Skip to content

Commit bc280d3

Browse files
1 parent 71a18db commit bc280d3

9 files changed

Lines changed: 109 additions & 7 deletions

File tree

advisories/unreviewed/2026/02/GHSA-62mp-mc96-vv2w/GHSA-62mp-mc96-vv2w.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-62mp-mc96-vv2w",
4-
"modified": "2026-02-25T18:31:28Z",
4+
"modified": "2026-04-07T12:31:15Z",
55
"published": "2026-02-20T18:31:36Z",
66
"aliases": [
77
"CVE-2025-69303"

advisories/unreviewed/2026/02/GHSA-pm8w-jq9r-x5rp/GHSA-pm8w-jq9r-x5rp.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pm8w-jq9r-x5rp",
4-
"modified": "2026-04-07T09:31:22Z",
4+
"modified": "2026-04-07T12:31:15Z",
55
"published": "2026-02-09T15:30:31Z",
66
"aliases": [
77
"CVE-2025-14831"
@@ -55,6 +55,10 @@
5555
"type": "WEB",
5656
"url": "https://access.redhat.com/errata/RHSA-2026:6737"
5757
},
58+
{
59+
"type": "WEB",
60+
"url": "https://access.redhat.com/errata/RHSA-2026:6738"
61+
},
5862
{
5963
"type": "WEB",
6064
"url": "https://access.redhat.com/security/cve/CVE-2025-14831"

advisories/unreviewed/2026/03/GHSA-79rc-g99x-p5qw/GHSA-79rc-g99x-p5qw.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-79rc-g99x-p5qw",
4-
"modified": "2026-03-09T21:31:34Z",
4+
"modified": "2026-04-07T12:31:15Z",
55
"published": "2026-03-05T06:30:25Z",
66
"aliases": [
77
"CVE-2026-27348"

advisories/unreviewed/2026/03/GHSA-rrhg-36hf-rgw9/GHSA-rrhg-36hf-rgw9.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rrhg-36hf-rgw9",
4-
"modified": "2026-04-01T18:36:32Z",
4+
"modified": "2026-04-07T12:31:15Z",
55
"published": "2026-03-19T15:31:21Z",
66
"aliases": [
77
"CVE-2026-27043"

advisories/unreviewed/2026/04/GHSA-8qw7-rqx6-9gqj/GHSA-8qw7-rqx6-9gqj.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8qw7-rqx6-9gqj",
4-
"modified": "2026-04-02T03:31:32Z",
4+
"modified": "2026-04-07T12:31:15Z",
55
"published": "2026-04-02T03:31:32Z",
66
"aliases": [
77
"CVE-2026-5318"
@@ -39,6 +39,10 @@
3939
"type": "WEB",
4040
"url": "https://github.com/LibRaw/LibRaw"
4141
},
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/LibRaw/LibRaw/releases/tag/0.22.1"
45+
},
4246
{
4347
"type": "WEB",
4448
"url": "https://github.com/biniamf/pocs/tree/main/libraw_lljpeg"

advisories/unreviewed/2026/04/GHSA-hfxf-x65r-328p/GHSA-hfxf-x65r-328p.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@
2525
}
2626
],
2727
"database_specific": {
28-
"cwe_ids": [],
28+
"cwe_ids": [
29+
"CWE-79"
30+
],
2931
"severity": "MODERATE",
3032
"github_reviewed": false,
3133
"github_reviewed_at": null,

advisories/unreviewed/2026/04/GHSA-jp35-q64r-j6gf/GHSA-jp35-q64r-j6gf.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jp35-q64r-j6gf",
4-
"modified": "2026-04-02T15:31:43Z",
4+
"modified": "2026-04-07T12:31:15Z",
55
"published": "2026-04-02T15:31:43Z",
66
"aliases": [
77
"CVE-2026-5342"
@@ -39,6 +39,10 @@
3939
"type": "WEB",
4040
"url": "https://github.com/LibRaw/LibRaw"
4141
},
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/LibRaw/LibRaw/releases/tag/0.22.1"
45+
},
4246
{
4347
"type": "WEB",
4448
"url": "https://github.com/biniamf/pocs/tree/main/libraw_nikonpadded"
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-mh87-c4c3-cgwf",
4+
"modified": "2026-04-07T12:31:15Z",
5+
"published": "2026-04-07T12:31:15Z",
6+
"aliases": [
7+
"CVE-2026-31842"
8+
],
9+
"details": "Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization due to a case-sensitive comparison of the Transfer-Encoding header in src/reqs.c. The is_chunked_transfer() function uses strcmp() to compare the header value against \"chunked\", even though RFC 7230 specifies that transfer-coding names are case-insensitive. By sending a request with Transfer-Encoding: Chunked, an unauthenticated remote attacker can cause Tinyproxy to misinterpret the request as having no body. In this state, Tinyproxy sets content_length.client to -1, skips pull_client_data_chunked(), forwards request headers upstream, and transitions into relay_connection() raw TCP forwarding while unread body data remains buffered. This leads to inconsistent request state between Tinyproxy and backend servers. RFC-compliant backends (e.g., Node.js, Nginx) will continue waiting for chunked body data, causing connections to hang indefinitely. This behavior enables application-level denial of service through backend worker exhaustion. Additionally, in deployments where Tinyproxy is used for request-body inspection, filtering, or security enforcement, the unread body may be forwarded without proper inspection, resulting in potential security control bypass.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31842"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/tinyproxy/tinyproxy/issues/604"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://datatracker.ietf.org/doc/html/rfc7230"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://github.com/tinyproxy/tinyproxy"
37+
}
38+
],
39+
"database_specific": {
40+
"cwe_ids": [
41+
"CWE-444"
42+
],
43+
"severity": "HIGH",
44+
"github_reviewed": false,
45+
"github_reviewed_at": null,
46+
"nvd_published_at": "2026-04-07T12:16:21Z"
47+
}
48+
}
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-w5x8-257x-9rv5",
4+
"modified": "2026-04-07T12:31:15Z",
5+
"published": "2026-04-07T12:31:15Z",
6+
"aliases": [
7+
"CVE-2026-4420"
8+
],
9+
"details": "Bludit is vulnerable to Stored Cross-Site Scripting (XSS) in its page creating functionality. An authenticated attacker with page creation privileges (such as Author, Editor, or Administrator) can embed a malicious JavaScript payload in the tags field of a newly created article. This payload will be executed when a victim visits the URL of the uploaded resource. The uploaded resource itself is accessible without authentication. Critically, this vulnerability could be used to automatically create a new site administrator if the victim has enough privileges. \n\nThe vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only versions 3.17.2 and 3.18.0 were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4420"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://cert.pl/en/posts/2026/04/CVE-2026-4420"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/bludit/bludit"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-79"
34+
],
35+
"severity": "MODERATE",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-04-07T11:16:07Z"
39+
}
40+
}

0 commit comments

Comments
 (0)