Skip to content

Commit 902e7e9

Browse files
Sync EUVD catalog: Tue Apr 21 00:41:23 UTC 2026
Signed-off-by: AboutCode Automation <automation@aboutcode.org>
1 parent 23d3688 commit 902e7e9

194 files changed

Lines changed: 10053 additions & 43 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/2026/03/EUVD-2026-12031.json

Lines changed: 80 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,43 @@
33
"enisaUuid": "64d14084-b162-3fd0-947c-ec89acd03204",
44
"description": "A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.",
55
"datePublished": "Mar 13, 2026, 9:31:51 PM",
6-
"dateUpdated": "Mar 13, 2026, 9:31:51 PM",
6+
"dateUpdated": "Apr 20, 2026, 6:31:26 AM",
77
"baseScore": 7.5,
88
"baseScoreVersion": "3.1",
99
"baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
10-
"references": "https://access.redhat.com/security/cve/CVE-2026-4111\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2446453\nhttps://github.com/libarchive/libarchive/pull/2877\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-4111\n",
10+
"references": "https://access.redhat.com/errata/RHSA-2026:5063\nhttps://access.redhat.com/errata/RHSA-2026:5080\nhttps://access.redhat.com/errata/RHSA-2026:6647\nhttps://access.redhat.com/errata/RHSA-2026:7093\nhttps://access.redhat.com/errata/RHSA-2026:7105\nhttps://access.redhat.com/errata/RHSA-2026:7106\nhttps://access.redhat.com/errata/RHSA-2026:7239\nhttps://access.redhat.com/errata/RHSA-2026:7329\nhttps://access.redhat.com/errata/RHSA-2026:7335\nhttps://access.redhat.com/errata/RHSA-2026:8746\nhttps://access.redhat.com/errata/RHSA-2026:8747\nhttps://access.redhat.com/errata/RHSA-2026:8748\nhttps://access.redhat.com/security/cve/CVE-2026-4111\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2446453\nhttps://github.com/libarchive/libarchive/pull/2877\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-4111\nhttps://access.redhat.com/errata/RHSA-2026:8865\n",
1111
"aliases": "CVE-2026-4111\n",
1212
"assigner": "redhat",
13-
"epss": 0.02,
13+
"epss": 0.03,
1414
"enisaIdProduct": [
15+
{
16+
"id": "0bf6f597-d8a6-3330-99e2-0a1b69ecf998",
17+
"product": {
18+
"name": "Red Hat Discovery 2"
19+
},
20+
"product_version": "patch: sha256:040dadd657afdb9f0914f896a4962fd3dbf40b70c8037e4d72b6801b766c9b7d"
21+
},
22+
{
23+
"id": "185c1528-92c0-30df-832d-a6e3e5510749",
24+
"product": {
25+
"name": "Red Hat AI Inference Server 3.3"
26+
},
27+
"product_version": "patch: sha256:be6d568f28044533e4ad80f0856407c359e2eaf31a6b89cada433e6575d2300e"
28+
},
29+
{
30+
"id": "2a2b8200-a784-3403-aeca-50ed8ca423a8",
31+
"product": {
32+
"name": "Red Hat AI Inference Server 3.3"
33+
},
34+
"product_version": "patch: sha256:0ec114881d9dcd28a5dbbb2ec0ea1301ad87d5ae133121ce8167ef29d19802cc"
35+
},
36+
{
37+
"id": "2b76eb5a-3691-34c5-a2a9-ed8db4d5c4e5",
38+
"product": {
39+
"name": "Red Hat OpenShift Container Platform 4.13"
40+
},
41+
"product_version": "patch: 413.92.202604080111-0"
42+
},
1543
{
1644
"id": "3facfc15-d651-3756-bbf8-fb8d8b8a18c5",
1745
"product": {
@@ -25,6 +53,55 @@
2553
"name": "Red Hat Enterprise Linux 10"
2654
},
2755
"product_version": "patch: 0:3.7.7-5.el10_1"
56+
},
57+
{
58+
"id": "4c6d54c9-aa96-35c2-b9da-633f1dae372f",
59+
"product": {
60+
"name": "Red Hat Enterprise Linux 9.6 Extended Update Support"
61+
},
62+
"product_version": "patch: 0:3.5.3-6.el9_6.1"
63+
},
64+
{
65+
"id": "57a7dfed-45e5-362b-be45-8c9c21de6d92",
66+
"product": {
67+
"name": "Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions"
68+
},
69+
"product_version": "patch: 0:3.5.3-5.el9_2.1"
70+
},
71+
{
72+
"id": "9606ba53-506f-3ebb-af4a-948b59802100",
73+
"product": {
74+
"name": "Red Hat Enterprise Linux 9.4 Extended Update Support"
75+
},
76+
"product_version": "patch: 0:3.5.3-4.el9_4.2"
77+
},
78+
{
79+
"id": "b68bc367-fd7f-39e7-a241-6a54815bc2cc",
80+
"product": {
81+
"name": "Red Hat AI Inference Server 3.3"
82+
},
83+
"product_version": "patch: sha256:813ba7ccd1696b44deb90d9e6cd8af114bdb47781eae7f27246a81fba062a892"
84+
},
85+
{
86+
"id": "e2ccd141-b1c3-343d-9bf0-124d46adffbf",
87+
"product": {
88+
"name": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions"
89+
},
90+
"product_version": "patch: 0:3.5.3-2.el9_0.3"
91+
},
92+
{
93+
"id": "f2bbe426-8e7d-39e0-a95d-0a57a340cd82",
94+
"product": {
95+
"name": "Red Hat AI Inference Server 3.2"
96+
},
97+
"product_version": "patch: sha256:54616c9f3e4d27120504b0b2020432ef3ff85286a50de7be842f05df0cfcd69e"
98+
},
99+
{
100+
"id": "fe0340f1-ae0e-3e35-9f55-8d917e1f16ca",
101+
"product": {
102+
"name": "Red Hat Discovery 2"
103+
},
104+
"product_version": "patch: sha256:062310de4b34e278f8c7e4634def673a77d1228d493541ef1264ba4cb83b68eb"
28105
}
29106
],
30107
"enisaIdVendor": [

advisories/2026/03/EUVD-2026-13097.json

Lines changed: 47 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,58 @@
33
"enisaUuid": "e56690d0-bd77-3749-b1dc-cfa65800ac55",
44
"description": "A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.",
55
"datePublished": "Mar 19, 2026, 3:31:21 PM",
6-
"dateUpdated": "Mar 19, 2026, 3:31:22 PM",
6+
"dateUpdated": "Apr 20, 2026, 6:31:26 AM",
77
"baseScore": 7.5,
88
"baseScoreVersion": "3.1",
99
"baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
10-
"references": "https://access.redhat.com/security/cve/CVE-2026-4424\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2449006\nhttps://github.com/libarchive/libarchive/pull/2898\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-4424\n",
10+
"references": "https://access.redhat.com/errata/RHSA-2026:8492\nhttps://access.redhat.com/errata/RHSA-2026:8510\nhttps://access.redhat.com/errata/RHSA-2026:8517\nhttps://access.redhat.com/errata/RHSA-2026:8521\nhttps://access.redhat.com/errata/RHSA-2026:8534\nhttps://access.redhat.com/security/cve/CVE-2026-4424\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2449006\nhttps://github.com/libarchive/libarchive/pull/2898\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-4424\nhttps://access.redhat.com/errata/RHSA-2026:8864\nhttps://access.redhat.com/errata/RHSA-2026:8865\nhttps://access.redhat.com/errata/RHSA-2026:8867\nhttps://access.redhat.com/errata/RHSA-2026:8873\nhttps://access.redhat.com/errata/RHSA-2026:8908\n",
1111
"aliases": "CVE-2026-4424\n",
1212
"assigner": "redhat",
13-
"epss": 0.17,
14-
"enisaIdProduct": [],
13+
"epss": 0.2,
14+
"enisaIdProduct": [
15+
{
16+
"id": "1c2b4f30-6570-3133-9dac-ab3ee9b9aaf9",
17+
"product": {
18+
"name": "Red Hat Enterprise Linux 8"
19+
},
20+
"product_version": "patch: 0:3.3.3-7.el8_10"
21+
},
22+
{
23+
"id": "57b20c21-174c-32db-94f0-d5f5a1063c36",
24+
"product": {
25+
"name": "Red Hat Enterprise Linux 7 Extended Lifecycle Support"
26+
},
27+
"product_version": "patch: 0:3.1.2-14.el7_9.2"
28+
},
29+
{
30+
"id": "6b0c6f97-a141-37ca-b8c2-3740bdff669b",
31+
"product": {
32+
"name": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions"
33+
},
34+
"product_version": "patch: 0:3.5.3-2.el9_0.4"
35+
},
36+
{
37+
"id": "86188e5d-1cb0-3062-aec7-cd17450e667f",
38+
"product": {
39+
"name": "Red Hat Enterprise Linux 10"
40+
},
41+
"product_version": "patch: 0:3.7.7-8.el10_1"
42+
},
43+
{
44+
"id": "8ea34cde-5516-339a-afa0-e4d28e307f48",
45+
"product": {
46+
"name": "Red Hat Enterprise Linux 9"
47+
},
48+
"product_version": "patch: 0:3.5.3-9.el9_7"
49+
},
50+
{
51+
"id": "e8a94cfe-4072-3434-a38b-90fb2aa12c73",
52+
"product": {
53+
"name": "Red Hat Enterprise Linux 8.2 Advanced Update Support"
54+
},
55+
"product_version": "patch: 0:3.3.2-8.el8_2.2"
56+
}
57+
],
1558
"enisaIdVendor": [
1659
{
1760
"id": "f79bb6a4-95d5-3b5e-a7fb-58b8d3504460",

advisories/2026/03/EUVD-2026-17073.json

Lines changed: 43 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,51 @@
33
"enisaUuid": "af65621c-2a3d-3460-bb5e-6ec0ed762505",
44
"description": "A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.",
55
"datePublished": "Mar 30, 2026, 9:31:29 AM",
6-
"dateUpdated": "Mar 30, 2026, 9:31:29 AM",
7-
"baseScore": 0.0,
8-
"references": "https://access.redhat.com/security/cve/CVE-2026-5121\nhttps://github.com/libarchive/libarchive/pull/2934\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-5121\n",
6+
"dateUpdated": "Apr 20, 2026, 6:31:26 AM",
7+
"baseScore": 7.5,
8+
"baseScoreVersion": "3.1",
9+
"baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
10+
"references": "https://access.redhat.com/errata/RHSA-2026:8510\nhttps://access.redhat.com/errata/RHSA-2026:8517\nhttps://access.redhat.com/errata/RHSA-2026:8521\nhttps://access.redhat.com/errata/RHSA-2026:8534\nhttps://access.redhat.com/security/cve/CVE-2026-5121\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2452945\nhttps://github.com/advisories/GHSA-2vwv-vqpv-v8vc\nhttps://github.com/libarchive/libarchive/pull/2934\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-5121\nhttps://access.redhat.com/errata/RHSA-2026:8864\nhttps://access.redhat.com/errata/RHSA-2026:8867\nhttps://access.redhat.com/errata/RHSA-2026:8873\nhttps://access.redhat.com/errata/RHSA-2026:8908\n",
911
"aliases": "CVE-2026-5121\n",
1012
"assigner": "redhat",
11-
"epss": 0.05,
12-
"enisaIdProduct": [],
13+
"epss": 0.08,
14+
"enisaIdProduct": [
15+
{
16+
"id": "2070c862-b728-38ba-ad99-ead5d3c972aa",
17+
"product": {
18+
"name": "Red Hat Enterprise Linux 7 Extended Lifecycle Support"
19+
},
20+
"product_version": "patch: 0:3.1.2-14.el7_9.2"
21+
},
22+
{
23+
"id": "626d3976-9046-3a82-9935-1851132c2816",
24+
"product": {
25+
"name": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions"
26+
},
27+
"product_version": "patch: 0:3.5.3-2.el9_0.4"
28+
},
29+
{
30+
"id": "8905a264-06f9-31b4-8b5f-b0f85ac60e12",
31+
"product": {
32+
"name": "Red Hat Enterprise Linux 8.2 Advanced Update Support"
33+
},
34+
"product_version": "patch: 0:3.3.2-8.el8_2.2"
35+
},
36+
{
37+
"id": "947b8b9f-86d6-39af-9fd8-a23ab19d4d6c",
38+
"product": {
39+
"name": "Red Hat Enterprise Linux 9"
40+
},
41+
"product_version": "patch: 0:3.5.3-9.el9_7"
42+
},
43+
{
44+
"id": "9b9918f4-c933-396a-9acc-3f3c979b920d",
45+
"product": {
46+
"name": "Red Hat Enterprise Linux 8"
47+
},
48+
"product_version": "patch: 0:3.3.3-7.el8_10"
49+
}
50+
],
1351
"enisaIdVendor": [
1452
{
1553
"id": "4503f562-a316-3121-adce-05d7ccbb8047",
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
{
2+
"id": "EUVD-2024-55553",
3+
"enisaUuid": "81a71bef-d5b0-3fb7-96bc-4fe2274f4c07",
4+
"description": "The Email Encoder WordPress plugin before 2.3.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).",
5+
"datePublished": "Apr 20, 2026, 9:30:44 AM",
6+
"dateUpdated": "Apr 20, 2026, 9:30:44 AM",
7+
"baseScore": 0.0,
8+
"references": "https://wpscan.com/vulnerability/7aeb6891-e159-4ed8-b1a9-a551140c9fcc/\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-7083\n",
9+
"aliases": "CVE-2024-7083\nGHSA-9772-r9rh-h65v\n",
10+
"assigner": "WPScan",
11+
"epss": 0.0,
12+
"enisaIdProduct": [
13+
{
14+
"id": "cbd4b427-7b74-3019-9c07-2f0c85d4f022",
15+
"product": {
16+
"name": "Email Encoder"
17+
},
18+
"product_version": "0 <2.3.4"
19+
}
20+
],
21+
"enisaIdVendor": [
22+
{
23+
"id": "8f45ca4b-207f-3756-93bd-ee85a285265a",
24+
"vendor": {
25+
"name": "Unknown"
26+
}
27+
}
28+
]
29+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"id": "EUVD-2025-209530",
3+
"enisaUuid": "87793738-71f7-38de-b4b7-6d51ef4ed6f1",
4+
"description": "Fudo Enterprise in versions from 5.5.0 through 5.6.2 allows low privileged users to access certain administrator-only resources via improperly protected API endpoints. This includes sensitive information such as system logs and parts of system configuration settings.\nThis vulnerability has been fixed in version 5.6.3",
5+
"datePublished": "Apr 20, 2026, 12:31:59 PM",
6+
"dateUpdated": "Apr 20, 2026, 12:31:59 PM",
7+
"baseScore": 5.1,
8+
"baseScoreVersion": "4.0",
9+
"baseScoreVector": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
10+
"references": "https://www.fudosecurity.com/product/enterprise\nhttps://cert.pl/en/posts/2026/04/CVE-2025-13480\nhttps://download.fudosecurity.com/documentation/fudo/5_6/rn/RN_5.6.3.pdf\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-13480\n",
11+
"aliases": "CVE-2025-13480\nGHSA-x858-8gr5-586m\n",
12+
"assigner": "CERT-PL",
13+
"epss": 0.0,
14+
"enisaIdProduct": [
15+
{
16+
"id": "17d25cd6-34cb-3e41-a460-c87106f6596c",
17+
"product": {
18+
"name": "Fudo Enterprise"
19+
},
20+
"product_version": "5.5.0 \u22645.6.2"
21+
}
22+
],
23+
"enisaIdVendor": [
24+
{
25+
"id": "999226a4-3070-3f23-bf75-2e92b932c771",
26+
"vendor": {
27+
"name": "Fudo Security"
28+
}
29+
}
30+
]
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"id": "EUVD-2025-209532",
3+
"enisaUuid": "6b7ab528-7521-3214-b70c-f7ac877604d8",
4+
"description": "Apache Doris MCP Server versions earlier than 0.6.1 are affected by an improper neutralization flaw in query context handling that may allow execution of unintended SQL statements and bypass of intended query validation and access restrictions through the MCP query execution interface. Version 0.6.1 and later are not affected.",
5+
"datePublished": "Apr 20, 2026, 3:31:52 PM",
6+
"dateUpdated": "Apr 20, 2026, 3:31:52 PM",
7+
"baseScore": 5.3,
8+
"baseScoreVersion": "3.1",
9+
"baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
10+
"references": "https://lists.apache.org/thread/odp0fyyst8kxm7hhm9z4d1snh1y4hjpy\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-66335\nhttp://www.openwall.com/lists/oss-security/2026/04/17/4\n",
11+
"aliases": "CVE-2025-66335\nGHSA-qhfq-gvvc-5q6q\n",
12+
"assigner": "apache",
13+
"epss": 0.0,
14+
"enisaIdProduct": [
15+
{
16+
"id": "b65a6867-41eb-3ef8-8d72-32d199dca21d",
17+
"product": {
18+
"name": "Apache Doris MCP Server"
19+
},
20+
"product_version": "0.1.0 <0.6.1"
21+
}
22+
],
23+
"enisaIdVendor": [
24+
{
25+
"id": "b9d97948-bf1b-3e82-92be-550236c23750",
26+
"vendor": {
27+
"name": "Apache Software Foundation"
28+
}
29+
}
30+
]
31+
}
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
{
2+
"id": "EUVD-2025-209534",
3+
"enisaUuid": "194e11ad-77bf-3317-9c4e-4e215b5f1da2",
4+
"description": "A vulnerability exists in the Buffalo Link Station version 1.85-0.01 that allows unauthenticated or guest-level users to enumerate valid usernames and their associated privilege roles. The issue is triggered by modifying a parameter within requests sent to the /nasapi endpoint.",
5+
"datePublished": "Apr 20, 2026, 6:31:48 PM",
6+
"dateUpdated": "Apr 20, 2026, 6:31:49 PM",
7+
"baseScore": 0.0,
8+
"references": "https://github.com/DBmonster19/CVE-2025-66954\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-66954\n",
9+
"aliases": "GHSA-3gjh-jvm6-6pfg\nCVE-2025-66954\n",
10+
"assigner": "mitre",
11+
"epss": 0.0,
12+
"enisaIdProduct": [
13+
{
14+
"id": "d2fe9cc1-e8f8-3331-8732-ad229ef057ec",
15+
"product": {
16+
"name": "n/a"
17+
},
18+
"product_version": "n/a"
19+
}
20+
],
21+
"enisaIdVendor": [
22+
{
23+
"id": "76ad9dcf-e856-3aae-b60a-b52202187c37",
24+
"vendor": {
25+
"name": "n/a"
26+
}
27+
}
28+
]
29+
}

advisories/2026/04/EUVD-2026-23710.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,13 @@
22
"id": "EUVD-2026-23710",
33
"enisaUuid": "272bbf91-f5c5-3de7-bbb4-2c6d972cd5ff",
44
"description": "A security flaw has been discovered in liangliangyy DjangoBlog up to 2.1.0.0. This affects an unknown function of the file djangoblog/settings.py of the component Setting Handler. The manipulation of the argument SECRET_KEY results in hard-coded credentials. The attack can be launched remotely. The attack requires a high level of complexity. The exploitability is reported as difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.",
5-
"datePublished": "Apr 19, 2026, 9:15:14 PM",
6-
"dateUpdated": "Apr 19, 2026, 9:15:14 PM",
5+
"datePublished": "Apr 20, 2026, 12:30:13 AM",
6+
"dateUpdated": "Apr 20, 2026, 12:30:13 AM",
77
"baseScore": 6.3,
88
"baseScoreVersion": "4.0",
99
"baseScoreVector": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
10-
"references": "https://vuldb.com/vuln/358213\nhttps://vuldb.com/vuln/358213/cti\nhttps://vuldb.com/submit/790283\nhttps://github.com/3em0/cve_repo/blob/main/DjangoBlog/Vuln-3-Hardcoded-Django-SECRET_KEY.md\n",
11-
"aliases": "CVE-2026-6578\n",
10+
"references": "https://vuldb.com/vuln/358213\nhttps://vuldb.com/vuln/358213/cti\nhttps://vuldb.com/submit/790283\nhttps://github.com/3em0/cve_repo/blob/main/DjangoBlog/Vuln-3-Hardcoded-Django-SECRET_KEY.md\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-6578\n",
11+
"aliases": "CVE-2026-6578\nGHSA-jf35-jg3h-pwmh\n",
1212
"assigner": "VulDB",
1313
"epss": 0.0,
1414
"enisaIdProduct": [

advisories/2026/04/EUVD-2026-23712.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,13 @@
22
"id": "EUVD-2026-23712",
33
"enisaUuid": "64c6f43b-18e4-3cf6-b0ab-3381ff079269",
44
"description": "A weakness has been identified in liangliangyy DjangoBlog up to 2.1.0.0. This impacts an unknown function of the file blog/views.py of the component Clean Endpoint. This manipulation causes missing authentication. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.",
5-
"datePublished": "Apr 19, 2026, 10:00:17 PM",
6-
"dateUpdated": "Apr 19, 2026, 10:00:17 PM",
5+
"datePublished": "Apr 20, 2026, 12:30:13 AM",
6+
"dateUpdated": "Apr 20, 2026, 12:30:13 AM",
77
"baseScore": 6.9,
88
"baseScoreVersion": "4.0",
99
"baseScoreVector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
10-
"references": "https://vuldb.com/vuln/358214\nhttps://vuldb.com/vuln/358214/cti\nhttps://vuldb.com/submit/790286\nhttps://github.com/3em0/cve_repo/blob/main/DjangoBlog/Vuln-4-Unauthenticated-Cache-Purge.md\n",
11-
"aliases": "CVE-2026-6579\n",
10+
"references": "https://vuldb.com/vuln/358214\nhttps://vuldb.com/vuln/358214/cti\nhttps://vuldb.com/submit/790286\nhttps://github.com/3em0/cve_repo/blob/main/DjangoBlog/Vuln-4-Unauthenticated-Cache-Purge.md\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-6579\n",
11+
"aliases": "CVE-2026-6579\nGHSA-5q63-8x25-h545\n",
1212
"assigner": "VulDB",
1313
"epss": 0.0,
1414
"enisaIdProduct": [

0 commit comments

Comments
 (0)