Skip to content

Commit 4453441

Browse files
1 parent 1f1a427 commit 4453441

3 files changed

Lines changed: 176 additions & 0 deletions

File tree

Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-g37f-4r6m-qg8m",
4+
"modified": "2026-03-22T09:30:27Z",
5+
"published": "2026-03-22T09:30:27Z",
6+
"aliases": [
7+
"CVE-2026-4541"
8+
],
9+
"details": "A flaw has been found in janmojzis tinyssh up to 20250501. Impacted is an unknown function of the file tinyssh/crypto_sign_ed25519_tinyssh.c of the component Ed25519 Signature Handler. This manipulation causes improper verification of cryptographic signature. The attack is restricted to local execution. The attack's complexity is rated as high. The exploitability is considered difficult. The exploit has been published and may be used. Upgrading to version 20260301 is recommended to address this issue. Patch name: 9c87269607e0d7d20174df742accc49c042cff17. Upgrading the affected component is recommended. If you want to get best quality of vulnerability data, you may have to visit VulDB.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4541"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/janmojzis/tinyssh/issues/101"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/janmojzis/tinyssh/issues/101#issue-3983586116"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://github.com/janmojzis/tinyssh/pull/102"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://github.com/janmojzis/tinyssh/commit/9c87269607e0d7d20174df742accc49c042cff17"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/janmojzis/tinyssh"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://github.com/janmojzis/tinyssh/releases/tag/20260301"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://vuldb.com/?ctiid.352358"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://vuldb.com/?id.352358"
57+
},
58+
{
59+
"type": "WEB",
60+
"url": "https://vuldb.com/?submit.774687"
61+
}
62+
],
63+
"database_specific": {
64+
"cwe_ids": [
65+
"CWE-345"
66+
],
67+
"severity": "LOW",
68+
"github_reviewed": false,
69+
"github_reviewed_at": null,
70+
"nvd_published_at": "2026-03-22T09:15:59Z"
71+
}
72+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-jff7-f2mj-769g",
4+
"modified": "2026-03-22T09:30:27Z",
5+
"published": "2026-03-22T09:30:27Z",
6+
"aliases": [
7+
"CVE-2026-4540"
8+
],
9+
"details": "A vulnerability was detected in projectworlds Online Notes Sharing System 1.0. This issue affects some unknown processing of the file /login.php of the component Parameters Handler. The manipulation of the argument Benutzer results in SQL Injection. The attack can be executed remotely. The exploit is now public and may be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4540"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/juzidddd/CVE/issues/4"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.352357"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.352357"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.774686"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-74"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2026-03-22T08:15:59Z"
51+
}
52+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-mwg5-3pp3-6h5w",
4+
"modified": "2026-03-22T09:30:27Z",
5+
"published": "2026-03-22T09:30:27Z",
6+
"aliases": [
7+
"CVE-2026-4542"
8+
],
9+
"details": "A vulnerability has been found in SSCMS 4.7.0. The affected element is an unknown function of the file LayerImageController.Submit.cs of the component layerImage Endpoint. Such manipulation of the argument filePaths leads to path traversal. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4542"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://vuldb.com/?ctiid.352359"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?id.352359"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?submit.774689"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://www.yuque.com/la12138/pa2fpb/vlyutc51eb7vhwaz?singleDoc"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-22"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2026-03-22T09:16:00Z"
51+
}
52+
}

0 commit comments

Comments
 (0)