|
1 | 1 | [ |
2 | 2 | { |
3 | | - "advisory_id": "EUVD-2025-197757", |
| 3 | + "advisory_id": "EUVD-2022-0569", |
4 | 4 | "aliases": [ |
5 | | - "EUVD-2025-197757", |
6 | | - "CVE-2025-13284" |
| 5 | + "EUVD-2022-0569", |
| 6 | + "CVE-2018-1109", |
| 7 | + "GHSA-cwfw-4gq5-mrqx" |
7 | 8 | ], |
8 | | - "summary": "ThinPLUS vulnerability that allows remote code execution", |
| 9 | + "summary": "A vulnerability was found in Braces versions 2.2.0 and above, prior to 2.3.1. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.", |
9 | 10 | "affected_packages": [], |
10 | 11 | "references_v2": [ |
11 | 12 | { |
12 | 13 | "reference_id": "", |
13 | 14 | "reference_type": "", |
14 | | - "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13284" |
| 15 | + "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1109" |
15 | 16 | }, |
16 | 17 | { |
17 | 18 | "reference_id": "", |
18 | 19 | "reference_type": "", |
19 | | - "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-197757" |
| 20 | + "url": "https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451" |
| 21 | + }, |
| 22 | + { |
| 23 | + "reference_id": "", |
| 24 | + "reference_type": "", |
| 25 | + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547272" |
| 26 | + }, |
| 27 | + { |
| 28 | + "reference_id": "", |
| 29 | + "reference_type": "", |
| 30 | + "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2022-0569" |
20 | 31 | } |
21 | 32 | ], |
22 | 33 | "severities": [ |
23 | 34 | { |
24 | 35 | "system": "cvssv3.1", |
25 | | - "value": "9.8", |
26 | | - "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" |
| 36 | + "value": "5.3", |
| 37 | + "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" |
27 | 38 | } |
28 | 39 | ], |
29 | | - "date_published": "2025-01-09T01:00:00+00:00", |
| 40 | + "date_published": "2021-03-30T01:52:55+00:00", |
30 | 41 | "weaknesses": [], |
31 | | - "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-197757" |
| 42 | + "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2022-0569" |
32 | 43 | }, |
33 | 44 | { |
34 | | - "advisory_id": "EUVD-2024-123456", |
| 45 | + "advisory_id": "EUVD-2025-199883", |
35 | 46 | "aliases": [ |
36 | | - "EUVD-2024-123456", |
37 | | - "CVE-2024-12345", |
38 | | - "CVE-2024-67890" |
| 47 | + "EUVD-2025-199883", |
| 48 | + "CVE-2025-66027" |
39 | 49 | ], |
40 | | - "summary": "Multiple vulnerabilities in authentication system", |
| 50 | + "summary": "Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.6, an information disclosure vulnerability exposes participant details, including names and email addresses through the /api/trpc/polls.get,polls.participants.list endpoint, even when Pro privacy features are enabled. This bypasses intended privacy controls that should prevent participants from viewing other users' personal information. This issue has been patched in version 4.5.6.", |
41 | 51 | "affected_packages": [], |
42 | 52 | "references_v2": [ |
43 | 53 | { |
44 | 54 | "reference_id": "", |
45 | 55 | "reference_type": "", |
46 | | - "url": "https://example.com/advisory1" |
| 56 | + "url": "https://github.com/lukevella/rallly/security/advisories/GHSA-65wg-8xgw-f3fg" |
47 | 57 | }, |
48 | 58 | { |
49 | 59 | "reference_id": "", |
50 | 60 | "reference_type": "", |
51 | | - "url": "https://example.com/advisory2" |
| 61 | + "url": "https://github.com/lukevella/rallly/commit/59738c04f9a8ec25f0af5ce20ad0eab6cf134963" |
52 | 62 | }, |
53 | 63 | { |
54 | 64 | "reference_id": "", |
55 | 65 | "reference_type": "", |
56 | | - "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2024-123456" |
| 66 | + "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-199883" |
57 | 67 | } |
58 | 68 | ], |
59 | 69 | "severities": [ |
60 | 70 | { |
61 | | - "system": "cvssv3.1", |
62 | | - "value": "7.5", |
63 | | - "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" |
| 71 | + "system": "cvssv4", |
| 72 | + "value": "7.1", |
| 73 | + "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N" |
64 | 74 | } |
65 | 75 | ], |
66 | | - "date_published": "2024-12-15T10:30:00+00:00", |
| 76 | + "date_published": "2025-11-29T00:43:02+00:00", |
67 | 77 | "weaknesses": [], |
68 | | - "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2024-123456" |
| 78 | + "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-199883" |
69 | 79 | }, |
70 | 80 | { |
71 | | - "advisory_id": "EUVD-2023-999999", |
| 81 | + "advisory_id": "EUVD-2025-199882", |
72 | 82 | "aliases": [ |
73 | | - "EUVD-2023-999999", |
74 | | - "CVE-2023-99999" |
| 83 | + "EUVD-2025-199882", |
| 84 | + "CVE-2025-66034" |
75 | 85 | ], |
76 | | - "summary": "Denial of service vulnerability", |
| 86 | + "summary": "fontTools is a library for manipulating fonts, written in Python. In versions from 4.33.0 to before 4.60.2, the fonttools varLib (or python3 -m fontTools.varLib) script has an arbitrary file write vulnerability that leads to remote code execution when a malicious .designspace file is processed. The vulnerability affects the main() code path of fontTools.varLib, used by the fonttools varLib CLI and any code that invokes fontTools.varLib.main(). This issue has been patched in version 4.60.2.", |
77 | 87 | "affected_packages": [], |
78 | 88 | "references_v2": [ |
79 | 89 | { |
80 | 90 | "reference_id": "", |
81 | 91 | "reference_type": "", |
82 | | - "url": "https://security.example.org/2023-999999" |
| 92 | + "url": "https://github.com/fonttools/fonttools/security/advisories/GHSA-768j-98cg-p3fv" |
83 | 93 | }, |
84 | 94 | { |
85 | 95 | "reference_id": "", |
86 | 96 | "reference_type": "", |
87 | | - "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2023-999999" |
| 97 | + "url": "https://github.com/fonttools/fonttools/commit/a696d5ba93270d5954f98e7cab5ddca8a02c1e32" |
| 98 | + }, |
| 99 | + { |
| 100 | + "reference_id": "", |
| 101 | + "reference_type": "", |
| 102 | + "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-199882" |
88 | 103 | } |
89 | 104 | ], |
90 | 105 | "severities": [ |
91 | 106 | { |
92 | | - "system": "cvssv3", |
93 | | - "value": "5.3", |
94 | | - "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" |
| 107 | + "system": "cvssv3.1", |
| 108 | + "value": "6.3", |
| 109 | + "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L" |
95 | 110 | } |
96 | 111 | ], |
97 | | - "date_published": "2023-06-20T14:22:00+00:00", |
| 112 | + "date_published": "2025-11-29T01:07:12+00:00", |
98 | 113 | "weaknesses": [], |
99 | | - "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2023-999999" |
| 114 | + "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-199882" |
100 | 115 | }, |
101 | 116 | { |
102 | | - "advisory_id": "EUVD-2022-555555", |
| 117 | + "advisory_id": "EUVD-2025-199921", |
103 | 118 | "aliases": [ |
104 | | - "EUVD-2022-555555", |
105 | | - "CVE-2022-55555" |
| 119 | + "EUVD-2025-199921", |
| 120 | + "CVE-2025-66420" |
106 | 121 | ], |
107 | | - "summary": "", |
| 122 | + "summary": "Tryton sao (aka tryton-sao) before 7.6.9 allows XSS via an HTML attachment. This is fixed in 7.6.9, 7.4.19, 7.0.38, and 6.0.67.", |
108 | 123 | "affected_packages": [], |
109 | 124 | "references_v2": [ |
110 | 125 | { |
111 | 126 | "reference_id": "", |
112 | 127 | "reference_type": "", |
113 | | - "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2022-555555" |
| 128 | + "url": "https://discuss.tryton.org/t/security-release-for-issue-14290/8895" |
| 129 | + }, |
| 130 | + { |
| 131 | + "reference_id": "", |
| 132 | + "reference_type": "", |
| 133 | + "url": "https://foss.heptapod.net/tryton/tryton/-/issues/14290" |
| 134 | + }, |
| 135 | + { |
| 136 | + "reference_id": "", |
| 137 | + "reference_type": "", |
| 138 | + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66420" |
| 139 | + }, |
| 140 | + { |
| 141 | + "reference_id": "", |
| 142 | + "reference_type": "", |
| 143 | + "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-199921" |
114 | 144 | } |
115 | 145 | ], |
116 | 146 | "severities": [ |
117 | 147 | { |
118 | | - "system": "cvssv2", |
119 | | - "value": "4.3", |
120 | | - "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" |
| 148 | + "system": "cvssv3.1", |
| 149 | + "value": "5.4", |
| 150 | + "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" |
121 | 151 | } |
122 | 152 | ], |
123 | | - "date_published": "2022-03-10T08:15:00+00:00", |
| 153 | + "date_published": "2025-11-30T00:00:00+00:00", |
124 | 154 | "weaknesses": [], |
125 | | - "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2022-555555" |
| 155 | + "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-199921" |
126 | 156 | }, |
127 | 157 | { |
128 | | - "advisory_id": "EUVD-2021-111111", |
| 158 | + "advisory_id": "EUVD-2025-199889", |
129 | 159 | "aliases": [ |
130 | | - "EUVD-2021-111111" |
| 160 | + "EUVD-2025-199889", |
| 161 | + "CVE-2025-66036" |
131 | 162 | ], |
132 | | - "summary": "Advisory without CVE alias but with EUVD ID", |
| 163 | + "summary": "Retro is an online platform providing items of vintage collections. Prior to version 2.4.7, Retro is vulnerable to a cross-site scripting (XSS) in the input handling component. This issue has been patched in version 2.4.7.", |
133 | 164 | "affected_packages": [], |
134 | 165 | "references_v2": [ |
135 | 166 | { |
136 | 167 | "reference_id": "", |
137 | 168 | "reference_type": "", |
138 | | - "url": "https://euvd.example.org/2021-111111" |
| 169 | + "url": "https://github.com/Anjaliavv51/Retro/security/advisories/GHSA-gvv6-p6h6-2vj2" |
139 | 170 | }, |
140 | 171 | { |
141 | 172 | "reference_id": "", |
142 | 173 | "reference_type": "", |
143 | | - "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2021-111111" |
| 174 | + "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-199889" |
144 | 175 | } |
145 | 176 | ], |
146 | 177 | "severities": [ |
147 | 178 | { |
148 | 179 | "system": "cvssv3.1", |
149 | | - "value": "6.5", |
150 | | - "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" |
| 180 | + "value": "6.1", |
| 181 | + "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" |
151 | 182 | } |
152 | 183 | ], |
153 | | - "date_published": "2021-11-05T16:45:00+00:00", |
| 184 | + "date_published": "2025-11-29T01:14:38+00:00", |
154 | 185 | "weaknesses": [], |
155 | | - "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2021-111111" |
| 186 | + "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-199889" |
156 | 187 | } |
157 | 188 | ] |
0 commit comments