Skip to content

Commit a4a0fb9

Browse files
1 parent 3f9e52f commit a4a0fb9

File tree

3 files changed

+77
-1
lines changed

3 files changed

+77
-1
lines changed
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-fvxq-m6wq-rqqv",
4+
"modified": "2025-06-14T00:30:22Z",
5+
"published": "2025-06-14T00:30:22Z",
6+
"aliases": [
7+
"CVE-2025-24919"
8+
],
9+
"details": "A deserialization of untrusted input vulnerability exists in the cvhDecapsulateCmd functionality of Dell ControlVault3 prior to 5.15.10.14 and ControlVault3 Plus prior to 6.2.26.36. A specially crafted ControlVault response to a command can lead to arbitrary code execution. An attacker can compromise a ControlVault firmware and have it craft a malicious response to trigger this vulnerability.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24919"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.dell.com/support/kbdoc/en-us/000276106/dsa-2025-053"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-502"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-06-13T22:15:18Z"
35+
}
36+
}

advisories/unreviewed/2025/06/GHSA-hm47-446q-7w5f/GHSA-hm47-446q-7w5f.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hm47-446q-7w5f",
4-
"modified": "2025-06-13T21:31:10Z",
4+
"modified": "2025-06-14T00:30:22Z",
55
"published": "2025-06-13T21:31:10Z",
66
"aliases": [
77
"CVE-2025-6083"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://extreme-networks.my.site.com"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000126912"
2529
}
2630
],
2731
"database_specific": {
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-j6h7-76gh-2j3r",
4+
"modified": "2025-06-14T00:30:22Z",
5+
"published": "2025-06-14T00:30:22Z",
6+
"aliases": [
7+
"CVE-2025-25215"
8+
],
9+
"details": "An arbitrary free vulnerability exists in the cv_close functionality of \nDell ControlVault3 prior to 5.15.10.14 and Dell ControlVault3 Plus prior to 6.2.26.36. A specially crafted ControlVault API call \ncan lead to an arbitrary free. An attacker can forge a fake session to \ntrigger this vulnerability.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25215"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.dell.com/support/kbdoc/en-us/000276106/dsa-2025-053"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-763"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-06-13T22:15:19Z"
35+
}
36+
}

0 commit comments

Comments
 (0)