Skip to content

Commit 0a6fe38

Browse files
Advisory Database Sync
1 parent bffd6ba commit 0a6fe38

37 files changed

Lines changed: 726 additions & 33 deletions

File tree

advisories/unreviewed/2026/03/GHSA-33r5-g5m3-5m79/GHSA-33r5-g5m3-5m79.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-33r5-g5m3-5m79",
4-
"modified": "2026-03-30T21:31:04Z",
4+
"modified": "2026-03-31T21:31:18Z",
55
"published": "2026-03-30T21:31:04Z",
66
"aliases": [
77
"CVE-2026-3502"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3502"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://research.checkpoint.com/2026/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://trueconf.com/blog/update/trueconf-8-5"

advisories/unreviewed/2026/03/GHSA-39fw-r4pr-87rj/GHSA-39fw-r4pr-87rj.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,8 @@
4646
],
4747
"database_specific": {
4848
"cwe_ids": [
49-
"CWE-119"
49+
"CWE-119",
50+
"CWE-787"
5051
],
5152
"severity": "HIGH",
5253
"github_reviewed": false,

advisories/unreviewed/2026/03/GHSA-3vp9-wjw8-vgmx/GHSA-3vp9-wjw8-vgmx.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3vp9-wjw8-vgmx",
4-
"modified": "2026-03-27T06:31:43Z",
4+
"modified": "2026-03-31T21:31:15Z",
55
"published": "2026-03-27T06:31:43Z",
66
"aliases": [
77
"CVE-2026-33280"
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-42h9-h8r4-fwqg",
4+
"modified": "2026-03-31T21:31:20Z",
5+
"published": "2026-03-31T21:31:20Z",
6+
"aliases": [
7+
"CVE-2026-5212"
8+
],
9+
"details": "A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This issue affects the function Webdav_Upload_File of the file /cgi-bin/webdav_mgr.cgi. The manipulation of the argument f_file leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5212"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_166/166.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/submit/780435"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/submit/780436"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/vuln/354348"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/vuln/354348/cti"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://www.dlink.com"
49+
}
50+
],
51+
"database_specific": {
52+
"cwe_ids": [
53+
"CWE-119"
54+
],
55+
"severity": "HIGH",
56+
"github_reviewed": false,
57+
"github_reviewed_at": null,
58+
"nvd_published_at": "2026-03-31T21:16:33Z"
59+
}
60+
}

advisories/unreviewed/2026/03/GHSA-4368-7mjc-5763/GHSA-4368-7mjc-5763.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,8 @@
2626
],
2727
"database_specific": {
2828
"cwe_ids": [
29-
"CWE-400"
29+
"CWE-400",
30+
"CWE-787"
3031
],
3132
"severity": "MODERATE",
3233
"github_reviewed": false,

advisories/unreviewed/2026/03/GHSA-46q8-mxmv-wf7q/GHSA-46q8-mxmv-wf7q.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-46q8-mxmv-wf7q",
4-
"modified": "2026-03-23T18:30:32Z",
4+
"modified": "2026-03-31T21:31:14Z",
55
"published": "2026-03-23T18:30:32Z",
66
"aliases": [
77
"CVE-2025-15605"
88
],
99
"details": "A hardcoded cryptographic key within the configuration mechanism on TP-Link Archer NX200, NX210, NX500 and NX600 enables decryption and re-encryption of device configuration data. An authenticated attacker may decrypt configuration files, modify them, and re-encrypt them, affecting the confidentiality and integrity of device configuration data.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
@@ -42,7 +46,8 @@
4246
],
4347
"database_specific": {
4448
"cwe_ids": [
45-
"CWE-321"
49+
"CWE-321",
50+
"CWE-798"
4651
],
4752
"severity": "HIGH",
4853
"github_reviewed": false,
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-54mj-887p-jvcm",
4+
"modified": "2026-03-31T21:31:18Z",
5+
"published": "2026-03-31T21:31:18Z",
6+
"aliases": [
7+
"CVE-2026-5210"
8+
],
9+
"details": "A vulnerability was detected in SourceCodester Leave Application System 1.0. This affects an unknown part. Performing a manipulation of the argument page results in file inclusion. Remote exploitation of the attack is possible. The exploit is now public and may be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5210"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://medium.com/@hemantrajbhati5555/local-file-inclusion-lfi-in-leave-application-system-php-sqlite3-4e095bb7ee40"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/submit/780419"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/vuln/354346"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/vuln/354346/cti"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.sourcecodester.com"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-73"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2026-03-31T19:16:29Z"
55+
}
56+
}

advisories/unreviewed/2026/03/GHSA-553r-96gg-xwgx/GHSA-553r-96gg-xwgx.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-553r-96gg-xwgx",
4-
"modified": "2026-03-23T18:30:32Z",
4+
"modified": "2026-03-31T21:31:14Z",
55
"published": "2026-03-23T18:30:32Z",
66
"aliases": [
77
"CVE-2025-15519"
88
],
99
"details": "Improper input handling in a modem-management administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-56vh-x74x-6hg7",
4+
"modified": "2026-03-31T21:31:20Z",
5+
"published": "2026-03-31T21:31:20Z",
6+
"aliases": [
7+
"CVE-2026-3468"
8+
],
9+
"details": "A stored Cross-Site Scripting (XSS) vulnerability has been identified in the SonicWall Email Security appliance due to improper neutralization of user-supplied input during web page generation, allowing a remote authenticated attacker as admin user to potentially execute arbitrary JavaScript code.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3468"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2026-0002"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-79"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-03-31T21:16:32Z"
35+
}
36+
}

advisories/unreviewed/2026/03/GHSA-6mq5-gjcx-rvxq/GHSA-6mq5-gjcx-rvxq.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6mq5-gjcx-rvxq",
4-
"modified": "2026-03-23T18:30:32Z",
4+
"modified": "2026-03-31T21:31:13Z",
55
"published": "2026-03-23T18:30:32Z",
66
"aliases": [
77
"CVE-2025-15518"
88
],
99
"details": "Improper input handling in a wireless-control administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

0 commit comments

Comments
 (0)