Skip to content

File tree

11 files changed

+511
-2
lines changed

11 files changed

+511
-2
lines changed

advisories/github-reviewed/2025/09/GHSA-wp3j-xq48-xpjw/GHSA-wp3j-xq48-xpjw.json

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wp3j-xq48-xpjw",
4-
"modified": "2026-02-09T21:31:02Z",
4+
"modified": "2026-02-16T09:30:30Z",
55
"published": "2025-09-04T20:01:54Z",
66
"aliases": [
77
"CVE-2025-9566"
@@ -122,6 +122,10 @@
122122
"type": "WEB",
123123
"url": "https://access.redhat.com/errata/RHSA-2025:18217"
124124
},
125+
{
126+
"type": "WEB",
127+
"url": "https://access.redhat.com/errata/RHSA-2025:17669"
128+
},
125129
{
126130
"type": "WEB",
127131
"url": "https://access.redhat.com/errata/RHSA-2025:16724"
@@ -158,9 +162,21 @@
158162
"type": "WEB",
159163
"url": "https://access.redhat.com/errata/RHSA-2025:15900"
160164
},
165+
{
166+
"type": "WEB",
167+
"url": "https://access.redhat.com/errata/RHEA-2025:4782"
168+
},
161169
{
162170
"type": "WEB",
163171
"url": "https://access.redhat.com/errata/RHBA-2025:16158"
172+
},
173+
{
174+
"type": "WEB",
175+
"url": "https://access.redhat.com/errata/RHBA-2025:15712"
176+
},
177+
{
178+
"type": "WEB",
179+
"url": "https://access.redhat.com/errata/RHBA-2025:15692"
164180
}
165181
],
166182
"database_specific": {
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2425-8942-cjhp",
4+
"modified": "2026-02-16T09:30:30Z",
5+
"published": "2026-02-16T09:30:30Z",
6+
"aliases": [
7+
"CVE-2026-2538"
8+
],
9+
"details": "A security flaw has been discovered in Flos Freeware Notepad2 4.2.22/4.2.23/4.2.24/4.2.25. Affected is an unknown function in the library Msimg32.dll. Performing a manipulation results in uncontrolled search path. Attacking locally is a requirement. The attack's complexity is rated as high. The exploitability is told to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2538"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/Cyber-Wo0dy/report/blob/main/notepad2/4.2.25/notepad2_dll_hijacking.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.346126"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.346126"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.749345"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-426"
46+
],
47+
"severity": "HIGH",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2026-02-16T07:17:00Z"
51+
}
52+
}
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4wc5-h6jc-fhhw",
4+
"modified": "2026-02-16T09:30:30Z",
5+
"published": "2026-02-16T09:30:30Z",
6+
"aliases": [
7+
"CVE-2026-2545"
8+
],
9+
"details": "A weakness has been identified in LigeroSmart up to 6.1.26. Impacted is an unknown function of the file /otrs/index.pl?Action=AgentTicketSearch. This manipulation of the argument Profile causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2545"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/LigeroSmart/ligerosmart/issues/282"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/LigeroSmart/ligerosmart/issues/282#issue-3879165194"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://github.com/LigeroSmart/ligerosmart"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?ctiid.346154"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?id.346154"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://vuldb.com/?submit.749758"
49+
}
50+
],
51+
"database_specific": {
52+
"cwe_ids": [
53+
"CWE-79"
54+
],
55+
"severity": "MODERATE",
56+
"github_reviewed": false,
57+
"github_reviewed_at": null,
58+
"nvd_published_at": "2026-02-16T08:16:05Z"
59+
}
60+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-54wp-f6vm-v42x",
4+
"modified": "2026-02-16T09:30:30Z",
5+
"published": "2026-02-16T09:30:30Z",
6+
"aliases": [
7+
"CVE-2026-2544"
8+
],
9+
"details": "A security flaw has been discovered in yued-fe LuLu UI up to 3.0.0. This issue affects the function child_process.exec of the file run.js. The manipulation results in os command injection. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2544"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/lakshayyverma/CVE-Discovery/blob/main/lulu.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.346153"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.346153"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.749722"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-77"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2026-02-16T08:16:05Z"
51+
}
52+
}
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-5fpg-jg99-g97m",
4+
"modified": "2026-02-16T09:30:30Z",
5+
"published": "2026-02-16T09:30:30Z",
6+
"aliases": [
7+
"CVE-2026-0929"
8+
],
9+
"details": "The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allowing subscribers and above to create forms on the site.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0929"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://wpscan.com/vulnerability/c0f17d83-6199-4676-90ec-4fba1e7fcf0f"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [],
24+
"severity": null,
25+
"github_reviewed": false,
26+
"github_reviewed_at": null,
27+
"nvd_published_at": "2026-02-16T07:17:00Z"
28+
}
29+
}
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-8mxg-vjpv-vxv2",
4+
"modified": "2026-02-16T09:30:30Z",
5+
"published": "2026-02-16T09:30:30Z",
6+
"aliases": [
7+
"CVE-2026-2546"
8+
],
9+
"details": "A security vulnerability has been detected in LigeroSmart up to 6.1.26. The affected element is an unknown function of the file /otrs/index.pl. Such manipulation of the argument SortBy leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2546"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/LigeroSmart/ligerosmart/issues/283"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/LigeroSmart/ligerosmart/issues/283#issue-3879199951"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://github.com/LigeroSmart/ligerosmart"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?ctiid.346155"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?id.346155"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://vuldb.com/?submit.749784"
49+
}
50+
],
51+
"database_specific": {
52+
"cwe_ids": [
53+
"CWE-79"
54+
],
55+
"severity": "MODERATE",
56+
"github_reviewed": false,
57+
"github_reviewed_at": null,
58+
"nvd_published_at": "2026-02-16T09:16:08Z"
59+
}
60+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-c68v-2764-rf86",
4+
"modified": "2026-02-16T09:30:30Z",
5+
"published": "2026-02-16T09:30:30Z",
6+
"aliases": [
7+
"CVE-2026-2543"
8+
],
9+
"details": "A vulnerability was identified in vichan-devel vichan up to 5.1.5. This vulnerability affects unknown code of the file inc/mod/pages.php of the component Password Change Handler. The manipulation of the argument Password leads to unverified password change. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2543"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/lakshayyverma/CVE-Discovery/blob/main/vichan.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.346152"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.346152"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.749716"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-620"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2026-02-16T07:17:01Z"
51+
}
52+
}

0 commit comments

Comments
 (0)