Skip to content

Commit c3dee28

Browse files
Advisory Database Sync
1 parent bd6f1c4 commit c3dee28

40 files changed

Lines changed: 802 additions & 37 deletions

File tree

advisories/unreviewed/2022/05/GHSA-x3cx-v22q-v4cr/GHSA-x3cx-v22q-v4cr.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-x3cx-v22q-v4cr",
4-
"modified": "2022-08-16T00:00:42Z",
4+
"modified": "2026-03-17T18:30:26Z",
55
"published": "2022-05-24T19:03:52Z",
66
"aliases": [
77
"CVE-2021-3522"

advisories/unreviewed/2022/07/GHSA-hvfw-pcx7-j7qm/GHSA-hvfw-pcx7-j7qm.json

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,8 @@
3434
],
3535
"database_specific": {
3636
"cwe_ids": [
37+
"CWE-122",
38+
"CWE-190",
3739
"CWE-787"
3840
],
3941
"severity": "HIGH",

advisories/unreviewed/2022/07/GHSA-qc68-fgqr-q53f/GHSA-qc68-fgqr-q53f.json

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,8 @@
3434
],
3535
"database_specific": {
3636
"cwe_ids": [
37+
"CWE-122",
38+
"CWE-190",
3739
"CWE-787"
3840
],
3941
"severity": "HIGH",

advisories/unreviewed/2025/11/GHSA-g7mr-vm94-3rv7/GHSA-g7mr-vm94-3rv7.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g7mr-vm94-3rv7",
4-
"modified": "2026-03-17T00:31:34Z",
4+
"modified": "2026-03-17T18:30:28Z",
55
"published": "2025-11-18T21:32:31Z",
66
"aliases": [
77
"CVE-2025-61662"
@@ -39,6 +39,14 @@
3939
"type": "WEB",
4040
"url": "https://access.redhat.com/errata/RHSA-2026:4654"
4141
},
42+
{
43+
"type": "WEB",
44+
"url": "https://access.redhat.com/errata/RHSA-2026:4760"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://access.redhat.com/errata/RHSA-2026:4830"
49+
},
4250
{
4351
"type": "WEB",
4452
"url": "https://access.redhat.com/security/cve/CVE-2025-61662"

advisories/unreviewed/2026/02/GHSA-cr8p-gx5g-wjgh/GHSA-cr8p-gx5g-wjgh.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cr8p-gx5g-wjgh",
4-
"modified": "2026-02-27T03:30:27Z",
4+
"modified": "2026-03-17T18:30:31Z",
55
"published": "2026-02-27T03:30:27Z",
66
"aliases": [
77
"CVE-2026-24498"
88
],
99
"details": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in EFM-Networks, Inc. IpTIME T5008, EFM-Networks, Inc. IpTIME AX2004M, EFM-Networks, Inc. IpTIME AX3000Q, EFM-Networks, Inc. IpTIME AX6000M allows Authentication Bypass.This issue affects ipTIME T5008: through 15.26.8; ipTIME AX2004M: through 15.26.8; ipTIME AX3000Q: through 15.26.8; ipTIME AX6000M: through 15.26.8.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2026/02/GHSA-gpj8-9gm3-6ppq/GHSA-gpj8-9gm3-6ppq.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gpj8-9gm3-6ppq",
4-
"modified": "2026-02-27T03:30:27Z",
4+
"modified": "2026-03-17T18:30:31Z",
55
"published": "2026-02-27T03:30:27Z",
66
"aliases": [
77
"CVE-2026-24497"
88
],
99
"details": "Stack-based Buffer Overflow vulnerability in SimTech Systems, Inc. ThinkWise allows Remote Code Inclusion.This issue affects ThinkWise: from 7 through 23.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
@@ -30,7 +34,8 @@
3034
],
3135
"database_specific": {
3236
"cwe_ids": [
33-
"CWE-121"
37+
"CWE-121",
38+
"CWE-787"
3439
],
3540
"severity": "HIGH",
3641
"github_reviewed": false,

advisories/unreviewed/2026/02/GHSA-m56j-8cwc-qgv8/GHSA-m56j-8cwc-qgv8.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,8 @@
3434
],
3535
"database_specific": {
3636
"cwe_ids": [
37-
"CWE-276"
37+
"CWE-276",
38+
"CWE-863"
3839
],
3940
"severity": "MODERATE",
4041
"github_reviewed": false,

advisories/unreviewed/2026/03/GHSA-3cmm-8xw2-c67r/GHSA-3cmm-8xw2-c67r.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3cmm-8xw2-c67r",
4-
"modified": "2026-03-16T18:32:04Z",
4+
"modified": "2026-03-17T18:30:32Z",
55
"published": "2026-03-16T18:32:04Z",
66
"aliases": [
77
"CVE-2026-29521"
88
],
99
"details": "Hereta ETH-IMC408M firmware version 1.0.15 and prior contain a cross-site request forgery vulnerability that allows attackers to modify device configuration by exploiting missing CSRF protections in setup.cgi. Attackers can host malicious pages that submit forged requests using automatically-included HTTP Basic Authentication credentials to add RADIUS accounts, alter network settings, or trigger diagnostics.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2026/03/GHSA-439v-7mv7-5p44/GHSA-439v-7mv7-5p44.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-439v-7mv7-5p44",
4-
"modified": "2026-03-16T21:34:32Z",
4+
"modified": "2026-03-17T18:30:31Z",
55
"published": "2026-03-12T21:34:49Z",
66
"aliases": [
77
"CVE-2025-13913"

advisories/unreviewed/2026/03/GHSA-4m3h-wp5w-5hqh/GHSA-4m3h-wp5w-5hqh.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4m3h-wp5w-5hqh",
4-
"modified": "2026-03-17T15:36:22Z",
4+
"modified": "2026-03-17T18:30:32Z",
55
"published": "2026-03-17T12:30:19Z",
66
"aliases": [
77
"CVE-2026-26929"

0 commit comments

Comments
 (0)