Skip to content

Commit 6ef12c0

Browse files
Advisory Database Sync
1 parent 5b5f006 commit 6ef12c0

57 files changed

Lines changed: 1127 additions & 100 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/unreviewed/2022/04/GHSA-782c-hpc8-pfgv/GHSA-782c-hpc8-pfgv.json

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-782c-hpc8-pfgv",
4-
"modified": "2022-04-23T00:40:22Z",
4+
"modified": "2026-04-09T18:31:21Z",
55
"published": "2022-04-23T00:40:22Z",
66
"aliases": [
77
"CVE-2012-5562"
88
],
99
"details": "rhn-proxy: may transmit credentials over clear-text when accessing RHN Satellite",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -28,7 +33,9 @@
2833
}
2934
],
3035
"database_specific": {
31-
"cwe_ids": [],
36+
"cwe_ids": [
37+
"CWE-319"
38+
],
3239
"severity": "LOW",
3340
"github_reviewed": false,
3441
"github_reviewed_at": null,

advisories/unreviewed/2026/01/GHSA-2j3v-cxmf-cmp7/GHSA-2j3v-cxmf-cmp7.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2j3v-cxmf-cmp7",
4-
"modified": "2026-01-15T15:31:21Z",
4+
"modified": "2026-04-09T18:31:22Z",
55
"published": "2026-01-15T15:31:21Z",
66
"aliases": [
77
"CVE-2026-0990"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429959"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2026/01/GHSA-337w-h8w7-m899/GHSA-337w-h8w7-m899.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-337w-h8w7-m899",
4-
"modified": "2026-03-24T12:30:24Z",
4+
"modified": "2026-04-09T18:31:22Z",
55
"published": "2026-01-26T21:30:36Z",
66
"aliases": [
77
"CVE-2025-9820"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
4545
},
46+
{
47+
"type": "WEB",
48+
"url": "https://access.redhat.com/errata/RHSA-2026:7329"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://access.redhat.com/security/cve/CVE-2025-9820"

advisories/unreviewed/2026/01/GHSA-3xfm-x84x-qwwq/GHSA-3xfm-x84x-qwwq.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3xfm-x84x-qwwq",
4-
"modified": "2026-01-15T15:31:21Z",
4+
"modified": "2026-04-09T18:31:22Z",
55
"published": "2026-01-15T15:31:21Z",
66
"aliases": [
77
"CVE-2026-0989"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429933"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/998"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2026/01/GHSA-cjqj-7q2q-jx9c/GHSA-cjqj-7q2q-jx9c.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cjqj-7q2q-jx9c",
4-
"modified": "2026-01-15T15:31:21Z",
4+
"modified": "2026-04-09T18:31:22Z",
55
"published": "2026-01-15T15:31:21Z",
66
"aliases": [
77
"CVE-2026-0992"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429975"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/1019"
2933
}
3034
],
3135
"database_specific": {

advisories/unreviewed/2026/02/GHSA-pm8w-jq9r-x5rp/GHSA-pm8w-jq9r-x5rp.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pm8w-jq9r-x5rp",
4-
"modified": "2026-04-07T12:31:15Z",
4+
"modified": "2026-04-09T18:31:22Z",
55
"published": "2026-02-09T15:30:31Z",
66
"aliases": [
77
"CVE-2025-14831"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://access.redhat.com/errata/RHSA-2026:6738"
6161
},
62+
{
63+
"type": "WEB",
64+
"url": "https://access.redhat.com/errata/RHSA-2026:7329"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://access.redhat.com/security/cve/CVE-2025-14831"

advisories/unreviewed/2026/03/GHSA-xrqh-48jh-pjv2/GHSA-xrqh-48jh-pjv2.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xrqh-48jh-pjv2",
4-
"modified": "2026-04-08T18:34:03Z",
4+
"modified": "2026-04-09T18:31:22Z",
55
"published": "2026-03-13T21:31:51Z",
66
"aliases": [
77
"CVE-2026-4111"
@@ -47,6 +47,10 @@
4747
"type": "WEB",
4848
"url": "https://access.redhat.com/errata/RHSA-2026:7106"
4949
},
50+
{
51+
"type": "WEB",
52+
"url": "https://access.redhat.com/errata/RHSA-2026:7329"
53+
},
5054
{
5155
"type": "WEB",
5256
"url": "https://access.redhat.com/security/cve/CVE-2026-4111"
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-24q9-g4p7-45qp",
4+
"modified": "2026-04-09T18:31:26Z",
5+
"published": "2026-04-09T18:31:26Z",
6+
"aliases": [
7+
"CVE-2025-15480"
8+
],
9+
"details": "In Ubuntu, ubuntu-desktop-provision version 24.04.4 could leak sensitive user credentials during crash reporting. Upon installation failure, if a user submitted a bug report to Launchpad, ubuntu-desktop-provision could include the user's password hash in the attached logs.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15480"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/canonical/ubuntu-desktop-provision/pull/1399"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/canonical/ubuntu-desktop-provision/pull/1400"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-1258"
34+
],
35+
"severity": "LOW",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-04-09T16:16:25Z"
39+
}
40+
}
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3ghp-8r47-4gj4",
4+
"modified": "2026-04-09T18:31:28Z",
5+
"published": "2026-04-09T18:31:28Z",
6+
"aliases": [
7+
"CVE-2026-5971"
8+
],
9+
"details": "A flaw has been found in FoundationAgents MetaGPT up to 0.8.1. This vulnerability affects the function ActionNode.xml_fill of the file metagpt/actions/action_node.py of the component XML Handler. Executing a manipulation can lead to improper neutralization of directives in dynamically evaluated code. The attack may be launched remotely. The exploit has been published and may be used. The project was informed of the problem early through a pull request but has not reacted yet.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5971"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/FoundationAgents/MetaGPT/issues/1928"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/FoundationAgents/MetaGPT/issues/1956"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://github.com/FoundationAgents/MetaGPT"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/submit/791734"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/vuln/356525"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://vuldb.com/vuln/356525/cti"
49+
}
50+
],
51+
"database_specific": {
52+
"cwe_ids": [
53+
"CWE-94"
54+
],
55+
"severity": "MODERATE",
56+
"github_reviewed": false,
57+
"github_reviewed_at": null,
58+
"nvd_published_at": "2026-04-09T18:17:04Z"
59+
}
60+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3wq5-x8p8-2v3p",
4+
"modified": "2026-04-09T18:31:28Z",
5+
"published": "2026-04-09T18:31:28Z",
6+
"aliases": [
7+
"CVE-2026-5329"
8+
],
9+
"details": "Rapid7 Velociraptor versions prior to 0.76.2 contain an improper input validation vulnerability in the client monitoring message handler on the Velociraptor server (primarily Linux) that allows an authenticated remote attacker to write to arbitrary internal server queues via a crafted monitoring message with a malicious queue name. The server handler that receives client monitoring messages does not sufficiently validate the queue name supplied by the client, allowing a rogue client to write arbitrary messages to privileged internal queues. This may lead to remote code execution on the Velociraptor server. Rapid7 Hosted Velociraptor instances are not affected by this vulnerability.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5329"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://docs.velociraptor.app/announcements/advisories/cve-2026-5329"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-20"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-04-09T18:17:04Z"
35+
}
36+
}

0 commit comments

Comments
 (0)