Skip to content

Commit 26f2c92

Browse files
Advisory Database Sync
1 parent ce016c6 commit 26f2c92

File tree

31 files changed

+912
-39
lines changed

31 files changed

+912
-39
lines changed

advisories/unreviewed/2022/05/GHSA-hmp6-wv7w-5wx2/GHSA-hmp6-wv7w-5wx2.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hmp6-wv7w-5wx2",
4-
"modified": "2022-05-24T19:19:13Z",
4+
"modified": "2026-04-15T00:31:33Z",
55
"published": "2022-05-24T19:19:13Z",
66
"aliases": [
77
"CVE-2021-41646"
88
],
99
"details": "Remote Code Execution (RCE) vulnerability exists in Sourcecodester Online Reviewer System 1.0 by uploading a maliciously crafted PHP file that bypasses the image upload filters..",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{

advisories/unreviewed/2025/01/GHSA-82c6-8mfc-c23h/GHSA-82c6-8mfc-c23h.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-82c6-8mfc-c23h",
4-
"modified": "2025-11-04T00:32:17Z",
4+
"modified": "2026-04-15T00:31:33Z",
55
"published": "2025-01-14T18:32:00Z",
66
"aliases": [
77
"CVE-2024-12086"
@@ -23,6 +23,10 @@
2323
"type": "ADVISORY",
2424
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12086"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://access.redhat.com/errata/RHBA-2025:6470"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://access.redhat.com/security/cve/CVE-2024-12086"

advisories/unreviewed/2025/01/GHSA-9x68-7qq6-v523/GHSA-9x68-7qq6-v523.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9x68-7qq6-v523",
4-
"modified": "2025-12-22T15:30:20Z",
4+
"modified": "2026-04-15T00:31:33Z",
55
"published": "2025-01-14T18:32:00Z",
66
"aliases": [
77
"CVE-2024-12087"
@@ -94,6 +94,10 @@
9494
{
9595
"type": "WEB",
9696
"url": "https://access.redhat.com/errata/RHSA-2025:23154"
97+
},
98+
{
99+
"type": "WEB",
100+
"url": "https://access.redhat.com/errata/RHBA-2025:6470"
97101
}
98102
],
99103
"database_specific": {

advisories/unreviewed/2025/01/GHSA-ffph-g3pc-8r3g/GHSA-ffph-g3pc-8r3g.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-ffph-g3pc-8r3g",
4-
"modified": "2025-11-04T00:32:18Z",
4+
"modified": "2026-04-15T00:31:33Z",
55
"published": "2025-01-14T18:32:00Z",
66
"aliases": [
77
"CVE-2024-12088"
@@ -23,6 +23,10 @@
2323
"type": "ADVISORY",
2424
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12088"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://access.redhat.com/errata/RHBA-2025:6470"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://access.redhat.com/errata/RHSA-2025:2600"

advisories/unreviewed/2025/01/GHSA-gp7r-m4cc-qhwq/GHSA-gp7r-m4cc-qhwq.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gp7r-m4cc-qhwq",
4-
"modified": "2025-11-04T00:32:20Z",
4+
"modified": "2026-04-15T00:31:33Z",
55
"published": "2025-01-14T18:32:00Z",
66
"aliases": [
77
"CVE-2024-12747"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12747"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://access.redhat.com/errata/RHBA-2025:6470"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://access.redhat.com/errata/RHSA-2025:2600"

advisories/unreviewed/2025/01/GHSA-xh5q-pch5-g3xq/GHSA-xh5q-pch5-g3xq.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xh5q-pch5-g3xq",
4-
"modified": "2025-11-20T21:30:28Z",
4+
"modified": "2026-04-15T00:31:33Z",
55
"published": "2025-01-14T18:32:00Z",
66
"aliases": [
77
"CVE-2024-12085"
@@ -126,6 +126,10 @@
126126
{
127127
"type": "WEB",
128128
"url": "https://access.redhat.com/errata/RHSA-2025:0324"
129+
},
130+
{
131+
"type": "WEB",
132+
"url": "https://access.redhat.com/errata/RHBA-2025:6470"
129133
}
130134
],
131135
"database_specific": {

advisories/unreviewed/2025/07/GHSA-8c4w-j52q-j4jq/GHSA-8c4w-j52q-j4jq.json

Lines changed: 35 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8c4w-j52q-j4jq",
4-
"modified": "2026-01-22T06:30:28Z",
4+
"modified": "2026-04-15T00:31:34Z",
55
"published": "2025-07-10T15:31:28Z",
66
"aliases": [
77
"CVE-2025-7425"
@@ -21,127 +21,131 @@
2121
},
2222
{
2323
"type": "WEB",
24-
"url": "https://lists.debian.org/debian-lts-announce/2025/09/msg00035.html"
24+
"url": "https://access.redhat.com/errata/RHBA-2025:12345"
2525
},
2626
{
2727
"type": "WEB",
28-
"url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/140"
28+
"url": "https://access.redhat.com/errata/RHSA-2025:14819"
2929
},
3030
{
3131
"type": "WEB",
32-
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379274"
32+
"url": "https://access.redhat.com/errata/RHSA-2025:14853"
3333
},
3434
{
3535
"type": "WEB",
36-
"url": "https://access.redhat.com/security/cve/CVE-2025-7425"
36+
"url": "https://access.redhat.com/errata/RHSA-2025:14858"
3737
},
3838
{
3939
"type": "WEB",
40-
"url": "https://access.redhat.com/errata/RHSA-2026:0934"
40+
"url": "https://access.redhat.com/errata/RHSA-2025:15308"
4141
},
4242
{
4343
"type": "WEB",
44-
"url": "https://access.redhat.com/errata/RHSA-2025:21913"
44+
"url": "https://access.redhat.com/errata/RHSA-2025:15672"
4545
},
4646
{
4747
"type": "WEB",
48-
"url": "https://access.redhat.com/errata/RHSA-2025:21885"
48+
"url": "https://access.redhat.com/errata/RHSA-2025:15827"
4949
},
5050
{
5151
"type": "WEB",
52-
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
52+
"url": "https://access.redhat.com/errata/RHSA-2025:15828"
5353
},
5454
{
5555
"type": "WEB",
56-
"url": "https://access.redhat.com/errata/RHSA-2025:15828"
56+
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
5757
},
5858
{
5959
"type": "WEB",
60-
"url": "https://access.redhat.com/errata/RHSA-2025:15827"
60+
"url": "https://access.redhat.com/errata/RHSA-2025:21885"
6161
},
6262
{
6363
"type": "WEB",
64-
"url": "https://access.redhat.com/errata/RHSA-2025:15672"
64+
"url": "https://access.redhat.com/errata/RHSA-2025:21913"
6565
},
6666
{
6767
"type": "WEB",
68-
"url": "https://access.redhat.com/errata/RHSA-2025:15308"
68+
"url": "https://access.redhat.com/errata/RHSA-2026:0934"
6969
},
7070
{
7171
"type": "WEB",
72-
"url": "https://access.redhat.com/errata/RHSA-2025:14858"
72+
"url": "https://access.redhat.com/security/cve/CVE-2025-7425"
7373
},
7474
{
7575
"type": "WEB",
76-
"url": "https://access.redhat.com/errata/RHSA-2025:14853"
76+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379274"
7777
},
7878
{
7979
"type": "WEB",
80-
"url": "https://access.redhat.com/errata/RHSA-2025:14819"
80+
"url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/140"
8181
},
8282
{
8383
"type": "WEB",
84-
"url": "https://access.redhat.com/errata/RHSA-2025:14818"
84+
"url": "https://lists.debian.org/debian-lts-announce/2025/09/msg00035.html"
8585
},
8686
{
8787
"type": "WEB",
88-
"url": "https://access.redhat.com/errata/RHSA-2025:14396"
88+
"url": "https://access.redhat.com/errata/RHSA-2025:12447"
8989
},
9090
{
9191
"type": "WEB",
92-
"url": "https://access.redhat.com/errata/RHSA-2025:14059"
92+
"url": "https://access.redhat.com/errata/RHSA-2025:12450"
9393
},
9494
{
9595
"type": "WEB",
96-
"url": "https://access.redhat.com/errata/RHSA-2025:13622"
96+
"url": "https://access.redhat.com/errata/RHSA-2025:13267"
9797
},
9898
{
9999
"type": "WEB",
100-
"url": "https://access.redhat.com/errata/RHSA-2025:13464"
100+
"url": "https://access.redhat.com/errata/RHSA-2025:13308"
101101
},
102102
{
103103
"type": "WEB",
104-
"url": "https://access.redhat.com/errata/RHSA-2025:13335"
104+
"url": "https://access.redhat.com/errata/RHSA-2025:13309"
105105
},
106106
{
107107
"type": "WEB",
108-
"url": "https://access.redhat.com/errata/RHSA-2025:13314"
108+
"url": "https://access.redhat.com/errata/RHSA-2025:13310"
109109
},
110110
{
111111
"type": "WEB",
112-
"url": "https://access.redhat.com/errata/RHSA-2025:13313"
112+
"url": "https://access.redhat.com/errata/RHSA-2025:13311"
113113
},
114114
{
115115
"type": "WEB",
116116
"url": "https://access.redhat.com/errata/RHSA-2025:13312"
117117
},
118118
{
119119
"type": "WEB",
120-
"url": "https://access.redhat.com/errata/RHSA-2025:13311"
120+
"url": "https://access.redhat.com/errata/RHSA-2025:13313"
121121
},
122122
{
123123
"type": "WEB",
124-
"url": "https://access.redhat.com/errata/RHSA-2025:13310"
124+
"url": "https://access.redhat.com/errata/RHSA-2025:13314"
125125
},
126126
{
127127
"type": "WEB",
128-
"url": "https://access.redhat.com/errata/RHSA-2025:13309"
128+
"url": "https://access.redhat.com/errata/RHSA-2025:13335"
129129
},
130130
{
131131
"type": "WEB",
132-
"url": "https://access.redhat.com/errata/RHSA-2025:13308"
132+
"url": "https://access.redhat.com/errata/RHSA-2025:13464"
133133
},
134134
{
135135
"type": "WEB",
136-
"url": "https://access.redhat.com/errata/RHSA-2025:13267"
136+
"url": "https://access.redhat.com/errata/RHSA-2025:13622"
137137
},
138138
{
139139
"type": "WEB",
140-
"url": "https://access.redhat.com/errata/RHSA-2025:12450"
140+
"url": "https://access.redhat.com/errata/RHSA-2025:14059"
141141
},
142142
{
143143
"type": "WEB",
144-
"url": "https://access.redhat.com/errata/RHSA-2025:12447"
144+
"url": "https://access.redhat.com/errata/RHSA-2025:14396"
145+
},
146+
{
147+
"type": "WEB",
148+
"url": "https://access.redhat.com/errata/RHSA-2025:14818"
145149
},
146150
{
147151
"type": "WEB",

advisories/unreviewed/2025/07/GHSA-w4gx-392p-5m58/GHSA-w4gx-392p-5m58.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-w4gx-392p-5m58",
4-
"modified": "2026-03-23T18:30:25Z",
4+
"modified": "2026-04-15T00:31:33Z",
55
"published": "2025-07-10T15:31:28Z",
66
"aliases": [
77
"CVE-2025-7424"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7424"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://access.redhat.com/errata/RHBA-2025:12345"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://access.redhat.com/security/cve/CVE-2025-7424"
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-34mc-mx9w-h5cv",
4+
"modified": "2026-04-15T00:31:35Z",
5+
"published": "2026-04-15T00:31:35Z",
6+
"aliases": [
7+
"CVE-2026-27292"
8+
],
9+
"details": "Adobe Framemaker versions 2022.8 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27292"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://helpx.adobe.com/security/products/framemaker/apsb26-36.html"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-416"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-04-14T23:16:25Z"
35+
}
36+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-39g8-p82f-45mx",
4+
"modified": "2026-04-15T00:31:35Z",
5+
"published": "2026-04-15T00:31:35Z",
6+
"aliases": [
7+
"CVE-2026-27301"
8+
],
9+
"details": "Adobe Framemaker versions 2022.8 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27301"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://helpx.adobe.com/security/products/framemaker/apsb26-36.html"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-122"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-04-14T23:16:27Z"
35+
}
36+
}

0 commit comments

Comments
 (0)