Skip to content

Commit 395d01f

Browse files
Advisory Database Sync
1 parent ace7bff commit 395d01f

28 files changed

Lines changed: 544 additions & 20 deletions

File tree

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-333w-78wm-wpxh",
4+
"modified": "2026-02-23T06:30:18Z",
5+
"published": "2026-02-23T06:30:18Z",
6+
"aliases": [
7+
"CVE-2026-2971"
8+
],
9+
"details": "A vulnerability was found in a466350665 Smart-SSO up to 2.1.1. Affected by this issue is some unknown functionality of the file smart-sso-server/src/main/resources/templates/login.html of the component Login. Performing a manipulation of the argument redirectUri results in cross site scripting. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2971"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://vuldb.com/?ctiid.347338"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?id.347338"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?submit.756025"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://www.notion.so/Smart-SSO-Reflected-XSS-vulnerabilities-in-redirectUri-parameter-304ea92a3c41805a8223c4ba75831802"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-79"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2026-02-23T05:16:20Z"
51+
}
52+
}

advisories/unreviewed/2026/02/GHSA-365g-rr2h-rx65/GHSA-365g-rr2h-rx65.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-365g-rr2h-rx65",
4-
"modified": "2026-02-18T18:30:40Z",
4+
"modified": "2026-02-23T06:30:17Z",
55
"published": "2026-02-18T18:30:40Z",
66
"aliases": [
77
"CVE-2025-71234"
@@ -22,6 +22,10 @@
2222
"type": "WEB",
2323
"url": "https://git.kernel.org/stable/c/5d810ba377eddee95d30766d360a14efbb3d1872"
2424
},
25+
{
26+
"type": "WEB",
27+
"url": "https://git.kernel.org/stable/c/86c946bcc00f6390ef65e9614ae60a9377e454f8"
28+
},
2529
{
2630
"type": "WEB",
2731
"url": "https://git.kernel.org/stable/c/9a0f3fa6ecd0c9c32dbc367a57482bbf7c7d25bf"

advisories/unreviewed/2026/02/GHSA-3w2g-4qx3-2mmw/GHSA-3w2g-4qx3-2mmw.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3w2g-4qx3-2mmw",
4-
"modified": "2026-02-19T18:31:43Z",
4+
"modified": "2026-02-23T06:30:17Z",
55
"published": "2026-02-18T18:30:40Z",
66
"aliases": [
77
"CVE-2025-71232"
@@ -22,6 +22,10 @@
2222
"type": "WEB",
2323
"url": "https://git.kernel.org/stable/c/19ac050ef09a2f0a9d9787540f77bb45cf9033e8"
2424
},
25+
{
26+
"type": "WEB",
27+
"url": "https://git.kernel.org/stable/c/7adbd2b7809066c75f0433e5e2a8e114b429f30f"
28+
},
2529
{
2630
"type": "WEB",
2731
"url": "https://git.kernel.org/stable/c/8e7597b4efee6143439641bc6522f247d585e060"

advisories/unreviewed/2026/02/GHSA-5jgq-pv8m-5cx7/GHSA-5jgq-pv8m-5cx7.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5jgq-pv8m-5cx7",
4-
"modified": "2026-02-18T18:30:40Z",
4+
"modified": "2026-02-23T06:30:18Z",
55
"published": "2026-02-18T18:30:40Z",
66
"aliases": [
77
"CVE-2026-23226"
@@ -18,6 +18,10 @@
1818
"type": "WEB",
1919
"url": "https://git.kernel.org/stable/c/36ef605c0395b94b826a8c8d6f2697071173de6e"
2020
},
21+
{
22+
"type": "WEB",
23+
"url": "https://git.kernel.org/stable/c/4f3a06cc57976cafa8c6f716646be6c79a99e485"
24+
},
2125
{
2226
"type": "WEB",
2327
"url": "https://git.kernel.org/stable/c/e4a8a96a93d08570e0405cfd989a8a07e5b6ff33"

advisories/unreviewed/2026/02/GHSA-5qf3-3gp9-pjx6/GHSA-5qf3-3gp9-pjx6.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5qf3-3gp9-pjx6",
4-
"modified": "2026-02-19T18:31:44Z",
4+
"modified": "2026-02-23T06:30:18Z",
55
"published": "2026-02-18T18:30:40Z",
66
"aliases": [
77
"CVE-2026-23222"
@@ -14,6 +14,10 @@
1414
"type": "ADVISORY",
1515
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23222"
1616
},
17+
{
18+
"type": "WEB",
19+
"url": "https://git.kernel.org/stable/c/1562b1fb7e17c1b3addb15e125c718b2be7f5512"
20+
},
1721
{
1822
"type": "WEB",
1923
"url": "https://git.kernel.org/stable/c/2ed27b5a1174351148c3adbfc0cd86d54072ba2e"
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6h9v-2cfh-rp3v",
4+
"modified": "2026-02-23T06:30:19Z",
5+
"published": "2026-02-23T06:30:18Z",
6+
"aliases": [
7+
"CVE-2026-2972"
8+
],
9+
"details": "A vulnerability was determined in a466350665 Smart-SSO up to 2.1.1. This affects the function Save of the file smart-sso-server/src/main/java/openjoe/smart/sso/server/controller/admin/UserController.java of the component Role Edit Page. Executing a manipulation can lead to cross site scripting. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2972"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://vuldb.com/?ctiid.347339"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?id.347339"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?submit.756026"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://www.notion.so/Smart-SSO-Stored-Cross-Site-Scripting-XSS-in-Role-Edit-Page-303ea92a3c4180f4beb9c119653ce51d"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-79"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2026-02-23T06:16:15Z"
51+
}
52+
}

advisories/unreviewed/2026/02/GHSA-6xrx-3vj8-2rjc/GHSA-6xrx-3vj8-2rjc.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6xrx-3vj8-2rjc",
4-
"modified": "2026-02-18T18:30:39Z",
4+
"modified": "2026-02-23T06:30:17Z",
55
"published": "2026-02-18T18:30:39Z",
66
"aliases": [
77
"CVE-2025-71230"
@@ -14,6 +14,10 @@
1414
"type": "ADVISORY",
1515
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71230"
1616
},
17+
{
18+
"type": "WEB",
19+
"url": "https://git.kernel.org/stable/c/05ce49a902be15dc93854cbfc20161205a9ee446"
20+
},
1721
{
1822
"type": "WEB",
1923
"url": "https://git.kernel.org/stable/c/399219831514126bc9541e8eadefe02c6fbd9166"

advisories/unreviewed/2026/02/GHSA-78xc-39m5-v2c6/GHSA-78xc-39m5-v2c6.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-78xc-39m5-v2c6",
4-
"modified": "2026-02-19T18:31:43Z",
4+
"modified": "2026-02-23T06:30:17Z",
55
"published": "2026-02-18T18:30:40Z",
66
"aliases": [
77
"CVE-2025-71233"
@@ -26,6 +26,10 @@
2626
"type": "WEB",
2727
"url": "https://git.kernel.org/stable/c/73cee890adafa2c219bb865356e08e7f82423fe5"
2828
},
29+
{
30+
"type": "WEB",
31+
"url": "https://git.kernel.org/stable/c/7c5c7d06bd1f86d2c3ebe62be903a4ba42db4d2c"
32+
},
2933
{
3034
"type": "WEB",
3135
"url": "https://git.kernel.org/stable/c/8cb905eca73944089a0db01443c7628a9e87012d"

advisories/unreviewed/2026/02/GHSA-876r-52fj-4pxf/GHSA-876r-52fj-4pxf.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-876r-52fj-4pxf",
4-
"modified": "2026-02-19T18:31:43Z",
4+
"modified": "2026-02-23T06:30:17Z",
55
"published": "2026-02-18T18:30:40Z",
66
"aliases": [
77
"CVE-2025-71235"
@@ -22,6 +22,10 @@
2222
"type": "WEB",
2323
"url": "https://git.kernel.org/stable/c/7062eb0c488f35730334daad9495d9265c574853"
2424
},
25+
{
26+
"type": "WEB",
27+
"url": "https://git.kernel.org/stable/c/8890bf450e0b6b283f48ac619fca5ac2f14ddd62"
28+
},
2529
{
2630
"type": "WEB",
2731
"url": "https://git.kernel.org/stable/c/891f9969a29e9767a453cef4811c8d2472ccab49"

advisories/unreviewed/2026/02/GHSA-8j5g-3q2r-xfjh/GHSA-8j5g-3q2r-xfjh.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8j5g-3q2r-xfjh",
4-
"modified": "2026-02-18T18:30:40Z",
4+
"modified": "2026-02-23T06:30:18Z",
55
"published": "2026-02-18T18:30:40Z",
66
"aliases": [
77
"CVE-2026-23224"
@@ -14,6 +14,10 @@
1414
"type": "ADVISORY",
1515
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23224"
1616
},
17+
{
18+
"type": "WEB",
19+
"url": "https://git.kernel.org/stable/c/1caf50ce4af096d0280d59a31abdd85703cd995c"
20+
},
1721
{
1822
"type": "WEB",
1923
"url": "https://git.kernel.org/stable/c/ae385826840a3c8e09bf38cac90adcd690716f57"

0 commit comments

Comments
 (0)