Skip to content

Commit 9f672c5

Browse files
1 parent 7b45f12 commit 9f672c5

4 files changed

Lines changed: 94 additions & 2 deletions

File tree

advisories/unreviewed/2025/07/GHSA-wc34-p4fh-wr9q/GHSA-wc34-p4fh-wr9q.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wc34-p4fh-wr9q",
4-
"modified": "2025-07-31T21:31:54Z",
4+
"modified": "2026-01-12T09:30:30Z",
55
"published": "2025-07-31T21:31:54Z",
66
"aliases": [
77
"CVE-2025-50572"
@@ -23,6 +23,10 @@
2323
"type": "WEB",
2424
"url": "https://github.com/shorooq-hummdi/Archer-csv-injection-command-exec/blob/main/README.md"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.archerirm.community/s/blogs/formula-injection-into-csv-files-vulnerability-in-rsa-archer-6-1-x-and-higher-MCOCQFO3WCQBCCHMKNC74JGSFWQY"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "http://archer.com"

advisories/unreviewed/2026/01/GHSA-7687-3v4j-49fr/GHSA-7687-3v4j-49fr.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7687-3v4j-49fr",
4-
"modified": "2026-01-07T21:31:56Z",
4+
"modified": "2026-01-12T09:30:30Z",
55
"published": "2026-01-07T21:31:56Z",
66
"aliases": [
77
"CVE-2026-22184"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22184"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/madler/zlib/issues/1142"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://github.com/madler/zlib"
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-pgqp-8h46-6x4j",
4+
"modified": "2026-01-12T09:30:31Z",
5+
"published": "2026-01-12T09:30:31Z",
6+
"aliases": [
7+
"CVE-2025-14279"
8+
],
9+
"details": "MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attacks due to a lack of Origin header validation in the MLFlow REST server. This vulnerability allows malicious websites to bypass Same-Origin Policy protections and execute unauthorized calls against REST endpoints. An attacker can query, update, and delete experiments via the affected endpoints, leading to potential data exfiltration, destruction, or manipulation. The issue is resolved in version 3.5.0.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14279"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/mlflow/mlflow/commit/b0ffd289e9b0d0cc32c9e3a9b9f3843ae83dbec3"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://huntr.com/bounties/ef478f72-2e4f-44dc-8055-fc06bef03108"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-346"
34+
],
35+
"severity": "HIGH",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-01-12T09:15:50Z"
39+
}
40+
}
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-vfvj-3wmg-p6fj",
4+
"modified": "2026-01-12T09:30:31Z",
5+
"published": "2026-01-12T09:30:31Z",
6+
"aliases": [
7+
"CVE-2026-0855"
8+
],
9+
"details": "Certain IP Camera models developed by Merit LILIN has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the device.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0855"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.twcert.org.tw/en/cp-139-10626-afbe2-2.html"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.twcert.org.tw/tw/cp-132-10625-fac5c-1.html"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-78"
38+
],
39+
"severity": "HIGH",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2026-01-12T07:16:19Z"
43+
}
44+
}

0 commit comments

Comments
 (0)