Skip to content

Commit 6628e9b

Browse files
1 parent 89a1ac0 commit 6628e9b

File tree

4 files changed

+173
-1
lines changed

4 files changed

+173
-1
lines changed

advisories/unreviewed/2025/02/GHSA-p3g3-qcxj-gm4g/GHSA-p3g3-qcxj-gm4g.json

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-p3g3-qcxj-gm4g",
4-
"modified": "2025-02-03T03:30:53Z",
4+
"modified": "2026-04-19T15:30:17Z",
55
"published": "2025-02-03T03:30:53Z",
66
"aliases": [
77
"CVE-2025-0974"
@@ -27,6 +27,10 @@
2727
"type": "WEB",
2828
"url": "https://gist.github.com/mcdruid/f8153d7d535c0fcba920e83a64953d4e"
2929
},
30+
{
31+
"type": "WEB",
32+
"url": "https://lightning.devs.mx/download"
33+
},
3034
{
3135
"type": "WEB",
3236
"url": "https://vuldb.com/?ctiid.294365"
@@ -38,6 +42,18 @@
3842
{
3943
"type": "WEB",
4044
"url": "https://vuldb.com/?submit.489672"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://vuldb.com/submit/489672"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://vuldb.com/vuln/294365"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://vuldb.com/vuln/294365/cti"
4157
}
4258
],
4359
"database_specific": {
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3v8q-qmgr-97jh",
4+
"modified": "2026-04-19T15:30:18Z",
5+
"published": "2026-04-19T15:30:18Z",
6+
"aliases": [
7+
"CVE-2026-6572"
8+
],
9+
"details": "A security vulnerability has been detected in Collabora KodExplorer up to 4.52. Affected by this issue is some unknown functionality of the file /app/controller/share.class.php of the component fileUpload Endpoint. The manipulation of the argument fileUpload leads to improper authorization. Remote exploitation of the attack is possible. The attack's complexity is rated as high. The exploitation is known to be difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6572"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://vuldb.com/submit/789988"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/vuln/358206"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/vuln/358206/cti"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vulnplus-note.wetolink.com/share/PLCI4v0BWaF8"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-266"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2026-04-19T13:16:45Z"
51+
}
52+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4q2m-7ch2-98qj",
4+
"modified": "2026-04-19T15:30:18Z",
5+
"published": "2026-04-19T15:30:18Z",
6+
"aliases": [
7+
"CVE-2026-6573"
8+
],
9+
"details": "A vulnerability was detected in PHPEMS 11.0. This affects the function temppage of the file /app/exam/controller/exams.master.php of the component Instant Exam Creation Handler. The manipulation of the argument uploadfile results in server-side request forgery. The attack can be executed remotely. The exploit is now public and may be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6573"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://vuldb.com/submit/789990"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/vuln/358207"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/vuln/358207/cti"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vulnplus-note.wetolink.com/share/1QZ4NE0oTRIc"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-918"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2026-04-19T13:16:46Z"
51+
}
52+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-c39q-8682-64fg",
4+
"modified": "2026-04-19T15:30:18Z",
5+
"published": "2026-04-19T15:30:18Z",
6+
"aliases": [
7+
"CVE-2026-6574"
8+
],
9+
"details": "A vulnerability has been found in osuuu LightPicture up to 1.2.2. This issue affects some unknown processing of the file /public/install/lp.sql of the component API Upload Endpoint. Such manipulation of the argument key leads to hard-coded credentials. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6574"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://vuldb.com/submit/790000"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/vuln/358209"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/vuln/358209/cti"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vulnplus-note.wetolink.com/share/VhoNkMja5u7A"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-259"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2026-04-19T14:16:11Z"
51+
}
52+
}

0 commit comments

Comments
 (0)