Skip to content

Commit f43c9ad

Browse files
Advisory Database Sync
1 parent 2339e77 commit f43c9ad

96 files changed

Lines changed: 3129 additions & 45 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/unreviewed/2025/12/GHSA-4qpp-gxm3-h9vw/GHSA-4qpp-gxm3-h9vw.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4qpp-gxm3-h9vw",
4-
"modified": "2026-01-21T12:30:30Z",
4+
"modified": "2026-01-21T18:30:27Z",
55
"published": "2025-12-11T15:30:32Z",
66
"aliases": [
77
"CVE-2025-14523"
@@ -67,6 +67,10 @@
6767
"type": "WEB",
6868
"url": "https://access.redhat.com/errata/RHSA-2026:0911"
6969
},
70+
{
71+
"type": "WEB",
72+
"url": "https://access.redhat.com/errata/RHSA-2026:0925"
73+
},
7074
{
7175
"type": "WEB",
7276
"url": "https://access.redhat.com/security/cve/CVE-2025-14523"

advisories/unreviewed/2026/01/GHSA-2262-37j2-53g4/GHSA-2262-37j2-53g4.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2262-37j2-53g4",
4-
"modified": "2026-01-16T18:31:33Z",
4+
"modified": "2026-01-21T18:30:27Z",
55
"published": "2026-01-16T18:31:33Z",
66
"aliases": [
77
"CVE-2026-0629"
@@ -23,6 +23,10 @@
2323
"type": "WEB",
2424
"url": "https://www.tp-link.com/us/support/faq/4899"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.tp-link.com/us/support/faq/4906"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://www.vigi.com/en/support/download"

advisories/unreviewed/2026/01/GHSA-22v3-g286-xrpf/GHSA-22v3-g286-xrpf.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@
2525
}
2626
],
2727
"database_specific": {
28-
"cwe_ids": [],
28+
"cwe_ids": [
29+
"CWE-400"
30+
],
2931
"severity": "HIGH",
3032
"github_reviewed": false,
3133
"github_reviewed_at": null,

advisories/unreviewed/2026/01/GHSA-2898-f79g-hh47/GHSA-2898-f79g-hh47.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@
2525
}
2626
],
2727
"database_specific": {
28-
"cwe_ids": [],
28+
"cwe_ids": [
29+
"CWE-79"
30+
],
2931
"severity": "MODERATE",
3032
"github_reviewed": false,
3133
"github_reviewed_at": null,
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2w96-8922-g8xr",
4+
"modified": "2026-01-21T18:30:31Z",
5+
"published": "2026-01-21T18:30:31Z",
6+
"aliases": [
7+
"CVE-2025-69766"
8+
],
9+
"details": "Tenda AX3 firmware v16.03.12.11 contains a stack-based buffer overflow in the formGetIptv function due to improper handling of the citytag stack buffer, which may result in memory corruption and remote code execution.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69766"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://river-brow-763.notion.site/Tenda-AX3-Buffer-Overflow-in-formGetIptv-2c9a595a7aef8043a091e6722b8e255a"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://river-brow-763.notion.site/Tenda-AX3-Buffer-Overflow-in-formGetIptv-2c9a595a7aef8043a091e6722b8e255a?source=copy_link"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [],
28+
"severity": null,
29+
"github_reviewed": false,
30+
"github_reviewed_at": null,
31+
"nvd_published_at": "2026-01-21T18:16:24Z"
32+
}
33+
}

advisories/unreviewed/2026/01/GHSA-3cw8-v59x-4gqg/GHSA-3cw8-v59x-4gqg.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@
2525
}
2626
],
2727
"database_specific": {
28-
"cwe_ids": [],
28+
"cwe_ids": [
29+
"CWE-79"
30+
],
2931
"severity": "MODERATE",
3032
"github_reviewed": false,
3133
"github_reviewed_at": null,
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3jfq-h25g-xqjx",
4+
"modified": "2026-01-21T18:30:32Z",
5+
"published": "2026-01-21T18:30:32Z",
6+
"aliases": [
7+
"CVE-2025-69763"
8+
],
9+
"details": "Tenda AX3 firmware v16.03.12.11 contains a stack overflow in formSetIptv via the vlanId parameter, which can cause memory corruption and enable remote code execution.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69763"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://river-brow-763.notion.site/Tenda-AX3-Buffer-Overflow-in-formSetIptv-2c9a595a7aef8025a3c6c4b102d95dd4"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://river-brow-763.notion.site/Tenda-AX3-Buffer-Overflow-in-formSetIptv-2c9a595a7aef8025a3c6c4b102d95dd4?source=copy_link"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [],
28+
"severity": null,
29+
"github_reviewed": false,
30+
"github_reviewed_at": null,
31+
"nvd_published_at": "2026-01-21T18:16:24Z"
32+
}
33+
}
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3rc8-xjj4-xjp5",
4+
"modified": "2026-01-21T18:30:31Z",
5+
"published": "2026-01-21T18:30:31Z",
6+
"aliases": [
7+
"CVE-2021-47884"
8+
],
9+
"details": "OKI Configuration Tool 1.6.53 contains an unquoted service path vulnerability in the OKI Local Port Manager service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in 'C:\\Program Files\\Okidata\\Common\\extend3\\portmgrsrv.exe' to inject malicious executables and escalate privileges.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47884"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://web.archive.org/web/20211207181409/https://www.oki.com/me/printing/services-and-solutions/smart-solutions/print-job-accounting/index.html"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.exploit-db.com/exploits/49624"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.vulncheck.com/advisories/configuration-tool-oplclsrv-unquoted-service-path"
37+
}
38+
],
39+
"database_specific": {
40+
"cwe_ids": [
41+
"CWE-428"
42+
],
43+
"severity": "HIGH",
44+
"github_reviewed": false,
45+
"github_reviewed_at": null,
46+
"nvd_published_at": "2026-01-21T18:16:22Z"
47+
}
48+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3whv-8qg8-4ffw",
4+
"modified": "2026-01-21T18:30:30Z",
5+
"published": "2026-01-21T18:30:30Z",
6+
"aliases": [
7+
"CVE-2026-1290"
8+
],
9+
"details": "Authentication Bypass by Primary Weakness vulnerability in Jamf Jamf Pro allows unspecified impact.This issue affects Jamf Pro: from 11.20 through 11.24.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1290"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://learn.jamf.com/en-US/bundle/jamf-pro-release-notes-11.24.0/page/Resolved_Issues.html"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-305"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-01-21T16:16:08Z"
35+
}
36+
}

advisories/unreviewed/2026/01/GHSA-44pv-mw72-7wfv/GHSA-44pv-mw72-7wfv.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@
2525
}
2626
],
2727
"database_specific": {
28-
"cwe_ids": [],
28+
"cwe_ids": [
29+
"CWE-400"
30+
],
2931
"severity": "MODERATE",
3032
"github_reviewed": false,
3133
"github_reviewed_at": null,

0 commit comments

Comments
 (0)