Skip to content

Commit ad777b4

Browse files
Advisory Database Sync
1 parent 5963a05 commit ad777b4

File tree

28 files changed

+768
-14
lines changed

28 files changed

+768
-14
lines changed

advisories/github-reviewed/2026/02/GHSA-2qxw-7fmx-gqfm/GHSA-2qxw-7fmx-gqfm.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2qxw-7fmx-gqfm",
4-
"modified": "2026-03-26T21:31:19Z",
4+
"modified": "2026-03-27T00:31:20Z",
55
"published": "2026-02-02T06:30:53Z",
66
"aliases": [
77
"CVE-2026-1531"
@@ -44,6 +44,10 @@
4444
"type": "WEB",
4545
"url": "https://github.com/theforeman/foreman_kubevirt/commit/6c9973ee59c6fbec65f165eb9ea9dd4ebb6eeef1"
4646
},
47+
{
48+
"type": "WEB",
49+
"url": "https://access.redhat.com/errata/RHSA-2026:5968"
50+
},
4751
{
4852
"type": "WEB",
4953
"url": "https://access.redhat.com/errata/RHSA-2026:5970"

advisories/github-reviewed/2026/02/GHSA-hfcp-477w-3wjw/GHSA-hfcp-477w-3wjw.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hfcp-477w-3wjw",
4-
"modified": "2026-03-26T21:31:19Z",
4+
"modified": "2026-03-27T00:31:20Z",
55
"published": "2026-02-27T09:30:29Z",
66
"aliases": [
77
"CVE-2026-0980"
@@ -44,6 +44,10 @@
4444
"type": "WEB",
4545
"url": "https://github.com/logicminds/rubyipmi/commit/252503a7b4dca68388165883b0322024e344a215"
4646
},
47+
{
48+
"type": "WEB",
49+
"url": "https://access.redhat.com/errata/RHSA-2026:5968"
50+
},
4751
{
4852
"type": "WEB",
4953
"url": "https://access.redhat.com/errata/RHSA-2026:5970"

advisories/github-reviewed/2026/03/GHSA-5mg7-485q-xm76/GHSA-5mg7-485q-xm76.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5mg7-485q-xm76",
4-
"modified": "2026-03-25T14:25:42Z",
4+
"modified": "2026-03-27T00:32:11Z",
55
"published": "2026-03-25T14:25:42Z",
66
"aliases": [],
77
"summary": "Two LiteLLM versions published containing credential harvesting malware",
@@ -33,6 +33,10 @@
3333
"type": "WEB",
3434
"url": "https://github.com/BerriAI/litellm/issues/24518"
3535
},
36+
{
37+
"type": "WEB",
38+
"url": "https://docs.litellm.ai/blog/security-update-march-2026"
39+
},
3640
{
3741
"type": "WEB",
3842
"url": "https://futuresearch.ai/blog/litellm-pypi-supply-chain-attack"

advisories/github-reviewed/2026/03/GHSA-fwj4-6wgp-mpxm/GHSA-fwj4-6wgp-mpxm.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fwj4-6wgp-mpxm",
4-
"modified": "2026-03-18T17:25:29Z",
4+
"modified": "2026-03-27T00:31:20Z",
55
"published": "2026-03-17T15:36:23Z",
66
"aliases": [
77
"CVE-2026-4324"
@@ -44,6 +44,14 @@
4444
"type": "WEB",
4545
"url": "https://github.com/Katello/katello/commit/a0a793b08d4f0a897ee985d79a687ad043f99e57"
4646
},
47+
{
48+
"type": "WEB",
49+
"url": "https://access.redhat.com/errata/RHSA-2026:5968"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://access.redhat.com/errata/RHSA-2026:5970"
54+
},
4755
{
4856
"type": "WEB",
4957
"url": "https://access.redhat.com/security/cve/CVE-2026-4324"

advisories/unreviewed/2025/10/GHSA-c25q-57mr-rv37/GHSA-c25q-57mr-rv37.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c25q-57mr-rv37",
4-
"modified": "2025-10-15T21:31:40Z",
4+
"modified": "2026-03-27T00:31:19Z",
55
"published": "2025-10-11T00:30:19Z",
66
"aliases": [
77
"CVE-2025-9551"
@@ -19,6 +19,14 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9551"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://d7es.tag1.com/security-advisories/protected-pages-moderately-critical-access-bypass-sa-contrib-2025-101"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://docs.herodevs.com/drupal/release-notes/protected-pages"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://www.drupal.org/sa-contrib-2025-101"
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-39fw-r4pr-87rj",
4+
"modified": "2026-03-27T00:31:21Z",
5+
"published": "2026-03-27T00:31:21Z",
6+
"aliases": [
7+
"CVE-2026-4903"
8+
],
9+
"details": "A flaw has been found in Tenda AC5 15.03.06.47. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. This manipulation of the argument PPPOEPassword causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4903"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://lavender-bicycle-a5a.notion.site/Tenda_AC5_QuickIndex_PPPOEPassword-32053a41781f808dae98f99c99bcb21c?source=copy_link"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.353654"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.353654"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.777380"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.tenda.com.cn"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-119"
50+
],
51+
"severity": "HIGH",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2026-03-26T23:16:21Z"
55+
}
56+
}
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-42p8-rv8p-8h4j",
4+
"modified": "2026-03-27T00:31:21Z",
5+
"published": "2026-03-27T00:31:21Z",
6+
"aliases": [
7+
"CVE-2026-3650"
8+
],
9+
"details": "A memory leak exists in the Grassroots DICOM library (GDCM). The bug occurs when parsing malformed DICOM files with non-standard VR types in file meta information. The vulnerability leads to vast memory allocations and resource depletion, triggering a denial-of-service condition. A maliciously crafted file can fill the heap in a single read operation without properly releasing it.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3650"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsma-26-083-01.json"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://sourceforge.net/projects/gdcm"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-26-083-01"
37+
}
38+
],
39+
"database_specific": {
40+
"cwe_ids": [
41+
"CWE-401"
42+
],
43+
"severity": "HIGH",
44+
"github_reviewed": false,
45+
"github_reviewed_at": null,
46+
"nvd_published_at": "2026-03-26T22:16:31Z"
47+
}
48+
}
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4vj5-vh2w-8g5j",
4+
"modified": "2026-03-27T00:31:21Z",
5+
"published": "2026-03-27T00:31:21Z",
6+
"aliases": [
7+
"CVE-2026-34352"
8+
],
9+
"details": "In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen contents, or cause an application crash, because of incorrect permissions.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34352"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/TigerVNC/tigervnc/commit/0b5cab169d847789efa54459a87659d3fd484393"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://groups.google.com/g/tigervnc-announce/c/anHL9WLshLI"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://sourceforge.net/projects/tigervnc/files/stable/1.16.2"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.openwall.com/lists/oss-security/2026/03/26/7"
37+
}
38+
],
39+
"database_specific": {
40+
"cwe_ids": [
41+
"CWE-732"
42+
],
43+
"severity": "HIGH",
44+
"github_reviewed": false,
45+
"github_reviewed_at": null,
46+
"nvd_published_at": "2026-03-26T23:16:20Z"
47+
}
48+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-597g-qjqv-f858",
4+
"modified": "2026-03-27T00:31:21Z",
5+
"published": "2026-03-27T00:31:21Z",
6+
"aliases": [
7+
"CVE-2026-4900"
8+
],
9+
"details": "A weakness has been identified in code-projects Online Food Ordering System 1.0. This affects an unknown part of the file /dbfood/localhost.sql. This manipulation causes files or directories accessible. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. It is advisable to modify the configuration settings.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4900"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://code-projects.org"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/ahmadmarz10-hub/CVEsMarz/blob/main/Online%20Food%20Ordering%20System%20in%20PHP%201.0%20%E2%80%93%20Sensitive%20Information%20Disclosure.md"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.353642"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.353642"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.776980"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-425"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2026-03-26T22:16:32Z"
55+
}
56+
}

advisories/unreviewed/2026/03/GHSA-688g-4qr3-6q47/GHSA-688g-4qr3-6q47.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-688g-4qr3-6q47",
4-
"modified": "2026-03-26T21:31:27Z",
4+
"modified": "2026-03-27T00:31:20Z",
55
"published": "2026-03-26T21:31:27Z",
66
"aliases": [
77
"CVE-2026-2271"
@@ -26,6 +26,10 @@
2626
{
2727
"type": "WEB",
2828
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2438429"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://gitlab.gnome.org/GNOME/gimp/-/issues/15732"
2933
}
3034
],
3135
"database_specific": {

0 commit comments

Comments
 (0)