Skip to content

Commit 583028d

Browse files
1 parent a8170f7 commit 583028d

File tree

2 files changed

+58
-8
lines changed

2 files changed

+58
-8
lines changed

advisories/unreviewed/2026/02/GHSA-9379-mwvr-7wxx/GHSA-9379-mwvr-7wxx.json renamed to advisories/github-reviewed/2026/02/GHSA-9379-mwvr-7wxx/GHSA-9379-mwvr-7wxx.json

Lines changed: 29 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,49 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9379-mwvr-7wxx",
4-
"modified": "2026-02-18T15:31:25Z",
4+
"modified": "2026-02-20T22:37:11Z",
55
"published": "2026-02-18T15:31:25Z",
66
"aliases": [
77
"CVE-2025-33245"
88
],
9+
"summary": "NVIDIA NeMo Framework contains a vulnerability where malicious data could cause remote code execution",
910
"details": "NVIDIA NeMo Framework contains a vulnerability where malicious data could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "nemo-toolkit"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "2.6.1"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33245"
2142
},
43+
{
44+
"type": "PACKAGE",
45+
"url": "https://github.com/NVIDIA-NeMo/NeMo"
46+
},
2247
{
2348
"type": "WEB",
2449
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5762"
@@ -33,8 +58,8 @@
3358
"CWE-502"
3459
],
3560
"severity": "HIGH",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2026-02-20T22:37:11Z",
3863
"nvd_published_at": "2026-02-18T14:16:03Z"
3964
}
4065
}

advisories/unreviewed/2026/02/GHSA-hvjw-vp7g-39h5/GHSA-hvjw-vp7g-39h5.json renamed to advisories/github-reviewed/2026/02/GHSA-hvjw-vp7g-39h5/GHSA-hvjw-vp7g-39h5.json

Lines changed: 29 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,49 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hvjw-vp7g-39h5",
4-
"modified": "2026-02-18T15:31:26Z",
4+
"modified": "2026-02-20T22:37:37Z",
55
"published": "2026-02-18T15:31:26Z",
66
"aliases": [
77
"CVE-2025-33253"
88
],
9+
"summary": "NVIDIA NeMo Framework Deserializes Untrusted Data",
910
"details": "NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "nemo-toolkit"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "2.6.1"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33253"
2142
},
43+
{
44+
"type": "PACKAGE",
45+
"url": "https://github.com/NVIDIA-NeMo/NeMo"
46+
},
2247
{
2348
"type": "WEB",
2449
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5762"
@@ -33,8 +58,8 @@
3358
"CWE-502"
3459
],
3560
"severity": "HIGH",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2026-02-20T22:37:17Z",
3863
"nvd_published_at": "2026-02-18T14:16:04Z"
3964
}
4065
}

0 commit comments

Comments
 (0)