Skip to content

File tree

advisories/unreviewed/2026/02/GHSA-3v2x-94p8-whg9/GHSA-3v2x-94p8-whg9.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3v2x-94p8-whg9",
4-
"modified": "2026-02-20T18:31:27Z",
4+
"modified": "2026-03-30T09:31:28Z",
55
"published": "2026-02-19T18:31:52Z",
66
"aliases": [
77
"CVE-2026-25315"
@@ -26,6 +26,7 @@
2626
],
2727
"database_specific": {
2828
"cwe_ids": [
29+
"CWE-358",
2930
"CWE-862"
3031
],
3132
"severity": "MODERATE",
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2vwv-vqpv-v8vc",
4+
"modified": "2026-03-30T09:31:29Z",
5+
"published": "2026-03-30T09:31:29Z",
6+
"aliases": [
7+
"CVE-2026-5121"
8+
],
9+
"details": "A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5121"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/libarchive/libarchive/pull/2934"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://access.redhat.com/security/cve/CVE-2026-5121"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [],
28+
"severity": null,
29+
"github_reviewed": false,
30+
"github_reviewed_at": null,
31+
"nvd_published_at": "2026-03-30T08:16:18Z"
32+
}
33+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6vhj-8f7g-v7f7",
4+
"modified": "2026-03-30T09:31:29Z",
5+
"published": "2026-03-30T09:31:29Z",
6+
"aliases": [
7+
"CVE-2026-3945"
8+
],
9+
"details": "An integer overflow vulnerability in the HTTP chunked transfer encoding parser in tinyproxy up to and including version 1.11.3 allows an unauthenticated remote attacker to cause a denial of service (DoS). The issue occurs because chunk size values are parsed using strtol() without properly validating overflow conditions (e.g., errno == ERANGE). A crafted chunk size such as 0x7fffffffffffffff (LONG_MAX) bypasses the existing validation check (chunklen < 0), leading to a signed integer overflow during arithmetic operations (chunklen + 2). This results in incorrect size calculations, causing the proxy to attempt reading an extremely large amount of request-body data and holding worker connections open indefinitely. An attacker can exploit this behavior to exhaust all available worker slots, preventing new connections from being accepted and causing complete service unavailability. Upstream addressed this issue in commit bb7edc4; however, the latest stable release (1.11.3) remains affected at the time of publication.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3945"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/tinyproxy/tinyproxy/issues/602"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/tinyproxy/tinyproxy/pull/603"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://github.com/tinyproxy/tinyproxy/commit/969852c"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://github.com/tinyproxy/tinyproxy/commit/bb7edc4"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/tinyproxy/tinyproxy/releases"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-190"
50+
],
51+
"severity": "HIGH",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2026-03-30T08:16:17Z"
55+
}
56+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-922m-q3x3-5pf9",
4+
"modified": "2026-03-30T09:31:28Z",
5+
"published": "2026-03-30T09:31:28Z",
6+
"aliases": [
7+
"CVE-2025-3716"
8+
],
9+
"details": "User enumeration in ESET Protect (on-prem) via Response Timing.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3716"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://help.eset.com/changelogs/?product=protect&lang=en-US"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-204"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-03-30T08:16:16Z"
35+
}
36+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-h5vx-6jh5-qhq7",
4+
"modified": "2026-03-30T09:31:28Z",
5+
"published": "2026-03-30T09:31:28Z",
6+
"aliases": [
7+
"CVE-2026-25704"
8+
],
9+
"details": "A Privilege Dropping / Lowering Errors/Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in  cosmic-greeter can allow an attacker to regain privileges that should have been dropped and abuse them in the racy checking logic.\n\n\n\n\nThis issue affects cosmic-greeter before https://github.Com/pop-os/cosmic-greeter/pull/426.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25704"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2026-25704"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-271"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-03-30T08:16:16Z"
35+
}
36+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-hfg6-72xh-m6qg",
4+
"modified": "2026-03-30T09:31:28Z",
5+
"published": "2026-03-30T09:31:28Z",
6+
"aliases": [
7+
"CVE-2026-2328"
8+
],
9+
"details": "An unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, resulting in exposure of sensitive information.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2328"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://certvde.com/de/advisories/VDE-2026-010"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-790"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-03-30T08:16:17Z"
35+
}
36+
}
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-hvj3-h37v-8xmq",
4+
"modified": "2026-03-30T09:31:29Z",
5+
"published": "2026-03-30T09:31:28Z",
6+
"aliases": [
7+
"CVE-2026-4415"
8+
],
9+
"details": "Gigabyte Control Center developed by GIGABYTE has an Arbitrary File Write vulnerability. When the pairing feature is enabled, unauthenticated remote attackers can write arbitrary files to any location on the underlying operating system, leading to arbitrary code execution or privilege escalation.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4415"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.twcert.org.tw/en/cp-139-10804-689cd-2.html"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.twcert.org.tw/tw/cp-132-10803-ae014-1.html"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-23"
38+
],
39+
"severity": "CRITICAL",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2026-03-30T08:16:18Z"
43+
}
44+
}
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-j666-j6hj-fpc7",
4+
"modified": "2026-03-30T09:31:28Z",
5+
"published": "2026-03-30T09:31:28Z",
6+
"aliases": [
7+
"CVE-2026-5119"
8+
],
9+
"details": "A flaw was found in libsoup. When establishing HTTPS tunnels through a configured HTTP proxy, sensitive session cookies are transmitted in cleartext within the initial HTTP CONNECT request. A network-positioned attacker or a malicious HTTP proxy can intercept these cookies, leading to potential session hijacking or user impersonation.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5119"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://access.redhat.com/security/cve/CVE-2026-5119"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2452932"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://gitlab.gnome.org/GNOME/libsoup/-/issues/502"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-319"
38+
],
39+
"severity": "MODERATE",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2026-03-30T07:15:58Z"
43+
}
44+
}

advisories/unreviewed/2026/03/GHSA-q397-v647-xvh6/GHSA-q397-v647-xvh6.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q397-v647-xvh6",
4-
"modified": "2026-03-26T18:31:29Z",
4+
"modified": "2026-03-30T09:31:28Z",
55
"published": "2026-03-25T12:30:24Z",
66
"aliases": [
77
"CVE-2026-31788"
@@ -22,6 +22,10 @@
2222
"type": "WEB",
2323
"url": "https://git.kernel.org/stable/c/389bae9a4409934e8b8d4dbdaaf02a3ae71cf8e4"
2424
},
25+
{
26+
"type": "WEB",
27+
"url": "https://git.kernel.org/stable/c/453b8fb68f3641fea970db88b7d9a153ed2a37e8"
28+
},
2529
{
2630
"type": "WEB",
2731
"url": "https://git.kernel.org/stable/c/78432d8f0372c71c518096395537fa12be7ff24e"
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-r23q-823p-vmf7",
4+
"modified": "2026-03-30T09:31:28Z",
5+
"published": "2026-03-30T09:31:28Z",
6+
"aliases": [
7+
"CVE-2025-15379"
8+
],
9+
"details": "A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function. When deploying a model with `env_manager=LOCAL`, MLflow reads dependency specifications from the model artifact's `python_env.yaml` file and directly interpolates them into a shell command without sanitization. This allows an attacker to supply a malicious model artifact and achieve arbitrary command execution on systems that deploy the model. The vulnerability affects versions 3.8.0 and is fixed in version 3.8.2.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15379"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/mlflow/mlflow/commit/361b6f620adf98385c6721e384fb5ef9a30bb05e"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://huntr.com/bounties/dc9c1c20-7879-4050-87df-4d095fe5ca75"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-77"
34+
],
35+
"severity": "CRITICAL",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-03-30T08:16:15Z"
39+
}
40+
}

0 commit comments

Comments
 (0)