Skip to content

Commit d142b53

Browse files
Advisory Database Sync
1 parent 8022ffb commit d142b53

25 files changed

Lines changed: 164 additions & 51 deletions

File tree

advisories/github-reviewed/2021/07/GHSA-jxhc-q857-3j6g/GHSA-jxhc-q857-3j6g.json

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jxhc-q857-3j6g",
4-
"modified": "2021-08-30T22:21:20Z",
4+
"modified": "2026-04-06T23:12:46Z",
55
"published": "2021-07-12T16:58:33Z",
66
"aliases": [
77
"CVE-2021-32740"
88
],
99
"summary": "Regular Expression Denial of Service in Addressable templates",
10-
"details": "### Impact\n\nWithin the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected.\n\n### Patches\n\nThe vulnerability was introduced in version 2.3.0 (previously yanked) and has been present in all subsequent versions up to, and including, 2.7.0. It is fixed in version 2.8.0.\n\n### Workarounds\n\nThe vulnerability can be avoided by only creating Template objects from trusted sources that have been validated not to produce catastrophic backtracking.\n\n### References\n\n- https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS\n- https://cwe.mitre.org/data/definitions/1333.html\n- https://www.regular-expressions.info/catastrophic.html\n\n### For more information\nIf you have any questions or comments about this advisory:\n* [Open an issue](https://github.com/sporkmonger/addressable/issues)\n",
10+
"details": "### Impact\n\nWithin the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected.\n\n### Patches\n\nThe vulnerability was introduced in version 2.3.0 (previously yanked) and has been present in all subsequent versions up to, and including, 2.7.0. It is fixed in version 2.8.0.\n\n### Workarounds\n\nThe vulnerability can be avoided by only creating Template objects from trusted sources that have been validated not to produce catastrophic backtracking.\n\n### References\n\n- https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS\n- https://cwe.mitre.org/data/definitions/1333.html\n- https://www.regular-expressions.info/catastrophic.html\n\n### For more information\nIf you have any questions or comments about this advisory:\n* [Open an issue](https://github.com/sporkmonger/addressable/issues)",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
@@ -82,6 +82,7 @@
8282
],
8383
"database_specific": {
8484
"cwe_ids": [
85+
"CWE-1333",
8586
"CWE-400"
8687
],
8788
"severity": "HIGH",

advisories/github-reviewed/2026/03/GHSA-f8xp-wvcx-p6f4/GHSA-f8xp-wvcx-p6f4.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f8xp-wvcx-p6f4",
4-
"modified": "2026-03-31T22:31:54Z",
4+
"modified": "2026-04-06T23:09:44Z",
55
"published": "2026-03-31T22:31:54Z",
66
"aliases": [
77
"CVE-2026-25726"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/cloudreve/cloudreve/security/advisories/GHSA-f8xp-wvcx-p6f4"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25726"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/cloudreve/cloudreve"
@@ -56,6 +60,6 @@
5660
"severity": "HIGH",
5761
"github_reviewed": true,
5862
"github_reviewed_at": "2026-03-31T22:31:54Z",
59-
"nvd_published_at": null
63+
"nvd_published_at": "2026-04-03T20:16:02Z"
6064
}
6165
}

advisories/github-reviewed/2026/03/GHSA-hqmj-h5c6-369m/GHSA-hqmj-h5c6-369m.json

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hqmj-h5c6-369m",
4-
"modified": "2026-03-25T18:51:54Z",
4+
"modified": "2026-04-06T23:11:55Z",
55
"published": "2026-03-16T16:23:28Z",
66
"aliases": [
77
"CVE-2026-28500"
88
],
99
"summary": "ONNX Untrusted Model Repository Warnings Suppressed by silent=True in onnx.hub.load() — Silent Supply-Chain Attack",
10-
"details": "## What's the issue\nPassing `silent=True` to `onnx.hub.load()` kills all trust warnings and user prompts. This means a model can be downloaded from any unverified GitHub repo with zero user awareness.\n \n```python\nif not _verify_repo_ref(repo) and not silent:\n # completely skipped when silent=True\n print(\"The model repo... is not trusted\")\n if input().lower() != \"y\":\n return None\n```\n \nOn top of that, the SHA256 integrity check is useless here — it validates against a manifest that lives in the same repo the attacker controls, so the hash will always match.\n\n \n## Impact\nAny pipeline using `hub.load()` with `silent=True` and an external repo string is silently loading whatever the repo owner ships. If that model executes arbitrary code on load, the attacker has access to the machine.\n \n## Resolved by removing the feature",
10+
"details": "## What's the issue\nPassing `silent=True` to `onnx.hub.load()` kills all trust warnings and user prompts. This means a model can be downloaded from any unverified GitHub repo with zero user awareness.\n \n```python\nif not _verify_repo_ref(repo) and not silent:\n # completely skipped when silent=True\n print(\"The model repo... is not trusted\")\n if input().lower() != \"y\":\n return None\n```\n \nOn top of that, the SHA256 integrity check is useless here — it validates against a manifest that lives in the same repo the attacker controls, so the hash will always match.\n\n \n## Impact\nAny pipeline using `hub.load()` with `silent=True` and an external repo string is silently loading whatever the repo owner ships. If that model executes arbitrary code on load, the attacker has access to the machine.\n \n## Resolved by removing the feature \n## References\n \n- [Write-up](https://github.com/ZeroXJacks/CVEs/blob/main/2026/CVE-2026-28500.md)",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
@@ -28,11 +28,14 @@
2828
"introduced": "0"
2929
},
3030
{
31-
"last_affected": "1.20.1"
31+
"fixed": "1.21.0"
3232
}
3333
]
3434
}
35-
]
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 1.20.1"
38+
}
3639
}
3740
],
3841
"references": [

advisories/github-reviewed/2026/04/GHSA-3c8v-cfp5-9885/GHSA-3c8v-cfp5-9885.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3c8v-cfp5-9885",
4-
"modified": "2026-04-03T02:43:59Z",
4+
"modified": "2026-04-06T23:11:04Z",
55
"published": "2026-04-03T02:43:59Z",
66
"aliases": [
77
"CVE-2026-34776"
@@ -97,6 +97,10 @@
9797
"type": "WEB",
9898
"url": "https://github.com/electron/electron/security/advisories/GHSA-3c8v-cfp5-9885"
9999
},
100+
{
101+
"type": "ADVISORY",
102+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34776"
103+
},
100104
{
101105
"type": "PACKAGE",
102106
"url": "https://github.com/electron/electron"
@@ -109,6 +113,6 @@
109113
"severity": "MODERATE",
110114
"github_reviewed": true,
111115
"github_reviewed_at": "2026-04-03T02:43:59Z",
112-
"nvd_published_at": null
116+
"nvd_published_at": "2026-04-04T00:16:18Z"
113117
}
114118
}

advisories/github-reviewed/2026/04/GHSA-3jr7-6hqp-x679/GHSA-3jr7-6hqp-x679.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3jr7-6hqp-x679",
4-
"modified": "2026-04-03T21:54:36Z",
4+
"modified": "2026-04-06T23:11:36Z",
55
"published": "2026-04-03T21:54:36Z",
66
"aliases": [
77
"CVE-2026-34824"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/mesop-dev/mesop/security/advisories/GHSA-3jr7-6hqp-x679"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34824"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/mesop-dev/mesop/commit/760a2079b5c609038c826d24dfbcf9b0be98d987"
@@ -55,11 +59,12 @@
5559
],
5660
"database_specific": {
5761
"cwe_ids": [
62+
"CWE-125",
5863
"CWE-400"
5964
],
6065
"severity": "HIGH",
6166
"github_reviewed": true,
6267
"github_reviewed_at": "2026-04-03T21:54:36Z",
63-
"nvd_published_at": null
68+
"nvd_published_at": "2026-04-03T23:17:05Z"
6469
}
6570
}

advisories/github-reviewed/2026/04/GHSA-3vff-hjqv-m7h8/GHSA-3vff-hjqv-m7h8.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3vff-hjqv-m7h8",
4-
"modified": "2026-04-03T21:36:07Z",
4+
"modified": "2026-04-06T23:09:55Z",
55
"published": "2026-04-03T21:36:07Z",
66
"aliases": [
77
"CVE-2026-33709"
@@ -43,9 +43,17 @@
4343
"type": "WEB",
4444
"url": "https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-3vff-hjqv-m7h8"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33709"
49+
},
4650
{
4751
"type": "PACKAGE",
4852
"url": "https://github.com/jupyterhub/jupyterhub"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://github.com/jupyterhub/jupyterhub/releases/tag/5.4.4"
4957
}
5058
],
5159
"database_specific": {
@@ -55,6 +63,6 @@
5563
"severity": "MODERATE",
5664
"github_reviewed": true,
5765
"github_reviewed_at": "2026-04-03T21:36:07Z",
58-
"nvd_published_at": null
66+
"nvd_published_at": "2026-04-03T22:16:26Z"
5967
}
6068
}

advisories/github-reviewed/2026/04/GHSA-4p4r-m79c-wq3v/GHSA-4p4r-m79c-wq3v.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4p4r-m79c-wq3v",
4-
"modified": "2026-04-03T02:37:24Z",
4+
"modified": "2026-04-06T23:10:30Z",
55
"published": "2026-04-03T02:37:24Z",
66
"aliases": [
77
"CVE-2026-34767"
@@ -97,6 +97,10 @@
9797
"type": "WEB",
9898
"url": "https://github.com/electron/electron/security/advisories/GHSA-4p4r-m79c-wq3v"
9999
},
100+
{
101+
"type": "ADVISORY",
102+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34767"
103+
},
100104
{
101105
"type": "PACKAGE",
102106
"url": "https://github.com/electron/electron"
@@ -110,6 +114,6 @@
110114
"severity": "MODERATE",
111115
"github_reviewed": true,
112116
"github_reviewed_at": "2026-04-03T02:37:24Z",
113-
"nvd_published_at": null
117+
"nvd_published_at": "2026-04-04T00:16:17Z"
114118
}
115119
}

advisories/github-reviewed/2026/04/GHSA-532v-xpq5-8h95/GHSA-532v-xpq5-8h95.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-532v-xpq5-8h95",
4-
"modified": "2026-04-03T02:42:27Z",
4+
"modified": "2026-04-06T23:10:55Z",
55
"published": "2026-04-03T02:42:27Z",
66
"aliases": [
77
"CVE-2026-34774"
@@ -78,6 +78,10 @@
7878
"type": "WEB",
7979
"url": "https://github.com/electron/electron/security/advisories/GHSA-532v-xpq5-8h95"
8080
},
81+
{
82+
"type": "ADVISORY",
83+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34774"
84+
},
8185
{
8286
"type": "PACKAGE",
8387
"url": "https://github.com/electron/electron"
@@ -90,6 +94,6 @@
9094
"severity": "HIGH",
9195
"github_reviewed": true,
9296
"github_reviewed_at": "2026-04-03T02:42:27Z",
93-
"nvd_published_at": null
97+
"nvd_published_at": "2026-04-04T00:16:18Z"
9498
}
9599
}

advisories/github-reviewed/2026/04/GHSA-5rqw-r77c-jp79/GHSA-5rqw-r77c-jp79.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5rqw-r77c-jp79",
4-
"modified": "2026-04-03T02:46:16Z",
4+
"modified": "2026-04-06T23:11:15Z",
55
"published": "2026-04-03T02:46:16Z",
66
"aliases": [
77
"CVE-2026-34779"
@@ -97,6 +97,10 @@
9797
"type": "WEB",
9898
"url": "https://github.com/electron/electron/security/advisories/GHSA-5rqw-r77c-jp79"
9999
},
100+
{
101+
"type": "ADVISORY",
102+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34779"
103+
},
100104
{
101105
"type": "PACKAGE",
102106
"url": "https://github.com/electron/electron"
@@ -109,6 +113,6 @@
109113
"severity": "MODERATE",
110114
"github_reviewed": true,
111115
"github_reviewed_at": "2026-04-03T02:46:16Z",
112-
"nvd_published_at": null
116+
"nvd_published_at": "2026-04-04T00:16:19Z"
113117
}
114118
}

advisories/github-reviewed/2026/04/GHSA-63hf-3vf5-4wqf/GHSA-63hf-3vf5-4wqf.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-63hf-3vf5-4wqf",
4-
"modified": "2026-04-01T21:49:06Z",
4+
"modified": "2026-04-06T23:12:09Z",
55
"published": "2026-04-01T21:49:06Z",
66
"aliases": [
77
"CVE-2026-34520"
88
],
99
"summary": "AIOHTTP's C parser (llhttp) accepts null bytes and control characters in response header values - header injection/security bypass",
1010
"details": "### Summary\n\nThe C parser (the default for most installs) accepted null bytes and control characters is response headers.\n\n### Impact\n\nAn attacker could send header values that are interpreted differently than expected due to the presence of control characters. For example, `request.url.origin()` may return a different value than the raw Host header, or what a reverse proxy interpreted it as., potentially resulting in some kind of security bypass.\n\n-----\n\nPatch: https://github.com/aio-libs/aiohttp/commit/9370b9714a7a56003cacd31a9b4ae16eab109ba4",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U"

0 commit comments

Comments
 (0)