Skip to content

Commit 9ca9084

Browse files
Advisory Database Sync
1 parent d92007d commit 9ca9084

File tree

27 files changed

+1276
-16
lines changed

27 files changed

+1276
-16
lines changed

advisories/unreviewed/2026/03/GHSA-2vwv-vqpv-v8vc/GHSA-2vwv-vqpv-v8vc.json

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2vwv-vqpv-v8vc",
4-
"modified": "2026-04-20T03:34:40Z",
4+
"modified": "2026-04-20T06:31:26Z",
55
"published": "2026-03-30T09:31:29Z",
66
"aliases": [
77
"CVE-2026-5121"
@@ -39,10 +39,22 @@
3939
"type": "WEB",
4040
"url": "https://access.redhat.com/errata/RHSA-2026:8534"
4141
},
42+
{
43+
"type": "WEB",
44+
"url": "https://access.redhat.com/errata/RHSA-2026:8864"
45+
},
4246
{
4347
"type": "WEB",
4448
"url": "https://access.redhat.com/errata/RHSA-2026:8867"
4549
},
50+
{
51+
"type": "WEB",
52+
"url": "https://access.redhat.com/errata/RHSA-2026:8873"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://access.redhat.com/errata/RHSA-2026:8908"
57+
},
4658
{
4759
"type": "WEB",
4860
"url": "https://access.redhat.com/security/cve/CVE-2026-5121"

advisories/unreviewed/2026/03/GHSA-c75f-55f6-f63q/GHSA-c75f-55f6-f63q.json

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c75f-55f6-f63q",
4-
"modified": "2026-04-20T03:34:40Z",
4+
"modified": "2026-04-20T06:31:26Z",
55
"published": "2026-03-19T15:31:21Z",
66
"aliases": [
77
"CVE-2026-4424"
@@ -43,10 +43,26 @@
4343
"type": "WEB",
4444
"url": "https://access.redhat.com/errata/RHSA-2026:8534"
4545
},
46+
{
47+
"type": "WEB",
48+
"url": "https://access.redhat.com/errata/RHSA-2026:8864"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://access.redhat.com/errata/RHSA-2026:8865"
53+
},
4654
{
4755
"type": "WEB",
4856
"url": "https://access.redhat.com/errata/RHSA-2026:8867"
4957
},
58+
{
59+
"type": "WEB",
60+
"url": "https://access.redhat.com/errata/RHSA-2026:8873"
61+
},
62+
{
63+
"type": "WEB",
64+
"url": "https://access.redhat.com/errata/RHSA-2026:8908"
65+
},
5066
{
5167
"type": "WEB",
5268
"url": "https://access.redhat.com/security/cve/CVE-2026-4424"

advisories/unreviewed/2026/03/GHSA-xrqh-48jh-pjv2/GHSA-xrqh-48jh-pjv2.json

Lines changed: 18 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xrqh-48jh-pjv2",
4-
"modified": "2026-04-17T15:31:07Z",
4+
"modified": "2026-04-20T06:31:26Z",
55
"published": "2026-03-13T21:31:51Z",
66
"aliases": [
77
"CVE-2026-4111"
@@ -25,59 +25,63 @@
2525
},
2626
{
2727
"type": "WEB",
28-
"url": "https://access.redhat.com/errata/RHSA-2026:5063"
28+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446453"
2929
},
3030
{
3131
"type": "WEB",
32-
"url": "https://access.redhat.com/errata/RHSA-2026:5080"
32+
"url": "https://access.redhat.com/security/cve/CVE-2026-4111"
3333
},
3434
{
3535
"type": "WEB",
36-
"url": "https://access.redhat.com/errata/RHSA-2026:6647"
36+
"url": "https://access.redhat.com/errata/RHSA-2026:8865"
3737
},
3838
{
3939
"type": "WEB",
40-
"url": "https://access.redhat.com/errata/RHSA-2026:7093"
40+
"url": "https://access.redhat.com/errata/RHSA-2026:8748"
4141
},
4242
{
4343
"type": "WEB",
44-
"url": "https://access.redhat.com/errata/RHSA-2026:7105"
44+
"url": "https://access.redhat.com/errata/RHSA-2026:8747"
4545
},
4646
{
4747
"type": "WEB",
48-
"url": "https://access.redhat.com/errata/RHSA-2026:7106"
48+
"url": "https://access.redhat.com/errata/RHSA-2026:8746"
4949
},
5050
{
5151
"type": "WEB",
52-
"url": "https://access.redhat.com/errata/RHSA-2026:7239"
52+
"url": "https://access.redhat.com/errata/RHSA-2026:7335"
5353
},
5454
{
5555
"type": "WEB",
5656
"url": "https://access.redhat.com/errata/RHSA-2026:7329"
5757
},
5858
{
5959
"type": "WEB",
60-
"url": "https://access.redhat.com/errata/RHSA-2026:7335"
60+
"url": "https://access.redhat.com/errata/RHSA-2026:7239"
6161
},
6262
{
6363
"type": "WEB",
64-
"url": "https://access.redhat.com/errata/RHSA-2026:8746"
64+
"url": "https://access.redhat.com/errata/RHSA-2026:7106"
6565
},
6666
{
6767
"type": "WEB",
68-
"url": "https://access.redhat.com/errata/RHSA-2026:8747"
68+
"url": "https://access.redhat.com/errata/RHSA-2026:7105"
6969
},
7070
{
7171
"type": "WEB",
72-
"url": "https://access.redhat.com/errata/RHSA-2026:8748"
72+
"url": "https://access.redhat.com/errata/RHSA-2026:7093"
7373
},
7474
{
7575
"type": "WEB",
76-
"url": "https://access.redhat.com/security/cve/CVE-2026-4111"
76+
"url": "https://access.redhat.com/errata/RHSA-2026:6647"
7777
},
7878
{
7979
"type": "WEB",
80-
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446453"
80+
"url": "https://access.redhat.com/errata/RHSA-2026:5080"
81+
},
82+
{
83+
"type": "WEB",
84+
"url": "https://access.redhat.com/errata/RHSA-2026:5063"
8185
}
8286
],
8387
"database_specific": {
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-23v2-6gx7-7pp6",
4+
"modified": "2026-04-20T06:31:26Z",
5+
"published": "2026-04-20T06:31:26Z",
6+
"aliases": [
7+
"CVE-2026-32961"
8+
],
9+
"details": "SD-330AC and AMC Manager provided by silex technology, Inc. contain a heap-based buffer overflow vulnerability in packet data processing of sx_smpd. Processing a crafted packet may cause a temporary denial-of-service (DoS) condition.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32961"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://jvn.jp/en/vu/JVNVU94271449"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.silex.jp/support/security-advisories/2026-001"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.silex.jp/support/security-advisories/en/2026-001"
37+
}
38+
],
39+
"database_specific": {
40+
"cwe_ids": [
41+
"CWE-122"
42+
],
43+
"severity": "MODERATE",
44+
"github_reviewed": false,
45+
"github_reviewed_at": null,
46+
"nvd_published_at": "2026-04-20T04:16:44Z"
47+
}
48+
}
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-332v-r8r4-hgh6",
4+
"modified": "2026-04-20T06:31:26Z",
5+
"published": "2026-04-20T06:31:26Z",
6+
"aliases": [
7+
"CVE-2026-32957"
8+
],
9+
"details": "SD-330AC and AMC Manager provided by silex technology, Inc. contain a missing authentication for critical function issue on firmware maintenance. Arbitrary file may be uploaded on the device without authentication.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32957"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://jvn.jp/en/vu/JVNVU94271449"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.silex.jp/support/security-advisories/2026-001"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.silex.jp/support/security-advisories/en/2026-001"
37+
}
38+
],
39+
"database_specific": {
40+
"cwe_ids": [
41+
"CWE-306"
42+
],
43+
"severity": "MODERATE",
44+
"github_reviewed": false,
45+
"github_reviewed_at": null,
46+
"nvd_published_at": "2026-04-20T04:16:39Z"
47+
}
48+
}
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-5842-r2vf-gmxv",
4+
"modified": "2026-04-20T06:31:27Z",
5+
"published": "2026-04-20T06:31:27Z",
6+
"aliases": [
7+
"CVE-2026-32965"
8+
],
9+
"details": "Initialization of a resource with an insecure default vulnerability exists in SD-330AC and AMC Manager provided by silex technology, Inc. When the affected device is connected to the network with the initial (factory-default) configuration, the device can be configured with the null string password.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32965"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://jvn.jp/en/vu/JVNVU94271449"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.silex.jp/support/security-advisories/2026-001"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.silex.jp/support/security-advisories/en/2026-001"
37+
}
38+
],
39+
"database_specific": {
40+
"cwe_ids": [
41+
"CWE-1188"
42+
],
43+
"severity": "HIGH",
44+
"github_reviewed": false,
45+
"github_reviewed_at": null,
46+
"nvd_published_at": "2026-04-20T04:16:45Z"
47+
}
48+
}
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-5f3w-cmwx-c9m9",
4+
"modified": "2026-04-20T06:31:27Z",
5+
"published": "2026-04-20T06:31:27Z",
6+
"aliases": [
7+
"CVE-2026-32964"
8+
],
9+
"details": "SD-330AC and AMC Manager provided by silex technology, Inc. contain an improper neutralization of CRLF sequences ('CRLF Injection') vulnerability. Processing some crafted configuration data may lead to arbitrary entries injected to the system configuration.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32964"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://jvn.jp/en/vu/JVNVU94271449"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.silex.jp/support/security-advisories/2026-001"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.silex.jp/support/security-advisories/en/2026-001"
37+
}
38+
],
39+
"database_specific": {
40+
"cwe_ids": [
41+
"CWE-93"
42+
],
43+
"severity": "MODERATE",
44+
"github_reviewed": false,
45+
"github_reviewed_at": null,
46+
"nvd_published_at": "2026-04-20T04:16:45Z"
47+
}
48+
}

0 commit comments

Comments
 (0)