Skip to content

Commit 04b10a3

Browse files
Advisory Database Sync
1 parent ce375ec commit 04b10a3

49 files changed

Lines changed: 912 additions & 105 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/github-reviewed/2026/03/GHSA-7q7g-x6vg-xpc3/GHSA-7q7g-x6vg-xpc3.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7q7g-x6vg-xpc3",
4-
"modified": "2026-03-26T18:32:54Z",
4+
"modified": "2026-03-27T21:31:24Z",
55
"published": "2026-03-26T18:32:54Z",
66
"aliases": [
77
"CVE-2026-33757"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/openbao/openbao/security/advisories/GHSA-7q7g-x6vg-xpc3"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33757"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/openbao/openbao/commit/e32103951925723e9787e33886ab6b6ec20f4964"
@@ -60,6 +64,6 @@
6064
"severity": "CRITICAL",
6165
"github_reviewed": true,
6266
"github_reviewed_at": "2026-03-26T18:32:54Z",
63-
"nvd_published_at": null
67+
"nvd_published_at": "2026-03-27T15:16:57Z"
6468
}
6569
}

advisories/github-reviewed/2026/03/GHSA-h6c8-cww8-35hf/GHSA-h6c8-cww8-35hf.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-h6c8-cww8-35hf",
4-
"modified": "2026-03-26T17:21:50Z",
4+
"modified": "2026-03-27T21:30:41Z",
55
"published": "2026-03-26T17:21:50Z",
66
"aliases": [
77
"CVE-2026-33729"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/openfga/openfga/security/advisories/GHSA-h6c8-cww8-35hf"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33729"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/openfga/openfga/commit/049b50ccd2cc7e163bd897f3d17a7b859ad146f8"
@@ -62,6 +66,6 @@
6266
"severity": "MODERATE",
6367
"github_reviewed": true,
6468
"github_reviewed_at": "2026-03-26T17:21:50Z",
65-
"nvd_published_at": null
69+
"nvd_published_at": "2026-03-27T01:16:20Z"
6670
}
6771
}

advisories/unreviewed/2025/07/GHSA-783m-53vh-rmp2/GHSA-783m-53vh-rmp2.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-783m-53vh-rmp2",
4-
"modified": "2025-07-25T15:30:41Z",
4+
"modified": "2026-03-27T21:31:31Z",
55
"published": "2025-07-25T15:30:41Z",
66
"aliases": [
77
"CVE-2025-4393"
@@ -22,6 +22,14 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://global.medtronic.com/xg-en/product-security/security-bulletins.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-205-01"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.medtronic.com/en-us/e/product-security/security-bulletins/mycarelink-patient-monitor-vulnerabilities.html"
2533
}
2634
],
2735
"database_specific": {

advisories/unreviewed/2025/07/GHSA-99gr-q2p8-x55m/GHSA-99gr-q2p8-x55m.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-99gr-q2p8-x55m",
4-
"modified": "2025-07-25T15:30:42Z",
4+
"modified": "2026-03-27T21:31:31Z",
55
"published": "2025-07-25T15:30:41Z",
66
"aliases": [
77
"CVE-2025-4394"
@@ -22,6 +22,14 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://global.medtronic.com/xg-en/product-security/security-bulletins.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-205-01"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.medtronic.com/en-us/e/product-security/security-bulletins/mycarelink-patient-monitor-vulnerabilities.html"
2533
}
2634
],
2735
"database_specific": {

advisories/unreviewed/2025/07/GHSA-rxfj-gvqj-6mmm/GHSA-rxfj-gvqj-6mmm.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rxfj-gvqj-6mmm",
4-
"modified": "2025-07-25T15:30:42Z",
4+
"modified": "2026-03-27T21:31:31Z",
55
"published": "2025-07-25T15:30:41Z",
66
"aliases": [
77
"CVE-2025-4395"
@@ -22,6 +22,14 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://global.medtronic.com/xg-en/product-security/security-bulletins.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-205-01"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.medtronic.com/en-us/e/product-security/security-bulletins/mycarelink-patient-monitor-vulnerabilities.html"
2533
}
2634
],
2735
"database_specific": {

advisories/unreviewed/2025/10/GHSA-j3cp-7wh4-9f6c/GHSA-j3cp-7wh4-9f6c.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-j3cp-7wh4-9f6c",
4-
"modified": "2026-03-27T18:31:21Z",
4+
"modified": "2026-03-27T21:31:32Z",
55
"published": "2025-10-15T15:30:28Z",
66
"aliases": [
77
"CVE-2025-53521"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://my.f5.com/manage/s/article/K000156741"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-53521"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2026/01/GHSA-fpp4-775q-mqrm/GHSA-fpp4-775q-mqrm.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fpp4-775q-mqrm",
4-
"modified": "2026-01-13T18:31:09Z",
4+
"modified": "2026-03-27T21:31:32Z",
55
"published": "2026-01-13T18:31:09Z",
66
"aliases": [
77
"CVE-2026-20872"
@@ -22,6 +22,14 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20872"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.vicarius.io/vsociety/posts/cve-2026-20872-detection-script-spoofing-vulnerability-in-windows-ntlm"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.vicarius.io/vsociety/posts/cve-2026-20872-mitigation-script-spoofing-vulnerability-in-windows-ntlm"
2533
}
2634
],
2735
"database_specific": {

advisories/unreviewed/2026/02/GHSA-4mq7-7q99-xhq3/GHSA-4mq7-7q99-xhq3.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4mq7-7q99-xhq3",
4-
"modified": "2026-02-10T18:30:41Z",
4+
"modified": "2026-03-27T21:31:32Z",
55
"published": "2026-02-10T18:30:41Z",
66
"aliases": [
77
"CVE-2026-21253"
@@ -22,6 +22,14 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21253"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.vicarius.io/vsociety/posts/cve-2026-21253-detection-script-elevation-of-privilege-vulnerability-in-mailslot-file-system"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.vicarius.io/vsociety/posts/cve-2026-21253-mitigation-script-elevation-of-privilege-vulnerability-in-mailslot-file-system"
2533
}
2634
],
2735
"database_specific": {

advisories/unreviewed/2026/02/GHSA-cf8p-vhmm-h7g6/GHSA-cf8p-vhmm-h7g6.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cf8p-vhmm-h7g6",
4-
"modified": "2026-02-10T21:31:29Z",
4+
"modified": "2026-03-27T21:31:32Z",
55
"published": "2026-02-10T18:30:42Z",
66
"aliases": [
77
"CVE-2026-21525"
@@ -26,6 +26,14 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21525"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.vicarius.io/vsociety/posts/cve-2026-21525-detection-script-dos-vulnerability-in-windows-remote-access-connection-manager"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.vicarius.io/vsociety/posts/cve-2026-21525-mitigation-script-dos-vulnerability-in-windows-remote-access-connection-manager"
2937
}
3038
],
3139
"database_specific": {

advisories/unreviewed/2026/02/GHSA-qppx-835v-jvwp/GHSA-qppx-835v-jvwp.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qppx-835v-jvwp",
4-
"modified": "2026-02-10T21:31:29Z",
4+
"modified": "2026-03-27T21:31:32Z",
55
"published": "2026-02-10T18:30:42Z",
66
"aliases": [
77
"CVE-2026-21533"
@@ -26,6 +26,14 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21533"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.vicarius.io/vsociety/posts/cve-2026-21533-detection-script-privilege-escalation-vulnerability-in-windows-remote-desktop"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.vicarius.io/vsociety/posts/cve-2026-21533-mitigation-script-privilege-escalation-vulnerability-in-windows-remote-desktop"
2937
}
3038
],
3139
"database_specific": {

0 commit comments

Comments
 (0)