Skip to content

Commit de5e1b3

Browse files
Advisory Database Sync
1 parent 1435a07 commit de5e1b3

36 files changed

Lines changed: 291 additions & 112 deletions

File tree

advisories/github-reviewed/2021/06/GHSA-5gjg-jgh4-gppm/GHSA-5gjg-jgh4-gppm.json

Lines changed: 18 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,19 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5gjg-jgh4-gppm",
4-
"modified": "2021-10-05T16:37:09Z",
4+
"modified": "2026-01-23T22:35:54Z",
55
"published": "2021-06-23T17:26:30Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2021-4236"
8+
],
79
"summary": "Websocket requests did not call AuthenticateMethod",
810
"details": "### Impact\n\nDepending on implementation, a denial-of-service or privilege escalation vulnerability may occur in software that uses the `github.com/ecnepsnai/web` package with Web Sockets that have an AuthenticateMethod.\n\nThe `AuthenticateMethod` is not called, and `UserData` will be nil in request methods. Attempts to read the `UserData` may result in a panic.\n\nThis issue only affects web sockets where an `AuthenticateMethod` is supplied to the handle options. Users who do not use web sockets, or users who do not require authentication are not at risk.\n\n#### Example\n\nIn the example below, one would expect that the `AuthenticateMethod` function would be called for each request to `/example`\n\n```go\nhandleOptions := web.HandleOptions{\n\tAuthenticateMethod: func(request *http.Request) interface{} {\n\t\t// Assume there is logic here to check for an active sessions, look at cookies or headers, etc...\n\t\tvar session Session{} // Example\n\n\t\treturn session\n\t},\n}\n\nserver.Socket(\"/example\", handle, handleOptions)\n```\n\nHowever, the method is not called, and therefor the `UserData` parameter of the request object in the handle will be nil, when it would have been expected to be the `session` object we returned.\n\n### Patches\n\nRelease v1.5.2 fixes this vulnerability. The authenticate method is now called for websocket requests.\n\nAll users of the web package should update to v1.5.2 or later.\n\n### Workarounds\n\nYou may work around this issue by making the authenticate method a named function, then calling that function at the start of the handle method for the websocket. Reject connections when the return value of the method is nil.",
9-
"severity": [],
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
15+
}
16+
],
1017
"affected": [
1118
{
1219
"package": {
@@ -33,6 +40,10 @@
3340
"type": "WEB",
3441
"url": "https://github.com/ecnepsnai/web/security/advisories/GHSA-5gjg-jgh4-gppm"
3542
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4236"
46+
},
3647
{
3748
"type": "WEB",
3849
"url": "https://github.com/ecnepsnai/web/commit/5a78f8d5c41ce60dcf9f61aaf47a7a8dc3e0002f"
@@ -48,9 +59,11 @@
4859
],
4960
"database_specific": {
5061
"cwe_ids": [
51-
"CWE-304"
62+
"CWE-304",
63+
"CWE-400",
64+
"CWE-476"
5265
],
53-
"severity": "MODERATE",
66+
"severity": "CRITICAL",
5467
"github_reviewed": true,
5568
"github_reviewed_at": "2021-05-21T17:41:20Z",
5669
"nvd_published_at": null

advisories/github-reviewed/2022/12/GHSA-jpgg-cp2x-qrw3/GHSA-jpgg-cp2x-qrw3.json

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jpgg-cp2x-qrw3",
4-
"modified": "2023-08-29T18:58:37Z",
4+
"modified": "2026-01-23T22:35:48Z",
55
"published": "2022-12-28T00:30:23Z",
6-
"aliases": [
7-
"CVE-2021-4236"
8-
],
9-
"summary": "ecnepsnai/web vulnerable to Uncontrolled Resource Consumption",
10-
"details": "Web Sockets do not execute any AuthenticateMethod methods which may be set, leading to a nil pointer dereference if the returned UserData pointer is assumed to be non-nil, or authentication bypass. This issue only affects WebSockets with an AuthenticateMethod hook. Request handlers that do not explicitly use WebSockets are not vulnerable.",
6+
"withdrawn": "2026-01-23T22:35:48Z",
7+
"aliases": [],
8+
"summary": "Duplicate Advisory: ecnepsnai/web vulnerable to Uncontrolled Resource Consumption",
9+
"details": "## Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-5gjg-jgh4-gppm. This link is maintained to preserve external references.\n\n## Original Description\nWeb Sockets do not execute any AuthenticateMethod methods which may be set, leading to a nil pointer dereference if the returned UserData pointer is assumed to be non-nil, or authentication bypass. This issue only affects WebSockets with an AuthenticateMethod hook. Request handlers that do not explicitly use WebSockets are not vulnerable.",
1110
"severity": [
1211
{
1312
"type": "CVSS_V3",

advisories/github-reviewed/2024/02/GHSA-w277-wpqf-rcfv/GHSA-w277-wpqf-rcfv.json

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-w277-wpqf-rcfv",
4-
"modified": "2024-02-06T20:30:14Z",
4+
"modified": "2026-01-23T22:35:18Z",
55
"published": "2024-02-06T20:30:14Z",
6+
"withdrawn": "2026-01-23T22:35:18Z",
67
"aliases": [],
7-
"summary": "Svix vulnerable to improper comparison of different-length signatures",
8-
"details": "The `Webhook::verify` function incorrectly compared signatures of different lengths - the two signatures would only be compared up to the length of the shorter signature. This allowed an attacker to pass in `v1,` as the signature, which would always pass verification.\n",
8+
"summary": "Duplicate Advisory: Svix vulnerable to improper comparison of different-length signatures",
9+
"details": "## Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-747x-5m58-mq97. This link is maintained to preserve external references.\n\n## Original Description\nThe `Webhook::verify` function incorrectly compared signatures of different lengths - the two signatures would only be compared up to the length of the shorter signature. This allowed an attacker to pass in `v1,` as the signature, which would always pass verification.",
910
"severity": [],
1011
"affected": [
1112
{

advisories/unreviewed/2026/01/GHSA-43fm-9f2q-hw2w/GHSA-43fm-9f2q-hw2w.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-43fm-9f2q-hw2w",
4-
"modified": "2026-01-22T18:30:38Z",
4+
"modified": "2026-01-23T22:35:51Z",
55
"published": "2026-01-22T18:30:38Z",
66
"aliases": [
77
"CVE-2025-69098"
88
],
99
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpWave Hide My WP hide_my_wp allows Reflected XSS.This issue affects Hide My WP: from n/a through <= 6.2.12.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-79"
2530
],
26-
"severity": null,
31+
"severity": "MODERATE",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-01-22T17:16:22Z"

advisories/unreviewed/2026/01/GHSA-53j3-cfjv-xfqj/GHSA-53j3-cfjv-xfqj.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-53j3-cfjv-xfqj",
4-
"modified": "2026-01-23T15:31:36Z",
4+
"modified": "2026-01-23T22:35:51Z",
55
"published": "2026-01-23T15:31:36Z",
66
"aliases": [
77
"CVE-2026-24558"
88
],
99
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in antoniobg ABG Rich Pins abg-rich-pins allows Stored XSS.This issue affects ABG Rich Pins: from n/a through <= 1.1.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-79"
2530
],
26-
"severity": null,
31+
"severity": "MODERATE",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-01-23T15:16:13Z"

advisories/unreviewed/2026/01/GHSA-5vv6-8wrr-wj6p/GHSA-5vv6-8wrr-wj6p.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5vv6-8wrr-wj6p",
4-
"modified": "2026-01-23T15:31:34Z",
4+
"modified": "2026-01-23T22:35:51Z",
55
"published": "2026-01-23T15:31:34Z",
66
"aliases": [
77
"CVE-2025-69907"
88
],
99
"details": "An unauthenticated information disclosure vulnerability exists in Newgen OmniDocs due to missing authentication and access control on the /omnidocs/GetListofCabinet API endpoint. A remote attacker can access this endpoint without valid credentials to retrieve sensitive internal configuration information, including cabinet names and database-related metadata. This allows unauthorized enumeration of backend deployment details and may facilitate further targeted attacks.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -24,8 +29,10 @@
2429
}
2530
],
2631
"database_specific": {
27-
"cwe_ids": [],
28-
"severity": null,
32+
"cwe_ids": [
33+
"CWE-284"
34+
],
35+
"severity": "HIGH",
2936
"github_reviewed": false,
3037
"github_reviewed_at": null,
3138
"nvd_published_at": "2026-01-23T15:16:05Z"

advisories/unreviewed/2026/01/GHSA-63vr-ppcf-2wwm/GHSA-63vr-ppcf-2wwm.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-63vr-ppcf-2wwm",
4-
"modified": "2026-01-23T15:31:38Z",
4+
"modified": "2026-01-23T22:35:51Z",
55
"published": "2026-01-23T15:31:38Z",
66
"aliases": [
77
"CVE-2026-24614"
88
],
99
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Devsbrain Flex QR Code Generator flex-qr-code-generator allows DOM-Based XSS.This issue affects Flex QR Code Generator: from n/a through <= 1.2.8.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-79"
2530
],
26-
"severity": null,
31+
"severity": "MODERATE",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-01-23T15:16:20Z"

advisories/unreviewed/2026/01/GHSA-762j-cc79-q852/GHSA-762j-cc79-q852.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-762j-cc79-q852",
4-
"modified": "2026-01-23T15:31:38Z",
4+
"modified": "2026-01-23T22:35:52Z",
55
"published": "2026-01-23T15:31:38Z",
66
"aliases": [
77
"CVE-2026-24626"
88
],
99
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LogicHunt Logo Slider logo-slider-wp allows Stored XSS.This issue affects Logo Slider: from n/a through <= 4.9.0.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-79"
2530
],
26-
"severity": null,
31+
"severity": "MODERATE",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-01-23T15:16:21Z"

advisories/unreviewed/2026/01/GHSA-7q2p-45vm-px3w/GHSA-7q2p-45vm-px3w.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7q2p-45vm-px3w",
4-
"modified": "2026-01-23T15:31:38Z",
4+
"modified": "2026-01-23T22:35:53Z",
55
"published": "2026-01-23T15:31:38Z",
66
"aliases": [
77
"CVE-2026-24632"
88
],
99
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jagdish1o1 Delay Redirects delay-redirects allows DOM-Based XSS.This issue affects Delay Redirects: from n/a through <= 1.0.0.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-79"
2530
],
26-
"severity": null,
31+
"severity": "MODERATE",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-01-23T15:16:22Z"

advisories/unreviewed/2026/01/GHSA-7x7r-hcqj-v9hx/GHSA-7x7r-hcqj-v9hx.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7x7r-hcqj-v9hx",
4-
"modified": "2026-01-23T15:31:38Z",
4+
"modified": "2026-01-23T22:35:52Z",
55
"published": "2026-01-23T15:31:38Z",
66
"aliases": [
77
"CVE-2026-24629"
88
],
99
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ability, Inc Web Accessibility with Max Access accessibility-toolbar allows Stored XSS.This issue affects Web Accessibility with Max Access: from n/a through <= 2.1.0.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-79"
2530
],
26-
"severity": null,
31+
"severity": "MODERATE",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-01-23T15:16:22Z"

0 commit comments

Comments
 (0)