Skip to content

Commit a1043d8

Browse files
Advisory Database Sync
1 parent 395d01f commit a1043d8

91 files changed

Lines changed: 967 additions & 90 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/unreviewed/2022/01/GHSA-5c8j-7c6c-838x/GHSA-5c8j-7c6c-838x.json

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,28 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5c8j-7c6c-838x",
4-
"modified": "2022-01-27T00:04:03Z",
4+
"modified": "2026-02-23T09:31:16Z",
55
"published": "2022-01-19T00:01:07Z",
66
"aliases": [
77
"CVE-2021-41807"
88
],
99
"details": "Lack of rate limiting in M-Files Server and M-Files Web products with versions before 21.12.10873.0 in certain type of user accounts allows unlimited amount of attempts and therefore makes brute-forcing login accounts easier.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
1419
"type": "ADVISORY",
1520
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41807"
1621
},
22+
{
23+
"type": "WEB",
24+
"url": "https://empower.m-files.com/security-advisories/CVE-2021-41807"
25+
},
1726
{
1827
"type": "WEB",
1928
"url": "https://www.m-files.com/about/trust-center/security-vulnerabilities/cve-2021-41807"

advisories/unreviewed/2022/01/GHSA-h62q-wxxr-4qqj/GHSA-h62q-wxxr-4qqj.json

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,28 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-h62q-wxxr-4qqj",
4-
"modified": "2022-01-27T00:04:01Z",
4+
"modified": "2026-02-23T09:31:16Z",
55
"published": "2022-01-19T00:01:07Z",
66
"aliases": [
77
"CVE-2021-41808"
88
],
99
"details": "In M-Files Server product with versions before 21.11.10775.0, enabling logging of Federated authentication to event log wrote sensitive information to log. Mitigating factors are logging is disabled by default.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
1419
"type": "ADVISORY",
1520
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41808"
1621
},
22+
{
23+
"type": "WEB",
24+
"url": "https://empower.m-files.com/security-advisories/CVE-2021-41808"
25+
},
1726
{
1827
"type": "WEB",
1928
"url": "https://www.m-files.com/about/trust-center/security-vulnerabilities/cve-2021-41808"

advisories/unreviewed/2022/01/GHSA-wrw2-8vg5-g3jj/GHSA-wrw2-8vg5-g3jj.json

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,28 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wrw2-8vg5-g3jj",
4-
"modified": "2022-01-27T00:04:00Z",
4+
"modified": "2026-02-23T09:31:17Z",
55
"published": "2022-01-19T00:01:07Z",
66
"aliases": [
77
"CVE-2021-41809"
88
],
99
"details": "SSRF vulnerability in M-Files Server products with versions before 22.1.11017.1, in a preview function allowed making queries from the server with certain document types referencing external entities.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
1419
"type": "ADVISORY",
1520
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41809"
1621
},
22+
{
23+
"type": "WEB",
24+
"url": "https://empower.m-files.com/security-advisories/CVE-2021-41809"
25+
},
1726
{
1827
"type": "WEB",
1928
"url": "https://www.m-files.com/about/trust-center/security-vulnerabilities/cve-2021-41809"

advisories/unreviewed/2022/11/GHSA-6w8q-wgfc-hxx8/GHSA-6w8q-wgfc-hxx8.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6w8q-wgfc-hxx8",
4-
"modified": "2024-08-28T12:30:31Z",
4+
"modified": "2026-02-23T09:31:17Z",
55
"published": "2022-11-30T15:30:27Z",
66
"aliases": [
77
"CVE-2022-1606"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1606"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://empower.m-files.com/security-advisories/CVE-2022-1606"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://product.m-files.com/security-advisories/cve-2022-1606"

advisories/unreviewed/2022/11/GHSA-hx75-3jr9-944m/GHSA-hx75-3jr9-944m.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hx75-3jr9-944m",
4-
"modified": "2024-08-28T12:30:31Z",
4+
"modified": "2026-02-23T09:31:17Z",
55
"published": "2022-11-30T15:30:27Z",
66
"aliases": [
77
"CVE-2022-1911"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1911"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://empower.m-files.com/security-advisories/CVE-2022-1911"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://product.m-files.com/security-advisories/cve-2022-1911"

advisories/unreviewed/2022/12/GHSA-cmrr-4p45-4xv3/GHSA-cmrr-4p45-4xv3.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cmrr-4p45-4xv3",
4-
"modified": "2024-08-28T12:30:33Z",
4+
"modified": "2026-02-23T09:31:17Z",
55
"published": "2022-12-30T12:30:25Z",
66
"aliases": [
77
"CVE-2022-4858"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4858"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://empower.m-files.com/security-advisories/CVE-2022-4858"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://product.m-files.com/security-advisories/cve-2022-4858"

advisories/unreviewed/2022/12/GHSA-fh2m-jrq8-h6q5/GHSA-fh2m-jrq8-h6q5.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fh2m-jrq8-h6q5",
4-
"modified": "2024-08-28T12:30:32Z",
4+
"modified": "2026-02-23T09:31:17Z",
55
"published": "2022-12-02T15:30:26Z",
66
"aliases": [
77
"CVE-2022-4270"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4270"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://empower.m-files.com/security-advisories/CVE-2022-4270"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://product.m-files.com/security-advisories/cve-2022-4270"

advisories/unreviewed/2022/12/GHSA-j86w-j9vr-w3pm/GHSA-j86w-j9vr-w3pm.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-j86w-j9vr-w3pm",
4-
"modified": "2024-08-28T12:30:32Z",
4+
"modified": "2026-02-23T09:31:17Z",
55
"published": "2022-12-09T15:30:29Z",
66
"aliases": [
77
"CVE-2022-4264"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4264"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://empower.m-files.com/security-advisories/CVE-2022-4264"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://product.m-files.com/security-advisories/cve-2022-4264"

advisories/unreviewed/2022/12/GHSA-qx2w-wx28-8mhv/GHSA-qx2w-wx28-8mhv.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qx2w-wx28-8mhv",
4-
"modified": "2024-08-28T12:30:33Z",
4+
"modified": "2026-02-23T09:31:17Z",
55
"published": "2022-12-30T15:30:22Z",
66
"aliases": [
77
"CVE-2022-4861"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4861"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://empower.m-files.com/security-advisories/CVE-2022-4861"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://product.m-files.com/security-advisories/cve-2022-4861"

advisories/unreviewed/2023/03/GHSA-f75p-j579-8r2c/GHSA-f75p-j579-8r2c.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f75p-j579-8r2c",
4-
"modified": "2024-08-28T09:30:30Z",
4+
"modified": "2026-02-23T09:31:17Z",
55
"published": "2023-03-29T12:30:35Z",
66
"aliases": [
77
"CVE-2023-0213"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0213"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://empower.m-files.com/security-advisories/CVE-2023-0213"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://product.m-files.com/security-advisories/cve-2023-0213"

0 commit comments

Comments
 (0)