Skip to content

Commit 6c3fe0f

Browse files

File tree

6 files changed

+272
-0
lines changed

6 files changed

+272
-0
lines changed
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-62rw-g63g-4696",
4+
"modified": "2025-08-09T00:30:30Z",
5+
"published": "2025-08-09T00:30:30Z",
6+
"aliases": [
7+
"CVE-2025-8741"
8+
],
9+
"details": "A vulnerability was found in macrozheng mall up to 1.0.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/login. The manipulation leads to cleartext transmission of sensitive information. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8741"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/N1n3b9S/cve/issues/10"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/N1n3b9S/cve/issues/10#issue-3262475757"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.319237"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.319237"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.623318"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [],
49+
"severity": "MODERATE",
50+
"github_reviewed": false,
51+
"github_reviewed_at": null,
52+
"nvd_published_at": "2025-08-08T22:16:17Z"
53+
}
54+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-g442-cv6p-6f3m",
4+
"modified": "2025-08-09T00:30:30Z",
5+
"published": "2025-08-09T00:30:30Z",
6+
"aliases": [
7+
"CVE-2025-46709"
8+
],
9+
"details": "Possible memory leak or kernel exceptions caused by reading kernel heap data after free or NULL pointer dereference kernel exception.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46709"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://www.imaginationtech.com/gpu-driver-vulnerabilities"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-416"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-08-09T00:15:26Z"
30+
}
31+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-mhxh-7p9w-pvcq",
4+
"modified": "2025-08-09T00:30:30Z",
5+
"published": "2025-08-09T00:30:30Z",
6+
"aliases": [
7+
"CVE-2025-8742"
8+
],
9+
"details": "A vulnerability was found in macrozheng mall 1.0.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Admin Login. The manipulation leads to improper restriction of excessive authentication attempts. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8742"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/N1n3b9S/cve/issues/12"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.319238"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.319238"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.623319"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-307"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2025-08-08T22:16:18Z"
51+
}
52+
}
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-p34c-25jj-vgmh",
4+
"modified": "2025-08-09T00:30:31Z",
5+
"published": "2025-08-09T00:30:31Z",
6+
"aliases": [
7+
"CVE-2025-8744"
8+
],
9+
"details": "A vulnerability classified as critical was found in CesiumLab Web up to 4.0. This vulnerability affects unknown code of the file /lodmodels/. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8744"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://vuldb.com/?ctiid.319240"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?id.319240"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?submit.616911"
37+
}
38+
],
39+
"database_specific": {
40+
"cwe_ids": [
41+
"CWE-74"
42+
],
43+
"severity": "MODERATE",
44+
"github_reviewed": false,
45+
"github_reviewed_at": null,
46+
"nvd_published_at": "2025-08-09T00:15:26Z"
47+
}
48+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-pqpx-59rc-8jj4",
4+
"modified": "2025-08-09T00:30:30Z",
5+
"published": "2025-08-09T00:30:30Z",
6+
"aliases": [
7+
"CVE-2025-8743"
8+
],
9+
"details": "A vulnerability classified as problematic has been found in Scada-LTS up to 2.7.8.1. This affects an unknown part of the file /data_source_edit.shtm of the component Virtual Data Source Property Handler. The manipulation of the argument Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8743"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-8743.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/Cross-Site_Scripting_(XSS)_Stored_endpoint_data_source_edit.shtm_parameter_name.md#poc"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.319239"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.319239"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.623428"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-79"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2025-08-08T23:15:37Z"
55+
}
56+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-x5ph-c3x5-4wmg",
4+
"modified": "2025-08-09T00:30:30Z",
5+
"published": "2025-08-09T00:30:30Z",
6+
"aliases": [
7+
"CVE-2025-6573"
8+
],
9+
"details": "Kernel software installed and running inside an untrusted/rich execution environment (REE) could leak information from the trusted execution environment (TEE).",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6573"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://www.imaginationtech.com/gpu-driver-vulnerabilities"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-280"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-08-09T00:15:26Z"
30+
}
31+
}

0 commit comments

Comments
 (0)