Skip to content

Commit f7faa36

Browse files
Advisory Database Sync
1 parent 1a589d1 commit f7faa36

54 files changed

Lines changed: 825 additions & 105 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/unreviewed/2026/01/GHSA-6v4g-392h-r9mh/GHSA-6v4g-392h-r9mh.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6v4g-392h-r9mh",
4-
"modified": "2026-01-15T00:31:38Z",
4+
"modified": "2026-03-12T15:30:22Z",
55
"published": "2026-01-14T18:31:36Z",
66
"aliases": [
77
"CVE-2025-14242"
@@ -31,6 +31,10 @@
3131
"type": "WEB",
3232
"url": "https://access.redhat.com/errata/RHSA-2026:0608"
3333
},
34+
{
35+
"type": "WEB",
36+
"url": "https://access.redhat.com/errata/RHSA-2026:4477"
37+
},
3438
{
3539
"type": "WEB",
3640
"url": "https://access.redhat.com/security/cve/CVE-2025-14242"

advisories/unreviewed/2026/02/GHSA-35x7-r658-wx7f/GHSA-35x7-r658-wx7f.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-35x7-r658-wx7f",
4-
"modified": "2026-02-26T09:30:27Z",
4+
"modified": "2026-03-12T15:30:23Z",
55
"published": "2026-02-26T09:30:27Z",
66
"aliases": [
77
"CVE-2026-1698"
88
],
99
"details": "A HTTP Host header attack vulnerability affects WebClient and the WebScheduler web apps of PcVue in version 15.0.0 through 16.3.3 included, allowing a remote attacker to inject harmful payloads that manipulate server-side behavior.\n\nThis vulnerability only affects the endpoints /Authentication/ExternalLogin, /Authentication/AuthorizationCodeCallback and /Authentication/Logout\nof the WebClient and WebScheduler web apps.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:M/U:Clear"

advisories/unreviewed/2026/02/GHSA-3fqx-3cg9-chg9/GHSA-3fqx-3cg9-chg9.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3fqx-3cg9-chg9",
4-
"modified": "2026-02-26T09:30:27Z",
4+
"modified": "2026-03-12T15:30:22Z",
55
"published": "2026-02-26T09:30:27Z",
66
"aliases": [
77
"CVE-2026-1692"
88
],
99
"details": "A missing origin validation in WebSockets vulnerability affects the GraphicalData web services used by the WebVue, WebScheduler, TouchVue and SnapVue features of PcVue in version 12.0.0 through 16.3.3 included. It might allow a remote attacker to lure a successfully authenticated user to a malicious website.\n\nThis vulnerability only affects the following two endpoints: GraphicalData/js/signalR/connect and GraphicalData/js/signalR/reconnect.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:M/U:Clear"

advisories/unreviewed/2026/02/GHSA-4r52-fgmg-vqxc/GHSA-4r52-fgmg-vqxc.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4r52-fgmg-vqxc",
4-
"modified": "2026-02-26T09:30:27Z",
4+
"modified": "2026-03-12T15:30:22Z",
55
"published": "2026-02-26T09:30:27Z",
66
"aliases": [
77
"CVE-2026-1696"
88
],
99
"details": "Some HTTP security headers are not properly set by the web server when sending responses to the client application.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:M/U:Clear"

advisories/unreviewed/2026/02/GHSA-4v7c-97mg-h3wh/GHSA-4v7c-97mg-h3wh.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4v7c-97mg-h3wh",
4-
"modified": "2026-02-26T09:30:27Z",
4+
"modified": "2026-03-12T15:30:23Z",
55
"published": "2026-02-26T09:30:27Z",
66
"aliases": [
77
"CVE-2026-1697"
88
],
99
"details": "The Secure and SameSite attribute are missing in the GraphicalData web services and WebClient web app of PcVue in version 12.0.0 through 16.3.3 included.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:M/U:Clear"

advisories/unreviewed/2026/02/GHSA-5w3f-m935-fxvq/GHSA-5w3f-m935-fxvq.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5w3f-m935-fxvq",
4-
"modified": "2026-02-26T09:30:27Z",
4+
"modified": "2026-03-12T15:30:22Z",
55
"published": "2026-02-26T09:30:27Z",
66
"aliases": [
77
"CVE-2026-1693"
88
],
99
"details": "The OAuth grant type Resource Owner Password Credentials (ROPC) flow is still used by the werbservices used by the WebVue, WebScheduler, TouchVue and Snapvue features of PcVue in version 12.0.0 through 16.3.3 included despite being deprecated. It might allow a remote attacker to steal user credentials.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:M/U:Clear"

advisories/unreviewed/2026/02/GHSA-6hjh-5rvg-rp2f/GHSA-6hjh-5rvg-rp2f.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6hjh-5rvg-rp2f",
4-
"modified": "2026-02-26T09:30:27Z",
4+
"modified": "2026-03-12T15:30:22Z",
55
"published": "2026-02-26T09:30:27Z",
66
"aliases": [
77
"CVE-2026-1694"
88
],
99
"details": "HTTP headers are added by the default configuration of IIS and ASP.net, and are not removed at the deployment phase of the webservices used by the WebVue, WebScheduler, TouchVue and SnapVue features of PcVue in version 12.0.0 through 16.3.3 included. It unnecessarily exposes sensitive information about the server configuration.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:M/U:Clear"

advisories/unreviewed/2026/02/GHSA-7693-hmcm-7whx/GHSA-7693-hmcm-7whx.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7693-hmcm-7whx",
4-
"modified": "2026-02-26T09:30:27Z",
4+
"modified": "2026-03-12T15:30:22Z",
55
"published": "2026-02-26T09:30:27Z",
66
"aliases": [
77
"CVE-2026-1695"
88
],
99
"details": "An XSS vulnerability affects the OAuth web services used by the WebVue, WebScheduler, TouchVue and SnapVue features of PcVue in version 12.0.0 through 16.3.3 included. It might allow a remote attacker to trick a legitimate user into loading content from another site upon unsuccessful user authentication on an unknown application (unknown client_id).\n\nThis vulnerability only affects the error page of the OAuth server.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:M/U:Clear"

advisories/unreviewed/2026/02/GHSA-7qq5-wfv8-hvvh/GHSA-7qq5-wfv8-hvvh.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7qq5-wfv8-hvvh",
4-
"modified": "2026-02-02T15:30:34Z",
4+
"modified": "2026-03-12T15:30:22Z",
55
"published": "2026-02-02T15:30:34Z",
66
"aliases": [
77
"CVE-2026-1757"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2435940"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/1009"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2026/03/GHSA-36j3-r3wc-mhg7/GHSA-36j3-r3wc-mhg7.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-36j3-r3wc-mhg7",
4-
"modified": "2026-03-11T21:31:03Z",
4+
"modified": "2026-03-12T15:30:24Z",
55
"published": "2026-03-11T21:31:03Z",
66
"aliases": [
77
"CVE-2025-70024"
88
],
99
"details": "An issue pertaining to CWE-89: Improper Neutralization of Special Elements used in an SQL Command was discovered in benkeen generatedata 4.0.14.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -28,8 +33,10 @@
2833
}
2934
],
3035
"database_specific": {
31-
"cwe_ids": [],
32-
"severity": null,
36+
"cwe_ids": [
37+
"CWE-89"
38+
],
39+
"severity": "CRITICAL",
3340
"github_reviewed": false,
3441
"github_reviewed_at": null,
3542
"nvd_published_at": "2026-03-11T21:16:13Z"

0 commit comments

Comments
 (0)