Skip to content

Commit 919ae17

Browse files

File tree

5 files changed

+25
-5
lines changed

5 files changed

+25
-5
lines changed

advisories/unreviewed/2024/08/GHSA-8cr7-x5g8-m3f3/GHSA-8cr7-x5g8-m3f3.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8cr7-x5g8-m3f3",
4-
"modified": "2024-08-27T21:31:14Z",
4+
"modified": "2025-12-06T03:30:15Z",
55
"published": "2024-08-27T21:31:14Z",
66
"aliases": [
77
"CVE-2024-5814"
88
],
99
"details": "A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the server hello. https://doi.org/10.46586/tches.v2024.i1.457-500",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:D/RE:M/U:Green"

advisories/unreviewed/2024/10/GHSA-vgjg-5wh9-2grq/GHSA-vgjg-5wh9-2grq.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vgjg-5wh9-2grq",
4-
"modified": "2024-10-10T15:30:32Z",
4+
"modified": "2025-12-06T03:30:15Z",
55
"published": "2024-10-08T09:30:52Z",
66
"aliases": [
77
"CVE-2024-34671"

advisories/unreviewed/2025/03/GHSA-q469-433j-8xc2/GHSA-q469-433j-8xc2.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q469-433j-8xc2",
4-
"modified": "2025-03-07T18:31:06Z",
4+
"modified": "2025-12-06T03:30:15Z",
55
"published": "2025-03-07T18:31:06Z",
66
"aliases": [
77
"CVE-2024-53696"
88
],
99
"details": "A server-side request forgery (SSRF) vulnerability has been reported to affect QuLog Center. If exploited, the vulnerability could allow remote attackers who have gained administrator access to read application data.\n\nWe have already fixed the vulnerability in the following versions:\nQuLog Center 1.7.0.829 ( 2024/10/01 ) and later\nQuLog Center 1.8.0.888 ( 2024/10/15 ) and later\nQTS 4.5.4.2957 build 20241119 and later\nQuTS hero h4.5.4.2956 build 20241119 and later",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/11/GHSA-r8j3-whr2-75m5/GHSA-r8j3-whr2-75m5.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-r8j3-whr2-75m5",
4-
"modified": "2025-11-26T06:31:28Z",
4+
"modified": "2025-12-06T03:30:15Z",
55
"published": "2025-11-26T06:31:28Z",
66
"aliases": [
77
"CVE-2025-59820"
@@ -30,6 +30,10 @@
3030
{
3131
"type": "WEB",
3232
"url": "https://kde.org/info/security/advisory-20250929-1.txt"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00006.html"
3337
}
3438
],
3539
"database_specific": {

advisories/unreviewed/2025/12/GHSA-6h4f-pj3g-q8fq/GHSA-6h4f-pj3g-q8fq.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6h4f-pj3g-q8fq",
4-
"modified": "2025-12-05T00:31:04Z",
4+
"modified": "2025-12-06T03:30:15Z",
55
"published": "2025-12-03T21:31:04Z",
66
"aliases": [
77
"CVE-2024-3884"
@@ -31,6 +31,14 @@
3131
"type": "WEB",
3232
"url": "https://access.redhat.com/errata/RHSA-2025:22777"
3333
},
34+
{
35+
"type": "WEB",
36+
"url": "https://access.redhat.com/errata/RHSA-2025:3990"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://access.redhat.com/errata/RHSA-2025:3992"
41+
},
3442
{
3543
"type": "WEB",
3644
"url": "https://access.redhat.com/security/cve/CVE-2024-3884"

0 commit comments

Comments
 (0)