Skip to content

Commit 49820e6

Browse files
Advisory Database Sync
1 parent 833e272 commit 49820e6

27 files changed

Lines changed: 807 additions & 24 deletions

File tree

advisories/unreviewed/2022/05/GHSA-4r4v-f3wv-mqw2/GHSA-4r4v-f3wv-mqw2.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4r4v-f3wv-mqw2",
4-
"modified": "2022-05-14T00:01:52Z",
4+
"modified": "2026-01-22T15:31:28Z",
55
"published": "2022-05-06T00:00:49Z",
66
"aliases": [
77
"CVE-2021-41739"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41739"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://medium.com/%40rootless724/artica-proxy-4-30-cyrus-events-php-rce-3aa2a868c695"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://medium.com/@rootless724/artica-proxy-4-30-cyrus-events-php-rce-3aa2a868c695"

advisories/unreviewed/2024/04/GHSA-vm87-5p79-rw78/GHSA-vm87-5p79-rw78.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vm87-5p79-rw78",
4-
"modified": "2024-04-24T18:30:33Z",
4+
"modified": "2026-01-22T15:31:28Z",
55
"published": "2024-04-24T18:30:33Z",
66
"aliases": [
77
"CVE-2023-47774"
88
],
9-
"details": "Improper Restriction of Rendered UI Layers or Frames vulnerability in Automattic Jetpack allows Clickjacking.This issue affects Jetpack: from n/a before 12.7.\n\n",
9+
"details": "Improper Restriction of Rendered UI Layers or Frames vulnerability in Automattic Jetpack allows Clickjacking.This issue affects Jetpack: from n/a before 12.7.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2024/05/GHSA-44m2-445p-2rrj/GHSA-44m2-445p-2rrj.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-44m2-445p-2rrj",
4-
"modified": "2024-05-14T18:31:02Z",
4+
"modified": "2026-01-22T15:31:28Z",
55
"published": "2024-05-14T18:31:02Z",
66
"aliases": [
77
"CVE-2024-4392"
@@ -29,7 +29,9 @@
2929
}
3030
],
3131
"database_specific": {
32-
"cwe_ids": [],
32+
"cwe_ids": [
33+
"CWE-79"
34+
],
3335
"severity": "MODERATE",
3436
"github_reviewed": false,
3537
"github_reviewed_at": null,

advisories/unreviewed/2025/11/GHSA-49f9-rcrj-v5wp/GHSA-49f9-rcrj-v5wp.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@
3131
"database_specific": {
3232
"cwe_ids": [
3333
"CWE-120",
34+
"CWE-122",
3435
"CWE-787"
3536
],
3637
"severity": "HIGH",

advisories/unreviewed/2025/12/GHSA-4hp4-5c2h-v77h/GHSA-4hp4-5c2h-v77h.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@
3131
"database_specific": {
3232
"cwe_ids": [
3333
"CWE-120",
34+
"CWE-122",
3435
"CWE-787"
3536
],
3637
"severity": "HIGH",
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-28h7-pr55-9w57",
4+
"modified": "2026-01-22T15:31:31Z",
5+
"published": "2026-01-22T15:31:31Z",
6+
"aliases": [
7+
"CVE-2025-10855"
8+
],
9+
"details": "Authorization Bypass Through User-Controlled Key vulnerability in Solvera Software Services Trade Inc. Teknoera allows Exploitation of Trusted Identifiers.This issue affects Teknoera: through 01102025.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10855"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.usom.gov.tr/bildirim/tr-26-0003"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-639"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-01-22T13:16:03Z"
35+
}
36+
}
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2rgp-qxg7-fcg5",
4+
"modified": "2026-01-22T15:31:32Z",
5+
"published": "2026-01-22T15:31:32Z",
6+
"aliases": [
7+
"CVE-2025-15523"
8+
],
9+
"details": "MacOS version of Inkscape bundles a Python interpreter that inherits the Transparency, Consent, and Control (TCC) permissions\ngranted by the user to the main application bundle. An attacker with local user access can\ninvoke this interpreter with arbitrary commands or scripts, leveraging the\napplication's previously granted TCC permissions to access user's files in privacy-protected folders without triggering user prompts. Accessing other resources beyond previously granted TCC permissions will prompt the user for approval in the name of Inkscape, potentially disguising attacker's malicious intent.\n\nThis issue has been fixed in 1.4.3 version of Inkscape.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15523"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://cert.pl/en/posts/2026/01/CVE-2025-15523"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://inkscape.org"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-276"
34+
],
35+
"severity": "MODERATE",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-01-22T15:16:47Z"
39+
}
40+
}

advisories/unreviewed/2026/01/GHSA-2w96-8922-g8xr/GHSA-2w96-8922-g8xr.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2w96-8922-g8xr",
4-
"modified": "2026-01-21T18:30:31Z",
4+
"modified": "2026-01-22T15:31:31Z",
55
"published": "2026-01-21T18:30:31Z",
66
"aliases": [
77
"CVE-2025-69766"
88
],
99
"details": "Tenda AX3 firmware v16.03.12.11 contains a stack-based buffer overflow in the formGetIptv function due to improper handling of the citytag stack buffer, which may result in memory corruption and remote code execution.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -24,8 +29,10 @@
2429
}
2530
],
2631
"database_specific": {
27-
"cwe_ids": [],
28-
"severity": null,
32+
"cwe_ids": [
33+
"CWE-121"
34+
],
35+
"severity": "CRITICAL",
2936
"github_reviewed": false,
3037
"github_reviewed_at": null,
3138
"nvd_published_at": "2026-01-21T18:16:24Z"
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-39cv-xcc4-9q3h",
4+
"modified": "2026-01-22T15:31:32Z",
5+
"published": "2026-01-22T15:31:32Z",
6+
"aliases": [
7+
"CVE-2026-1324"
8+
],
9+
"details": "A vulnerability was identified in Sangfor Operation and Maintenance Management System up to 3.0.12. Affected by this issue is the function SessionController of the file /isomp-protocol/protocol/session of the component SSH Protocol Handler. The manipulation of the argument keypassword leads to os command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1324"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/LX-LX88/cve/issues/20"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.342300"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.342300"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.735716"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-77"
46+
],
47+
"severity": "HIGH",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2026-01-22T15:16:50Z"
51+
}
52+
}
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3rr2-xxqc-95fc",
4+
"modified": "2026-01-22T15:31:32Z",
5+
"published": "2026-01-22T15:31:32Z",
6+
"aliases": [
7+
"CVE-2026-1102"
8+
],
9+
"details": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 12.3 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could have allowed an unauthenticated user to create a denial of service condition by sending repeated malformed SSH authentication requests.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1102"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://about.gitlab.com/releases/2026/01/21/patch-release-gitlab-18-8-2-released"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/579746"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-770"
34+
],
35+
"severity": "MODERATE",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-01-22T15:16:50Z"
39+
}
40+
}

0 commit comments

Comments
 (0)