Skip to content

File tree

12 files changed

+358
-6
lines changed

12 files changed

+358
-6
lines changed

advisories/unreviewed/2025/02/GHSA-5r25-p9f2-w2xv/GHSA-5r25-p9f2-w2xv.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5r25-p9f2-w2xv",
4-
"modified": "2025-09-18T09:31:12Z",
4+
"modified": "2026-03-25T00:31:11Z",
55
"published": "2025-02-19T18:32:24Z",
66
"aliases": [
77
"CVE-2025-1118"
@@ -30,6 +30,14 @@
3030
{
3131
"type": "WEB",
3232
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346137"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://git.savannah.gnu.org/cgit/grub.git/commit/?id=34824806ac6302f91e8cabaa41308eaced25725f"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html"
3341
}
3442
],
3543
"database_specific": {

advisories/unreviewed/2025/02/GHSA-cqj4-fp95-jqxq/GHSA-cqj4-fp95-jqxq.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cqj4-fp95-jqxq",
4-
"modified": "2025-10-06T12:30:29Z",
4+
"modified": "2026-03-25T00:31:10Z",
55
"published": "2025-02-10T18:30:46Z",
66
"aliases": [
77
"CVE-2024-12243"
@@ -47,6 +47,10 @@
4747
"type": "WEB",
4848
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344615"
4949
},
50+
{
51+
"type": "WEB",
52+
"url": "https://gitlab.com/gnutls/gnutls/-/issues/1553"
53+
},
5054
{
5155
"type": "WEB",
5256
"url": "https://gitlab.com/gnutls/libtasn1/-/issues/52"

advisories/unreviewed/2025/02/GHSA-h592-gmp8-rvr7/GHSA-h592-gmp8-rvr7.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-h592-gmp8-rvr7",
4-
"modified": "2025-09-18T09:31:12Z",
4+
"modified": "2026-03-25T00:31:11Z",
55
"published": "2025-02-19T21:31:38Z",
66
"aliases": [
77
"CVE-2025-0677"
@@ -34,6 +34,10 @@
3434
{
3535
"type": "WEB",
3636
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346116"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html"
3741
}
3842
],
3943
"database_specific": {

advisories/unreviewed/2025/02/GHSA-j3qr-8f3v-fgjj/GHSA-j3qr-8f3v-fgjj.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-j3qr-8f3v-fgjj",
4-
"modified": "2025-10-06T03:31:37Z",
4+
"modified": "2026-03-25T00:31:10Z",
55
"published": "2025-02-10T18:30:47Z",
66
"aliases": [
77
"CVE-2024-12133"
@@ -47,6 +47,10 @@
4747
"type": "WEB",
4848
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344611"
4949
},
50+
{
51+
"type": "WEB",
52+
"url": "https://gitlab.com/gnutls/libtasn1/-/blob/master/doc/security/CVE-2024-12133.md"
53+
},
5054
{
5155
"type": "WEB",
5256
"url": "https://gitlab.com/gnutls/libtasn1/-/issues/52"

advisories/unreviewed/2025/02/GHSA-vjmw-pmxv-8c6w/GHSA-vjmw-pmxv-8c6w.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vjmw-pmxv-8c6w",
4-
"modified": "2025-09-18T09:31:12Z",
4+
"modified": "2026-03-25T00:31:10Z",
55
"published": "2025-02-18T21:32:52Z",
66
"aliases": [
77
"CVE-2025-0622"
@@ -34,6 +34,10 @@
3434
{
3535
"type": "WEB",
3636
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345865"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html"
3741
}
3842
],
3943
"database_specific": {

advisories/unreviewed/2025/03/GHSA-vpmj-h28j-ffpp/GHSA-vpmj-h28j-ffpp.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vpmj-h28j-ffpp",
4-
"modified": "2025-03-03T18:31:28Z",
4+
"modified": "2026-03-25T00:31:11Z",
55
"published": "2025-03-03T18:31:28Z",
66
"aliases": [
77
"CVE-2024-45778"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345640"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html"
2933
}
3034
],
3135
"database_specific": {
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6c6m-rc4v-fp65",
4+
"modified": "2026-03-25T00:31:11Z",
5+
"published": "2026-03-25T00:31:11Z",
6+
"aliases": [
7+
"CVE-2026-4779"
8+
],
9+
"details": "A security vulnerability has been detected in SourceCodester Sales and Inventory System 1.0. This issue affects some unknown processing of the file update_customer_details.php of the component HTTP GET Parameter Handler. Such manipulation of the argument sid leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4779"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/meifukun/Web-Security-PoCs/blob/main/Inventory-System/SQLi-UpdateCustomerDetails-sid.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.352797"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.352797"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.775172"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.sourcecodester.com"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-74"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2026-03-24T23:17:12Z"
55+
}
56+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-923r-23pf-6337",
4+
"modified": "2026-03-25T00:31:11Z",
5+
"published": "2026-03-25T00:31:11Z",
6+
"aliases": [
7+
"CVE-2026-4781"
8+
],
9+
"details": "A flaw has been found in SourceCodester Sales and Inventory System 1.0. The affected element is an unknown function of the file update_purchase.php of the component HTTP GET Parameter Handler. Executing a manipulation of the argument sid can lead to sql injection. The attack may be performed from remote. The exploit has been published and may be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4781"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/meifukun/Web-Security-PoCs/blob/main/Inventory-System/SQLi-UpdatePurchase-sid.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.352799"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.352799"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.775174"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.sourcecodester.com"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-74"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2026-03-25T00:16:41Z"
55+
}
56+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-9jvv-qw4v-hm39",
4+
"modified": "2026-03-25T00:31:11Z",
5+
"published": "2026-03-25T00:31:11Z",
6+
"aliases": [
7+
"CVE-2026-4777"
8+
],
9+
"details": "A security flaw has been discovered in SourceCodester Sales and Inventory System 1.0. This affects an unknown part of the file view_supplier.php of the component POST Parameter Handler. The manipulation of the argument searchtxt results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4777"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/meifukun/Web-Security-PoCs/blob/main/Inventory-System/SQLi-ViewSupplier-searchtxt.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.352795"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.352795"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.775169"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.sourcecodester.com"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-74"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2026-03-24T22:16:24Z"
55+
}
56+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-fmg2-6qx8-qwc3",
4+
"modified": "2026-03-25T00:31:11Z",
5+
"published": "2026-03-25T00:31:11Z",
6+
"aliases": [
7+
"CVE-2026-4778"
8+
],
9+
"details": "A weakness has been identified in SourceCodester Sales and Inventory System 1.0. This vulnerability affects unknown code of the file update_category.php of the component HTTP GET Parameter Handler. This manipulation of the argument sid causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4778"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/meifukun/Web-Security-PoCs/blob/main/Inventory-System/SQLi-UpdateCategory-sid.md"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.352796"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.352796"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.775171"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.sourcecodester.com"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-74"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2026-03-24T23:17:12Z"
55+
}
56+
}

0 commit comments

Comments
 (0)