Skip to content

Commit fdbc3d0

Browse files
Advisory Database Sync
1 parent 0cbccba commit fdbc3d0

26 files changed

Lines changed: 554 additions & 18 deletions

File tree

advisories/unreviewed/2022/05/GHSA-326j-j9mx-gf84/GHSA-326j-j9mx-gf84.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-326j-j9mx-gf84",
4-
"modified": "2022-10-01T00:00:27Z",
4+
"modified": "2026-04-14T09:30:36Z",
55
"published": "2022-05-24T19:01:58Z",
66
"aliases": [
77
"CVE-2020-26139"
@@ -19,6 +19,14 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-019200.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-913875.html"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"

advisories/unreviewed/2022/05/GHSA-89fj-xvf5-gc78/GHSA-89fj-xvf5-gc78.json

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,32 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-89fj-xvf5-gc78",
4-
"modified": "2022-05-24T19:01:57Z",
4+
"modified": "2026-04-14T09:30:37Z",
55
"published": "2022-05-24T19:01:57Z",
66
"aliases": [
77
"CVE-2020-26144"
88
],
99
"details": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
1419
"type": "ADVISORY",
1520
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144"
1621
},
22+
{
23+
"type": "WEB",
24+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-019200.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-913875.html"
29+
},
1730
{
1831
"type": "WEB",
1932
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"

advisories/unreviewed/2022/05/GHSA-c49c-jx24-458g/GHSA-c49c-jx24-458g.json

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,32 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c49c-jx24-458g",
4-
"modified": "2022-05-24T19:01:57Z",
4+
"modified": "2026-04-14T09:30:37Z",
55
"published": "2022-05-24T19:01:57Z",
66
"aliases": [
77
"CVE-2020-26143"
88
],
99
"details": "An issue was discovered in the ALFA Windows 10 driver 1030.36.604 for AWUS036ACH. The WEP, WPA, WPA2, and WPA3 implementations accept fragmented plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
1419
"type": "ADVISORY",
1520
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143"
1621
},
22+
{
23+
"type": "WEB",
24+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-019200.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-913875.html"
29+
},
1730
{
1831
"type": "WEB",
1932
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"

advisories/unreviewed/2022/05/GHSA-c6qp-cf89-h54c/GHSA-c6qp-cf89-h54c.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c6qp-cf89-h54c",
4-
"modified": "2022-05-24T19:01:57Z",
4+
"modified": "2026-04-14T09:30:37Z",
55
"published": "2022-05-24T19:01:57Z",
66
"aliases": [
77
"CVE-2020-26145"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-913875.html"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"

advisories/unreviewed/2022/05/GHSA-mq8v-785f-4pmx/GHSA-mq8v-785f-4pmx.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mq8v-785f-4pmx",
4-
"modified": "2022-05-24T19:01:58Z",
4+
"modified": "2026-04-14T09:30:37Z",
55
"published": "2022-05-24T19:01:58Z",
66
"aliases": [
77
"CVE-2020-26141"
@@ -19,6 +19,14 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-019200.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-913875.html"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"

advisories/unreviewed/2022/05/GHSA-pwgj-jw9h-pg74/GHSA-pwgj-jw9h-pg74.json

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,32 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pwgj-jw9h-pg74",
4-
"modified": "2022-05-24T19:01:57Z",
4+
"modified": "2026-04-14T09:30:38Z",
55
"published": "2022-05-24T19:01:57Z",
66
"aliases": [
77
"CVE-2020-26146"
88
],
99
"details": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
1419
"type": "ADVISORY",
1520
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146"
1621
},
22+
{
23+
"type": "WEB",
24+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-019200.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-913875.html"
29+
},
1730
{
1831
"type": "WEB",
1932
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"

advisories/unreviewed/2022/05/GHSA-px4f-q3pw-j682/GHSA-px4f-q3pw-j682.json

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-px4f-q3pw-j682",
4-
"modified": "2022-07-13T00:00:50Z",
4+
"modified": "2026-04-14T09:30:37Z",
55
"published": "2022-05-24T19:01:58Z",
66
"aliases": [
77
"CVE-2020-26140"
@@ -19,6 +19,14 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-019200.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-913875.html"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
@@ -46,6 +54,7 @@
4654
],
4755
"database_specific": {
4856
"cwe_ids": [
57+
"CWE-327",
4958
"CWE-74"
5059
],
5160
"severity": "MODERATE",

advisories/unreviewed/2022/05/GHSA-qrgr-qfr9-4xfh/GHSA-qrgr-qfr9-4xfh.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qrgr-qfr9-4xfh",
4-
"modified": "2022-07-13T00:00:49Z",
4+
"modified": "2026-04-14T09:30:33Z",
55
"published": "2022-05-24T19:01:58Z",
66
"aliases": [
77
"CVE-2020-24588"
@@ -19,6 +19,14 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-019200.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-913875.html"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"

advisories/unreviewed/2022/08/GHSA-9r25-j996-8h38/GHSA-9r25-j996-8h38.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9r25-j996-8h38",
4-
"modified": "2022-08-18T00:00:18Z",
4+
"modified": "2026-04-14T09:30:41Z",
55
"published": "2022-08-11T00:00:43Z",
66
"aliases": [
77
"CVE-2022-36325"
@@ -19,6 +19,14 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36325"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-019200.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-710008.html"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-710008.pdf"

advisories/unreviewed/2022/08/GHSA-hm3h-qvm3-r8qv/GHSA-hm3h-qvm3-r8qv.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hm3h-qvm3-r8qv",
4-
"modified": "2022-08-18T00:00:18Z",
4+
"modified": "2026-04-14T09:30:41Z",
55
"published": "2022-08-11T00:00:42Z",
66
"aliases": [
77
"CVE-2022-36324"
@@ -19,6 +19,14 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36324"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-019200.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://cert-portal.siemens.com/productcert/html/ssa-710008.html"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-710008.pdf"

0 commit comments

Comments
 (0)