Skip to content

Commit 367cb99

Browse files
1 parent 2cdb5b6 commit 367cb99

2 files changed

Lines changed: 60 additions & 11 deletions

File tree

advisories/unreviewed/2026/04/GHSA-8fgx-wgvr-pcx8/GHSA-8fgx-wgvr-pcx8.json renamed to advisories/github-reviewed/2026/04/GHSA-8fgx-wgvr-pcx8/GHSA-8fgx-wgvr-pcx8.json

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8fgx-wgvr-pcx8",
4-
"modified": "2026-04-10T00:30:31Z",
4+
"modified": "2026-04-10T20:34:42Z",
55
"published": "2026-04-10T00:30:31Z",
66
"aliases": [
77
"CVE-2026-5986"
88
],
9+
"summary": "Zod jsVideoUrlParser vulnerable to ReDoS in util.js",
910
"details": "A weakness has been identified in Zod jsVideoUrlParser up to 0.5.1. The impacted element is the function getTime in the library lib/util.js. This manipulation of the argument timestamp causes inefficient regular expression complexity. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.",
1011
"severity": [
1112
{
@@ -14,10 +15,30 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "npm",
25+
"name": "js-video-url-parser"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"last_affected": "0.5.1"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
@@ -31,6 +52,10 @@
3152
"type": "WEB",
3253
"url": "https://github.com/Zod-/jsVideoUrlParser/issues/121#issue-4159661957"
3354
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/Zod-/jsVideoUrlParser"
58+
},
3459
{
3560
"type": "WEB",
3661
"url": "https://vuldb.com/submit/791911"
@@ -49,8 +74,8 @@
4974
"CWE-400"
5075
],
5176
"severity": "MODERATE",
52-
"github_reviewed": false,
53-
"github_reviewed_at": null,
77+
"github_reviewed": true,
78+
"github_reviewed_at": "2026-04-10T20:34:42Z",
5479
"nvd_published_at": "2026-04-09T23:17:01Z"
5580
}
5681
}

advisories/unreviewed/2026/04/GHSA-wp29-qmvj-frvp/GHSA-wp29-qmvj-frvp.json renamed to advisories/github-reviewed/2026/04/GHSA-wp29-qmvj-frvp/GHSA-wp29-qmvj-frvp.json

Lines changed: 30 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wp29-qmvj-frvp",
4-
"modified": "2026-04-09T21:31:30Z",
4+
"modified": "2026-04-10T20:34:27Z",
55
"published": "2026-04-09T21:31:30Z",
66
"aliases": [
77
"CVE-2026-5972"
88
],
9+
"summary": "FoundationAgents MetaGPT vulnerable to os command injection via the Terminal.run_command",
910
"details": "A vulnerability has been found in FoundationAgents MetaGPT up to 0.8.1. This issue affects the function Terminal.run_command in the library metagpt/tools/libs/terminal.py. The manipulation leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The identifier of the patch is d04ffc8dc67903e8b327f78ec121df5e190ffc7b. Applying a patch is the recommended action to fix this issue.",
1011
"severity": [
1112
{
@@ -14,10 +15,33 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "PyPI",
25+
"name": "metagpt"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"fixed": "0.8.2"
36+
}
37+
]
38+
}
39+
],
40+
"database_specific": {
41+
"last_known_affected_version_range": "<= 0.8.1"
42+
}
1843
}
1944
],
20-
"affected": [],
2145
"references": [
2246
{
2347
"type": "ADVISORY",
@@ -32,7 +56,7 @@
3256
"url": "https://github.com/paipeline/MetaGPT/commit/d04ffc8dc67903e8b327f78ec121df5e190ffc7b"
3357
},
3458
{
35-
"type": "WEB",
59+
"type": "PACKAGE",
3660
"url": "https://github.com/FoundationAgents/MetaGPT"
3761
},
3862
{
@@ -53,8 +77,8 @@
5377
"CWE-77"
5478
],
5579
"severity": "MODERATE",
56-
"github_reviewed": false,
57-
"github_reviewed_at": null,
80+
"github_reviewed": true,
81+
"github_reviewed_at": "2026-04-10T20:34:27Z",
5882
"nvd_published_at": "2026-04-09T20:16:28Z"
5983
}
6084
}

0 commit comments

Comments
 (0)