Skip to content

Commit 3f85c56

Browse files
Advisory Database Sync
1 parent 80d44f8 commit 3f85c56

60 files changed

Lines changed: 1461 additions & 45 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/unreviewed/2022/07/GHSA-8h8h-mjfx-hghg/GHSA-8h8h-mjfx-hghg.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8h8h-mjfx-hghg",
4-
"modified": "2022-07-16T00:00:21Z",
4+
"modified": "2026-04-07T18:31:29Z",
55
"published": "2022-07-13T00:01:53Z",
66
"aliases": [
77
"CVE-2021-38289"
@@ -23,6 +23,10 @@
2323
"type": "WEB",
2424
"url": "https://github.com/viperbluff/Novastar-VNNOX-iCare-Privilege-Escalation"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://security.novaicare.com/advisory-cve-2021-38289.html"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://twitter.com/viperbluff/status/1439941380244230150?s=20&t=iPSn8eNxaxUKis5OKSQJRQ"

advisories/unreviewed/2026/02/GHSA-3h52-r54r-fvgf/GHSA-3h52-r54r-fvgf.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3h52-r54r-fvgf",
4-
"modified": "2026-03-05T21:30:26Z",
4+
"modified": "2026-04-07T18:31:29Z",
55
"published": "2026-02-08T00:30:59Z",
66
"aliases": [
77
"CVE-2026-25858"

advisories/unreviewed/2026/02/GHSA-7679-g48g-fxpc/GHSA-7679-g48g-fxpc.json

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7679-g48g-fxpc",
4-
"modified": "2026-02-04T21:30:32Z",
4+
"modified": "2026-04-07T18:31:29Z",
55
"published": "2026-02-04T21:30:32Z",
66
"aliases": [
77
"CVE-2025-15555"
@@ -50,6 +50,18 @@
5050
{
5151
"type": "WEB",
5252
"url": "https://vuldb.com/?submit.741901"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://vuldb.com/submit/741901"
57+
},
58+
{
59+
"type": "WEB",
60+
"url": "https://vuldb.com/vuln/343795"
61+
},
62+
{
63+
"type": "WEB",
64+
"url": "https://vuldb.com/vuln/343795/cti"
5365
}
5466
],
5567
"database_specific": {

advisories/unreviewed/2026/02/GHSA-mpqv-244m-cf9r/GHSA-mpqv-244m-cf9r.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mpqv-244m-cf9r",
4-
"modified": "2026-02-27T21:31:21Z",
4+
"modified": "2026-04-07T18:31:29Z",
55
"published": "2026-02-26T21:31:31Z",
66
"aliases": [
77
"CVE-2026-22207"
@@ -35,6 +35,10 @@
3535
"type": "WEB",
3636
"url": "https://github.com/volcengine/OpenViking/pull/310/changes/0251c7045b3f8092c4d2e1565115b1ba23db282f"
3737
},
38+
{
39+
"type": "WEB",
40+
"url": "https://github.com/volcengine/OpenViking/commit/0251c7045b3f8092c4d2e1565115b1ba23db282f"
41+
},
3842
{
3943
"type": "WEB",
4044
"url": "https://www.vulncheck.com/advisories/openviking-missing-root-api-key-allows-anonymous-root-access"

advisories/unreviewed/2026/03/GHSA-3385-wm72-hh52/GHSA-3385-wm72-hh52.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3385-wm72-hh52",
4-
"modified": "2026-03-31T09:31:41Z",
4+
"modified": "2026-04-07T18:31:30Z",
55
"published": "2026-03-31T09:31:41Z",
66
"aliases": [
77
"CVE-2025-41357"
88
],
99
"details": "Reflected Cross-Site Scripting (XSS) vulnerability in Anon Proxy Server v0.104. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending him/her a malicious URL. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.\nIt affects 'host' parameter in '/diagdns.php' endpoint.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2026/03/GHSA-43rw-359f-4h89/GHSA-43rw-359f-4h89.json

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-43rw-359f-4h89",
4-
"modified": "2026-03-19T18:31:16Z",
4+
"modified": "2026-04-07T18:31:29Z",
55
"published": "2026-03-18T21:32:58Z",
66
"aliases": [
77
"CVE-2026-3479"
@@ -27,10 +27,22 @@
2727
"type": "WEB",
2828
"url": "https://github.com/python/cpython/pull/146122"
2929
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/python/cpython/commit/5af6ce3e7b643a30a02d22245c1e3f4a8bc0a1fe"
33+
},
3034
{
3135
"type": "WEB",
3236
"url": "https://github.com/python/cpython/commit/bcdf231946b1da8bdfbab4c05539bb0cc964a1c7"
3337
},
38+
{
39+
"type": "WEB",
40+
"url": "https://github.com/python/cpython/commit/cf59bf76470f3d75ad47d80ffb8ce76b64b5e943"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/python/cpython/commit/d786d59a8f7196bb630100a869f28ad13436b59c"
45+
},
3446
{
3547
"type": "WEB",
3648
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/WYLLVQOOCKGK73JM7Z7ZSNOJC4N7BAWY"

advisories/unreviewed/2026/03/GHSA-65q8-p76v-6qj6/GHSA-65q8-p76v-6qj6.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-65q8-p76v-6qj6",
4-
"modified": "2026-03-31T09:31:42Z",
4+
"modified": "2026-04-07T18:31:30Z",
55
"published": "2026-03-31T09:31:42Z",
66
"aliases": [
77
"CVE-2026-3107"
88
],
99
"details": "Stored Cross-Site Scripting (XSS) in Teampass versions prior to 3.1.5.16, affecting the password manager's password import functionality at the endpoint 'redacted/index.php?page=items'. The application fails to properly sanitize and encode user-input data during the import process, allowing malicious JavaScript payloads to be persistently stored in the database. When other users view the imported passwords, the payload is automatically executed in their browsers, resulting in a stored XSS condition at the endpoint 'redacted/index.php?page=items'. Exploiting this vulnerability allows an attacker to execute arbitrary JavaScript code in the context of multiple users and the administrator, which can lead to session hijacking, credential theft, privilege abuse, and compromise of application integrity.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2026/03/GHSA-f28w-75x8-62f8/GHSA-f28w-75x8-62f8.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f28w-75x8-62f8",
4-
"modified": "2026-03-31T09:31:41Z",
4+
"modified": "2026-04-07T18:31:30Z",
55
"published": "2026-03-31T09:31:41Z",
66
"aliases": [
77
"CVE-2025-41356"
88
],
99
"details": "Reflected Cross-Site Scripting (XSS) vulnerability in Anon Proxy Server v0.104. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending him/her a malicious URL. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user. It affects \n'host' parameter in '/diagconnect.php'\n\n endpoint.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2026/03/GHSA-hvcr-3gq9-w43p/GHSA-hvcr-3gq9-w43p.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hvcr-3gq9-w43p",
4-
"modified": "2026-03-31T09:31:41Z",
4+
"modified": "2026-04-07T18:31:30Z",
55
"published": "2026-03-31T09:31:41Z",
66
"aliases": [
77
"CVE-2025-41355"
88
],
99
"details": "Reflected Cross-Site Scripting (XSS) vulnerability in Anon Proxy Server \nv0.104. This vulnerability allows an attacker to execute JavaScript code\n in the victim's browser by sending him/her a malicious URL. This \nvulnerability can be exploited to steal sensitive user data, such as \nsession cookies, or to perform actions on behalf of the user. It affects \n'port' and 'proxyPort' parameters in '/anon.php' endpoint.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2026/03/GHSA-rm92-fj5q-mpj5/GHSA-rm92-fj5q-mpj5.json

Lines changed: 25 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rm92-fj5q-mpj5",
4-
"modified": "2026-03-25T18:31:37Z",
4+
"modified": "2026-04-07T18:31:30Z",
55
"published": "2026-03-20T15:31:14Z",
66
"aliases": [
77
"CVE-2026-4519"
@@ -27,18 +27,38 @@
2727
"type": "WEB",
2828
"url": "https://github.com/python/cpython/pull/143931"
2929
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/python/cpython/commit/3681d47a440865aead912a054d4599087b4270dd"
33+
},
3034
{
3135
"type": "WEB",
3236
"url": "https://github.com/python/cpython/commit/43fe06b96f6a6cf5cfd5bdab20b8649374956866"
3337
},
38+
{
39+
"type": "WEB",
40+
"url": "https://github.com/python/cpython/commit/591ed890270c5697b013bf637029fb3e6cd2d73e"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/python/cpython/commit/594b5a05dc9913880ac92eded440defbf32a28d1"
45+
},
3446
{
3547
"type": "WEB",
3648
"url": "https://github.com/python/cpython/commit/82a24a4442312bdcfc4c799885e8b3e00990f02b"
3749
},
50+
{
51+
"type": "WEB",
52+
"url": "https://github.com/python/cpython/commit/89bfb8e5ed3c7caa241028f1a4eac5f6275a46a4"
53+
},
3854
{
3955
"type": "WEB",
4056
"url": "https://github.com/python/cpython/commit/9669a912a0e329c094e992204d6bdb8787024d76"
4157
},
58+
{
59+
"type": "WEB",
60+
"url": "https://github.com/python/cpython/commit/96fc5048605863c7b6fd6289643feb0e97edd96c"
61+
},
4262
{
4363
"type": "WEB",
4464
"url": "https://github.com/python/cpython/commit/ad4d5ba32af4d80b0dfa2ba9d8203bfb219e60a5"
@@ -47,6 +67,10 @@
4767
"type": "WEB",
4868
"url": "https://github.com/python/cpython/commit/cbba6119391112aba9c5aebf7b94aea447922c48"
4969
},
70+
{
71+
"type": "WEB",
72+
"url": "https://github.com/python/cpython/commit/cc023511238ad93ecc8796157c6f9139a2bb2932"
73+
},
5074
{
5175
"type": "WEB",
5276
"url": "https://github.com/python/cpython/commit/ceac1efc66516ac387eef2c9a0ce671895b44f03"

0 commit comments

Comments
 (0)