c8.json new file mode 100644 index 0000000000000..fd3208b2292e9 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-v57j-pmmv-88c8/GHSA-v57j-pmmv-88c8.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v57j-pmmv-88c8", + "modified": "2025-06-09T03:32:38Z", + "published": "2025-06-09T03:32:38Z", + "aliases": [ + "CVE-2025-5855" + ], + "details": "A vulnerability, which was classified as critical, was found in Tenda AC6 15.03.05.16. This affects the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument rebootTime leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5855" + }, + { + "type": "WEB", + "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC6-formsetreboottimer-20a53a41781f80c5b6cac51008556c7e?source=copy_link" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311601" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311601" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.591422" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T02:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-v7mq-jjjq-c7p3/GHSA-v7mq-jjjq-c7p3.json b/advisories/unreviewed/2025/06/GHSA-v7mq-jjjq-c7p3/GHSA-v7mq-jjjq-c7p3.json new file mode 100644 index 0000000000000..e3419547e78b9 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-v7mq-jjjq-c7p3/GHSA-v7mq-jjjq-c7p3.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v7mq-jjjq-c7p3", + "modified": "2025-06-09T12:31:10Z", + "published": "2025-06-09T12:31:10Z", + "aliases": [ + "CVE-2025-40675" + ], + "details": "A Reflected Cross-Site Scripting (XSS) vulnerability has been found in Bagisto v2.0.0. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the victim a malicious URL using the parameter 'query' in '/search'. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40675" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/reflected-cross-site-scripting-xss-bagisto" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T10:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-vm2g-hvc6-gm5m/GHSA-vm2g-hvc6-gm5m.json b/advisories/unreviewed/2025/06/GHSA-vm2g-hvc6-gm5m/GHSA-vm2g-hvc6-gm5m.json new file mode 100644 index 0000000000000..f539265b574b6 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-vm2g-hvc6-gm5m/GHSA-vm2g-hvc6-gm5m.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vm2g-hvc6-gm5m", + "modified": "2025-06-09T06:30:23Z", + "published": "2025-06-09T06:30:22Z", + "aliases": [ + "CVE-2025-5864" + ], + "details": "A vulnerability was found in Tenda TDSEE App up to 1.7.12. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /app/ConfirmSmsCode of the component Password Reset Confirmation Code Handler. The manipulation leads to improper restriction of excessive authentication attempts. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.7.15 is able to address this issue. It is recommended to upgrade the affected component.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5864" + }, + { + "type": "WEB", + "url": "https://blog.kevgen.ru/posts/account_takeover_in_tdsee_app" + }, + { + "type": "WEB", + "url": "https://github.com/k3vg3n/researches/blob/main/Account_takeover_in_TDSEE_app.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311623" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311623" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.592074" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-307" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T06:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-vm64-xcc6-8fhj/GHSA-vm64-xcc6-8fhj.json b/advisories/unreviewed/2025/06/GHSA-vm64-xcc6-8fhj/GHSA-vm64-xcc6-8fhj.json new file mode 100644 index 0000000000000..320daa6ab17b4 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-vm64-xcc6-8fhj/GHSA-vm64-xcc6-8fhj.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vm64-xcc6-8fhj", + "modified": "2025-06-09T03:32:38Z", + "published": "2025-06-09T03:32:38Z", + "aliases": [ + "CVE-2025-5853" + ], + "details": "A vulnerability classified as critical was found in Tenda AC6 15.03.05.16. Affected by this vulnerability is the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg. The manipulation of the argument remoteIp leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5853" + }, + { + "type": "WEB", + "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC6-formSetSafeWanWebMan-20a53a41781f80f1a3ebc7931f32a29f?source=copy_link" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311599" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311599" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.591419" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T01:15:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-vmhw-cqjv-v26j/GHSA-vmhw-cqjv-v26j.json b/advisories/unreviewed/2025/06/GHSA-vmhw-cqjv-v26j/GHSA-vmhw-cqjv-v26j.json new file mode 100644 index 0000000000000..bff624ca3b3d1 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-vmhw-cqjv-v26j/GHSA-vmhw-cqjv-v26j.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vmhw-cqjv-v26j", + "modified": "2025-06-09T06:30:22Z", + "published": "2025-06-09T06:30:22Z", + "aliases": [ + "CVE-2025-25209" + ], + "details": "The AuthPolicy metadata on Red Hat Connectivity Link contains an object which stores secretes, however it assumes those secretes are already in the kuadrant-system instead of copying it to the referred namespace. This creates space for a malicious actor with a developer persona access to leak those secrets over HTTP connection, as long the attacker knows the name of the targeted secrets and those secrets are limited to one line only.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25209" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2025-25209" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347438" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T06:15:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-vwm9-6f8w-5whc/GHSA-vwm9-6f8w-5whc.json b/advisories/unreviewed/2025/06/GHSA-vwm9-6f8w-5whc/GHSA-vwm9-6f8w-5whc.json new file mode 100644 index 0000000000000..31866d626a536 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-vwm9-6f8w-5whc/GHSA-vwm9-6f8w-5whc.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vwm9-6f8w-5whc", + "modified": "2025-06-09T09:31:04Z", + "published": "2025-06-09T09:31:04Z", + "aliases": [ + "CVE-2025-5893" + ], + "details": "Smart Parking Management System from Honding Technology has an Exposure of Sensitive Information vulnerability, allowing unauthenticated remote attackers to access a specific page and obtain plaintext administrator credentials.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5893" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/en/cp-139-10169-651d6-2.html" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/tw/cp-132-10167-39c6d-1.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-256" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T07:15:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-w6g8-vwvh-5j95/GHSA-w6g8-vwvh-5j95.json b/advisories/unreviewed/2025/06/GHSA-w6g8-vwvh-5j95/GHSA-w6g8-vwvh-5j95.json new file mode 100644 index 0000000000000..9e7abc81c6c57 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-w6g8-vwvh-5j95/GHSA-w6g8-vwvh-5j95.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w6g8-vwvh-5j95", + "modified": "2025-06-09T06:30:21Z", + "published": "2025-06-09T06:30:21Z", + "aliases": [ + "CVE-2025-5859" + ], + "details": "A vulnerability was found in PHPGurukul Nipah Virus Testing Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /test-details.php. The manipulation of the argument assignto leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5859" + }, + { + "type": "WEB", + "url": "https://github.com/f1rstb100d/myCVE/issues/65" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311605" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311605" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.591443" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T04:15:45Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-w6rq-5ggq-m372/GHSA-w6rq-5ggq-m372.json b/advisories/unreviewed/2025/06/GHSA-w6rq-5ggq-m372/GHSA-w6rq-5ggq-m372.json new file mode 100644 index 0000000000000..ee8f7aa7d5c85 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-w6rq-5ggq-m372/GHSA-w6rq-5ggq-m372.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w6rq-5ggq-m372", + "modified": "2025-06-09T06:30:22Z", + "published": "2025-06-09T06:30:22Z", + "aliases": [ + "CVE-2025-4652" + ], + "details": "The Broadstreet WordPress plugin before 1.51.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4652" + }, + { + "type": "WEB", + "url": "https://wpscan.com/vulnerability/2a18ab96-ba95-4599-824f-df12e4851e6d" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T06:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-w866-3fpp-r6c4/GHSA-w866-3fpp-r6c4.json b/advisories/unreviewed/2025/06/GHSA-w866-3fpp-r6c4/GHSA-w866-3fpp-r6c4.json new file mode 100644 index 0000000000000..5ecd6ae534cb5 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-w866-3fpp-r6c4/GHSA-w866-3fpp-r6c4.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w866-3fpp-r6c4", + "modified": "2025-06-09T06:30:22Z", + "published": "2025-06-09T06:30:22Z", + "aliases": [ + "CVE-2025-5861" + ], + "details": "A vulnerability has been found in Tenda AC7 15.03.06.44 and classified as critical. This vulnerability affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5861" + }, + { + "type": "WEB", + "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC7-fromadvsetlanip-20a53a41781f80038f4fc4b9d927eb9a?source=copy_link" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311620" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311620" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.591960" + }, + { + "type": "WEB", + "url": "https://www.tenda.com.cn" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T05:15:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-w8fr-ppgg-phx3/GHSA-w8fr-ppgg-phx3.json b/advisories/unreviewed/2025/06/GHSA-w8fr-ppgg-phx3/GHSA-w8fr-ppgg-phx3.json new file mode 100644 index 0000000000000..9eea43e2e0747 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-w8fr-ppgg-phx3/GHSA-w8fr-ppgg-phx3.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w8fr-ppgg-phx3", + "modified": "2025-06-09T03:32:38Z", + "published": "2025-06-09T03:32:38Z", + "aliases": [ + "CVE-2025-5858" + ], + "details": "A vulnerability was found in PHPGurukul Nipah Virus Testing Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /patient-report.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5858" + }, + { + "type": "WEB", + "url": "https://github.com/f1rstb100d/myCVE/issues/64" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311604" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311604" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.591440" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T03:15:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-wc8m-52qp-mpc9/GHSA-wc8m-52qp-mpc9.json b/advisories/unreviewed/2025/06/GHSA-wc8m-52qp-mpc9/GHSA-wc8m-52qp-mpc9.json new file mode 100644 index 0000000000000..247da6af930f0 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-wc8m-52qp-mpc9/GHSA-wc8m-52qp-mpc9.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wc8m-52qp-mpc9", + "modified": "2025-06-08T21:30:31Z", + "published": "2025-06-08T21:30:30Z", + "aliases": [ + "CVE-2025-35009" + ], + "details": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNNETSP command that can lead to privilege escalation. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-35009" + }, + { + "type": "WEB", + "url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware" + }, + { + "type": "WEB", + "url": "https://takeonme.org/cves/cve-2025-35009" + }, + { + "type": "WEB", + "url": "https://www.microhardcorp.com/BulletLTE-NA2.php" + }, + { + "type": "WEB", + "url": "https://www.microhardcorp.com/IPn4Gii-NA2.php" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-88" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T21:15:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-wjqp-9vhf-cc8w/GHSA-wjqp-9vhf-cc8w.json b/advisories/unreviewed/2025/06/GHSA-wjqp-9vhf-cc8w/GHSA-wjqp-9vhf-cc8w.json new file mode 100644 index 0000000000000..5ff8800a7601e --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-wjqp-9vhf-cc8w/GHSA-wjqp-9vhf-cc8w.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wjqp-9vhf-cc8w", + "modified": "2025-06-09T12:31:12Z", + "published": "2025-06-09T12:31:12Z", + "aliases": [ + "CVE-2025-41437" + ], + "details": "Zohocorp ManageEngine OpManager, NetFlow Analyzer, Network Configuration Manager, Firewall Analyzer and OpUtils versions 128565 and below are vulnerable to Reflected XSS on the login page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41437" + }, + { + "type": "WEB", + "url": "https://www.manageengine.com/itom/advisory/cve-2025-41437.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T11:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-wpv4-g2wc-qxqh/GHSA-wpv4-g2wc-qxqh.json b/advisories/unreviewed/2025/06/GHSA-wpv4-g2wc-qxqh/GHSA-wpv4-g2wc-qxqh.json new file mode 100644 index 0000000000000..ae885ed61630a --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-wpv4-g2wc-qxqh/GHSA-wpv4-g2wc-qxqh.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wpv4-g2wc-qxqh", + "modified": "2025-06-09T12:31:11Z", + "published": "2025-06-09T12:31:11Z", + "aliases": [ + "CVE-2025-27709" + ], + "details": "Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to authenticated SQL injection in the Service Account Auditing reports.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27709" + }, + { + "type": "WEB", + "url": "https://www.manageengine.com/products/active-directory-audit/cve-2025-27709.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T11:15:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-wwc6-hv89-4c8g/GHSA-wwc6-hv89-4c8g.json b/advisories/unreviewed/2025/06/GHSA-wwc6-hv89-4c8g/GHSA-wwc6-hv89-4c8g.json new file mode 100644 index 0000000000000..763c22c44e909 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-wwc6-hv89-4c8g/GHSA-wwc6-hv89-4c8g.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wwc6-hv89-4c8g", + "modified": "2025-06-08T21:30:29Z", + "published": "2025-06-08T21:30:29Z", + "aliases": [ + "CVE-2025-32455" + ], + "details": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the run_cmd argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32455" + }, + { + "type": "WEB", + "url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices" + }, + { + "type": "WEB", + "url": "https://takeonme.org/cves/cve-2025-3460" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-88" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T21:15:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-x587-ghrp-vp2f/GHSA-x587-ghrp-vp2f.json b/advisories/unreviewed/2025/06/GHSA-x587-ghrp-vp2f/GHSA-x587-ghrp-vp2f.json new file mode 100644 index 0000000000000..447bc91187824 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-x587-ghrp-vp2f/GHSA-x587-ghrp-vp2f.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x587-ghrp-vp2f", + "modified": "2025-06-09T03:32:38Z", + "published": "2025-06-09T03:32:38Z", + "aliases": [ + "CVE-2025-5856" + ], + "details": "A vulnerability has been found in PHPGurukul BP Monitoring Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /registration.php. The manipulation of the argument emailid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5856" + }, + { + "type": "WEB", + "url": "https://github.com/Rmy4x/cve/blob/main/cve2.md" + }, + { + "type": "WEB", + "url": "https://phpgurukul.com" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311602" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311602" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.591426" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T03:15:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-x9cq-hh4v-vrww/GHSA-x9cq-hh4v-vrww.json b/advisories/unreviewed/2025/06/GHSA-x9cq-hh4v-vrww/GHSA-x9cq-hh4v-vrww.json new file mode 100644 index 0000000000000..48836bbfb952a --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-x9cq-hh4v-vrww/GHSA-x9cq-hh4v-vrww.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x9cq-hh4v-vrww", + "modified": "2025-06-08T21:30:29Z", + "published": "2025-06-08T21:30:29Z", + "aliases": [ + "CVE-2025-32459" + ], + "details": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the sync_time argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32459" + }, + { + "type": "WEB", + "url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices" + }, + { + "type": "WEB", + "url": "https://takeonme.org/cves/cve-2025-3460" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-88" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-08T21:15:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-xr69-f8gw-5vr7/GHSA-xr69-f8gw-5vr7.json b/advisories/unreviewed/2025/06/GHSA-xr69-f8gw-5vr7/GHSA-xr69-f8gw-5vr7.json new file mode 100644 index 0000000000000..54d3bf8e17e67 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-xr69-f8gw-5vr7/GHSA-xr69-f8gw-5vr7.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xr69-f8gw-5vr7", + "modified": "2025-06-09T09:31:04Z", + "published": "2025-06-09T09:31:04Z", + "aliases": [ + "CVE-2025-5869" + ], + "details": "A vulnerability, which was classified as critical, was found in RT-Thread 5.1.0. Affected is the function sys_recvfrom of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument from leads to memory corruption.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5869" + }, + { + "type": "WEB", + "url": "https://github.com/RT-Thread/rt-thread/issues/10304" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311628" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311628" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.584135" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T09:15:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/06/GHSA-xxqp-4rfr-9px7/GHSA-xxqp-4rfr-9px7.json b/advisories/unreviewed/2025/06/GHSA-xxqp-4rfr-9px7/GHSA-xxqp-4rfr-9px7.json new file mode 100644 index 0000000000000..bb7de1c24cfe8 --- /dev/null +++ b/advisories/unreviewed/2025/06/GHSA-xxqp-4rfr-9px7/GHSA-xxqp-4rfr-9px7.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xxqp-4rfr-9px7", + "modified": "2025-06-09T09:31:04Z", + "published": "2025-06-09T09:31:04Z", + "aliases": [ + "CVE-2025-5866" + ], + "details": "A vulnerability classified as critical has been found in RT-Thread 5.1.0. This affects the function sys_sigprocmask of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument how leads to improper validation of array index.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5866" + }, + { + "type": "WEB", + "url": "https://github.com/RT-Thread/rt-thread/issues/10300" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.311625" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.311625" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.584127" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-06-09T07:15:22Z" + } +} \ No newline at end of file