Skip to content

Commit 5e6582e

Browse files
Advisory Database Sync
1 parent 161692f commit 5e6582e

File tree

30 files changed

+727
-24
lines changed

30 files changed

+727
-24
lines changed

advisories/unreviewed/2023/04/GHSA-2c69-r2jh-xjvm/GHSA-2c69-r2jh-xjvm.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2c69-r2jh-xjvm",
4-
"modified": "2023-04-20T18:30:50Z",
4+
"modified": "2026-04-20T21:31:37Z",
55
"published": "2023-04-20T18:30:50Z",
66
"aliases": [
77
"CVE-2023-27351"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27351"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-27351"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://www.papercut.com/kb/Main/PO-1216-and-PO-1219"

advisories/unreviewed/2024/03/GHSA-m7gg-q7qj-3r2r/GHSA-m7gg-q7qj-3r2r.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m7gg-q7qj-3r2r",
4-
"modified": "2025-05-30T18:30:51Z",
4+
"modified": "2026-04-20T21:31:37Z",
55
"published": "2024-03-04T18:30:39Z",
66
"aliases": [
77
"CVE-2024-27199"
@@ -23,6 +23,10 @@
2323
"type": "WEB",
2424
"url": "https://github.com/Stuub/RCity-CVE-2024-27198/blob/main/RCity.py"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-27199"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive"

advisories/unreviewed/2025/03/GHSA-g53h-cfhr-24hw/GHSA-g53h-cfhr-24hw.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g53h-cfhr-24hw",
4-
"modified": "2025-11-05T00:31:17Z",
4+
"modified": "2026-04-20T21:31:38Z",
55
"published": "2025-03-24T21:30:33Z",
66
"aliases": [
77
"CVE-2025-2749"
@@ -27,6 +27,10 @@
2727
"type": "WEB",
2828
"url": "https://labs.watchtowr.com/bypassing-authentication-like-its-the-90s-pre-auth-rce-chain-s-in-kentico-xperience-cms"
2929
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-2749"
33+
},
3034
{
3135
"type": "WEB",
3236
"url": "https://www.vulncheck.com/advisories/kentico-xperience-staging-media-file-upload-authenticated-rce"

advisories/unreviewed/2025/06/GHSA-hrwx-88rh-95q7/GHSA-hrwx-88rh-95q7.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hrwx-88rh-95q7",
4-
"modified": "2025-11-03T21:34:05Z",
4+
"modified": "2026-04-20T21:31:38Z",
55
"published": "2025-06-26T21:31:08Z",
66
"aliases": [
77
"CVE-2025-32975"
@@ -31,6 +31,10 @@
3131
"type": "WEB",
3232
"url": "https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978"
3333
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32975"
37+
},
3438
{
3539
"type": "WEB",
3640
"url": "http://seclists.org/fulldisclosure/2025/Jun/25"

advisories/unreviewed/2025/06/GHSA-wmq6-ffv7-gqwf/GHSA-wmq6-ffv7-gqwf.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wmq6-ffv7-gqwf",
4-
"modified": "2025-07-11T15:31:34Z",
4+
"modified": "2026-04-20T21:31:38Z",
55
"published": "2025-06-23T15:31:42Z",
66
"aliases": [
77
"CVE-2025-48700"
@@ -30,6 +30,10 @@
3030
{
3131
"type": "WEB",
3232
"url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-48700"
3337
}
3438
],
3539
"database_specific": {

advisories/unreviewed/2026/02/GHSA-9qpv-49q8-9chx/GHSA-9qpv-49q8-9chx.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9qpv-49q8-9chx",
4-
"modified": "2026-02-25T18:31:38Z",
4+
"modified": "2026-04-20T21:31:38Z",
55
"published": "2026-02-25T18:31:38Z",
66
"aliases": [
77
"CVE-2026-20122"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20122"
2529
}
2630
],
2731
"database_specific": {

advisories/unreviewed/2026/02/GHSA-cf88-f64q-c626/GHSA-cf88-f64q-c626.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cf88-f64q-c626",
4-
"modified": "2026-02-25T18:31:38Z",
4+
"modified": "2026-04-20T21:31:38Z",
55
"published": "2026-02-25T18:31:38Z",
66
"aliases": [
77
"CVE-2026-20133"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20133"
2529
}
2630
],
2731
"database_specific": {

advisories/unreviewed/2026/02/GHSA-mp6j-7g85-8pg2/GHSA-mp6j-7g85-8pg2.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mp6j-7g85-8pg2",
4-
"modified": "2026-02-25T18:31:38Z",
4+
"modified": "2026-04-20T21:31:38Z",
55
"published": "2026-02-25T18:31:38Z",
66
"aliases": [
77
"CVE-2026-20128"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20128"
2529
}
2630
],
2731
"database_specific": {
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2vgw-r373-m9qx",
4+
"modified": "2026-04-20T21:31:46Z",
5+
"published": "2026-04-20T21:31:46Z",
6+
"aliases": [
7+
"CVE-2026-29648"
8+
],
9+
"details": "In OpenXiangShan NEMU, when Smstateen is enabled, clearing mstateen0.ENVCFG does not correctly restrict access to henvcfg and senvcfg. As a result, less-privileged code may read or write these CSRs without the required exception, potentially bypassing intended state-enable based isolation controls in virtualized or multi-privilege environments.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29648"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/OpenXiangShan/NEMU/issues/690"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://github.com/OpenXiangShan/XiangShan/pull/3978"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://docs.riscv.org/reference/isa/priv/smstateen.html"
28+
}
29+
],
30+
"database_specific": {
31+
"cwe_ids": [],
32+
"severity": null,
33+
"github_reviewed": false,
34+
"github_reviewed_at": null,
35+
"nvd_published_at": "2026-04-20T21:16:19Z"
36+
}
37+
}

advisories/unreviewed/2026/04/GHSA-4cgq-vq3r-c9r4/GHSA-4cgq-vq3r-c9r4.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4cgq-vq3r-c9r4",
4-
"modified": "2026-04-20T18:31:49Z",
4+
"modified": "2026-04-20T21:31:43Z",
55
"published": "2026-04-20T18:31:49Z",
66
"aliases": [
77
"CVE-2026-30269"
88
],
99
"details": "Improper access control in Doorman v0.1.0 and v1.0.2 allows any authenticated user to update their own account role to a non-admin privileged role via /platform/user/{username}. The `role` field is accepted by the update model without a manage_users permission check for self-updates, enabling privilege escalation to high-privileged roles.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -24,8 +29,10 @@
2429
}
2530
],
2631
"database_specific": {
27-
"cwe_ids": [],
28-
"severity": null,
32+
"cwe_ids": [
33+
"CWE-269"
34+
],
35+
"severity": "CRITICAL",
2936
"github_reviewed": false,
3037
"github_reviewed_at": null,
3138
"nvd_published_at": "2026-04-20T17:16:33Z"

0 commit comments

Comments
 (0)