Skip to content

File tree

21 files changed

+563
-7
lines changed

21 files changed

+563
-7
lines changed

advisories/unreviewed/2026/02/GHSA-5hwv-xjx8-73mr/GHSA-5hwv-xjx8-73mr.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5hwv-xjx8-73mr",
4-
"modified": "2026-02-27T09:30:29Z",
4+
"modified": "2026-03-05T03:31:24Z",
55
"published": "2026-02-27T09:30:29Z",
66
"aliases": [
77
"CVE-2026-1626"

advisories/unreviewed/2026/02/GHSA-cqcg-78xg-q885/GHSA-cqcg-78xg-q885.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cqcg-78xg-q885",
4-
"modified": "2026-02-27T09:30:29Z",
4+
"modified": "2026-03-05T03:31:24Z",
55
"published": "2026-02-27T09:30:29Z",
66
"aliases": [
77
"CVE-2026-1627"

advisories/unreviewed/2026/02/GHSA-q725-qhcv-vv5j/GHSA-q725-qhcv-vv5j.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,8 @@
3838
],
3939
"database_specific": {
4040
"cwe_ids": [
41-
"CWE-287"
41+
"CWE-287",
42+
"CWE-306"
4243
],
4344
"severity": "MODERATE",
4445
"github_reviewed": false,

advisories/unreviewed/2026/02/GHSA-rqc2-5fv7-4vrp/GHSA-rqc2-5fv7-4vrp.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,8 @@
4242
],
4343
"database_specific": {
4444
"cwe_ids": [
45-
"CWE-287"
45+
"CWE-287",
46+
"CWE-306"
4647
],
4748
"severity": "LOW",
4849
"github_reviewed": false,
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-32fg-c88m-mcrv",
4+
"modified": "2026-03-05T03:31:26Z",
5+
"published": "2026-03-05T03:31:26Z",
6+
"aliases": [
7+
"CVE-2025-40931"
8+
],
9+
"details": "Apache::Session::Generate::MD5 versions through 1.94 for Perl create insecure session id.\n\nApache::Session::Generate::MD5 generates session ids insecurely. The default session id generator returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40931"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://metacpan.org/dist/Apache-Session/source/lib/Apache/Session/Generate/MD5.pm#L27"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://security.metacpan.org/docs/guides/random-data-for-security.html"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [
28+
"CWE-338"
29+
],
30+
"severity": null,
31+
"github_reviewed": false,
32+
"github_reviewed_at": null,
33+
"nvd_published_at": "2026-03-05T02:16:39Z"
34+
}
35+
}
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3757-h85m-r4vw",
4+
"modified": "2026-03-05T03:31:26Z",
5+
"published": "2026-03-05T03:31:26Z",
6+
"aliases": [
7+
"CVE-2026-26033"
8+
],
9+
"details": "UPS Multi-UPS Management Console (MUMC) version 01.06.0001 (A03) contains an Unquoted Search Path or Element (CWE-428) vulnerability, which allows a user with write access to a directory on the system drive to execute arbitrary code with SYSTEM privileges.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26033"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://jvn.jp/en/jp/JVN56544509"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.dell.com/support/home/en-us/drivers/driversdetails?driverid=038h3"
33+
}
34+
],
35+
"database_specific": {
36+
"cwe_ids": [
37+
"CWE-428"
38+
],
39+
"severity": "HIGH",
40+
"github_reviewed": false,
41+
"github_reviewed_at": null,
42+
"nvd_published_at": "2026-03-05T03:15:54Z"
43+
}
44+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4753-7q6g-548g",
4+
"modified": "2026-03-05T03:31:26Z",
5+
"published": "2026-03-05T03:31:26Z",
6+
"aliases": [
7+
"CVE-2026-29123"
8+
],
9+
"details": "A SUID root-owned binary in /home/xd/terminal/XDTerminal in International Data Casting (IDC) SFX2100 on Linux allows a local actor to potentially preform local privilege escalation depending on conditions of the system via execution of the affected SUID binary. This can be via PATH hijacking, symlink abuse or shared object hijacking.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29123"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.abdulmhsblog.com/posts/spfx-vulnrabilities"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-269"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-03-05T02:16:51Z"
35+
}
36+
}
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4rjc-gpxw-9fr5",
4+
"modified": "2026-03-05T03:31:26Z",
5+
"published": "2026-03-05T03:31:26Z",
6+
"aliases": [
7+
"CVE-2026-3257"
8+
],
9+
"details": "UnQLite versions through 0.06 for Perl uses a potentially insecure version of the UnQLite library.\n\nUnQLite for Perl embeds the UnQLite library. Version 0.06 and earlier of the Perl module uses a version of the library from 2014 that may be vulnerable to a heap-based overflow.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3257"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://metacpan.org/release/TOKUHIROM/UnQLite-0.07/source/Changes"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://unqlite.symisc.net"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3791"
28+
}
29+
],
30+
"database_specific": {
31+
"cwe_ids": [],
32+
"severity": null,
33+
"github_reviewed": false,
34+
"github_reviewed_at": null,
35+
"nvd_published_at": "2026-03-05T02:16:52Z"
36+
}
37+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-8qw5-974f-hf78",
4+
"modified": "2026-03-05T03:31:26Z",
5+
"published": "2026-03-05T03:31:26Z",
6+
"aliases": [
7+
"CVE-2026-29124"
8+
],
9+
"details": "Multiple SUID root-owned binaries are found in /home/monitor/terminal, /home/monitor/kore-terminal, /home/monitor/IDE-DPack/terminal-dpack, and /home/monitor/IDE-DPack/terminal-dpack2 in International Data Casting (IDC) SFX2100 Satellite Receiver, which may lead to local privlidge escalation from the `monitor` user to root",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29124"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.abdulmhsblog.com/posts/spfx-vulnrabilities"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-269"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-03-05T02:16:51Z"
35+
}
36+
}
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-98r5-r223-6xwf",
4+
"modified": "2026-03-05T03:31:26Z",
5+
"published": "2026-03-05T03:31:26Z",
6+
"aliases": [
7+
"CVE-2024-57854"
8+
],
9+
"details": "Net::NSCA::Client versions through 0.009002 for Perl uses a poor random number generator.\n\nVersion v0.003 switched to use Data::Rand::Obscure instead of Crypt::Random for generation of a random initialisation vectors.\n\nData::Rand::Obscure uses Perl's built-in rand() function, which is not suitable for cryptographic functions.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57854"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://metacpan.org/release/DOUGDUDE/Net-NSCA-Client-0.009002/source/lib/Net/NSCA/Client/InitialPacket.pm#L119"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://patch-diff.githubusercontent.com/raw/dougwilson/perl5-net-nsca-client/pull/2.patch"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [
28+
"CWE-338"
29+
],
30+
"severity": null,
31+
"github_reviewed": false,
32+
"github_reviewed_at": null,
33+
"nvd_published_at": "2026-03-05T03:15:53Z"
34+
}
35+
}

0 commit comments

Comments
 (0)