Skip to content

Commit cd940f9

Browse files
Advisory Database Sync
1 parent 24fa3cc commit cd940f9

File tree

61 files changed

+1619
-51
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+1619
-51
lines changed

advisories/unreviewed/2024/02/GHSA-rpw7-c5cp-v8vp/GHSA-rpw7-c5cp-v8vp.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rpw7-c5cp-v8vp",
4-
"modified": "2024-02-07T03:30:33Z",
4+
"modified": "2026-04-20T18:31:41Z",
55
"published": "2024-02-07T03:30:33Z",
66
"aliases": [
77
"CVE-2024-0849"
88
],
9-
"details": "Leanote version 2.7.0 allows obtaining arbitrary local files. This is possible\n\nbecause the application is vulnerable to LFR.\n\n\n\n\n",
9+
"details": "Leanote version 2.7.0 allows obtaining arbitrary local files. This is possible\n\nbecause the application is vulnerable to LFR.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",

advisories/unreviewed/2025/01/GHSA-3fcc-qfqw-wqr5/GHSA-3fcc-qfqw-wqr5.json

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3fcc-qfqw-wqr5",
4-
"modified": "2025-09-16T18:31:19Z",
4+
"modified": "2026-04-20T18:31:42Z",
55
"published": "2025-01-15T09:30:50Z",
66
"aliases": [
77
"CVE-2024-7322"
@@ -26,7 +26,8 @@
2626
],
2727
"database_specific": {
2828
"cwe_ids": [
29-
"CWE-346"
29+
"CWE-346",
30+
"CWE-940"
3031
],
3132
"severity": "MODERATE",
3233
"github_reviewed": false,

advisories/unreviewed/2025/11/GHSA-r6gx-fcg6-8hhj/GHSA-r6gx-fcg6-8hhj.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-r6gx-fcg6-8hhj",
4-
"modified": "2025-12-22T09:31:24Z",
4+
"modified": "2026-04-20T18:31:42Z",
55
"published": "2025-11-25T09:31:24Z",
66
"aliases": [
77
"CVE-2025-13502"
@@ -67,6 +67,10 @@
6767
"type": "WEB",
6868
"url": "https://access.redhat.com/security/cve/CVE-2025-13502"
6969
},
70+
{
71+
"type": "WEB",
72+
"url": "https://bugs.webkit.org/show_bug.cgi?id=302218"
73+
},
7074
{
7175
"type": "WEB",
7276
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416300"

advisories/unreviewed/2026/02/GHSA-5rc9-qhhx-3j46/GHSA-5rc9-qhhx-3j46.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5rc9-qhhx-3j46",
4-
"modified": "2026-04-14T15:30:28Z",
4+
"modified": "2026-04-20T18:31:42Z",
55
"published": "2026-02-03T00:30:18Z",
66
"aliases": [
77
"CVE-2026-0924"
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-27jw-fcpv-p46x",
4+
"modified": "2026-04-20T18:31:50Z",
5+
"published": "2026-04-20T18:31:49Z",
6+
"aliases": [
7+
"CVE-2026-23757"
8+
],
9+
"details": "GFI HelpDesk before 4.99.10 contains a stored cross-site scripting vulnerability in the Reports module where the title parameter is passed directly to SWIFT_Report::Create() without HTML sanitization. Attackers can inject arbitrary JavaScript into the report title field when creating or editing a report, and the payload executes when staff members view and click the affected report link in the Manage Reports interface.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23757"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://gfi.ai/products-and-solutions/email-and-messaging-solutions/helpdesk/resources/product-releases"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.vulncheck.com/advisories/gfi-helpdesk-stored-xss-via-reports-module"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-79"
38+
],
39+
"severity": "MODERATE",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2026-04-20T18:16:24Z"
43+
}
44+
}

advisories/unreviewed/2026/04/GHSA-28jg-cgg7-j4wc/GHSA-28jg-cgg7-j4wc.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-28jg-cgg7-j4wc",
4-
"modified": "2026-04-20T15:31:52Z",
4+
"modified": "2026-04-20T18:31:46Z",
55
"published": "2026-04-20T15:31:52Z",
66
"aliases": [
77
"CVE-2026-33557"
88
],
99
"details": "A possible security vulnerability has been identified in Apache Kafka.\n\nBy default, the broker property `sasl.oauthbearer.jwt.validator.class` is set to `org.apache.kafka.common.security.oauthbearer.DefaultJwtValidator`. It accepts any JWT token without validating its signature, issuer, or audience. An attacker can generate a JWT token from any issuer with the `preferred_username` set to any user, and the broker will accept it.\n\nWe advise the Kafka users using kafka v4.1.0 or v4.1.1 to set the config `sasl.oauthbearer.jwt.validator.class` to `org.apache.kafka.common.security.oauthbearer.BrokerJwtValidator` explicitly to avoid this vulnerability. Since Kafka v4.1.2 and v4.2.0 and later, the issue is fixed and will correctly validate the JWT token.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -31,7 +36,7 @@
3136
"cwe_ids": [
3237
"CWE-1285"
3338
],
34-
"severity": null,
39+
"severity": "CRITICAL",
3540
"github_reviewed": false,
3641
"github_reviewed_at": null,
3742
"nvd_published_at": "2026-04-20T14:16:18Z"
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2mm2-ghgp-p33q",
4+
"modified": "2026-04-20T18:31:50Z",
5+
"published": "2026-04-20T18:31:50Z",
6+
"aliases": [
7+
"CVE-2026-39111"
8+
],
9+
"details": "SQL Injection vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1.1 in the email parameter of the forgot password page (forgot-password.php). This allows an unauthenticated attacker to manipulate backend SQL queries and retrieve sensitive user data.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39111"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/efekaanakkar/Apartment-Visitors-Management-System-CVEs"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://phpgurukul.com/?sdm_process_download=1&download_id=21524"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://phpgurukul.com/apartment-visitors-management-system-using-php-and-mysql"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-89"
38+
],
39+
"severity": "HIGH",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2026-04-20T18:16:27Z"
43+
}
44+
}

advisories/unreviewed/2026/04/GHSA-2wm4-697g-pfq8/GHSA-2wm4-697g-pfq8.json

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2wm4-697g-pfq8",
4-
"modified": "2026-04-20T15:31:52Z",
4+
"modified": "2026-04-20T18:31:47Z",
55
"published": "2026-04-20T15:31:52Z",
66
"aliases": [
77
"CVE-2026-5760"
88
],
99
"details": "SGLang's reranking endpoint (/v1/rerank) achieves Remote Code Execution (RCE) when a model file containing a malcious tokenizer.chat_template is loaded, as the Jinja2 chat templates are rendered using an unsandboxed jinja2.Environment().",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -17,11 +22,17 @@
1722
{
1823
"type": "WEB",
1924
"url": "https://github.com/Stuub/SGLang-0.5.9-RCE"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.kb.cert.org/vuls/id/915947"
2029
}
2130
],
2231
"database_specific": {
23-
"cwe_ids": [],
24-
"severity": null,
32+
"cwe_ids": [
33+
"CWE-94"
34+
],
35+
"severity": "CRITICAL",
2536
"github_reviewed": false,
2637
"github_reviewed_at": null,
2738
"nvd_published_at": "2026-04-20T14:16:21Z"
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3gjh-jvm6-6pfg",
4+
"modified": "2026-04-20T18:31:49Z",
5+
"published": "2026-04-20T18:31:48Z",
6+
"aliases": [
7+
"CVE-2025-66954"
8+
],
9+
"details": "A vulnerability exists in the Buffalo Link Station version 1.85-0.01 that allows unauthenticated or guest-level users to enumerate valid usernames and their associated privilege roles. The issue is triggered by modifying a parameter within requests sent to the /nasapi endpoint.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66954"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/DBmonster19/CVE-2025-66954"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-639"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-04-20T17:16:29Z"
35+
}
36+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-49mg-4v6p-32w2",
4+
"modified": "2026-04-20T18:31:48Z",
5+
"published": "2026-04-20T18:31:48Z",
6+
"aliases": [
7+
"CVE-2026-34429"
8+
],
9+
"details": "Vvveb prior to 1.0.8.1 contains a stored cross-site scripting vulnerability that allows authenticated users with media upload and rename permissions to execute arbitrary JavaScript by bypassing MIME type validation and renaming uploaded files to executable extensions. Attackers can prepend a GIF89a header to HTML/JavaScript payloads to bypass upload validation, rename the file to .html extension, and execute malicious scripts in an administrator's browser session to create backdoor accounts and upload malicious plugins for remote code execution.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34429"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/givanz/Vvveb/commit/cc997d3359ea5e49a45c132f5dee3bc80fb441d7"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://delta.cyberm.ca/bugbin/ur66bvB7BYTC9y0eCIk3uzhZQgbjzAkG"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://github.com/givanz/Vvveb/releases/tag/1.0.8.1"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://www.vulncheck.com/advisories/vvveb-stored-xss-via-media-upload-and-rename"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-79"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2026-04-20T16:16:44Z"
51+
}
52+
}

0 commit comments

Comments
 (0)