Skip to content

Commit f58705f

Browse files
Advisory Database Sync
1 parent a1043d8 commit f58705f

45 files changed

Lines changed: 494 additions & 37 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/unreviewed/2022/05/GHSA-v47f-5m37-hhcx/GHSA-v47f-5m37-hhcx.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v47f-5m37-hhcx",
4-
"modified": "2022-05-11T00:01:56Z",
4+
"modified": "2026-02-23T12:31:28Z",
55
"published": "2022-05-03T00:00:36Z",
66
"aliases": [
77
"CVE-2021-41810"
@@ -19,6 +19,14 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41810"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://empower.m-files.com/security-advisories/CVE-2021-41810"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://product.m-files.com/security-advisories/cve-2021-41810"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://www.m-files.com/about/trust-center/security-advisories/cve-2021-41810"

advisories/unreviewed/2023/12/GHSA-6qxg-cm55-g85x/GHSA-6qxg-cm55-g85x.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6qxg-cm55-g85x",
4-
"modified": "2024-08-28T09:30:33Z",
4+
"modified": "2026-02-23T12:31:28Z",
55
"published": "2023-12-20T12:30:26Z",
66
"aliases": [
77
"CVE-2023-6912"
88
],
9-
"details": "Lack of protection against brute force attacks in M-Files Server before 23.12.13205.0 allows an attacker unlimited authentication attempts, potentially compromising targeted M-Files user accounts by guessing passwords.\n",
9+
"details": "Lack of protection against brute force attacks in M-Files Server before 23.12.13205.0 allows an attacker unlimited authentication attempts, potentially compromising targeted M-Files user accounts by guessing passwords.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6912"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://empower.m-files.com/security-advisories/CVE-2023-6912"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://product.m-files.com/security-advisories/cve-2023-6912"

advisories/unreviewed/2024/02/GHSA-384m-rpvv-4rw6/GHSA-384m-rpvv-4rw6.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-384m-rpvv-4rw6",
4-
"modified": "2025-12-23T21:30:15Z",
4+
"modified": "2026-02-23T12:31:28Z",
55
"published": "2024-02-23T09:30:38Z",
66
"aliases": [
77
"CVE-2024-0563"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0563"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://empower.m-files.com/security-advisories/CVE-2024-0563"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://product.m-files.com/security-advisories/cve-2024-0563"

advisories/unreviewed/2024/04/GHSA-5943-48f3-6wx5/GHSA-5943-48f3-6wx5.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5943-48f3-6wx5",
4-
"modified": "2024-08-27T12:30:44Z",
4+
"modified": "2026-02-23T12:31:28Z",
55
"published": "2024-04-26T06:30:35Z",
66
"aliases": [
77
"CVE-2024-4056"
88
],
9-
"details": "\nDenial of service condition in M-Files Server in versions before 24.4.13592.4 and after 23.11 (excluding 24.2 LTS) allows unauthenticated user to consume computing resources.\n\n",
9+
"details": "Denial of service condition in M-Files Server in versions before 24.4.13592.4 and after 23.11 (excluding 24.2 LTS) allows unauthenticated user to consume computing resources.",
1010
"severity": [
1111
{
1212
"type": "CVSS_V3",
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4056"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://empower.m-files.com/security-advisories/CVE-2024-4056"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://product.m-files.com/security-advisories/cve-2024-4056"

advisories/unreviewed/2024/07/GHSA-88qp-7q8w-jhw6/GHSA-88qp-7q8w-jhw6.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-88qp-7q8w-jhw6",
4-
"modified": "2024-08-27T12:30:44Z",
4+
"modified": "2026-02-23T12:31:28Z",
55
"published": "2024-07-29T15:30:36Z",
66
"aliases": [
77
"CVE-2024-6881"
@@ -23,6 +23,10 @@
2323
"type": "ADVISORY",
2424
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6881"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://empower.m-files.com/security-advisories/CVE-2024-6881"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://product.m-files.com/security-advisories/cve-2024-6881"

advisories/unreviewed/2024/07/GHSA-vf38-34c2-p6j8/GHSA-vf38-34c2-p6j8.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vf38-34c2-p6j8",
4-
"modified": "2024-08-27T12:30:44Z",
4+
"modified": "2026-02-23T12:31:28Z",
55
"published": "2024-07-29T15:30:35Z",
66
"aliases": [
77
"CVE-2024-6124"
@@ -23,6 +23,10 @@
2323
"type": "ADVISORY",
2424
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6124"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://empower.m-files.com/security-advisories/CVE-2024-6124"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://product.m-files.com/security-advisories/cve-2024-6124"

advisories/unreviewed/2024/08/GHSA-28pw-27gw-65v8/GHSA-28pw-27gw-65v8.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-28pw-27gw-65v8",
4-
"modified": "2024-09-07T00:31:28Z",
4+
"modified": "2026-02-23T12:31:28Z",
55
"published": "2024-08-27T12:30:44Z",
66
"aliases": [
77
"CVE-2024-6789"
@@ -23,6 +23,10 @@
2323
"type": "ADVISORY",
2424
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6789"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://empower.m-files.com/security-advisories/CVE-2024-6789"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://product.m-files.com/security-advisories/cve-2024-6789"

advisories/unreviewed/2024/10/GHSA-96w8-fcjx-v927/GHSA-96w8-fcjx-v927.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-96w8-fcjx-v927",
4-
"modified": "2024-10-02T06:30:26Z",
4+
"modified": "2026-02-23T12:31:29Z",
55
"published": "2024-10-02T06:30:26Z",
66
"aliases": [
77
"CVE-2024-9174"
88
],
99
"details": "Stored HTML Injection in Social Module in M-Files Hubshare before version 5.0.8.6 allows authenticated user to spoof UI",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
@@ -19,6 +23,10 @@
1923
"type": "ADVISORY",
2024
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9174"
2125
},
26+
{
27+
"type": "WEB",
28+
"url": "https://empower.m-files.com/security-advisories/CVE-2024-9174"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://product.m-files.com/security-advisories/cve-2024-9174"

advisories/unreviewed/2024/10/GHSA-9hv6-whj4-wpw5/GHSA-9hv6-whj4-wpw5.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9hv6-whj4-wpw5",
4-
"modified": "2024-10-02T06:30:27Z",
4+
"modified": "2026-02-23T12:31:29Z",
55
"published": "2024-10-02T06:30:27Z",
66
"aliases": [
77
"CVE-2024-9333"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9333"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://empower.m-files.com/security-advisories/CVE-2024-9333"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://product.m-files.com/security-advisories/cve-2024-9333"

advisories/unreviewed/2024/11/GHSA-c3rr-7229-8p7f/GHSA-c3rr-7229-8p7f.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c3rr-7229-8p7f",
4-
"modified": "2025-10-29T15:31:50Z",
4+
"modified": "2026-02-23T12:31:29Z",
55
"published": "2024-11-20T09:32:54Z",
66
"aliases": [
77
"CVE-2024-10127"
@@ -23,6 +23,10 @@
2323
"type": "ADVISORY",
2424
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10127"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://empower.m-files.com/security-advisories/CVE-2024-10127"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://product.m-files.com/security-advisories/CVE-2024-10127"

0 commit comments

Comments
 (0)