Skip to content

Commit d312587

Browse files
Advisory Database Sync
1 parent 40ca305 commit d312587

30 files changed

Lines changed: 251 additions & 70 deletions

File tree

advisories/github-reviewed/2025/11/GHSA-24hm-wm2h-h8w7/GHSA-24hm-wm2h-h8w7.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-24hm-wm2h-h8w7",
4-
"modified": "2025-12-01T23:57:53Z",
4+
"modified": "2026-01-29T03:30:58Z",
55
"published": "2025-11-28T06:32:06Z",
66
"aliases": [
77
"CVE-2025-66371"
@@ -55,6 +55,10 @@
5555
{
5656
"type": "WEB",
5757
"url": "https://github.com/iterasdev/peppol-py/releases/tag/1.1.1"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://invoice.secvuln.info"
5862
}
5963
],
6064
"database_specific": {

advisories/github-reviewed/2026/01/GHSA-8p9x-46gm-qfx2/GHSA-8p9x-46gm-qfx2.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8p9x-46gm-qfx2",
4-
"modified": "2026-01-27T18:01:26Z",
4+
"modified": "2026-01-29T03:31:31Z",
55
"published": "2026-01-27T18:01:26Z",
66
"aliases": [
77
"CVE-2026-22039"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/kyverno/kyverno/security/advisories/GHSA-8p9x-46gm-qfx2"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22039"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://github.com/kyverno/kyverno/commit/e0ba4de4f1e0ca325066d5095db51aec45b1407b"
@@ -80,6 +84,6 @@
8084
"severity": "CRITICAL",
8185
"github_reviewed": true,
8286
"github_reviewed_at": "2026-01-27T18:01:26Z",
83-
"nvd_published_at": null
87+
"nvd_published_at": "2026-01-27T17:16:12Z"
8488
}
8589
}

advisories/github-reviewed/2026/01/GHSA-r2rj-wwm5-x6mq/GHSA-r2rj-wwm5-x6mq.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-r2rj-wwm5-x6mq",
4-
"modified": "2026-01-27T18:02:22Z",
4+
"modified": "2026-01-29T03:31:12Z",
55
"published": "2026-01-27T18:02:22Z",
66
"aliases": [
77
"CVE-2026-23881"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/kyverno/kyverno/security/advisories/GHSA-r2rj-wwm5-x6mq"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23881"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://github.com/kyverno/kyverno/commit/7a651be3a8c78dcabfbf4178b8d89026bf3b850f"
@@ -79,6 +83,6 @@
7983
"severity": "HIGH",
8084
"github_reviewed": true,
8185
"github_reviewed_at": "2026-01-27T18:02:22Z",
82-
"nvd_published_at": null
86+
"nvd_published_at": "2026-01-27T17:16:12Z"
8387
}
8488
}

advisories/github-reviewed/2026/01/GHSA-vc8c-j3xm-xj73/GHSA-vc8c-j3xm-xj73.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vc8c-j3xm-xj73",
4-
"modified": "2026-01-27T00:48:20Z",
4+
"modified": "2026-01-29T03:28:33Z",
55
"published": "2026-01-27T00:48:20Z",
66
"aliases": [
77
"CVE-2026-24116"
@@ -81,6 +81,10 @@
8181
"type": "WEB",
8282
"url": "https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-vc8c-j3xm-xj73"
8383
},
84+
{
85+
"type": "ADVISORY",
86+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24116"
87+
},
8488
{
8589
"type": "WEB",
8690
"url": "https://github.com/bytecodealliance/wasmtime/commit/728fa07184f8da2a046f48ef9b61f869dce133a6"
@@ -108,6 +112,10 @@
108112
{
109113
"type": "PACKAGE",
110114
"url": "https://github.com/bytecodealliance/wasmtime"
115+
},
116+
{
117+
"type": "WEB",
118+
"url": "https://rustsec.org/advisories/RUSTSEC-2026-0006.html"
111119
}
112120
],
113121
"database_specific": {
@@ -117,6 +125,6 @@
117125
"severity": "MODERATE",
118126
"github_reviewed": true,
119127
"github_reviewed_at": "2026-01-27T00:48:20Z",
120-
"nvd_published_at": null
128+
"nvd_published_at": "2026-01-27T19:16:16Z"
121129
}
122130
}

advisories/unreviewed/2025/02/GHSA-5ggv-478m-c2xw/GHSA-5ggv-478m-c2xw.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,8 @@
4242
],
4343
"database_specific": {
4444
"cwe_ids": [
45-
"CWE-77"
45+
"CWE-77",
46+
"CWE-78"
4647
],
4748
"severity": "MODERATE",
4849
"github_reviewed": false,

advisories/unreviewed/2025/02/GHSA-jj9w-p5wc-95q5/GHSA-jj9w-p5wc-95q5.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,8 @@
4242
],
4343
"database_specific": {
4444
"cwe_ids": [
45-
"CWE-284"
45+
"CWE-284",
46+
"CWE-434"
4647
],
4748
"severity": "MODERATE",
4849
"github_reviewed": false,

advisories/unreviewed/2025/03/GHSA-j6jw-hg33-x575/GHSA-j6jw-hg33-x575.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-j6jw-hg33-x575",
4-
"modified": "2025-03-01T00:31:55Z",
4+
"modified": "2026-01-29T03:31:24Z",
55
"published": "2025-03-01T00:31:55Z",
66
"aliases": [
77
"CVE-2024-1509"
88
],
99
"details": "Brocade ASCG before 3.2.0 Web Interface is not \nenforcing HSTS, as defined by RFC 6797. HSTS is an optional response \nheader that can be configured on the server to instruct the browser to \nonly communicate via HTTPS. The lack of HSTS allows downgrade attacks, \nSSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking \nprotections.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2025/09/GHSA-4pvg-877c-6rg9/GHSA-4pvg-877c-6rg9.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4pvg-877c-6rg9",
4-
"modified": "2025-09-10T12:30:20Z",
4+
"modified": "2026-01-29T03:31:24Z",
55
"published": "2025-09-10T12:30:20Z",
66
"aliases": [
77
"CVE-2025-10213"
88
],
99
"details": "DLL search path hijacking vulnerability in the UPDF.exe executable for Windows version 1.8.5.0 allows attackers with local access to execute arbitrary code by placing a dxtn.dll file of their choice in the 'C:\\Users\\<user>\\AppData\\Local\\Microsoft\\WindowsApps\\' directory, which could lead to arbitrary code execution and persistence.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2026/01/GHSA-3f5c-485h-v36h/GHSA-3f5c-485h-v36h.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3f5c-485h-v36h",
4-
"modified": "2026-01-22T18:30:33Z",
4+
"modified": "2026-01-29T03:31:26Z",
55
"published": "2026-01-22T18:30:33Z",
66
"aliases": [
77
"CVE-2025-67620"
88
],
99
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CleverSoft Anon anon2x allows Reflected XSS.This issue affects Anon: from n/a through <= 2.2.10.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-79"
2530
],
26-
"severity": null,
31+
"severity": "HIGH",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-01-22T17:16:02Z"

advisories/unreviewed/2026/01/GHSA-4676-qh4g-4h4x/GHSA-4676-qh4g-4h4x.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4676-qh4g-4h4x",
4-
"modified": "2026-01-22T18:30:34Z",
4+
"modified": "2026-01-29T03:31:26Z",
55
"published": "2026-01-22T18:30:34Z",
66
"aliases": [
77
"CVE-2025-67947"
88
],
99
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in scriptsbundle AdForest Elementor adforest-elementor allows Reflected XSS.This issue affects AdForest Elementor: from n/a through <= 3.0.11.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-79"
2530
],
26-
"severity": null,
31+
"severity": "HIGH",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-01-22T17:16:04Z"

0 commit comments

Comments
 (0)