Skip to content

File tree

11 files changed

+154
-10
lines changed

11 files changed

+154
-10
lines changed

advisories/github-reviewed/2025/04/GHSA-73m2-qfq3-56cx/GHSA-73m2-qfq3-56cx.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-73m2-qfq3-56cx",
4-
"modified": "2025-04-24T16:36:08Z",
4+
"modified": "2025-05-17T00:30:25Z",
55
"published": "2025-04-24T12:31:28Z",
66
"aliases": [
77
"CVE-2025-27820"
@@ -59,6 +59,10 @@
5959
{
6060
"type": "WEB",
6161
"url": "https://lists.apache.org/thread/55xhs40ncqv97qvoocok44995xp5kqn8"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://security.netapp.com/advisory/ntap-20250516-0003"
6266
}
6367
],
6468
"database_specific": {

advisories/github-reviewed/2025/04/GHSA-rc42-6c7j-7h5r/GHSA-rc42-6c7j-7h5r.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rc42-6c7j-7h5r",
4-
"modified": "2025-04-28T20:59:16Z",
4+
"modified": "2025-05-17T00:30:25Z",
55
"published": "2025-04-28T09:31:53Z",
66
"aliases": [
77
"CVE-2025-22235"
@@ -126,6 +126,10 @@
126126
"type": "PACKAGE",
127127
"url": "https://github.com/spring-projects/spring-boot"
128128
},
129+
{
130+
"type": "WEB",
131+
"url": "https://security.netapp.com/advisory/ntap-20250516-0010"
132+
},
129133
{
130134
"type": "WEB",
131135
"url": "https://spring.io/security/cve-2025-22235"

advisories/unreviewed/2024/01/GHSA-vrmh-7wgx-mjw7/GHSA-vrmh-7wgx-mjw7.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vrmh-7wgx-mjw7",
4-
"modified": "2024-01-04T15:30:23Z",
4+
"modified": "2025-05-17T00:30:25Z",
55
"published": "2024-01-04T15:30:23Z",
66
"aliases": [
77
"CVE-2023-3726"
88
],
9-
"details": "OCSInventory allow stored email template with special characters that lead to a Stored cross-site Scripting.\n\n",
9+
"details": "OCSInventory allow stored email template with special characters that lead to a Stored cross-site Scripting.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2024/08/GHSA-52jj-6w68-3m25/GHSA-52jj-6w68-3m25.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-52jj-6w68-3m25",
4-
"modified": "2024-08-27T12:30:44Z",
4+
"modified": "2025-05-17T00:30:25Z",
55
"published": "2024-08-27T12:30:44Z",
66
"aliases": [
77
"CVE-2024-8207"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://jira.mongodb.org/browse/SERVER-69507"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://security.netapp.com/advisory/ntap-20250516-0009"
2529
}
2630
],
2731
"database_specific": {

advisories/unreviewed/2024/09/GHSA-pw8j-vg82-pm6c/GHSA-pw8j-vg82-pm6c.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pw8j-vg82-pm6c",
4-
"modified": "2024-09-10T15:31:04Z",
4+
"modified": "2025-05-17T00:30:25Z",
55
"published": "2024-09-10T15:31:04Z",
66
"aliases": [
77
"CVE-2024-8654"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://jira.mongodb.org/browse/SERVER-71477"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://security.netapp.com/advisory/ntap-20250516-0008"
2529
}
2630
],
2731
"database_specific": {

advisories/unreviewed/2025/02/GHSA-7q4p-93g6-4wf9/GHSA-7q4p-93g6-4wf9.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7q4p-93g6-4wf9",
4-
"modified": "2025-05-13T21:30:29Z",
4+
"modified": "2025-05-17T00:30:25Z",
55
"published": "2025-02-25T18:31:24Z",
66
"aliases": [
77
"CVE-2025-26600"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-26600"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://security.netapp.com/advisory/ntap-20250516-0005"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345252"

advisories/unreviewed/2025/02/GHSA-gf8x-6jh7-3mjv/GHSA-gf8x-6jh7-3mjv.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gf8x-6jh7-3mjv",
4-
"modified": "2025-05-13T21:30:30Z",
4+
"modified": "2025-05-17T00:30:25Z",
55
"published": "2025-02-25T18:31:24Z",
66
"aliases": [
77
"CVE-2025-26601"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-26601"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://security.netapp.com/advisory/ntap-20250516-0004"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345251"

advisories/unreviewed/2025/02/GHSA-q3rr-g46f-jgqr/GHSA-q3rr-g46f-jgqr.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q3rr-g46f-jgqr",
4-
"modified": "2025-05-09T03:30:23Z",
4+
"modified": "2025-05-17T00:30:25Z",
55
"published": "2025-02-19T21:31:38Z",
66
"aliases": [
77
"CVE-2025-0624"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0624"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://security.netapp.com/advisory/ntap-20250516-0006"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346112"
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4gpg-x7c9-xm4v",
4+
"modified": "2025-05-17T00:30:25Z",
5+
"published": "2025-05-17T00:30:25Z",
6+
"aliases": [
7+
"CVE-2025-4813"
8+
],
9+
"details": "A vulnerability, which was classified as critical, was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. Affected is an unknown function of the file /edit-phlebotomist.php. The manipulation of the argument mobilenumber leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4813"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/Pjwww13447/pjwww/issues/6"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://phpgurukul.com"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.309270"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.309270"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.573888"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-74"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2025-05-16T22:15:19Z"
55+
}
56+
}

advisories/unreviewed/2025/05/GHSA-8863-jfm6-35xm/GHSA-8863-jfm6-35xm.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8863-jfm6-35xm",
4-
"modified": "2025-05-05T21:31:30Z",
4+
"modified": "2025-05-17T00:30:25Z",
55
"published": "2025-05-05T21:31:30Z",
66
"aliases": [
77
"CVE-2025-1493"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1493"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://security.netapp.com/advisory/ntap-20250516-0001"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://www.ibm.com/support/pages/node/7232518"
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-xfvc-4j77-wjcc",
4+
"modified": "2025-05-17T00:30:25Z",
5+
"published": "2025-05-17T00:30:25Z",
6+
"aliases": [
7+
"CVE-2025-4812"
8+
],
9+
"details": "A vulnerability, which was classified as critical, has been found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. This issue affects some unknown processing of the file /profile.php. The manipulation of the argument mobilenumber leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4812"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/Pjwww13447/pjwww/issues/5"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://phpgurukul.com"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.309269"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.309269"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.573886"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-74"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2025-05-16T22:15:19Z"
55+
}
56+
}

0 commit comments

Comments
 (0)