Skip to content

Commit c88760a

Browse files
Advisory Database Sync
1 parent dd7120a commit c88760a

63 files changed

Lines changed: 1678 additions & 63 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/unreviewed/2022/05/GHSA-77fm-4w36-vpp3/GHSA-77fm-4w36-vpp3.json

Lines changed: 18 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-77fm-4w36-vpp3",
4-
"modified": "2022-05-14T02:35:28Z",
4+
"modified": "2026-04-13T18:30:34Z",
55
"published": "2022-05-14T02:35:28Z",
66
"aliases": [
77
"CVE-2012-1854"
88
],
99
"details": "Untrusted search path vulnerability in VBE6.dll in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Microsoft Visual Basic for Applications (VBA); and Summit Microsoft Visual Basic for Applications SDK allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .docx file, aka \"Visual Basic for Applications Insecure Library Loading Vulnerability,\" as exploited in the wild in July 2012.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -18,17 +23,27 @@
1823
"type": "WEB",
1924
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-046"
2025
},
26+
{
27+
"type": "WEB",
28+
"url": "https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2012/ms12-046"
29+
},
2130
{
2231
"type": "WEB",
2332
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14950"
2433
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2012-1854"
37+
},
2538
{
2639
"type": "WEB",
2740
"url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html"
2841
}
2942
],
3043
"database_specific": {
31-
"cwe_ids": [],
44+
"cwe_ids": [
45+
"CWE-426"
46+
],
3247
"severity": "MODERATE",
3348
"github_reviewed": false,
3449
"github_reviewed_at": null,

advisories/unreviewed/2022/05/GHSA-wxg9-xx37-xj49/GHSA-wxg9-xx37-xj49.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wxg9-xx37-xj49",
4-
"modified": "2025-05-05T18:30:45Z",
4+
"modified": "2026-04-13T18:30:34Z",
55
"published": "2022-05-24T17:26:11Z",
66
"aliases": [
77
"CVE-2020-9715"
@@ -27,6 +27,10 @@
2727
"type": "WEB",
2828
"url": "https://helpx.adobe.com/security/products/acrobat/apsb20-48.html"
2929
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-9715"
33+
},
3034
{
3135
"type": "WEB",
3236
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-991"

advisories/unreviewed/2023/02/GHSA-hjxr-gv9h-rjxc/GHSA-hjxr-gv9h-rjxc.json

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hjxr-gv9h-rjxc",
4-
"modified": "2023-02-14T21:30:30Z",
4+
"modified": "2026-04-13T18:30:34Z",
55
"published": "2023-02-14T21:30:30Z",
66
"aliases": [
77
"CVE-2023-21529"
@@ -22,10 +22,20 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21529"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-21529"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations"
2533
}
2634
],
2735
"database_specific": {
28-
"cwe_ids": [],
36+
"cwe_ids": [
37+
"CWE-502"
38+
],
2939
"severity": "HIGH",
3040
"github_reviewed": false,
3141
"github_reviewed_at": null,

advisories/unreviewed/2023/11/GHSA-5wf7-vwpm-xxwx/GHSA-5wf7-vwpm-xxwx.json

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5wf7-vwpm-xxwx",
4-
"modified": "2023-11-14T18:30:29Z",
4+
"modified": "2026-04-13T18:30:34Z",
55
"published": "2023-11-14T18:30:29Z",
66
"aliases": [
77
"CVE-2023-36424"
@@ -22,10 +22,16 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36424"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36424"
2529
}
2630
],
2731
"database_specific": {
28-
"cwe_ids": [],
32+
"cwe_ids": [
33+
"CWE-125"
34+
],
2935
"severity": "HIGH",
3036
"github_reviewed": false,
3137
"github_reviewed_at": null,

advisories/unreviewed/2025/10/GHSA-9f23-58rv-2hx4/GHSA-9f23-58rv-2hx4.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9f23-58rv-2hx4",
4-
"modified": "2025-10-15T18:31:48Z",
4+
"modified": "2026-04-13T18:30:34Z",
55
"published": "2025-10-14T06:31:13Z",
66
"aliases": [
77
"CVE-2025-11731"
@@ -27,6 +27,10 @@
2727
"type": "WEB",
2828
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403688"
2929
},
30+
{
31+
"type": "WEB",
32+
"url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/151"
33+
},
3034
{
3135
"type": "WEB",
3236
"url": "https://gitlab.gnome.org/GNOME/libxslt/-/merge_requests/78"

advisories/unreviewed/2025/11/GHSA-wmgf-g9pc-mvh3/GHSA-wmgf-g9pc-mvh3.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wmgf-g9pc-mvh3",
4-
"modified": "2025-12-16T18:31:31Z",
4+
"modified": "2026-04-13T18:30:34Z",
55
"published": "2025-11-11T18:30:21Z",
66
"aliases": [
77
"CVE-2025-60710"
@@ -23,6 +23,10 @@
2323
"type": "WEB",
2424
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60710"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-60710"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-60710-detection-script-eop-vulnerability-in-host-process-for-windows-tasks"

advisories/unreviewed/2026/02/GHSA-r6vr-hwpr-qqch/GHSA-r6vr-hwpr-qqch.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-r6vr-hwpr-qqch",
4-
"modified": "2026-03-30T15:31:34Z",
4+
"modified": "2026-04-13T18:30:34Z",
55
"published": "2026-02-06T09:30:29Z",
66
"aliases": [
77
"CVE-2026-21643"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://github.com/0xBlackash/CVE-2026-21643/blob/main/cve-2026-21643.py"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21643"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2026/04/GHSA-3677-p5q3-vx7h/GHSA-3677-p5q3-vx7h.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3677-p5q3-vx7h",
4-
"modified": "2026-04-08T09:31:32Z",
4+
"modified": "2026-04-13T18:30:38Z",
55
"published": "2026-04-08T09:31:32Z",
66
"aliases": [
77
"CVE-2026-39510"
88
],
99
"details": "Authorization Bypass Through User-Controlled Key vulnerability in WP Chill Image Photo Gallery Final Tiles Grid final-tiles-grid-gallery-lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Image Photo Gallery Final Tiles Grid: from n/a through <= 3.6.11.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-639"
2530
],
26-
"severity": null,
31+
"severity": "LOW",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-04-08T09:16:25Z"
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3gpw-5r2f-ch38",
4+
"modified": "2026-04-13T18:30:40Z",
5+
"published": "2026-04-13T18:30:40Z",
6+
"aliases": [
7+
"CVE-2025-31991"
8+
],
9+
"details": "Rate Limiting for attempting a user login is not being properly enforced, making HCL DevOps Velocity susceptible to brute-force attacks past the unsuccessful login attempt limit.  This vulnerability is fixed in 5.1.7.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31991"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0130138"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-307"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-04-13T16:16:24Z"
35+
}
36+
}

advisories/unreviewed/2026/04/GHSA-45jv-8hvx-m25c/GHSA-45jv-8hvx-m25c.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-45jv-8hvx-m25c",
4-
"modified": "2026-04-08T09:31:33Z",
4+
"modified": "2026-04-13T18:30:38Z",
55
"published": "2026-04-08T09:31:32Z",
66
"aliases": [
77
"CVE-2026-39571"
88
],
99
"details": "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Themefic Instantio instantio allows Retrieve Embedded Sensitive Data.This issue affects Instantio: from n/a through <= 3.3.30.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-497"
2530
],
26-
"severity": null,
31+
"severity": "MODERATE",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-04-08T09:16:28Z"

0 commit comments

Comments
 (0)