Skip to content

Commit ecd1f66

Browse files
Advisory Database Sync
1 parent e9cd487 commit ecd1f66

File tree

26 files changed

+273
-64
lines changed

26 files changed

+273
-64
lines changed

advisories/unreviewed/2024/08/GHSA-9chr-m38j-w26g/GHSA-9chr-m38j-w26g.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9chr-m38j-w26g",
4-
"modified": "2024-09-04T15:30:33Z",
4+
"modified": "2026-01-28T00:31:37Z",
55
"published": "2024-08-30T00:31:23Z",
66
"aliases": [
77
"CVE-2024-1545"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1545"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/wolfSSL/wolfssl/pull/7167"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.0-stable"
@@ -27,6 +31,7 @@
2731
"database_specific": {
2832
"cwe_ids": [
2933
"CWE-1256",
34+
"CWE-252",
3035
"CWE-74"
3136
],
3237
"severity": "MODERATE",

advisories/unreviewed/2024/08/GHSA-grjj-54gm-q5vf/GHSA-grjj-54gm-q5vf.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-grjj-54gm-q5vf",
4-
"modified": "2024-08-27T21:31:13Z",
4+
"modified": "2026-01-28T00:31:37Z",
55
"published": "2024-08-27T21:31:13Z",
66
"aliases": [
77
"CVE-2024-1544"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1544"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/wolfSSL/wolfssl/pull/7020"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable"

advisories/unreviewed/2026/01/GHSA-2x38-48vp-w23x/GHSA-2x38-48vp-w23x.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2x38-48vp-w23x",
4-
"modified": "2026-01-27T21:31:49Z",
4+
"modified": "2026-01-28T00:31:40Z",
55
"published": "2026-01-27T21:31:49Z",
66
"aliases": [
77
"CVE-2026-24858"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-24858"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2026/01/GHSA-34g3-9529-6r2w/GHSA-34g3-9529-6r2w.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-34g3-9529-6r2w",
4-
"modified": "2026-01-22T18:30:35Z",
4+
"modified": "2026-01-28T00:31:38Z",
55
"published": "2026-01-22T18:30:35Z",
66
"aliases": [
77
"CVE-2025-68835"
88
],
99
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in matiskiba Ravpage ravpage allows Reflected XSS.This issue affects Ravpage: from n/a through <= 2.33.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-79"
2530
],
26-
"severity": null,
31+
"severity": "HIGH",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-01-22T17:16:11Z"

advisories/unreviewed/2026/01/GHSA-492m-9864-4xjr/GHSA-492m-9864-4xjr.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-492m-9864-4xjr",
4-
"modified": "2026-01-22T18:30:38Z",
4+
"modified": "2026-01-28T00:31:39Z",
55
"published": "2026-01-22T18:30:38Z",
66
"aliases": [
77
"CVE-2025-69182"
88
],
99
"details": "Incorrect Privilege Assignment vulnerability in e-plugins Institutions Directory institutions-directory allows Privilege Escalation.This issue affects Institutions Directory: from n/a through <= 1.3.4.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-266"
2530
],
26-
"severity": null,
31+
"severity": "HIGH",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-01-22T17:16:24Z"

advisories/unreviewed/2026/01/GHSA-4ffx-5v5p-gf97/GHSA-4ffx-5v5p-gf97.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4ffx-5v5p-gf97",
4-
"modified": "2026-01-22T18:30:36Z",
4+
"modified": "2026-01-28T00:31:38Z",
55
"published": "2026-01-22T18:30:36Z",
66
"aliases": [
77
"CVE-2025-68896"
88
],
99
"details": "Missing Authorization vulnerability in vrpr WDV One Page Docs wdv-one-page-docs allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WDV One Page Docs: from n/a through <= 1.2.4.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-862"
2530
],
26-
"severity": null,
31+
"severity": "MODERATE",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-01-22T17:16:13Z"

advisories/unreviewed/2026/01/GHSA-6h74-r6p3-8hvh/GHSA-6h74-r6p3-8hvh.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6h74-r6p3-8hvh",
4-
"modified": "2026-01-22T18:30:35Z",
4+
"modified": "2026-01-28T00:31:38Z",
55
"published": "2026-01-22T18:30:35Z",
66
"aliases": [
77
"CVE-2025-68839"
88
],
99
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Remi Corson Easy Theme Options easy-theme-options allows Reflected XSS.This issue affects Easy Theme Options: from n/a through <= 1.0.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-79"
2530
],
26-
"severity": null,
31+
"severity": "HIGH",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-01-22T17:16:11Z"

advisories/unreviewed/2026/01/GHSA-7jq6-95cj-mcx6/GHSA-7jq6-95cj-mcx6.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7jq6-95cj-mcx6",
4-
"modified": "2026-01-22T18:30:38Z",
4+
"modified": "2026-01-28T00:31:38Z",
55
"published": "2026-01-22T18:30:38Z",
66
"aliases": [
77
"CVE-2025-69076"
88
],
99
"details": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Modern Housewife modernhousewife allows PHP Local File Inclusion.This issue affects Modern Housewife: from n/a through <= 1.0.12.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-98"
2530
],
26-
"severity": null,
31+
"severity": "HIGH",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-01-22T17:16:21Z"

advisories/unreviewed/2026/01/GHSA-9m3q-c2qh-cgvf/GHSA-9m3q-c2qh-cgvf.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9m3q-c2qh-cgvf",
4-
"modified": "2026-01-23T15:31:35Z",
4+
"modified": "2026-01-28T00:31:39Z",
55
"published": "2026-01-23T15:31:35Z",
66
"aliases": [
77
"CVE-2026-24525"
88
],
99
"details": "Missing Authorization vulnerability in CloudPanel CLP Varnish Cache clp-varnish-cache allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects CLP Varnish Cache: from n/a through <= 1.0.2.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-862"
2530
],
26-
"severity": null,
31+
"severity": "HIGH",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-01-23T15:16:08Z"

advisories/unreviewed/2026/01/GHSA-c6jq-h3hj-7vwx/GHSA-c6jq-h3hj-7vwx.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c6jq-h3hj-7vwx",
4-
"modified": "2026-01-22T18:30:40Z",
4+
"modified": "2026-01-28T00:31:39Z",
55
"published": "2026-01-22T18:30:40Z",
66
"aliases": [
77
"CVE-2026-22481"
88
],
99
"details": "Missing Authorization vulnerability in Rasedul Haque Rumi BD Courier Order Ratio Checker bd-courier-order-ratio-checker allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects BD Courier Order Ratio Checker: from n/a through <= 2.0.1.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-862"
2530
],
26-
"severity": null,
31+
"severity": "HIGH",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-01-22T17:16:36Z"

0 commit comments

Comments
 (0)