Skip to content

Commit d48c7d8

Browse files
Advisory Database Sync
1 parent cbcf714 commit d48c7d8

49 files changed

Lines changed: 1645 additions & 18 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/unreviewed/2025/12/GHSA-5r97-vg42-wrjj/GHSA-5r97-vg42-wrjj.json

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5r97-vg42-wrjj",
4-
"modified": "2026-01-08T21:30:28Z",
4+
"modified": "2026-04-02T18:31:34Z",
55
"published": "2025-12-20T03:31:35Z",
66
"aliases": [
77
"CVE-2025-8065"
@@ -23,10 +23,18 @@
2323
"type": "ADVISORY",
2424
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8065"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.tp-link.com/en/support/download/tapo-c520ws/#Firmware-Release-Notes"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://www.tp-link.com/us/support/download/tapo-c200/v3/#Firmware-Release-Notes"
2933
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.tp-link.com/us/support/download/tapo-c520ws/#Firmware-Release-Notes"
37+
},
3038
{
3139
"type": "WEB",
3240
"url": "https://www.tp-link.com/us/support/faq/4849"
@@ -35,6 +43,7 @@
3543
"database_specific": {
3644
"cwe_ids": [
3745
"CWE-120",
46+
"CWE-121",
3847
"CWE-400"
3948
],
4049
"severity": "HIGH",

advisories/unreviewed/2026/02/GHSA-c348-hjj9-x39v/GHSA-c348-hjj9-x39v.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c348-hjj9-x39v",
4-
"modified": "2026-03-13T21:31:40Z",
4+
"modified": "2026-04-02T18:31:34Z",
55
"published": "2026-02-10T18:30:40Z",
66
"aliases": [
77
"CVE-2026-0651"
@@ -27,6 +27,10 @@
2727
"type": "WEB",
2828
"url": "https://www.tp-link.com/en/support/download/tapo-c260/v1"
2929
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.tp-link.com/en/support/download/tapo-c520ws"
33+
},
3034
{
3135
"type": "WEB",
3236
"url": "https://www.tp-link.com/en/support/download/tapo-d235"
@@ -35,6 +39,10 @@
3539
"type": "WEB",
3640
"url": "https://www.tp-link.com/us/support/download/tapo-c260/v1"
3741
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.tp-link.com/us/support/download/tapo-c520ws"
45+
},
3846
{
3947
"type": "WEB",
4048
"url": "https://www.tp-link.com/us/support/faq/4960"

advisories/unreviewed/2026/03/GHSA-33r5-g5m3-5m79/GHSA-33r5-g5m3-5m79.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-33r5-g5m3-5m79",
4-
"modified": "2026-03-31T21:31:18Z",
4+
"modified": "2026-04-02T18:31:36Z",
55
"published": "2026-03-30T21:31:04Z",
66
"aliases": [
77
"CVE-2026-3502"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://trueconf.com/blog/update/trueconf-8-5"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-3502"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2026/03/GHSA-42h9-h8r4-fwqg/GHSA-42h9-h8r4-fwqg.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,8 @@
5050
],
5151
"database_specific": {
5252
"cwe_ids": [
53-
"CWE-119"
53+
"CWE-119",
54+
"CWE-787"
5455
],
5556
"severity": "HIGH",
5657
"github_reviewed": false,

advisories/unreviewed/2026/03/GHSA-mfxw-q267-mgp6/GHSA-mfxw-q267-mgp6.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mfxw-q267-mgp6",
4-
"modified": "2026-04-02T15:31:37Z",
4+
"modified": "2026-04-02T18:31:36Z",
55
"published": "2026-03-30T21:31:04Z",
66
"aliases": [
77
"CVE-2026-34714"
@@ -38,6 +38,10 @@
3838
{
3939
"type": "WEB",
4040
"url": "http://www.openwall.com/lists/oss-security/2026/04/02/4"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "http://www.openwall.com/lists/oss-security/2026/04/02/5"
4145
}
4246
],
4347
"database_specific": {

advisories/unreviewed/2026/03/GHSA-rgch-x4h6-m876/GHSA-rgch-x4h6-m876.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,8 @@
4646
],
4747
"database_specific": {
4848
"cwe_ids": [
49-
"CWE-119"
49+
"CWE-119",
50+
"CWE-787"
5051
],
5152
"severity": "HIGH",
5253
"github_reviewed": false,

advisories/unreviewed/2026/03/GHSA-v5wq-39jv-hmwm/GHSA-v5wq-39jv-hmwm.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,8 @@
4646
],
4747
"database_specific": {
4848
"cwe_ids": [
49-
"CWE-119"
49+
"CWE-119",
50+
"CWE-787"
5051
],
5152
"severity": "HIGH",
5253
"github_reviewed": false,
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-25v3-gpg9-m4p7",
4+
"modified": "2026-04-02T18:31:38Z",
5+
"published": "2026-04-02T18:31:38Z",
6+
"aliases": [
7+
"CVE-2026-34119"
8+
],
9+
"details": "A heap-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 within the HTTP parsing\nloop\nwhen appending segmented request bodies without\ncontinuous write‑boundary verification, due to insufficient boundary validation when handling externally supplied HTTP input.  An attacker\non the same network segment could trigger heap memory corruption conditions by\nsending crafted payloads that cause write operations beyond allocated buffer\nboundaries.  Successful exploitation\ncauses a Denial-of-Service (DoS) condition, causing the device’s process to\ncrash or become unresponsive.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34119"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.tp-link.com/en/support/download/tapo-c520ws/#Firmware-Release-Notes"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.tp-link.com/us/support/download/tapo-c520ws/#Firmware-Release-Notes"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.tp-link.com/us/support/faq/5047"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-122"
38+
],
39+
"severity": "HIGH",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2026-04-02T18:16:28Z"
43+
}
44+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2ph3-3852-f6r9",
4+
"modified": "2026-04-02T18:31:38Z",
5+
"published": "2026-04-02T18:31:38Z",
6+
"aliases": [
7+
"CVE-2026-33271"
8+
],
9+
"details": "Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis True Image (Windows) before build 42902.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33271"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://security-advisory.acronis.com/advisories/SEC-9108"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-732"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-04-02T18:16:27Z"
35+
}
36+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3w99-p9rf-w2qj",
4+
"modified": "2026-04-02T18:31:37Z",
5+
"published": "2026-04-02T18:31:37Z",
6+
"aliases": [
7+
"CVE-2026-5351"
8+
],
9+
"details": "A weakness has been identified in Trendnet TEW-657BRM 1.00.1. This affects the function add_wps_client of the file /setup.cgi. This manipulation of the argument wl_enrolee_pin causes os command injection. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor confirms, that \"[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us.\" This vulnerability only affects products that are no longer supported by the maintainer.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5351"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/panda666-888/vuls/blob/main/trendnet/tew-657brm/add_wps_client.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/submit/781564"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/vuln/354704"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/vuln/354704/cti"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-77"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2026-04-02T16:16:28Z"
51+
}
52+
}

0 commit comments

Comments
 (0)