Skip to content

Commit 95b7dd4

Browse files
Advisory Database Sync
1 parent 7b5a57b commit 95b7dd4

26 files changed

Lines changed: 396 additions & 48 deletions

File tree

advisories/unreviewed/2026/03/GHSA-2vwv-vqpv-v8vc/GHSA-2vwv-vqpv-v8vc.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2vwv-vqpv-v8vc",
4-
"modified": "2026-04-14T18:30:26Z",
4+
"modified": "2026-04-16T18:31:15Z",
55
"published": "2026-03-30T09:31:29Z",
66
"aliases": [
77
"CVE-2026-5121"
@@ -23,6 +23,10 @@
2323
"type": "WEB",
2424
"url": "https://github.com/libarchive/libarchive/pull/2934"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://access.redhat.com/errata/RHSA-2026:8510"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://access.redhat.com/security/cve/CVE-2026-5121"

advisories/unreviewed/2026/03/GHSA-c75f-55f6-f63q/GHSA-c75f-55f6-f63q.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c75f-55f6-f63q",
4-
"modified": "2026-04-16T15:31:27Z",
4+
"modified": "2026-04-16T18:31:14Z",
55
"published": "2026-03-19T15:31:21Z",
66
"aliases": [
77
"CVE-2026-4424"
@@ -27,6 +27,10 @@
2727
"type": "WEB",
2828
"url": "https://access.redhat.com/errata/RHSA-2026:8492"
2929
},
30+
{
31+
"type": "WEB",
32+
"url": "https://access.redhat.com/errata/RHSA-2026:8510"
33+
},
3034
{
3135
"type": "WEB",
3236
"url": "https://access.redhat.com/security/cve/CVE-2026-4424"

advisories/unreviewed/2026/03/GHSA-h5vx-6jh5-qhq7/GHSA-h5vx-6jh5-qhq7.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-h5vx-6jh5-qhq7",
4-
"modified": "2026-03-30T09:31:28Z",
4+
"modified": "2026-04-16T18:31:15Z",
55
"published": "2026-03-30T09:31:28Z",
66
"aliases": [
77
"CVE-2026-25704"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2026-25704"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "http://www.openwall.com/lists/oss-security/2026/04/16/3"
2529
}
2630
],
2731
"database_specific": {

advisories/unreviewed/2026/04/GHSA-2fw9-cxch-qx5h/GHSA-2fw9-cxch-qx5h.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2fw9-cxch-qx5h",
4-
"modified": "2026-04-09T00:32:00Z",
4+
"modified": "2026-04-16T18:31:21Z",
55
"published": "2026-04-09T00:32:00Z",
66
"aliases": [
77
"CVE-2026-5890"
88
],
99
"details": "Race in WebCodecs in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -27,7 +32,7 @@
2732
"cwe_ids": [
2833
"CWE-362"
2934
],
30-
"severity": null,
35+
"severity": "MODERATE",
3136
"github_reviewed": false,
3237
"github_reviewed_at": null,
3338
"nvd_published_at": "2026-04-08T22:16:28Z"
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2h3v-69mw-9j56",
4+
"modified": "2026-04-16T18:31:22Z",
5+
"published": "2026-04-16T18:31:22Z",
6+
"aliases": [
7+
"CVE-2025-36579"
8+
],
9+
"details": "Dell Client Platform BIOS contains a Weak Password Recovery Mechanism vulnerability. An unauthenticated attacker with physical access to the system could potentially exploit this vulnerability, leading to unauthorized access.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-36579"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.dell.com/support/kbdoc/en-us/000300450/dsa-2025-153"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-640"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-04-16T17:16:54Z"
35+
}
36+
}

advisories/unreviewed/2026/04/GHSA-3j9x-gmp6-9x73/GHSA-3j9x-gmp6-9x73.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3j9x-gmp6-9x73",
4-
"modified": "2026-04-16T15:31:32Z",
4+
"modified": "2026-04-16T18:31:21Z",
55
"published": "2026-04-16T15:31:32Z",
66
"aliases": [
77
"CVE-2026-37337"
88
],
99
"details": "SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Injection in the file /music/view_playlist.php.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -20,8 +25,10 @@
2025
}
2126
],
2227
"database_specific": {
23-
"cwe_ids": [],
24-
"severity": null,
28+
"cwe_ids": [
29+
"CWE-89"
30+
],
31+
"severity": "HIGH",
2532
"github_reviewed": false,
2633
"github_reviewed_at": null,
2734
"nvd_published_at": "2026-04-16T15:17:36Z"

advisories/unreviewed/2026/04/GHSA-3xhp-52jc-www8/GHSA-3xhp-52jc-www8.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3xhp-52jc-www8",
4-
"modified": "2026-04-16T15:31:33Z",
4+
"modified": "2026-04-16T18:31:21Z",
55
"published": "2026-04-16T15:31:32Z",
66
"aliases": [
77
"CVE-2026-37346"
88
],
99
"details": "SourceCodester Payroll Management and Information System v1.0 is vulnerable to SQL Injection in the file /payroll/view_account.php?emp_id=.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -20,8 +25,10 @@
2025
}
2126
],
2227
"database_specific": {
23-
"cwe_ids": [],
24-
"severity": null,
28+
"cwe_ids": [
29+
"CWE-89"
30+
],
31+
"severity": "MODERATE",
2532
"github_reviewed": false,
2633
"github_reviewed_at": null,
2734
"nvd_published_at": "2026-04-16T15:17:37Z"

advisories/unreviewed/2026/04/GHSA-69rx-rvq8-835f/GHSA-69rx-rvq8-835f.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-69rx-rvq8-835f",
4-
"modified": "2026-04-02T00:31:04Z",
4+
"modified": "2026-04-16T18:31:16Z",
55
"published": "2026-04-02T00:31:04Z",
66
"aliases": [
77
"CVE-2026-21767"

advisories/unreviewed/2026/04/GHSA-7c2r-j947-3p6p/GHSA-7c2r-j947-3p6p.json

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7c2r-j947-3p6p",
4-
"modified": "2026-04-13T06:30:31Z",
4+
"modified": "2026-04-16T18:31:21Z",
55
"published": "2026-04-13T06:30:31Z",
66
"aliases": [
77
"CVE-2026-21013"
88
],
99
"details": "Incorrect default permission in Galaxy Wearable prior to version 2.2.68.26 allows local attackers to access sensitive information.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
@@ -25,7 +29,9 @@
2529
}
2630
],
2731
"database_specific": {
28-
"cwe_ids": [],
32+
"cwe_ids": [
33+
"CWE-276"
34+
],
2935
"severity": "MODERATE",
3036
"github_reviewed": false,
3137
"github_reviewed_at": null,

advisories/unreviewed/2026/04/GHSA-8x4h-8ccm-x267/GHSA-8x4h-8ccm-x267.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8x4h-8ccm-x267",
4-
"modified": "2026-04-13T06:30:30Z",
4+
"modified": "2026-04-16T18:31:21Z",
55
"published": "2026-04-13T06:30:30Z",
66
"aliases": [
77
"CVE-2026-21003"
88
],
99
"details": "Improper input validation in data related to network restrictions prior to SMR Apr-2026 Release 1 allows physical attackers to bypass the restrictions.",
1010
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+
},
1115
{
1216
"type": "CVSS_V4",
1317
"score": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"

0 commit comments

Comments
 (0)