Skip to content

Commit 4f4cfdc

Browse files
Advisory Database Sync
1 parent cf6c740 commit 4f4cfdc

File tree

53 files changed

+600
-76
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

53 files changed

+600
-76
lines changed

advisories/unreviewed/2021/12/GHSA-xqxh-cq77-r6qh/GHSA-xqxh-cq77-r6qh.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xqxh-cq77-r6qh",
4-
"modified": "2026-03-09T15:30:31Z",
4+
"modified": "2026-03-09T21:31:32Z",
55
"published": "2021-12-18T00:00:51Z",
66
"aliases": [
77
"CVE-2021-22054"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22054"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-22054"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://www.greynoise.io/blog/new-ssrf-exploitation-surge"

advisories/unreviewed/2024/07/GHSA-8g92-f59v-j999/GHSA-8g92-f59v-j999.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8g92-f59v-j999",
4-
"modified": "2024-07-13T03:30:37Z",
4+
"modified": "2026-03-09T21:31:32Z",
55
"published": "2024-07-13T03:30:37Z",
66
"aliases": [
77
"CVE-2023-39329"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39329"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://access.redhat.com/errata/RHSA-2026:4128"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://access.redhat.com/security/cve/CVE-2023-39329"

advisories/unreviewed/2024/07/GHSA-f7p4-6cq7-whmw/GHSA-f7p4-6cq7-whmw.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f7p4-6cq7-whmw",
4-
"modified": "2024-07-13T03:30:37Z",
4+
"modified": "2026-03-09T21:31:32Z",
55
"published": "2024-07-13T03:30:37Z",
66
"aliases": [
77
"CVE-2023-39327"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39327"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://access.redhat.com/errata/RHSA-2026:4128"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://access.redhat.com/security/cve/CVE-2023-39327"

advisories/unreviewed/2025/09/GHSA-vfrj-f292-3f24/GHSA-vfrj-f292-3f24.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vfrj-f292-3f24",
4-
"modified": "2025-09-23T06:30:27Z",
4+
"modified": "2026-03-09T21:31:32Z",
55
"published": "2025-09-23T06:30:27Z",
66
"aliases": [
77
"CVE-2025-26399"
@@ -23,6 +23,14 @@
2323
"type": "WEB",
2424
"url": "https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-8-7-hotfix-1_release_notes.htm"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-26399"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.microsoft.com/en-us/security/blog/2026/02/06/active-exploitation-solarwinds-web-help-desk"
33+
},
2634
{
2735
"type": "WEB",
2836
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-26399"

advisories/unreviewed/2026/02/GHSA-2j3g-j6qj-x9q2/GHSA-2j3g-j6qj-x9q2.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2j3g-j6qj-x9q2",
4-
"modified": "2026-02-10T18:30:38Z",
4+
"modified": "2026-03-09T21:31:32Z",
55
"published": "2026-02-10T18:30:38Z",
66
"aliases": [
77
"CVE-2026-1603"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-1603"
2529
}
2630
],
2731
"database_specific": {

advisories/unreviewed/2026/02/GHSA-37cc-q9ww-mg9w/GHSA-37cc-q9ww-mg9w.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-37cc-q9ww-mg9w",
4-
"modified": "2026-02-16T12:30:24Z",
4+
"modified": "2026-03-09T21:31:33Z",
55
"published": "2026-02-16T12:30:24Z",
66
"aliases": [
77
"CVE-2025-59905"
88
],
99
"details": "Cross-Site Scripting (XSS) vulnerability reflected in Kubysoft, which occurs through multiple parameters within the endpoint ‘/node/kudaby/nodeFN/procedure’. This flaw allows the injection of arbitrary client-side scripts, which are immediately reflected in the HTTP response and executed in the victim's browser.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2026/02/GHSA-fvcr-8w5m-c388/GHSA-fvcr-8w5m-c388.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fvcr-8w5m-c388",
4-
"modified": "2026-02-16T12:30:24Z",
4+
"modified": "2026-03-09T21:31:32Z",
55
"published": "2026-02-16T12:30:24Z",
66
"aliases": [
77
"CVE-2025-59903"
88
],
99
"details": "Stored Cross-Site Scripting (XSS) vulnerability in Kubysoft, where uploaded SVG images are not properly sanitized. This allows attackers to embed malicious scripts within SVG files as visual content, which are then stored on the server and executed in the context of any user accessing the compromised resource.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:L/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2026/02/GHSA-qrxh-hqj2-g6xg/GHSA-qrxh-hqj2-g6xg.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qrxh-hqj2-g6xg",
4-
"modified": "2026-02-16T12:30:24Z",
4+
"modified": "2026-03-09T21:31:33Z",
55
"published": "2026-02-16T12:30:24Z",
66
"aliases": [
77
"CVE-2025-59904"
88
],
99
"details": "Stored Cross-Site Scripting (XSS) vulnerability in Kubysoft, which is triggered through multiple parameters in the '/kForms/app' endpoint. This issue allows malicious scripts to be injected and executed persistently in the context of users accessing the affected resource.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:L/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-24pw-8cqg-3ppr",
4+
"modified": "2026-03-09T21:31:37Z",
5+
"published": "2026-03-09T21:31:37Z",
6+
"aliases": [
7+
"CVE-2026-30140"
8+
],
9+
"details": "An incorrect access control vulnerability exists in Tenda W15E V02.03.01.26_cn. An unauthenticated attacker can access the /cgi-bin/DownloadCfg/RouterCfm.jpg endpoint to download the configuration file containing plaintext administrator credentials, leading to sensitive information disclosure and potential remote administrative access.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-30140"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/jhx-ui/CVE-Reports/blob/main/README.md#vulnerability-report-tenda-router-sensitive-information-disclosure"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [],
24+
"severity": null,
25+
"github_reviewed": false,
26+
"github_reviewed_at": null,
27+
"nvd_published_at": "2026-03-09T19:16:07Z"
28+
}
29+
}

advisories/unreviewed/2026/03/GHSA-2p8h-37p5-9g77/GHSA-2p8h-37p5-9g77.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,7 @@
3434
],
3535
"database_specific": {
3636
"cwe_ids": [
37+
"CWE-121",
3738
"CWE-787"
3839
],
3940
"severity": "CRITICAL",

0 commit comments

Comments
 (0)