Skip to content

Commit 9028b58

Browse files
Sync EUVD catalog: Wed Apr 8 00:37:25 UTC 2026
Signed-off-by: AboutCode Automation <automation@aboutcode.org>
1 parent e416b2f commit 9028b58

282 files changed

Lines changed: 10435 additions & 65 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"id": "EUVD-2021-34776",
3+
"enisaUuid": "73a49abf-8a79-326d-82fc-85dd289644be",
4+
"description": "Tianxin Internet Behavior Management System contains a command injection vulnerability in the Reporter component endpoint that allows unauthenticated attackers to execute arbitrary commands by supplying a crafted objClass parameter containing shell metacharacters and output redirection. Attackers can exploit this vulnerability to write malicious PHP files into the web root and achieve remote code execution with the privileges of the web server process. This vulnerability has been fixed in version NACFirmware_4.0.0.7_20210716.180815_topsec_0_basic.bin. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-06-01 (UTC).",
5+
"datePublished": "Apr 7, 2026, 3:30:48 PM",
6+
"dateUpdated": "Apr 7, 2026, 3:30:49 PM",
7+
"baseScore": 9.3,
8+
"baseScoreVersion": "4.0",
9+
"baseScoreVector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
10+
"references": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-41972\nhttps://www.cnvd.org.cn/patchInfo/show/280166\nhttps://cn-sec.com/archives/4631959.html\nhttps://avd.aliyun.com/detail?id=AVD-2021-890232\nhttps://www.vulncheck.com/advisories/tianxin-internet-behavior-management-system-command-injection-via-toquery-php\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-4473\n",
11+
"aliases": "CVE-2021-4473\n",
12+
"assigner": "VulnCheck",
13+
"epss": 0.0,
14+
"enisaIdProduct": [
15+
{
16+
"id": "6a9c6d96-3855-3c1c-bc66-c708694b9f2c",
17+
"product": {
18+
"name": "Tianxin Internet Behavior Management System"
19+
},
20+
"product_version": "0 <4.0.0.7_20210716.180815"
21+
}
22+
],
23+
"enisaIdVendor": [
24+
{
25+
"id": "8337f30a-a49b-3809-a4c5-e367bb7daceb",
26+
"vendor": {
27+
"name": "Beijing Topsec Network Security Technology Co., Ltd."
28+
}
29+
}
30+
]
31+
}
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
{
2+
"id": "EUVD-2024-55537",
3+
"enisaUuid": "9267848f-b893-39ed-a4b1-438f3d81e61d",
4+
"description": "Koha Library before 23.05.10 fails to sanitize user-controllable filenames prior to unzipping, leading to remote code execution. The line \"qx/unzip $filename -d $dirname/;\" in upload-cover-image.pl is vulnerable to command injection via shell metacharacters because input data can be controlled by an attacker and is directly included in a system command, i.e., an attack can occur via malicious filenames after uploading a .zip file and clicking Process Images.",
5+
"datePublished": "Apr 7, 2026, 6:31:35 PM",
6+
"dateUpdated": "Apr 7, 2026, 6:31:35 PM",
7+
"baseScore": 0.0,
8+
"references": "https://gitlab.com/koha-community/Koha/-/blob/23.05.x/misc/release_notes/release_notes_23_05_10.md\nhttps://gitlab.com/koha-community/Koha/-/blob/23.05.x/misc/release_notes/release_notes_23_05_11.md\nhttps://github.com/hacklantic/Research/tree/main/CVE-2024-36057\nhttps://koha-community.org/koha-22-05-22-released/\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36057\n",
9+
"aliases": "CVE-2024-36057\nGHSA-j75v-99xr-7x47\n",
10+
"assigner": "mitre",
11+
"epss": 0.0,
12+
"enisaIdProduct": [
13+
{
14+
"id": "4d0d59cf-abe9-378a-a261-fdef4f94be82",
15+
"product": {
16+
"name": "n/a"
17+
},
18+
"product_version": "n/a"
19+
}
20+
],
21+
"enisaIdVendor": [
22+
{
23+
"id": "46ecb5ea-a982-3875-8333-45f5d95a7473",
24+
"vendor": {
25+
"name": "n/a"
26+
}
27+
}
28+
]
29+
}
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
{
2+
"id": "EUVD-2024-55539",
3+
"enisaUuid": "64a56256-3aac-3523-87c1-f090be5805c0",
4+
"description": "The Send Basket functionality in Koha Library before 23.05.10 is susceptible to Time-Based SQL Injection because it fails to sanitize the POST parameter bib_list in /cgi-bin/koha/opac-sendbasket.pl, allowing library users to read arbitrary data from the database.",
5+
"datePublished": "Apr 7, 2026, 6:31:37 PM",
6+
"dateUpdated": "Apr 7, 2026, 6:31:37 PM",
7+
"baseScore": 0.0,
8+
"references": "https://gitlab.com/koha-community/Koha/-/blob/23.05.x/misc/release_notes/release_notes_23_05_10.md\nhttps://gitlab.com/koha-community/Koha/-/blob/23.05.x/misc/release_notes/release_notes_23_05_11.md\nhttps://koha-community.org/koha-22-05-22-released/\nhttps://github.com/hacklantic/Research/tree/main/CVE-2024-36058\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36058\n",
9+
"aliases": "GHSA-62mc-fgr6-xcww\nCVE-2024-36058\n",
10+
"assigner": "mitre",
11+
"epss": 0.0,
12+
"enisaIdProduct": [
13+
{
14+
"id": "c9b5e7d6-a527-34c3-b560-67313cdc82ba",
15+
"product": {
16+
"name": "n/a"
17+
},
18+
"product_version": "n/a"
19+
}
20+
],
21+
"enisaIdVendor": [
22+
{
23+
"id": "e0ac09d8-77c5-3d66-a0c4-3bb02575a0ca",
24+
"vendor": {
25+
"name": "n/a"
26+
}
27+
}
28+
]
29+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"id": "EUVD-2025-209253",
3+
"enisaUuid": "1ef2b3df-52b6-321f-b644-a5116deca375",
4+
"description": "IBM Concert 1.0.0 through 2.2.0 creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack.",
5+
"datePublished": "Apr 7, 2026, 3:30:24 AM",
6+
"dateUpdated": "Apr 7, 2026, 3:30:24 AM",
7+
"baseScore": 6.2,
8+
"baseScoreVersion": "3.1",
9+
"baseScoreVector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
10+
"references": "https://www.ibm.com/support/pages/node/7268620\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-13044\n",
11+
"aliases": "GHSA-32vv-mwc8-ch6p\nCVE-2025-13044\n",
12+
"assigner": "ibm",
13+
"epss": 0.0,
14+
"enisaIdProduct": [
15+
{
16+
"id": "df058e40-4739-38cd-8dd5-81308b41e886",
17+
"product": {
18+
"name": "Concert"
19+
},
20+
"product_version": "1.0.0 \u22642.2.0"
21+
}
22+
],
23+
"enisaIdVendor": [
24+
{
25+
"id": "5a1d41c9-1fdb-3402-8c05-f0cb559c1815",
26+
"vendor": {
27+
"name": "IBM"
28+
}
29+
}
30+
]
31+
}
Lines changed: 136 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,136 @@
1+
{
2+
"id": "EUVD-2025-209255",
3+
"enisaUuid": "589623fe-828b-3034-b2f5-deab9e56d41d",
4+
"description": "Remote Code Execution Vulnerability\u00a0in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management - Manager on Windows, Job Management Partner 1/IT Desktop Management - Manager on Windows, JP1/NETM/DM Manager on Windows, JP1/NETM/DM Client on Windows, Job Management Partner 1/Software Distribution Manager on Windows, Job Management Partner 1/Software Distribution Client on Windows.This issue affects JP1/IT Desktop Management 2 - Manager: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; JP1/IT Desktop Management 2 - Operations Director: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; Job Management Partner 1/IT Desktop Management 2 - Manager: from 10-50 through 10-50-11; JP1/IT Desktop Management - Manager: from 09-50 through 10-10-16; Job Management Partner 1/IT Desktop Management - Manager: from 09-50 through 10-10-16; JP1/NETM/DM Manager: from 09-00 through 10-20-02; JP1/NETM/DM Client: from 09-00 through 10-20-02; Job Management Partner 1/Software Distribution Manager: from 09-00 through 09-51-13; Job Management Partner 1/Software Distribution Client: from 09-00 through 09-51-13.",
5+
"datePublished": "Apr 7, 2026, 6:30:27 AM",
6+
"dateUpdated": "Apr 7, 2026, 6:30:27 AM",
7+
"baseScore": 8.8,
8+
"baseScoreVersion": "3.1",
9+
"baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
10+
"references": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2026-118/index.html\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-65115\n",
11+
"aliases": "CVE-2025-65115\nGHSA-h2gf-w3wm-8xqj\n",
12+
"assigner": "Hitachi",
13+
"epss": 0.0,
14+
"enisaIdProduct": [
15+
{
16+
"id": "0754bb16-2e61-3d68-b69f-0856a3831b41",
17+
"product": {
18+
"name": "JP1/IT Desktop Management 2 - Manager"
19+
},
20+
"product_version": "13-10 <13-10-07"
21+
},
22+
{
23+
"id": "255d0fa4-b726-3bac-a757-5491e2c15897",
24+
"product": {
25+
"name": "JP1/IT Desktop Management 2 - Operations Director"
26+
},
27+
"product_version": "13-01 <13-01-07"
28+
},
29+
{
30+
"id": "46522042-521c-35f8-a8e8-4436c88bdc34",
31+
"product": {
32+
"name": "JP1/IT Desktop Management 2 - Operations Director"
33+
},
34+
"product_version": "12-60 <12-60-12"
35+
},
36+
{
37+
"id": "52668f2f-1c61-3260-a228-e139aab351d0",
38+
"product": {
39+
"name": "JP1/IT Desktop Management 2 - Manager"
40+
},
41+
"product_version": "10-50 \u226412-50-11"
42+
},
43+
{
44+
"id": "71650b11-9186-391c-ad8c-12d1bb001d61",
45+
"product": {
46+
"name": "JP1/IT Desktop Management 2 - Operations Director"
47+
},
48+
"product_version": "13-00 <13-00-05"
49+
},
50+
{
51+
"id": "7b233b28-3568-396d-8cac-8e94183ee4b1",
52+
"product": {
53+
"name": "Job Management Partner 1/IT Desktop Management 2 - Manager"
54+
},
55+
"product_version": "10-50 \u226410-50-11"
56+
},
57+
{
58+
"id": "81cced40-02e7-334f-8355-22fb3d1a7299",
59+
"product": {
60+
"name": "JP1/IT Desktop Management 2 - Operations Director"
61+
},
62+
"product_version": "13-10 <13-10-07"
63+
},
64+
{
65+
"id": "88af3753-eb6f-39b8-8d29-f1c910746413",
66+
"product": {
67+
"name": "JP1/IT Desktop Management 2 - Operations Director"
68+
},
69+
"product_version": "10-50 \u226412-50-11"
70+
},
71+
{
72+
"id": "a1f50151-40b1-3583-bc13-83bcc6e8833c",
73+
"product": {
74+
"name": "JP1/IT Desktop Management 2 - Manager"
75+
},
76+
"product_version": "13-01 <13-01-07"
77+
},
78+
{
79+
"id": "af41de6b-dee4-3712-9492-ff31a4cc96bb",
80+
"product": {
81+
"name": "JP1/IT Desktop Management 2 - Operations Director"
82+
},
83+
"product_version": "13-50 <13-50-02"
84+
},
85+
{
86+
"id": "b9e558a7-05c3-3892-9236-8c1bc09c3c94",
87+
"product": {
88+
"name": "JP1/IT Desktop Management 2 - Manager"
89+
},
90+
"product_version": "13-11 <13-11-04"
91+
},
92+
{
93+
"id": "c0a214c4-44ef-3b41-8230-a42c3dc502d2",
94+
"product": {
95+
"name": "JP1/IT Desktop Management 2 - Manager"
96+
},
97+
"product_version": "13-00 <13-00-05"
98+
},
99+
{
100+
"id": "c372bd2f-b09a-3b94-b075-95c5fb61fdc7",
101+
"product": {
102+
"name": "JP1/IT Desktop Management 2 - Manager"
103+
},
104+
"product_version": "12-60 <12-60-12"
105+
},
106+
{
107+
"id": "c6adfda4-af9a-39a0-88f5-eebe1a8fca87",
108+
"product": {
109+
"name": "JP1/IT Desktop Management 2 - Operations Director"
110+
},
111+
"product_version": "13-11 <13-11-04"
112+
},
113+
{
114+
"id": "f0246181-b08b-3e13-adb5-e7dc28de4d37",
115+
"product": {
116+
"name": "JP1/IT Desktop Management 2 - Manager"
117+
},
118+
"product_version": "13-50 <13-50-02"
119+
},
120+
{
121+
"id": "f669d6a5-0129-3f53-b4f6-cda8f78aa179",
122+
"product": {
123+
"name": "JP1/IT Desktop Management - Manager"
124+
},
125+
"product_version": "09-50 \u226410-10-16"
126+
}
127+
],
128+
"enisaIdVendor": [
129+
{
130+
"id": "3ffd3264-9716-3c1e-9941-4f1d942b434e",
131+
"vendor": {
132+
"name": "Hitachi"
133+
}
134+
}
135+
]
136+
}

0 commit comments

Comments
 (0)