Skip to content

Commit 3ae6e49

Browse files
Advisory Database Sync
1 parent a709ad5 commit 3ae6e49

73 files changed

Lines changed: 1807 additions & 73 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/unreviewed/2025/02/GHSA-w5j5-j57f-hp27/GHSA-w5j5-j57f-hp27.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-w5j5-j57f-hp27",
4-
"modified": "2025-03-10T21:31:08Z",
4+
"modified": "2026-04-13T15:30:39Z",
55
"published": "2025-02-04T15:31:37Z",
66
"aliases": [
77
"CVE-2025-1015"

advisories/unreviewed/2025/05/GHSA-7rph-qq97-wqp5/GHSA-7rph-qq97-wqp5.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7rph-qq97-wqp5",
4-
"modified": "2025-11-03T21:33:58Z",
4+
"modified": "2026-04-13T15:30:43Z",
55
"published": "2025-05-27T15:31:26Z",
66
"aliases": [
77
"CVE-2025-5264"

advisories/unreviewed/2025/05/GHSA-fjj5-r59g-88g7/GHSA-fjj5-r59g-88g7.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fjj5-r59g-88g7",
4-
"modified": "2025-06-11T12:30:35Z",
4+
"modified": "2026-04-13T15:30:44Z",
55
"published": "2025-05-27T15:31:27Z",
66
"aliases": [
77
"CVE-2025-5265"

advisories/unreviewed/2025/07/GHSA-3q2p-xj33-xm8j/GHSA-3q2p-xj33-xm8j.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3q2p-xj33-xm8j",
4-
"modified": "2025-11-03T21:34:11Z",
4+
"modified": "2026-04-13T15:30:46Z",
55
"published": "2025-07-22T21:31:15Z",
66
"aliases": [
77
"CVE-2025-8030"

advisories/unreviewed/2025/10/GHSA-pwc5-5wfj-q75c/GHSA-pwc5-5wfj-q75c.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pwc5-5wfj-q75c",
4-
"modified": "2025-11-14T18:31:26Z",
4+
"modified": "2026-04-13T15:30:51Z",
55
"published": "2025-10-14T15:31:26Z",
66
"aliases": [
77
"CVE-2025-11713"

advisories/unreviewed/2026/03/GHSA-7649-76jc-fc5r/GHSA-7649-76jc-fc5r.json

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7649-76jc-fc5r",
4-
"modified": "2026-03-31T12:31:35Z",
4+
"modified": "2026-04-13T15:31:07Z",
55
"published": "2026-03-31T12:31:35Z",
66
"aliases": [
77
"CVE-2026-4399"
88
],
99
"details": "Prompt injection vulnerability in 1millionbot Millie chatbot that occurs when a user manages to evade chat restrictions using Boolean prompt injection techniques (formulating a question in such a way that, upon receiving an affirmative response ('true'), the model executes the injected instruction), causing it to return prohibited information and information outside its intended context. Successful exploitation of this vulnerability could allow a malicious remote attacker to abuse the service for purposes other than those originally intended, or even execute out-of-context tasks using 1millionbot's resources and/or OpenAI's API key. This allows the attacker to evade the containment mechanisms implemented during LLM model training and obtain responses or chat behaviors that were originally restricted.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
@@ -25,7 +29,9 @@
2529
}
2630
],
2731
"database_specific": {
28-
"cwe_ids": [],
32+
"cwe_ids": [
33+
"CWE-77"
34+
],
2935
"severity": "HIGH",
3036
"github_reviewed": false,
3137
"github_reviewed_at": null,

advisories/unreviewed/2026/03/GHSA-7h53-73g8-fjvr/GHSA-7h53-73g8-fjvr.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7h53-73g8-fjvr",
4-
"modified": "2026-03-31T12:31:35Z",
4+
"modified": "2026-04-13T15:31:07Z",
55
"published": "2026-03-31T12:31:35Z",
66
"aliases": [
77
"CVE-2026-4400"
88
],
99
"details": "Insecure Direct Object Reference (IDOR) vulnerability in 1millionbot Millie chat that allows private conversations of other users being viewed by simply changing the conversation ID. The vulnerability is present in the endpoint 'api.1millionbot.com/api/public/conversations/' and, if exploited, could allow a remote attacker to access other users private chatbot conversations, revealing sensitive or confidential data without requiring credentials or impersonating users. In order for the vulnerability to be exploited, the attacker must have the user's conversation ID.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2026/03/GHSA-93rm-8cxm-wfv4/GHSA-93rm-8cxm-wfv4.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,9 @@
3333
}
3434
],
3535
"database_specific": {
36-
"cwe_ids": [],
36+
"cwe_ids": [
37+
"CWE-787"
38+
],
3739
"severity": "HIGH",
3840
"github_reviewed": false,
3941
"github_reviewed_at": null,

advisories/unreviewed/2026/03/GHSA-hhqv-q79g-jgfm/GHSA-hhqv-q79g-jgfm.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,9 @@
3333
}
3434
],
3535
"database_specific": {
36-
"cwe_ids": [],
36+
"cwe_ids": [
37+
"CWE-787"
38+
],
3739
"severity": "HIGH",
3840
"github_reviewed": false,
3941
"github_reviewed_at": null,
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-225p-6j6c-7793",
4+
"modified": "2026-04-13T15:31:43Z",
5+
"published": "2026-04-13T15:31:43Z",
6+
"aliases": [
7+
"CVE-2026-6182"
8+
],
9+
"details": "A vulnerability was identified in code-projects Simple Content Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /web/admin/login.php. Such manipulation of the argument User leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6182"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://code-projects.org"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/Xmyronn/simple-cms-sqli-login-bypass-CVE-HUNT-"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/submit/797263"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/vuln/357105"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/vuln/357105/cti"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-74"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2026-04-13T15:17:49Z"
55+
}
56+
}

0 commit comments

Comments
 (0)