Skip to content

Commit 7ad146a

Browse files
Advisory Database Sync
1 parent 05a6190 commit 7ad146a

90 files changed

Lines changed: 1167 additions & 99 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/unreviewed/2022/01/GHSA-cf77-6c9v-56mf/GHSA-cf77-6c9v-56mf.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cf77-6c9v-56mf",
4-
"modified": "2023-07-06T15:30:29Z",
4+
"modified": "2026-02-24T18:30:55Z",
55
"published": "2022-01-11T00:01:24Z",
66
"aliases": [
77
"CVE-2021-40014"

advisories/unreviewed/2022/01/GHSA-j5wx-jhwh-qm36/GHSA-j5wx-jhwh-qm36.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-j5wx-jhwh-qm36",
4-
"modified": "2023-07-06T15:30:29Z",
4+
"modified": "2026-02-24T18:30:55Z",
55
"published": "2022-01-11T00:01:21Z",
66
"aliases": [
77
"CVE-2021-40027"

advisories/unreviewed/2022/01/GHSA-p5j8-hcx4-456v/GHSA-p5j8-hcx4-456v.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-p5j8-hcx4-456v",
4-
"modified": "2022-07-13T00:01:39Z",
4+
"modified": "2026-02-24T18:30:55Z",
55
"published": "2022-01-11T00:01:25Z",
66
"aliases": [
77
"CVE-2021-40006"

advisories/unreviewed/2022/01/GHSA-wvq2-357p-vcgg/GHSA-wvq2-357p-vcgg.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wvq2-357p-vcgg",
4-
"modified": "2023-07-06T15:30:29Z",
4+
"modified": "2026-02-24T18:30:55Z",
55
"published": "2022-01-11T00:01:18Z",
66
"aliases": [
77
"CVE-2021-40032"

advisories/unreviewed/2022/02/GHSA-jxf5-m5fg-rw27/GHSA-jxf5-m5fg-rw27.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jxf5-m5fg-rw27",
4-
"modified": "2022-05-13T00:00:39Z",
4+
"modified": "2026-02-24T18:30:58Z",
55
"published": "2022-02-17T00:00:32Z",
66
"aliases": [
77
"CVE-2021-39298"

advisories/unreviewed/2022/05/GHSA-37q4-472r-ppmr/GHSA-37q4-472r-ppmr.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-37q4-472r-ppmr",
4-
"modified": "2023-12-28T21:30:29Z",
4+
"modified": "2026-02-24T18:30:55Z",
55
"published": "2022-05-24T19:10:50Z",
66
"aliases": [
77
"CVE-2021-36958"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36958"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.kb.cert.org/vuls/id/131152"
2529
}
2630
],
2731
"database_specific": {

advisories/unreviewed/2022/05/GHSA-3w9m-7j3j-w9p6/GHSA-3w9m-7j3j-w9p6.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,8 @@
2626
],
2727
"database_specific": {
2828
"cwe_ids": [
29-
"CWE-352"
29+
"CWE-352",
30+
"CWE-79"
3031
],
3132
"severity": "CRITICAL",
3233
"github_reviewed": false,

advisories/unreviewed/2022/05/GHSA-h8r6-3pj7-gwfh/GHSA-h8r6-3pj7-gwfh.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-h8r6-3pj7-gwfh",
4-
"modified": "2022-05-24T19:17:18Z",
4+
"modified": "2026-02-24T18:30:55Z",
55
"published": "2022-05-24T19:17:18Z",
66
"aliases": [
77
"CVE-2021-38180"
88
],
99
"details": "SAP Business One - version 10.0, allows an attacker to inject formulas when exporting data to Excel (CSV injection) due to improper sanitation during the data export. An attacker could thereby execute arbitrary commands on the victim's computer but only if the victim allows to execute macros while opening the file and the security settings of Excel allow for command execution.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{

advisories/unreviewed/2026/02/GHSA-2255-92v8-4pvj/GHSA-2255-92v8-4pvj.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2255-92v8-4pvj",
4-
"modified": "2026-02-24T15:30:31Z",
4+
"modified": "2026-02-24T18:31:01Z",
55
"published": "2026-02-24T15:30:31Z",
66
"aliases": [
77
"CVE-2026-2760"
@@ -29,6 +29,14 @@
2929
{
3030
"type": "WEB",
3131
"url": "https://www.mozilla.org/security/advisories/mfsa2026-15"
32+
},
33+
{
34+
"type": "WEB",
35+
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16"
36+
},
37+
{
38+
"type": "WEB",
39+
"url": "https://www.mozilla.org/security/advisories/mfsa2026-17"
3240
}
3341
],
3442
"database_specific": {
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3547-c34m-73j3",
4+
"modified": "2026-02-24T18:31:02Z",
5+
"published": "2026-02-24T18:31:02Z",
6+
"aliases": [
7+
"CVE-2026-27521"
8+
],
9+
"details": "Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior do not implement rate limiting or account lockout on failed login attempts, enabling brute-force attacks against user credentials.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27521"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.binardat.com/products/8-port-10-gigabit-sfp-managed-switch,-support-1g-sfp-and-10g-sfp-module,-160gbps-bandwidth,-l3-web-managed,-metal-fanless-fiber-binardat-network-switch"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.vulncheck.com/advisories/binardat-10g08-0800gsm-network-switch-missing-login-rate-limiting"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-307"
38+
],
39+
"severity": "MODERATE",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2026-02-24T16:24:10Z"
43+
}
44+
}

0 commit comments

Comments
 (0)