Skip to content

File tree

advisories/github-reviewed/2026/03/GHSA-7p93-6934-f4q7/GHSA-7p93-6934-f4q7.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7p93-6934-f4q7",
4-
"modified": "2026-03-30T17:00:54Z",
4+
"modified": "2026-04-06T17:18:18Z",
55
"published": "2026-03-30T17:00:54Z",
66
"aliases": [
77
"CVE-2026-33533"
@@ -40,9 +40,21 @@
4040
"type": "WEB",
4141
"url": "https://github.com/nicolargo/glances/security/advisories/GHSA-7p93-6934-f4q7"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33533"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/nicolargo/glances/commit/dcb39c3f12b2a1eec708c58d22d7a1d62bdf5fa1"
50+
},
4351
{
4452
"type": "PACKAGE",
4553
"url": "https://github.com/nicolargo/glances"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://github.com/nicolargo/glances/releases/tag/v4.5.3"
4658
}
4759
],
4860
"database_specific": {
@@ -52,6 +64,6 @@
5264
"severity": "HIGH",
5365
"github_reviewed": true,
5466
"github_reviewed_at": "2026-03-30T17:00:54Z",
55-
"nvd_published_at": null
67+
"nvd_published_at": "2026-04-02T15:16:39Z"
5668
}
5769
}

advisories/github-reviewed/2026/03/GHSA-98gw-w575-h2ph/GHSA-98gw-w575-h2ph.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-98gw-w575-h2ph",
4-
"modified": "2026-03-31T22:48:45Z",
4+
"modified": "2026-04-06T17:18:07Z",
55
"published": "2026-03-31T22:48:45Z",
66
"aliases": [
77
"CVE-2026-32629"
@@ -65,9 +65,17 @@
6565
"type": "WEB",
6666
"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-98gw-w575-h2ph"
6767
},
68+
{
69+
"type": "ADVISORY",
70+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32629"
71+
},
6872
{
6973
"type": "PACKAGE",
7074
"url": "https://github.com/thorsten/phpMyFAQ"
75+
},
76+
{
77+
"type": "WEB",
78+
"url": "https://github.com/thorsten/phpMyFAQ/releases/tag/4.1.1"
7179
}
7280
],
7381
"database_specific": {
@@ -78,6 +86,6 @@
7886
"severity": "MODERATE",
7987
"github_reviewed": true,
8088
"github_reviewed_at": "2026-03-31T22:48:45Z",
81-
"nvd_published_at": null
89+
"nvd_published_at": "2026-04-02T15:16:38Z"
8290
}
8391
}

advisories/github-reviewed/2026/03/GHSA-q4r8-xm5f-56gw/GHSA-q4r8-xm5f-56gw.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q4r8-xm5f-56gw",
4-
"modified": "2026-03-20T21:35:17Z",
4+
"modified": "2026-04-06T17:19:40Z",
55
"published": "2026-03-19T16:27:53Z",
66
"aliases": [
77
"CVE-2026-30836"
88
],
99
"summary": "step-ca has Unauthenticated Certificate Issuance via SCEP UpdateReq (MessageType=18)",
10-
"details": "⚠️ **Limited Disclosure — Full Details Pending**\n\nA critical security vulnerability has been identified in Step CA. An updated version, v0.30.0, is available and all operators are strongly encouraged to upgrade immediately.\n\nFull details of this vulnerability will be published in this security advisory on March 30, 2026.\nIf you have urgent questions in the meantime, please contact [security@smallstep.com](mailto:security@smallstep.com).",
10+
"details": "## Summary\n\nAn attacker can force a Step CA SCEP provisioner to create certificates without completing certain protocol authorization checks.\n\n## Details\n\nSCEP requests carry a message type. On receipt of a SCEP request, Step CA starts processing it by parsing its contents. Message types that were considered valid, but not explicitly supported in Step CA, would result in getting parsed successfully. While processing the parsed SCEP message, authorization logic would be skipped for the non-supported message types.\n\nAs a result, the request would be treated as authorized, bypassing the authorization checks normally enforced as part of the SCEP protocol and its implementation in Step CA.\n\nAuthorization webhooks and regular CA policies, such as allowed names and restrictions on certificate validity periods, remain in place.\n\n## Mitigations\n\nIf you are unable to upgrade to v0.30.0 or newer, the attack can be mitigated by (temporarily) disabling or removing SCEP provisioners, or restricting access to SCEP provisioners to trusted clients only.\n\n## Fix\n\nIn v0.30.0, additional validation was added to SCEP provisioners, so that they reject unsupported message types.\n\n## Acknowledgements\n\nThis issue was identified and reported by Prasanth Sundararajan.\n\n## Embargo List\n\nIf your organization runs Step CA in production and would like advance, embargoed notification of future security updates, visit https://u.step.sm/disclosure to request inclusion on our embargo list.\n\nStay safe, and thank you for helping us keep the ecosystem secure.\n\nIf you have urgent questions, please contact [security@smallstep.com](mailto:security@smallstep.com).",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",

advisories/github-reviewed/2026/03/GHSA-qhj7-v7h7-q4c7/GHSA-qhj7-v7h7-q4c7.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qhj7-v7h7-q4c7",
4-
"modified": "2026-03-30T17:01:27Z",
4+
"modified": "2026-04-06T17:18:29Z",
55
"published": "2026-03-30T17:01:27Z",
66
"aliases": [
77
"CVE-2026-33641"
@@ -40,9 +40,21 @@
4040
"type": "WEB",
4141
"url": "https://github.com/nicolargo/glances/security/advisories/GHSA-qhj7-v7h7-q4c7"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33641"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/nicolargo/glances/commit/358d76a225fc21a9f95d2c4d7e46fafe64a644c6"
50+
},
4351
{
4452
"type": "PACKAGE",
4553
"url": "https://github.com/nicolargo/glances"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://github.com/nicolargo/glances/releases/tag/v4.5.3"
4658
}
4759
],
4860
"database_specific": {
@@ -52,6 +64,6 @@
5264
"severity": "HIGH",
5365
"github_reviewed": true,
5466
"github_reviewed_at": "2026-03-30T17:01:27Z",
55-
"nvd_published_at": null
67+
"nvd_published_at": "2026-04-02T15:16:40Z"
5668
}
5769
}

advisories/github-reviewed/2026/03/GHSA-vv7q-7jx5-f767/GHSA-vv7q-7jx5-f767.json

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vv7q-7jx5-f767",
4-
"modified": "2026-03-31T22:53:21Z",
4+
"modified": "2026-04-06T17:18:14Z",
55
"published": "2026-03-31T22:53:21Z",
66
"aliases": [
77
"CVE-2026-32871"
@@ -40,9 +40,25 @@
4040
"type": "WEB",
4141
"url": "https://github.com/PrefectHQ/fastmcp/security/advisories/GHSA-vv7q-7jx5-f767"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32871"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/PrefectHQ/fastmcp/pull/3507"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/PrefectHQ/fastmcp/commit/40bdfb6b1de0ce30609ee9ba5bb95ecd04a9fb71"
54+
},
4355
{
4456
"type": "PACKAGE",
4557
"url": "https://github.com/PrefectHQ/fastmcp"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://github.com/PrefectHQ/fastmcp/releases/tag/v3.2.0"
4662
}
4763
],
4864
"database_specific": {
@@ -52,6 +68,6 @@
5268
"severity": "CRITICAL",
5369
"github_reviewed": true,
5470
"github_reviewed_at": "2026-03-31T22:53:21Z",
55-
"nvd_published_at": null
71+
"nvd_published_at": "2026-04-02T15:16:38Z"
5672
}
5773
}

advisories/github-reviewed/2026/04/GHSA-38m8-xrfj-v38x/GHSA-38m8-xrfj-v38x.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-38m8-xrfj-v38x",
4-
"modified": "2026-04-01T22:30:32Z",
4+
"modified": "2026-04-06T17:18:35Z",
55
"published": "2026-04-01T22:30:32Z",
66
"aliases": [
77
"CVE-2026-34728"
@@ -43,9 +43,17 @@
4343
"type": "WEB",
4444
"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-38m8-xrfj-v38x"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34728"
49+
},
4650
{
4751
"type": "PACKAGE",
4852
"url": "https://github.com/thorsten/phpMyFAQ"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://github.com/thorsten/phpMyFAQ/releases/tag/4.1.1"
4957
}
5058
],
5159
"database_specific": {
@@ -55,6 +63,6 @@
5563
"severity": "HIGH",
5664
"github_reviewed": true,
5765
"github_reviewed_at": "2026-04-01T22:30:32Z",
58-
"nvd_published_at": null
66+
"nvd_published_at": "2026-04-02T15:16:41Z"
5967
}
6068
}

advisories/github-reviewed/2026/04/GHSA-3gw8-3mg3-jmpc/GHSA-3gw8-3mg3-jmpc.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3gw8-3mg3-jmpc",
4-
"modified": "2026-04-01T19:46:00Z",
4+
"modified": "2026-04-06T17:17:50Z",
55
"published": "2026-04-01T19:46:00Z",
66
"aliases": [
77
"CVE-2026-28805"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/devcode-it/openstamanager/security/advisories/GHSA-3gw8-3mg3-jmpc"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28805"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://github.com/devcode-it/openstamanager/commit/50b9089c506ba2ca249afb1dfead2af5d42c10e7"
@@ -67,6 +71,6 @@
6771
"severity": "HIGH",
6872
"github_reviewed": true,
6973
"github_reviewed_at": "2026-04-01T19:46:00Z",
70-
"nvd_published_at": null
74+
"nvd_published_at": "2026-04-02T14:16:26Z"
7175
}
7276
}

advisories/github-reviewed/2026/04/GHSA-5crx-pfhq-4hgg/GHSA-5crx-pfhq-4hgg.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5crx-pfhq-4hgg",
4-
"modified": "2026-04-01T23:42:47Z",
4+
"modified": "2026-04-06T17:18:58Z",
55
"published": "2026-04-01T23:42:47Z",
66
"aliases": [
77
"CVE-2026-34974"
@@ -43,9 +43,17 @@
4343
"type": "WEB",
4444
"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-5crx-pfhq-4hgg"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34974"
49+
},
4650
{
4751
"type": "PACKAGE",
4852
"url": "https://github.com/thorsten/phpMyFAQ"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://github.com/thorsten/phpMyFAQ/releases/tag/4.1.1"
4957
}
5058
],
5159
"database_specific": {
@@ -55,6 +63,6 @@
5563
"severity": "MODERATE",
5664
"github_reviewed": true,
5765
"github_reviewed_at": "2026-04-01T23:42:47Z",
58-
"nvd_published_at": null
66+
"nvd_published_at": "2026-04-02T15:16:51Z"
5967
}
6068
}

advisories/github-reviewed/2026/04/GHSA-9q5m-jfc4-wc92/GHSA-9q5m-jfc4-wc92.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9q5m-jfc4-wc92",
4-
"modified": "2026-04-01T19:52:04Z",
4+
"modified": "2026-04-06T17:18:24Z",
55
"published": "2026-04-01T19:52:04Z",
66
"aliases": [
77
"CVE-2026-33544"
@@ -40,9 +40,21 @@
4040
"type": "WEB",
4141
"url": "https://github.com/steveiliop56/tinyauth/security/advisories/GHSA-9q5m-jfc4-wc92"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33544"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/steveiliop56/tinyauth/commit/f26c2171610d5c2dfbba2edb6ccd39490e349803"
50+
},
4351
{
4452
"type": "PACKAGE",
4553
"url": "https://github.com/steveiliop56/tinyauth"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://github.com/steveiliop56/tinyauth/releases/tag/v5.0.5"
4658
}
4759
],
4860
"database_specific": {
@@ -52,6 +64,6 @@
5264
"severity": "HIGH",
5365
"github_reviewed": true,
5466
"github_reviewed_at": "2026-04-01T19:52:04Z",
55-
"nvd_published_at": null
67+
"nvd_published_at": "2026-04-02T15:16:39Z"
5668
}
5769
}

advisories/github-reviewed/2026/04/GHSA-cv2g-8cj8-vgc7/GHSA-cv2g-8cj8-vgc7.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cv2g-8cj8-vgc7",
4-
"modified": "2026-04-01T22:31:44Z",
4+
"modified": "2026-04-06T17:18:46Z",
55
"published": "2026-04-01T22:31:44Z",
66
"aliases": [
77
"CVE-2026-34729"
@@ -43,9 +43,17 @@
4343
"type": "WEB",
4444
"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-cv2g-8cj8-vgc7"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34729"
49+
},
4650
{
4751
"type": "PACKAGE",
4852
"url": "https://github.com/thorsten/phpMyFAQ"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://github.com/thorsten/phpMyFAQ/releases/tag/4.1.1"
4957
}
5058
],
5159
"database_specific": {
@@ -55,6 +63,6 @@
5563
"severity": "MODERATE",
5664
"github_reviewed": true,
5765
"github_reviewed_at": "2026-04-01T22:31:44Z",
58-
"nvd_published_at": null
66+
"nvd_published_at": "2026-04-02T15:16:42Z"
5967
}
6068
}

0 commit comments

Comments
 (0)