Skip to content

File tree

14 files changed

+284
-12
lines changed

14 files changed

+284
-12
lines changed

advisories/unreviewed/2025/07/GHSA-f7q5-qg45-7vm8/GHSA-f7q5-qg45-7vm8.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f7q5-qg45-7vm8",
4-
"modified": "2026-04-14T12:31:28Z",
4+
"modified": "2026-04-21T00:32:13Z",
55
"published": "2025-07-10T09:32:27Z",
66
"aliases": [
77
"CVE-2025-32989"
@@ -47,6 +47,10 @@
4747
"type": "WEB",
4848
"url": "https://access.redhat.com/errata/RHSA-2025:22529"
4949
},
50+
{
51+
"type": "WEB",
52+
"url": "https://access.redhat.com/errata/RHSA-2026:7477"
53+
},
5054
{
5155
"type": "WEB",
5256
"url": "https://access.redhat.com/security/cve/CVE-2025-32989"

advisories/unreviewed/2025/07/GHSA-fv5h-vqpf-6fqj/GHSA-fv5h-vqpf-6fqj.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fv5h-vqpf-6fqj",
4-
"modified": "2026-03-26T18:31:27Z",
4+
"modified": "2026-04-21T00:32:13Z",
55
"published": "2025-07-10T09:32:27Z",
66
"aliases": [
77
"CVE-2025-32988"
@@ -51,6 +51,10 @@
5151
"type": "WEB",
5252
"url": "https://access.redhat.com/errata/RHSA-2025:22529"
5353
},
54+
{
55+
"type": "WEB",
56+
"url": "https://access.redhat.com/errata/RHSA-2026:7477"
57+
},
5458
{
5559
"type": "WEB",
5660
"url": "https://access.redhat.com/security/cve/CVE-2025-32988"

advisories/unreviewed/2025/07/GHSA-v8v5-8mm8-3j8p/GHSA-v8v5-8mm8-3j8p.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v8v5-8mm8-3j8p",
4-
"modified": "2026-04-14T12:31:28Z",
4+
"modified": "2026-04-21T00:32:13Z",
55
"published": "2025-07-10T12:31:18Z",
66
"aliases": [
77
"CVE-2025-32990"
@@ -51,6 +51,10 @@
5151
"type": "WEB",
5252
"url": "https://access.redhat.com/errata/RHSA-2025:22529"
5353
},
54+
{
55+
"type": "WEB",
56+
"url": "https://access.redhat.com/errata/RHSA-2026:7477"
57+
},
5458
{
5559
"type": "WEB",
5660
"url": "https://access.redhat.com/security/cve/CVE-2025-32990"

advisories/unreviewed/2025/09/GHSA-qc8j-wvjf-7jfj/GHSA-qc8j-wvjf-7jfj.json

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qc8j-wvjf-7jfj",
4-
"modified": "2026-02-27T18:31:00Z",
4+
"modified": "2026-04-21T00:32:14Z",
55
"published": "2025-09-23T18:30:24Z",
66
"aliases": [
77
"CVE-2025-9900"
@@ -21,7 +21,7 @@
2121
},
2222
{
2323
"type": "WEB",
24-
"url": "https://access.redhat.com/errata/RHSA-2025:21508"
24+
"url": "https://access.redhat.com/errata/RHSA-2025:17651"
2525
},
2626
{
2727
"type": "WEB",
@@ -63,6 +63,10 @@
6363
"type": "WEB",
6464
"url": "https://access.redhat.com/errata/RHSA-2026:3462"
6565
},
66+
{
67+
"type": "WEB",
68+
"url": "https://access.redhat.com/errata/RHSA-2026:7504"
69+
},
6670
{
6771
"type": "WEB",
6872
"url": "https://access.redhat.com/security/cve/CVE-2025-9900"
@@ -91,10 +95,6 @@
9195
"type": "WEB",
9296
"url": "https://lists.debian.org/debian-lts-announce/2025/09/msg00031.html"
9397
},
94-
{
95-
"type": "WEB",
96-
"url": "https://access.redhat.com/errata/RHSA-2025:17651"
97-
},
9898
{
9999
"type": "WEB",
100100
"url": "https://access.redhat.com/errata/RHSA-2025:17675"
@@ -167,6 +167,10 @@
167167
"type": "WEB",
168168
"url": "https://access.redhat.com/errata/RHSA-2025:21507"
169169
},
170+
{
171+
"type": "WEB",
172+
"url": "https://access.redhat.com/errata/RHSA-2025:21508"
173+
},
170174
{
171175
"type": "WEB",
172176
"url": "http://www.openwall.com/lists/oss-security/2025/09/26/3"

advisories/unreviewed/2026/03/GHSA-g7c4-wv7q-gcc6/GHSA-g7c4-wv7q-gcc6.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g7c4-wv7q-gcc6",
4-
"modified": "2026-03-30T18:31:18Z",
4+
"modified": "2026-04-21T00:32:14Z",
55
"published": "2026-03-30T18:31:18Z",
66
"aliases": [
77
"CVE-2026-4046"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4046"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://inbox.sourceware.org/libc-announce/76814edf-cf7f-47ec-979d-2dce0a2c76bf@gotplt.org/T/#u"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33980"

advisories/unreviewed/2026/04/GHSA-2vxx-w4h2-4g8g/GHSA-2vxx-w4h2-4g8g.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@
2626
],
2727
"database_specific": {
2828
"cwe_ids": [
29+
"CWE-434",
2930
"CWE-78"
3031
],
3132
"severity": "CRITICAL",
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3mhm-cc78-hw48",
4+
"modified": "2026-04-21T00:32:14Z",
5+
"published": "2026-04-21T00:32:14Z",
6+
"aliases": [
7+
"CVE-2026-5721"
8+
],
9+
"details": "The wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 6.5.0.4. This is due to insufficient input sanitization and output escaping in the prepareCellOutput() method of the LinkWDTColumn, ImageWDTColumn, and EmailWDTColumn classes. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page, given that they can trick an Administrator into importing data from an attacker-controlled source and the affected column types (Link, Image, or Email) are configured.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5721"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://plugins.trac.wordpress.org/changeset/3510613"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8db736fb-cd6c-4a52-9dd3-eefd0a8d9267?source=cve"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-79"
34+
],
35+
"severity": "MODERATE",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-04-20T23:16:24Z"
39+
}
40+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-46pm-c965-776x",
4+
"modified": "2026-04-21T00:32:14Z",
5+
"published": "2026-04-21T00:32:14Z",
6+
"aliases": [
7+
"CVE-2026-0930"
8+
],
9+
"details": "Potential read out of bounds case with wolfSSHd on Windows while handling a terminal resize request. An authenticated user could trigger the out of bounds read after establishing a connection which would leak the adjacent stack memory to the pseudo-console output.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0930"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/wolfssl/wolfssh/pull/846"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-126"
30+
],
31+
"severity": "LOW",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-04-20T22:16:23Z"
35+
}
36+
}
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4fw6-xxwg-9332",
4+
"modified": "2026-04-21T00:32:14Z",
5+
"published": "2026-04-21T00:32:14Z",
6+
"aliases": [
7+
"CVE-2026-22051"
8+
],
9+
"details": "StorageGRID (formerly StorageGRID Webscale) versions prior to 11.9.0.13 and 12.0.0.6 are susceptible to a Information Disclosure vulnerability. Successful exploit could allow an authenticated attacker with low privileges to run arbitrary metrics queries, revealing metric results that they do not have access to.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22051"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://security.netapp.com/advisory/ntap-20260420-0001"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [],
29+
"severity": "LOW",
30+
"github_reviewed": false,
31+
"github_reviewed_at": null,
32+
"nvd_published_at": "2026-04-20T22:16:23Z"
33+
}
34+
}
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6pg9-3wf4-7w8v",
4+
"modified": "2026-04-21T00:32:14Z",
5+
"published": "2026-04-21T00:32:14Z",
6+
"aliases": [
7+
"CVE-2026-29643"
8+
],
9+
"details": "XiangShan (Open-source high-performance RISC-V processor) commit edb1dfaf7d290ae99724594507dc46c2c2125384 (2024-11-28) contains an improper exceptional-condition handling flaw in its CSR subsystem (NewCSR). On affected versions, certain sequences of CSR operations targeting non-existent/custom CSR addresses may trigger an illegal-instruction exception but fail to reliably transfer control to the configured trap handler (mtvec), causing control-flow disruption and potentially leaving the core in a hung or unrecoverable state. This can be exploited by a local attacker able to execute code on the processor to cause a denial of service and potentially inconsistent architectural state.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29643"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/OpenXiangShan/XiangShan/issues/3959"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://github.com/OpenXiangShan/XiangShan/pull/3966"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://docs.riscv.org/reference/isa/priv/machine.html"
28+
},
29+
{
30+
"type": "WEB",
31+
"url": "https://docs.riscv.org/reference/isa/priv/priv-csrs.html"
32+
}
33+
],
34+
"database_specific": {
35+
"cwe_ids": [],
36+
"severity": null,
37+
"github_reviewed": false,
38+
"github_reviewed_at": null,
39+
"nvd_published_at": "2026-04-20T22:16:23Z"
40+
}
41+
}

0 commit comments

Comments
 (0)