Skip to content

Commit 22257ce

Browse files
Advisory Database Sync
1 parent 3c70e89 commit 22257ce

File tree

58 files changed

+1320
-91
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

58 files changed

+1320
-91
lines changed

advisories/github-reviewed/2026/04/GHSA-q8h3-jv9v-57qx/GHSA-q8h3-jv9v-57qx.json

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q8h3-jv9v-57qx",
4-
"modified": "2026-04-14T23:31:38Z",
4+
"modified": "2026-04-16T15:32:16Z",
55
"published": "2026-04-14T23:31:38Z",
66
"aliases": [],
77
"summary": "ImageMagick has has an off-by-one origin validation in allows out-of-bounds read in morphology processing",
@@ -26,7 +26,7 @@
2626
"introduced": "0"
2727
},
2828
{
29-
"fixed": "14.20.0"
29+
"fixed": "14.12.0"
3030
}
3131
]
3232
}
@@ -45,7 +45,7 @@
4545
"introduced": "0"
4646
},
4747
{
48-
"fixed": "14.20.0"
48+
"fixed": "14.12.0"
4949
}
5050
]
5151
}
@@ -64,7 +64,7 @@
6464
"introduced": "0"
6565
},
6666
{
67-
"fixed": "14.20.0"
67+
"fixed": "14.12.0"
6868
}
6969
]
7070
}
@@ -83,7 +83,7 @@
8383
"introduced": "0"
8484
},
8585
{
86-
"fixed": "14.20.0"
86+
"fixed": "14.12.0"
8787
}
8888
]
8989
}
@@ -102,7 +102,7 @@
102102
"introduced": "0"
103103
},
104104
{
105-
"fixed": "14.20.0"
105+
"fixed": "14.12.0"
106106
}
107107
]
108108
}
@@ -121,7 +121,7 @@
121121
"introduced": "0"
122122
},
123123
{
124-
"fixed": "14.20.0"
124+
"fixed": "14.12.0"
125125
}
126126
]
127127
}
@@ -140,7 +140,7 @@
140140
"introduced": "0"
141141
},
142142
{
143-
"fixed": "14.20.0"
143+
"fixed": "14.12.0"
144144
}
145145
]
146146
}
@@ -159,7 +159,7 @@
159159
"introduced": "0"
160160
},
161161
{
162-
"fixed": "14.20.0"
162+
"fixed": "14.12.0"
163163
}
164164
]
165165
}
@@ -178,7 +178,7 @@
178178
"introduced": "0"
179179
},
180180
{
181-
"fixed": "14.20.0"
181+
"fixed": "14.12.0"
182182
}
183183
]
184184
}
@@ -197,7 +197,7 @@
197197
"introduced": "0"
198198
},
199199
{
200-
"fixed": "14.20.0"
200+
"fixed": "14.12.0"
201201
}
202202
]
203203
}
@@ -216,7 +216,7 @@
216216
"introduced": "0"
217217
},
218218
{
219-
"fixed": "14.20.0"
219+
"fixed": "14.12.0"
220220
}
221221
]
222222
}
@@ -235,7 +235,7 @@
235235
"introduced": "0"
236236
},
237237
{
238-
"fixed": "14.20.0"
238+
"fixed": "14.12.0"
239239
}
240240
]
241241
}
@@ -254,7 +254,7 @@
254254
"introduced": "0"
255255
},
256256
{
257-
"fixed": "14.20.0"
257+
"fixed": "14.12.0"
258258
}
259259
]
260260
}
@@ -273,7 +273,7 @@
273273
"introduced": "0"
274274
},
275275
{
276-
"fixed": "14.20.0"
276+
"fixed": "14.12.0"
277277
}
278278
]
279279
}
@@ -292,7 +292,7 @@
292292
"introduced": "0"
293293
},
294294
{
295-
"fixed": "14.20.0"
295+
"fixed": "14.12.0"
296296
}
297297
]
298298
}
@@ -311,7 +311,7 @@
311311
"introduced": "0"
312312
},
313313
{
314-
"fixed": "14.20.0"
314+
"fixed": "14.12.0"
315315
}
316316
]
317317
}
@@ -330,7 +330,7 @@
330330
"introduced": "0"
331331
},
332332
{
333-
"fixed": "14.20.0"
333+
"fixed": "14.12.0"
334334
}
335335
]
336336
}
@@ -349,7 +349,7 @@
349349
"introduced": "0"
350350
},
351351
{
352-
"fixed": "14.20.0"
352+
"fixed": "14.12.0"
353353
}
354354
]
355355
}

advisories/unreviewed/2022/05/GHSA-hr98-frg6-wvvr/GHSA-hr98-frg6-wvvr.json

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hr98-frg6-wvvr",
4-
"modified": "2023-03-29T21:30:22Z",
4+
"modified": "2026-04-16T15:31:26Z",
55
"published": "2022-05-24T22:00:36Z",
66
"aliases": [
77
"CVE-2019-5481"
@@ -23,6 +23,18 @@
2323
"type": "WEB",
2424
"url": "https://curl.haxx.se/docs/CVE-2019-5481.html"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT"
37+
},
2638
{
2739
"type": "WEB",
2840
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC"

advisories/unreviewed/2022/05/GHSA-mh8f-5gw2-5wgh/GHSA-mh8f-5gw2-5wgh.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mh8f-5gw2-5wgh",
4-
"modified": "2022-05-24T17:27:38Z",
4+
"modified": "2026-04-16T15:31:26Z",
55
"published": "2022-05-24T17:27:38Z",
66
"aliases": [
77
"CVE-2020-1968"

advisories/unreviewed/2025/11/GHSA-g7mr-vm94-3rv7/GHSA-g7mr-vm94-3rv7.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g7mr-vm94-3rv7",
4-
"modified": "2026-04-16T12:31:39Z",
4+
"modified": "2026-04-16T15:31:26Z",
55
"published": "2025-11-18T21:32:31Z",
66
"aliases": [
77
"CVE-2025-61662"
@@ -35,6 +35,10 @@
3535
"type": "WEB",
3636
"url": "https://access.redhat.com/errata/RHSA-2026:7243"
3737
},
38+
{
39+
"type": "WEB",
40+
"url": "https://access.redhat.com/errata/RHSA-2026:7239"
41+
},
3842
{
3943
"type": "WEB",
4044
"url": "https://access.redhat.com/errata/RHSA-2026:6492"

advisories/unreviewed/2026/03/GHSA-c75f-55f6-f63q/GHSA-c75f-55f6-f63q.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c75f-55f6-f63q",
4-
"modified": "2026-03-19T15:31:22Z",
4+
"modified": "2026-04-16T15:31:27Z",
55
"published": "2026-03-19T15:31:21Z",
66
"aliases": [
77
"CVE-2026-4424"
@@ -23,6 +23,10 @@
2323
"type": "WEB",
2424
"url": "https://github.com/libarchive/libarchive/pull/2898"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://access.redhat.com/errata/RHSA-2026:8492"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://access.redhat.com/security/cve/CVE-2026-4424"

advisories/unreviewed/2026/03/GHSA-rm92-fj5q-mpj5/GHSA-rm92-fj5q-mpj5.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rm92-fj5q-mpj5",
4-
"modified": "2026-04-07T18:31:30Z",
4+
"modified": "2026-04-16T15:31:27Z",
55
"published": "2026-03-20T15:31:14Z",
66
"aliases": [
77
"CVE-2026-4519"
88
],
99
"details": "The webbrowser.open() API would accept leading dashes in the URL which \ncould be handled as command line options for certain web browsers. New \nbehavior rejects leading dashes. Users are recommended to sanitize URLs \nprior to passing to webbrowser.open().",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

advisories/unreviewed/2026/03/GHSA-wx98-99rr-664q/GHSA-wx98-99rr-664q.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,8 @@
3434
],
3535
"database_specific": {
3636
"cwe_ids": [
37-
"CWE-306"
37+
"CWE-306",
38+
"CWE-434"
3839
],
3940
"severity": "CRITICAL",
4041
"github_reviewed": false,

advisories/unreviewed/2026/03/GHSA-xrqh-48jh-pjv2/GHSA-xrqh-48jh-pjv2.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xrqh-48jh-pjv2",
4-
"modified": "2026-04-09T21:31:25Z",
4+
"modified": "2026-04-16T15:31:26Z",
55
"published": "2026-03-13T21:31:51Z",
66
"aliases": [
77
"CVE-2026-4111"
@@ -47,6 +47,10 @@
4747
"type": "WEB",
4848
"url": "https://access.redhat.com/errata/RHSA-2026:7106"
4949
},
50+
{
51+
"type": "WEB",
52+
"url": "https://access.redhat.com/errata/RHSA-2026:7239"
53+
},
5054
{
5155
"type": "WEB",
5256
"url": "https://access.redhat.com/errata/RHSA-2026:7329"
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-23m2-3g75-jvc8",
4+
"modified": "2026-04-16T15:31:32Z",
5+
"published": "2026-04-16T15:31:32Z",
6+
"aliases": [
7+
"CVE-2026-4160"
8+
],
9+
"details": "The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress is vulnerable to Insecure Direct Object Reference via the 'submission_id' parameter in versions up to, and including, 6.1.21. This is due to missing authorization and ownership validation on a user controlled key in the Stripe SCA confirmation AJAX endpoint. This makes it possible for unauthenticated attackers to modify payment status of targeted pending submissions (for example, setting the status to \"failed\").",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4160"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://plugins.trac.wordpress.org/changeset/3496638/fluentform"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/154fc656-3a33-4783-a941-10bb848244b3?source=cve"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-639"
34+
],
35+
"severity": "MODERATE",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-04-16T14:16:18Z"
39+
}
40+
}
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-263f-2q4p-95qq",
4+
"modified": "2026-04-16T15:31:32Z",
5+
"published": "2026-04-16T15:31:32Z",
6+
"aliases": [
7+
"CVE-2026-37339"
8+
],
9+
"details": "SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Injection in the file /music/view_genre.php.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-37339"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/mt-0505/cve-report/blob/main/sourcecodester/simple-music-cloud-community-system/SQL-3.md"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [],
24+
"severity": null,
25+
"github_reviewed": false,
26+
"github_reviewed_at": null,
27+
"nvd_published_at": "2026-04-16T15:17:36Z"
28+
}
29+
}

0 commit comments

Comments
 (0)