Skip to content

File tree

7 files changed

+46
-14
lines changed

7 files changed

+46
-14
lines changed

advisories/github-reviewed/2022/08/GHSA-6278-2q4m-cmf3/GHSA-6278-2q4m-cmf3.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6278-2q4m-cmf3",
4-
"modified": "2022-09-16T18:37:18Z",
4+
"modified": "2025-10-22T19:19:35Z",
55
"published": "2022-08-27T00:00:43Z",
66
"aliases": [
77
"CVE-2022-36537"
@@ -11,7 +11,7 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H"
1515
}
1616
],
1717
"affected": [
@@ -131,6 +131,10 @@
131131
{
132132
"type": "WEB",
133133
"url": "https://www.bleepingcomputer.com/news/security/cisa-warns-of-hackers-exploiting-zk-java-framework-rce-flaw"
134+
},
135+
{
136+
"type": "WEB",
137+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-36537"
134138
}
135139
],
136140
"database_specific": {

advisories/github-reviewed/2023/04/GHSA-5cx2-vq3h-x52c/GHSA-5cx2-vq3h-x52c.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5cx2-vq3h-x52c",
4-
"modified": "2024-04-08T15:35:54Z",
4+
"modified": "2025-10-22T19:20:31Z",
55
"published": "2023-04-24T18:30:30Z",
66
"aliases": [
77
"CVE-2023-27524"
@@ -11,7 +11,7 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L"
14+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L/E:H"
1515
}
1616
],
1717
"affected": [
@@ -60,6 +60,14 @@
6060
"type": "WEB",
6161
"url": "https://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html"
6262
},
63+
{
64+
"type": "WEB",
65+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-27524"
66+
},
67+
{
68+
"type": "WEB",
69+
"url": "https://www.openwall.com/lists/oss-security/2023/04/24/2"
70+
},
6371
{
6472
"type": "WEB",
6573
"url": "http://www.openwall.com/lists/oss-security/2023/04/24/2"

advisories/github-reviewed/2023/05/GHSA-gw42-f939-fhvm/GHSA-gw42-f939-fhvm.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gw42-f939-fhvm",
4-
"modified": "2023-07-20T18:57:26Z",
4+
"modified": "2025-10-22T19:20:57Z",
55
"published": "2023-05-23T19:54:30Z",
66
"aliases": [
77
"CVE-2023-32315"
@@ -11,7 +11,7 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L/E:H"
1515
}
1616
],
1717
"affected": [
@@ -91,6 +91,10 @@
9191
"type": "WEB",
9292
"url": "https://igniterealtime.atlassian.net/browse/OF-2595"
9393
},
94+
{
95+
"type": "WEB",
96+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-32315"
97+
},
9498
{
9599
"type": "WEB",
96100
"url": "http://packetstormsecurity.com/files/173607/Openfire-Authentication-Bypass-Remote-Code-Execution.html"

advisories/github-reviewed/2023/07/GHSA-x3cq-8f32-5f63/GHSA-x3cq-8f32-5f63.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-x3cq-8f32-5f63",
4-
"modified": "2025-01-29T22:00:17Z",
4+
"modified": "2025-10-22T19:21:22Z",
55
"published": "2023-07-06T21:15:04Z",
66
"aliases": [
77
"CVE-2023-33246"
@@ -11,7 +11,7 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
1515
}
1616
],
1717
"affected": [
@@ -121,6 +121,10 @@
121121
"type": "WEB",
122122
"url": "https://lists.apache.org/thread/1s8j2c8kogthtpv3060yddk03zq0pxyp"
123123
},
124+
{
125+
"type": "WEB",
126+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-33246"
127+
},
124128
{
125129
"type": "WEB",
126130
"url": "https://www.vicarius.io/vsociety/posts/rocketmq-rce-cve-2023-33246-33247"

advisories/github-reviewed/2023/08/GHSA-vmch-3w2x-vhgq/GHSA-vmch-3w2x-vhgq.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vmch-3w2x-vhgq",
4-
"modified": "2024-06-27T21:35:49Z",
4+
"modified": "2025-10-22T19:21:48Z",
55
"published": "2023-08-09T12:56:43Z",
66
"aliases": [
77
"CVE-2023-38180"
@@ -11,7 +11,7 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H"
1515
}
1616
],
1717
"affected": [
@@ -242,6 +242,10 @@
242242
{
243243
"type": "WEB",
244244
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180"
245+
},
246+
{
247+
"type": "WEB",
248+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-38180"
245249
}
246250
],
247251
"database_specific": {

advisories/github-reviewed/2023/09/GHSA-2pxw-r47w-4p8c/GHSA-2pxw-r47w-4p8c.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2pxw-r47w-4p8c",
4-
"modified": "2023-09-05T15:45:10Z",
4+
"modified": "2025-10-22T19:20:02Z",
55
"published": "2023-09-05T15:45:10Z",
66
"aliases": [
77
"CVE-2023-28434"
@@ -11,7 +11,7 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H"
1515
}
1616
],
1717
"affected": [
@@ -55,6 +55,10 @@
5555
{
5656
"type": "PACKAGE",
5757
"url": "https://github.com/minio/minio"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28434"
5862
}
5963
],
6064
"database_specific": {

advisories/github-reviewed/2023/10/GHSA-crg9-44h2-xw35/GHSA-crg9-44h2-xw35.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-crg9-44h2-xw35",
4-
"modified": "2025-02-13T19:20:36Z",
4+
"modified": "2025-10-22T19:22:19Z",
55
"published": "2023-10-27T15:30:20Z",
66
"aliases": [
77
"CVE-2023-46604"
@@ -11,7 +11,7 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H"
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H/E:H"
1515
}
1616
],
1717
"affected": [
@@ -225,6 +225,10 @@
225225
"type": "WEB",
226226
"url": "https://security.netapp.com/advisory/ntap-20231110-0010"
227227
},
228+
{
229+
"type": "WEB",
230+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-46604"
231+
},
228232
{
229233
"type": "WEB",
230234
"url": "https://www.openwall.com/lists/oss-security/2023/10/27/5"

0 commit comments

Comments
 (0)