Skip to content

File tree

24 files changed

+967
-1
lines changed

24 files changed

+967
-1
lines changed

advisories/unreviewed/2026/02/GHSA-mp88-q525-44rp/GHSA-mp88-q525-44rp.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mp88-q525-44rp",
4-
"modified": "2026-02-06T12:30:25Z",
4+
"modified": "2026-03-05T09:30:32Z",
55
"published": "2026-02-06T12:30:25Z",
66
"aliases": [
77
"CVE-2026-24924"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://consumer.huawei.com/en/support/bulletin/2026/2"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://consumer.huawei.com/en/support/bulletin/2026/3"
2529
}
2630
],
2731
"database_specific": {
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2fv9-x5cx-m494",
4+
"modified": "2026-03-05T09:30:33Z",
5+
"published": "2026-03-05T09:30:33Z",
6+
"aliases": [
7+
"CVE-2026-28536"
8+
],
9+
"details": "Authentication bypass vulnerability in the device authentication module. Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28536"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://consumer.huawei.com/en/support/bulletin/2026/3"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://consumer.huawei.com/en/support/bulletinlaptops/2026/3"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://consumer.huawei.com/en/support/bulletinvision/2026/3"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-305"
38+
],
39+
"severity": "CRITICAL",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2026-03-05T07:16:13Z"
43+
}
44+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2q32-mmxp-hxr7",
4+
"modified": "2026-03-05T09:30:34Z",
5+
"published": "2026-03-05T09:30:34Z",
6+
"aliases": [
7+
"CVE-2026-21786"
8+
],
9+
"details": "HCL Sametime for iOS is impacted by a sensitive information disclosure. Hostnames information is written in application logs and certain URLs.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21786"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0128949"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-532"
30+
],
31+
"severity": "LOW",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-03-05T08:15:58Z"
35+
}
36+
}
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3cff-w54f-j96w",
4+
"modified": "2026-03-05T09:30:34Z",
5+
"published": "2026-03-05T09:30:34Z",
6+
"aliases": [
7+
"CVE-2026-28537"
8+
],
9+
"details": "Double free vulnerability in the window module. Impact: Successful exploitation of this vulnerability may affect availability.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28537"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://consumer.huawei.com/en/support/bulletin/2026/3"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://consumer.huawei.com/en/support/bulletinlaptops/2026/3"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-415"
34+
],
35+
"severity": "MODERATE",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-03-05T08:15:58Z"
39+
}
40+
}
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3hq3-ff7h-6mf5",
4+
"modified": "2026-03-05T09:30:33Z",
5+
"published": "2026-03-05T09:30:33Z",
6+
"aliases": [
7+
"CVE-2026-2743"
8+
],
9+
"details": "Arbitrary File Write via Path Traversal upload to Remote Code Execution in SeppMail User Web Interface. The affected feature is the large file transfer (LFT). This issue affects SeppMail: 15.0.2.1 and before",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:A/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2743"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://downloads.seppmail.com/extrelnotes/150/ERN15.0.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://labs.infoguard.ch/advisories/seppmail"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-22"
34+
],
35+
"severity": "CRITICAL",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-03-05T07:16:14Z"
39+
}
40+
}
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3rc5-p2vw-9hqv",
4+
"modified": "2026-03-05T09:30:35Z",
5+
"published": "2026-03-05T09:30:35Z",
6+
"aliases": [
7+
"CVE-2026-28547"
8+
],
9+
"details": "Vulnerability of uninitialized pointer access in the scanning module. Impact: Successful exploitation of this vulnerability may affect availability.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28547"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://consumer.huawei.com/en/support/bulletin/2026/3"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://consumer.huawei.com/en/support/bulletinlaptops/2026/3"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-824"
34+
],
35+
"severity": "MODERATE",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-03-05T09:16:11Z"
39+
}
40+
}
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3xm9-wqg6-2qvm",
4+
"modified": "2026-03-05T09:30:35Z",
5+
"published": "2026-03-05T09:30:35Z",
6+
"aliases": [
7+
"CVE-2026-2893"
8+
],
9+
"details": "The Page and Post Clone plugin for WordPress is vulnerable to SQL Injection via the 'meta_key' parameter in the content_clone() function in all versions up to, and including, 6.3. This is due to insufficient escaping on the user-supplied meta_key value and insufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. The injection is second-order: the malicious payload is stored as a post meta key and executed when the post is cloned.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2893"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://plugins.trac.wordpress.org/browser/page-or-post-clone/tags/6.3/page-or-post-clone.php#L95"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://plugins.trac.wordpress.org/browser/page-or-post-clone/trunk/page-or-post-clone.php#L95"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3474651%40page-or-post-clone%2Ftrunk&old=3202933%40page-or-post-clone%2Ftrunk&sfp_email=&sfph_mail="
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/85674d8a-96b3-4fae-8bff-900ca78073a4?source=cve"
37+
}
38+
],
39+
"database_specific": {
40+
"cwe_ids": [
41+
"CWE-89"
42+
],
43+
"severity": "MODERATE",
44+
"github_reviewed": false,
45+
"github_reviewed_at": null,
46+
"nvd_published_at": "2026-03-05T08:15:59Z"
47+
}
48+
}
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-44j2-jfxj-37px",
4+
"modified": "2026-03-05T09:30:34Z",
5+
"published": "2026-03-05T09:30:34Z",
6+
"aliases": [
7+
"CVE-2026-28545"
8+
],
9+
"details": "Race condition vulnerability in the printing module. Impact: Successful exploitation of this vulnerability may affect availability.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28545"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://consumer.huawei.com/en/support/bulletin/2026/3"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://consumer.huawei.com/en/support/bulletinlaptops/2026/3"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-362"
34+
],
35+
"severity": "MODERATE",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-03-05T08:15:59Z"
39+
}
40+
}
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4pqh-7xgc-j83m",
4+
"modified": "2026-03-05T09:30:34Z",
5+
"published": "2026-03-05T09:30:34Z",
6+
"aliases": [
7+
"CVE-2026-28550"
8+
],
9+
"details": "Race condition vulnerability in the security control module. Impact: Successful exploitation of this vulnerability may affect availability.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28550"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://consumer.huawei.com/en/support/bulletin/2026/3"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://consumer.huawei.com/en/support/bulletinlaptops/2026/3"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [],
33+
"severity": "MODERATE",
34+
"github_reviewed": false,
35+
"github_reviewed_at": null,
36+
"nvd_published_at": "2026-03-05T08:15:59Z"
37+
}
38+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-685m-vm2f-9ffc",
4+
"modified": "2026-03-05T09:30:35Z",
5+
"published": "2026-03-05T09:30:35Z",
6+
"aliases": [
7+
"CVE-2026-28548"
8+
],
9+
"details": "Vulnerability of improper verification in the email application. Impact: Successful exploitation of this vulnerability may affect service confidentiality.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28548"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://consumer.huawei.com/en/support/bulletin/2026/3"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-269"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-03-05T09:16:11Z"
35+
}
36+
}

0 commit comments

Comments
 (0)