Skip to content

Commit ca31c1f

Browse files
Advisory Database Sync
1 parent 06c8c6b commit ca31c1f

File tree

68 files changed

+588
-148
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

68 files changed

+588
-148
lines changed

advisories/unreviewed/2022/05/GHSA-84qf-j5p4-2cph/GHSA-84qf-j5p4-2cph.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-84qf-j5p4-2cph",
4-
"modified": "2022-05-24T19:10:15Z",
4+
"modified": "2026-03-06T21:30:29Z",
55
"published": "2022-05-24T19:10:15Z",
66
"aliases": [
77
"CVE-2021-31869"
88
],
99
"details": "Pimcore AdminBundle version 6.8.0 and earlier suffers from a SQL injection issue in the specificID variable used by the application. This issue was fixed in version 6.9.4 of the product.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{

advisories/unreviewed/2022/05/GHSA-xhpg-8gj2-g9m7/GHSA-xhpg-8gj2-g9m7.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xhpg-8gj2-g9m7",
4-
"modified": "2022-05-24T19:18:58Z",
4+
"modified": "2026-03-06T21:30:29Z",
55
"published": "2022-05-24T19:18:58Z",
66
"aliases": [
77
"CVE-2020-24932"
88
],
99
"details": "An SQL Injection vulnerability exists in Sourcecodester Complaint Management System 1.0 via the cid parameter in complaint-details.php.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{

advisories/unreviewed/2022/08/GHSA-6mwq-4j3f-rr3x/GHSA-6mwq-4j3f-rr3x.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6mwq-4j3f-rr3x",
4-
"modified": "2022-08-17T00:00:33Z",
4+
"modified": "2026-03-06T21:30:30Z",
55
"published": "2022-08-11T00:00:16Z",
66
"aliases": [
77
"CVE-2022-1962"

advisories/unreviewed/2022/08/GHSA-6p55-r473-gcgm/GHSA-6p55-r473-gcgm.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6p55-r473-gcgm",
4-
"modified": "2022-08-16T00:00:25Z",
4+
"modified": "2026-03-06T21:30:30Z",
55
"published": "2022-08-11T00:00:19Z",
66
"aliases": [
77
"CVE-2022-37007"

advisories/unreviewed/2022/08/GHSA-j55j-52j7-vq87/GHSA-j55j-52j7-vq87.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-j55j-52j7-vq87",
4-
"modified": "2022-08-17T00:00:32Z",
4+
"modified": "2026-03-06T21:30:30Z",
55
"published": "2022-08-11T00:00:17Z",
66
"aliases": [
77
"CVE-2022-30629"

advisories/unreviewed/2024/11/GHSA-26c6-c3h3-4qf7/GHSA-26c6-c3h3-4qf7.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-26c6-c3h3-4qf7",
4-
"modified": "2024-11-27T06:30:39Z",
4+
"modified": "2026-03-06T21:30:30Z",
55
"published": "2024-11-27T06:30:39Z",
66
"aliases": [
77
"CVE-2024-52959"
88
],
99
"details": "A Improper Control of Generation of Code ('Code Injection') vulnerability in plugin management in iota C.ai Conversational Platform from 1.0.0 through 2.1.3 allows remote authenticated users to perform arbitrary system commands via a DLL file.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2024/11/GHSA-jfcq-6qwc-xqvx/GHSA-jfcq-6qwc-xqvx.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jfcq-6qwc-xqvx",
4-
"modified": "2024-11-27T06:30:39Z",
4+
"modified": "2026-03-06T21:30:30Z",
55
"published": "2024-11-27T06:30:39Z",
66
"aliases": [
77
"CVE-2024-52958"
88
],
99
"details": "A improper verification of cryptographic signature vulnerability in plugin management in iota C.ai Conversational Platform from 1.0.0 through 2.1.3 allows remote authenticated users to load a malicious DLL via upload plugin function.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2026/01/GHSA-4qf5-7jr3-q9pq/GHSA-4qf5-7jr3-q9pq.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4qf5-7jr3-q9pq",
4-
"modified": "2026-01-21T18:30:31Z",
4+
"modified": "2026-03-06T21:30:30Z",
55
"published": "2026-01-21T18:30:31Z",
66
"aliases": [
77
"CVE-2021-47830"
88
],
99
"details": "GetSimple CMS My SMTP Contact Plugin 1.1.1 contains a cross-site request forgery (CSRF) vulnerability. Attackers can craft a malicious webpage that, when visited by an authenticated administrator, can change SMTP configuration settings in the plugin. This may allow unauthorized changes but does not directly enable remote code execution.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2026/01/GHSA-6hw4-fq3j-72w9/GHSA-6hw4-fq3j-72w9.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6hw4-fq3j-72w9",
4-
"modified": "2026-01-21T18:30:30Z",
4+
"modified": "2026-03-06T21:30:30Z",
55
"published": "2026-01-21T18:30:30Z",
66
"aliases": [
77
"CVE-2021-47778"
88
],
99
"details": "GetSimple CMS My SMTP Contact Plugin 1.1.2 contains a PHP code injection vulnerability. An authenticated administrator can inject arbitrary PHP code through plugin configuration parameters, leading to remote code execution on the server.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2026/01/GHSA-xcf5-jfw6-6364/GHSA-xcf5-jfw6-6364.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xcf5-jfw6-6364",
4-
"modified": "2026-01-21T18:30:31Z",
4+
"modified": "2026-03-06T21:30:30Z",
55
"published": "2026-01-21T18:30:31Z",
66
"aliases": [
77
"CVE-2021-47870"
88
],
99
"details": "GetSimple CMS My SMTP Contact Plugin 1.1.2 suffers from a Stored Cross-Site Scripting (XSS) vulnerability. The plugin attempts to sanitize user input using htmlspecialchars(), but this can be bypassed by passing dangerous characters as escaped hex bytes. This allows attackers to inject arbitrary client-side code that executes in the administrator's browser when visiting a malicious page.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

0 commit comments

Comments
 (0)