Skip to content

Commit d636e8e

Browse files
Advisory Database Sync
1 parent 100bd58 commit d636e8e

File tree

35 files changed

+597
-41
lines changed

35 files changed

+597
-41
lines changed

advisories/unreviewed/2022/05/GHSA-38f2-9m48-4vff/GHSA-38f2-9m48-4vff.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-38f2-9m48-4vff",
4-
"modified": "2022-05-24T17:47:34Z",
4+
"modified": "2026-04-14T21:31:40Z",
55
"published": "2022-05-24T17:47:34Z",
66
"aliases": [
77
"CVE-2021-27130"
88
],
99
"details": "Online Reviewer System 1.0 contains a SQL injection vulnerability through authentication bypass, which may lead to a reverse shell upload.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{

advisories/unreviewed/2026/03/GHSA-4m3q-v5m4-mc2x/GHSA-4m3q-v5m4-mc2x.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4m3q-v5m4-mc2x",
4-
"modified": "2026-03-26T15:30:41Z",
4+
"modified": "2026-04-14T21:31:41Z",
55
"published": "2026-03-26T15:30:41Z",
66
"aliases": [
77
"CVE-2026-27664"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://cert-portal.siemens.com/productcert/html/ssa-246443.html"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "http://seclists.org/fulldisclosure/2026/Apr/7"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2026/03/GHSA-j3fp-8j72-vf4g/GHSA-j3fp-8j72-vf4g.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-j3fp-8j72-vf4g",
4-
"modified": "2026-03-26T15:30:41Z",
4+
"modified": "2026-04-14T21:31:41Z",
55
"published": "2026-03-26T15:30:41Z",
66
"aliases": [
77
"CVE-2026-27663"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://cert-portal.siemens.com/productcert/html/ssa-246443.html"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "http://seclists.org/fulldisclosure/2026/Apr/6"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2026/04/GHSA-2j6r-34xw-23mj/GHSA-2j6r-34xw-23mj.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2j6r-34xw-23mj",
4-
"modified": "2026-04-08T09:31:32Z",
4+
"modified": "2026-04-14T21:31:42Z",
55
"published": "2026-04-08T09:31:32Z",
66
"aliases": [
77
"CVE-2026-39544"
88
],
99
"details": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in themeStek LabtechCO labtechco allows PHP Local File Inclusion.This issue affects LabtechCO: from n/a through <= 8.3.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-98"
2530
],
26-
"severity": null,
31+
"severity": "HIGH",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-04-08T09:16:27Z"
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-33v2-523j-4qw6",
4+
"modified": "2026-04-14T21:31:47Z",
5+
"published": "2026-04-14T21:31:47Z",
6+
"aliases": [
7+
"CVE-2026-34625"
8+
],
9+
"details": "Adobe Experience Manager versions 6.5.24, FP11.7 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this issue by manipulating the DOM environment to execute malicious JavaScript within the context of the victim's browser. Exploitation of this issue requires user interaction in that a victim must visit a crafted webpage.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34625"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://helpx.adobe.com/security/products/aem-screens/apsb26-34.html"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-79"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-04-14T19:16:38Z"
35+
}
36+
}

advisories/unreviewed/2026/04/GHSA-446f-x529-8hw2/GHSA-446f-x529-8hw2.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-446f-x529-8hw2",
4-
"modified": "2026-04-14T18:30:33Z",
4+
"modified": "2026-04-14T21:31:46Z",
55
"published": "2026-04-14T12:31:28Z",
66
"aliases": [
77
"CVE-2026-24069"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://r.sec-consult.com/kiuwanlock"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "http://seclists.org/fulldisclosure/2026/Apr/5"
2529
}
2630
],
2731
"database_specific": {

advisories/unreviewed/2026/04/GHSA-5jvx-5q86-rxx3/GHSA-5jvx-5q86-rxx3.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,9 @@
3333
}
3434
],
3535
"database_specific": {
36-
"cwe_ids": [],
36+
"cwe_ids": [
37+
"CWE-125"
38+
],
3739
"severity": "HIGH",
3840
"github_reviewed": false,
3941
"github_reviewed_at": null,

advisories/unreviewed/2026/04/GHSA-67qf-qf6p-xgv3/GHSA-67qf-qf6p-xgv3.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,8 @@
3030
],
3131
"database_specific": {
3232
"cwe_ids": [
33-
"CWE-122"
33+
"CWE-122",
34+
"CWE-787"
3435
],
3536
"severity": "HIGH",
3637
"github_reviewed": false,
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-7r6q-467q-xx63",
4+
"modified": "2026-04-14T21:31:48Z",
5+
"published": "2026-04-14T21:31:48Z",
6+
"aliases": [
7+
"CVE-2026-27313"
8+
],
9+
"details": "Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27313"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://helpx.adobe.com/security/products/bridge/apsb26-39.html"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-122"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-04-14T20:16:34Z"
35+
}
36+
}

advisories/unreviewed/2026/04/GHSA-826q-ppf7-8g9v/GHSA-826q-ppf7-8g9v.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,9 @@
3333
}
3434
],
3535
"database_specific": {
36-
"cwe_ids": [],
36+
"cwe_ids": [
37+
"CWE-770"
38+
],
3739
"severity": "HIGH",
3840
"github_reviewed": false,
3941
"github_reviewed_at": null,

0 commit comments

Comments
 (0)