Skip to content

Commit 2485601

Browse files
Advisory Database Sync
1 parent 4d9f12b commit 2485601

31 files changed

Lines changed: 691 additions & 35 deletions

File tree

advisories/unreviewed/2022/05/GHSA-7fxq-f8vg-7f3w/GHSA-7fxq-f8vg-7f3w.json

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7fxq-f8vg-7f3w",
4-
"modified": "2022-05-24T17:42:39Z",
4+
"modified": "2026-03-30T15:31:33Z",
55
"published": "2022-05-24T17:42:39Z",
66
"aliases": [
77
"CVE-2020-19513"
88
],
99
"details": "Buffer overflow in FinalWire Ltd AIDA64 Engineer 6.00.5100 allows attackers to execute arbitrary code by creating a crafted input that will overwrite the SEH handler.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -21,7 +26,8 @@
2126
],
2227
"database_specific": {
2328
"cwe_ids": [
24-
"CWE-1236"
29+
"CWE-1236",
30+
"CWE-787"
2531
],
2632
"severity": "HIGH",
2733
"github_reviewed": false,

advisories/unreviewed/2025/11/GHSA-39m5-rg2v-54h9/GHSA-39m5-rg2v-54h9.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-39m5-rg2v-54h9",
4-
"modified": "2025-12-11T00:30:26Z",
4+
"modified": "2026-03-30T15:31:34Z",
55
"published": "2025-11-26T21:31:26Z",
66
"aliases": [
77
"CVE-2025-13611"
@@ -23,6 +23,10 @@
2323
"type": "WEB",
2424
"url": "https://about.gitlab.com/releases/2025/11/26/patch-release-gitlab-18-6-1-released"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://about.gitlab.com/releases/2026/01/07/patch-release-gitlab-18-7-1-released"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/545947"

advisories/unreviewed/2026/02/GHSA-r6vr-hwpr-qqch/GHSA-r6vr-hwpr-qqch.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-r6vr-hwpr-qqch",
4-
"modified": "2026-02-06T09:30:29Z",
4+
"modified": "2026-03-30T15:31:34Z",
55
"published": "2026-02-06T09:30:29Z",
66
"aliases": [
77
"CVE-2026-21643"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-1142"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/0xBlackash/CVE-2026-21643/blob/main/cve-2026-21643.py"
2529
}
2630
],
2731
"database_specific": {

advisories/unreviewed/2026/03/GHSA-2mq5-fr5w-rr29/GHSA-2mq5-fr5w-rr29.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2mq5-fr5w-rr29",
4-
"modified": "2026-03-26T21:31:28Z",
4+
"modified": "2026-03-30T15:31:51Z",
55
"published": "2026-03-26T21:31:28Z",
66
"aliases": [
77
"CVE-2026-3530"
88
],
99
"details": "Server-Side Request Forgery (SSRF) vulnerability in Drupal OpenID Connect / OAuth client allows Server Side Request Forgery.This issue affects OpenID Connect / OAuth client: from 0.0.0 before 1.5.0.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-918"
2530
],
26-
"severity": null,
31+
"severity": "MODERATE",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-03-26T21:17:09Z"

advisories/unreviewed/2026/03/GHSA-3mvf-x53v-pjr7/GHSA-3mvf-x53v-pjr7.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3mvf-x53v-pjr7",
4-
"modified": "2026-03-26T21:31:28Z",
4+
"modified": "2026-03-30T15:31:52Z",
55
"published": "2026-03-26T21:31:28Z",
66
"aliases": [
77
"CVE-2026-4933"
88
],
99
"details": "Incorrect Authorization vulnerability in Drupal Unpublished Node Permissions allows Forceful Browsing.This issue affects Unpublished Node Permissions: from 0.0.0 before 1.7.0.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-863"
2530
],
26-
"severity": null,
31+
"severity": "HIGH",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-03-26T21:17:10Z"
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4qgx-7r85-6fpx",
4+
"modified": "2026-03-30T15:32:06Z",
5+
"published": "2026-03-30T15:32:06Z",
6+
"aliases": [
7+
"CVE-2026-4315"
8+
],
9+
"details": "A Cross-Site Request Forgery (CSRF) vulnerability in the WatchGuard Fireware OS WebUI could allow a remote attacker to trigger a denial-of-service (DoS) condition in the Fireware Web UI by convincing an authenticated administrator into visiting a malicious web page.This issue affects Fireware OS: 11.8 through 11.12.4+541730, 12.0 through 12.11.8, and 2025.1 through 2026.1.2.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4315"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2026-00006"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-352"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-03-30T13:16:22Z"
35+
}
36+
}

advisories/unreviewed/2026/03/GHSA-5fjm-c352-35cv/GHSA-5fjm-c352-35cv.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5fjm-c352-35cv",
4-
"modified": "2026-03-23T21:30:52Z",
4+
"modified": "2026-03-30T15:31:36Z",
55
"published": "2026-03-23T21:30:52Z",
66
"aliases": [
77
"CVE-2026-32851"
88
],
99
"details": "MailEnable versions prior to 10.55 contain a reflected cross-site scripting vulnerability in the webmail interface that allows remote attackers to execute arbitrary JavaScript in a victim's browser by crafting a malicious URL. Attackers can inject malicious code through the Attendees parameter in the FreeBusy.aspx form, which is not properly sanitized before being embedded into dynamically generated JavaScript.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6457-73j6-h3qg",
4+
"modified": "2026-03-30T15:32:07Z",
5+
"published": "2026-03-30T15:32:07Z",
6+
"aliases": [
7+
"CVE-2026-5164"
8+
],
9+
"details": "A flaw was found in virtio-win. The `RhelDoUnMap()` function does not properly validate the number of descriptors provided by a user during an unmap request. A local user could exploit this input validation vulnerability by supplying an excessive number of descriptors, leading to a buffer overrun. This can cause a system crash, resulting in a Denial of Service (DoS).",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5164"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/virtio-win/kvm-guest-drivers-windows/pull/1504"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://access.redhat.com/security/cve/CVE-2026-5164"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453014"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-120"
38+
],
39+
"severity": "MODERATE",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2026-03-30T15:16:36Z"
43+
}
44+
}

advisories/unreviewed/2026/03/GHSA-68p2-v646-58j6/GHSA-68p2-v646-58j6.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-68p2-v646-58j6",
4-
"modified": "2026-03-27T15:30:25Z",
4+
"modified": "2026-03-30T15:31:57Z",
55
"published": "2026-03-27T15:30:25Z",
66
"aliases": [
77
"CVE-2025-61190"
88
],
99
"details": "A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in DSpace JSPUI 6.5 within the search/discover filtering functionality. The vulnerability exists due to improper sanitization of user-supplied input via the filter_type_1 parameter.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -28,8 +33,10 @@
2833
}
2934
],
3035
"database_specific": {
31-
"cwe_ids": [],
32-
"severity": null,
36+
"cwe_ids": [
37+
"CWE-79"
38+
],
39+
"severity": "MODERATE",
3340
"github_reviewed": false,
3441
"github_reviewed_at": null,
3542
"nvd_published_at": "2026-03-27T15:16:45Z"
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6fw6-rqjg-9v3j",
4+
"modified": "2026-03-30T15:32:07Z",
5+
"published": "2026-03-30T15:32:07Z",
6+
"aliases": [
7+
"CVE-2026-5165"
8+
],
9+
"details": "A flaw was found in virtio-win, specifically within the VirtIO Block (BLK) device. When the device undergoes a reset, it fails to properly manage memory, resulting in a use-after-free vulnerability. This issue could allow a local attacker to corrupt system memory, potentially leading to system instability or unexpected behavior.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5165"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/virtio-win/kvm-guest-drivers-windows/pull/1493"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://access.redhat.com/security/cve/CVE-2026-5165"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453015"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-825"
38+
],
39+
"severity": "MODERATE",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2026-03-30T15:16:36Z"
43+
}
44+
}

0 commit comments

Comments
 (0)