Skip to content

Commit 37b4619

Browse files
Advisory Database Sync
1 parent 9ddcb19 commit 37b4619

293 files changed

Lines changed: 11432 additions & 142 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/unreviewed/2026/01/GHSA-6v4g-392h-r9mh/GHSA-6v4g-392h-r9mh.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6v4g-392h-r9mh",
4-
"modified": "2026-03-13T21:31:39Z",
4+
"modified": "2026-03-16T15:30:31Z",
55
"published": "2026-01-14T18:31:36Z",
66
"aliases": [
77
"CVE-2025-14242"
@@ -59,6 +59,14 @@
5959
"type": "WEB",
6060
"url": "https://access.redhat.com/errata/RHSA-2026:4550"
6161
},
62+
{
63+
"type": "WEB",
64+
"url": "https://access.redhat.com/errata/RHSA-2026:4553"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://access.redhat.com/errata/RHSA-2026:4554"
69+
},
6270
{
6371
"type": "WEB",
6472
"url": "https://access.redhat.com/security/cve/CVE-2025-14242"

advisories/unreviewed/2026/02/GHSA-3frw-32pg-5m86/GHSA-3frw-32pg-5m86.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3frw-32pg-5m86",
4-
"modified": "2026-02-13T00:32:51Z",
4+
"modified": "2026-03-16T15:30:31Z",
55
"published": "2026-02-12T00:31:03Z",
66
"aliases": [
77
"CVE-2026-20611"
@@ -50,6 +50,10 @@
5050
{
5151
"type": "WEB",
5252
"url": "https://support.apple.com/en-us/126353"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-173"
5357
}
5458
],
5559
"database_specific": {

advisories/unreviewed/2026/02/GHSA-6xrf-46c8-4wmj/GHSA-6xrf-46c8-4wmj.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6xrf-46c8-4wmj",
4-
"modified": "2026-02-13T21:31:34Z",
4+
"modified": "2026-03-16T15:30:31Z",
55
"published": "2026-02-12T00:31:04Z",
66
"aliases": [
77
"CVE-2026-20616"
@@ -34,6 +34,10 @@
3434
{
3535
"type": "WEB",
3636
"url": "https://support.apple.com/en-us/126353"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-176"
3741
}
3842
],
3943
"database_specific": {

advisories/unreviewed/2026/02/GHSA-7fj8-2w2v-gvp9/GHSA-7fj8-2w2v-gvp9.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7fj8-2w2v-gvp9",
4-
"modified": "2026-02-21T06:30:17Z",
4+
"modified": "2026-03-16T15:30:32Z",
55
"published": "2026-02-21T06:30:17Z",
66
"aliases": [
77
"CVE-2026-2861"
@@ -46,6 +46,14 @@
4646
{
4747
"type": "WEB",
4848
"url": "https://vuldb.com/?submit.753966"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "http://www.openwall.com/lists/oss-security/2026/03/15/1"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "http://www.openwall.com/lists/oss-security/2026/03/16/1"
4957
}
5058
],
5159
"database_specific": {

advisories/unreviewed/2026/02/GHSA-f4xv-648j-g6xj/GHSA-f4xv-648j-g6xj.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f4xv-648j-g6xj",
4-
"modified": "2026-02-05T15:31:14Z",
4+
"modified": "2026-03-16T15:30:31Z",
55
"published": "2026-02-05T15:31:14Z",
66
"aliases": [
77
"CVE-2025-13491"

advisories/unreviewed/2026/02/GHSA-pmfg-h9xp-96jh/GHSA-pmfg-h9xp-96jh.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pmfg-h9xp-96jh",
4-
"modified": "2026-02-13T00:32:51Z",
4+
"modified": "2026-03-16T15:30:31Z",
55
"published": "2026-02-12T00:31:05Z",
66
"aliases": [
77
"CVE-2026-20675"
@@ -50,6 +50,10 @@
5050
{
5151
"type": "WEB",
5252
"url": "https://support.apple.com/en-us/126353"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-174"
5357
}
5458
],
5559
"database_specific": {
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-223m-mhgp-x54c",
4+
"modified": "2026-03-16T15:30:40Z",
5+
"published": "2026-03-16T15:30:40Z",
6+
"aliases": [
7+
"CVE-2015-20119"
8+
],
9+
"details": "Next Click Ventures RealtyScript 4.0.2 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious HTML and iframe elements through the text parameter in the pages.php admin interface. Attackers can submit POST requests to the add page action with crafted iframe payloads in the text parameter to store malicious content that executes in the browsers of users viewing the affected pages.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-20119"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.exploit-db.com/exploits/38496"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.vulncheck.com/advisories/realtyscript-stored-cross-site-scripting-via-text-parameter-in-pages-php"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5269.php"
37+
}
38+
],
39+
"database_specific": {
40+
"cwe_ids": [
41+
"CWE-79"
42+
],
43+
"severity": "MODERATE",
44+
"github_reviewed": false,
45+
"github_reviewed_at": null,
46+
"nvd_published_at": "2026-03-16T14:17:47Z"
47+
}
48+
}
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-22gx-8798-xj77",
4+
"modified": "2026-03-16T15:30:40Z",
5+
"published": "2026-03-16T15:30:40Z",
6+
"aliases": [
7+
"CVE-2016-20035"
8+
],
9+
"details": "Wowza Streaming Engine 4.5.0 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions by crafting malicious web pages. Attackers can trick logged-in administrators into visiting a malicious site that submits POST requests to the user edit endpoint to create new admin accounts with arbitrary credentials.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-20035"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.exploit-db.com/exploits/40134"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.vulncheck.com/advisories/wowza-streaming-engine-csrf-via-user-edit-endpoint"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5341.php"
37+
}
38+
],
39+
"database_specific": {
40+
"cwe_ids": [
41+
"CWE-352"
42+
],
43+
"severity": "MODERATE",
44+
"github_reviewed": false,
45+
"github_reviewed_at": null,
46+
"nvd_published_at": "2026-03-16T14:17:50Z"
47+
}
48+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-258c-cqq8-pmrp",
4+
"modified": "2026-03-16T15:30:41Z",
5+
"published": "2026-03-16T15:30:41Z",
6+
"aliases": [
7+
"CVE-2025-15554"
8+
],
9+
"details": "Browser caching of LAPS passwords in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin passwords.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15554"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://labs.reversec.com/advisories/2026/03/admin-passwords-cached-by-browsers-in-truesec-lapswebui"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-525"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-03-16T14:17:56Z"
35+
}
36+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-26fg-fjwm-xwm6",
4+
"modified": "2026-03-16T15:30:44Z",
5+
"published": "2026-03-16T15:30:44Z",
6+
"aliases": [
7+
"CVE-2026-4167"
8+
],
9+
"details": "A vulnerability was determined in Belkin F9K1122 1.00.33. This affects the function formReboot of the file /goform/formReboot. This manipulation of the argument webpage causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4167"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/Litengzheng/vul_db/blob/main/Belkin/vul_152/README.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/Litengzheng/vul_db/blob/main/Belkin/vul_152/README.md#proof-of-concept-poc"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.351074"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.351074"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.769727"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-119"
50+
],
51+
"severity": "HIGH",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2026-03-16T14:19:56Z"
55+
}
56+
}

0 commit comments

Comments
 (0)