Skip to content

Commit 9fb22ad

Browse files
1 parent 1d789ad commit 9fb22ad

8 files changed

Lines changed: 242 additions & 4 deletions

File tree

advisories/unreviewed/2022/04/GHSA-g7xr-56w3-vjqh/GHSA-g7xr-56w3-vjqh.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g7xr-56w3-vjqh",
4-
"modified": "2026-02-24T09:31:12Z",
4+
"modified": "2026-03-07T18:30:30Z",
55
"published": "2022-04-30T18:09:55Z",
66
"aliases": [
77
"CVE-1999-0073"
@@ -21,6 +21,10 @@
2121
{
2222
"type": "WEB",
2323
"url": "http://www.openwall.com/lists/oss-security/2026/02/24/3"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "http://www.openwall.com/lists/oss-security/2026/03/07/3"
2428
}
2529
],
2630
"database_specific": {

advisories/unreviewed/2026/02/GHSA-j682-47rx-fxrp/GHSA-j682-47rx-fxrp.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-j682-47rx-fxrp",
4-
"modified": "2026-03-06T18:31:10Z",
4+
"modified": "2026-03-07T18:30:30Z",
55
"published": "2026-02-27T06:31:28Z",
66
"aliases": [
77
"CVE-2026-28372"
@@ -46,6 +46,14 @@
4646
{
4747
"type": "WEB",
4848
"url": "http://www.openwall.com/lists/oss-security/2026/03/06/3"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "http://www.openwall.com/lists/oss-security/2026/03/07/1"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "http://www.openwall.com/lists/oss-security/2026/03/07/2"
4957
}
5058
],
5159
"database_specific": {

advisories/unreviewed/2026/03/GHSA-crhr-qqj8-rpxc/GHSA-crhr-qqj8-rpxc.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-crhr-qqj8-rpxc",
4-
"modified": "2026-03-07T09:30:15Z",
4+
"modified": "2026-03-07T18:30:30Z",
55
"published": "2026-03-07T09:30:15Z",
66
"aliases": [
77
"CVE-2026-24308"
@@ -17,6 +17,10 @@
1717
{
1818
"type": "WEB",
1919
"url": "https://lists.apache.org/thread/qng3rtzv2pqkmko4rhv85jfplkyrgqdr"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "http://www.openwall.com/lists/oss-security/2026/03/07/5"
2024
}
2125
],
2226
"database_specific": {
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-f8w4-fphr-9q3w",
4+
"modified": "2026-03-07T18:30:31Z",
5+
"published": "2026-03-07T18:30:30Z",
6+
"aliases": [
7+
"CVE-2026-3665"
8+
],
9+
"details": "A vulnerability was identified in xlnt-community xlnt up to 1.6.1. The affected element is the function xlnt::detail::xlsx_consumer::read_office_document of the file source/detail/serialization/xlsx_consumer.cpp of the component XLSX File Parser. The manipulation leads to null pointer dereference. The attack must be carried out locally. The exploit is publicly available and might be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3665"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/xlnt-community/xlnt/issues/140"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://github.com/oneafter/0128/blob/main/xl4/repro"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://github.com/xlnt-community/xlnt"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?ctiid.349554"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?id.349554"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://vuldb.com/?submit.764647"
49+
}
50+
],
51+
"database_specific": {
52+
"cwe_ids": [
53+
"CWE-404"
54+
],
55+
"severity": "MODERATE",
56+
"github_reviewed": false,
57+
"github_reviewed_at": null,
58+
"nvd_published_at": "2026-03-07T16:15:56Z"
59+
}
60+
}
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-hjc5-2xcc-v5q2",
4+
"modified": "2026-03-07T18:30:31Z",
5+
"published": "2026-03-07T18:30:31Z",
6+
"aliases": [
7+
"CVE-2026-3667"
8+
],
9+
"details": "A security flaw has been discovered in Freedom Factory dGEN1 up to 20260221. The impacted element is the function FakeAppService of the component org.ethosmobile.ethoslauncher. The manipulation results in improper authorization. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3667"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://gist.github.com/Lytes/571902a31a3d543da009554a82f2d00c"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://gist.github.com/Lytes/a94219fa1de3f5173555d5a3e8058f01"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.349555"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.349555"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.764699"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-266"
50+
],
51+
"severity": "MODERATE",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2026-03-07T16:15:56Z"
55+
}
56+
}

advisories/unreviewed/2026/03/GHSA-jvq4-fjjq-g6w7/GHSA-jvq4-fjjq-g6w7.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jvq4-fjjq-g6w7",
4-
"modified": "2026-03-05T21:30:38Z",
4+
"modified": "2026-03-07T18:30:30Z",
55
"published": "2026-03-05T03:31:26Z",
66
"aliases": [
77
"CVE-2026-3381"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3381"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/pmqs/Compress-Raw-Zlib/issues/41"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit"
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-mmqm-c3vq-cgvr",
4+
"modified": "2026-03-07T18:30:31Z",
5+
"published": "2026-03-07T18:30:31Z",
6+
"aliases": [
7+
"CVE-2026-3668"
8+
],
9+
"details": "A weakness has been identified in Freedom Factory dGEN1 up to 20260221. This affects the function AndroidEthereum of the component org.ethosmobile.webpwaemul. This manipulation causes improper access controls. Remote exploitation of the attack is possible. The attack is considered to have high complexity. The exploitability is reported as difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3668"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://gist.github.com/Lytes/5fc292cecdc561f5c010c1f3a8a7bf1d"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.349556"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.349556"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.764702"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-266"
46+
],
47+
"severity": "LOW",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2026-03-07T16:15:57Z"
51+
}
52+
}
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-r2wv-mwv6-mxwm",
4+
"modified": "2026-03-07T18:30:31Z",
5+
"published": "2026-03-07T18:30:31Z",
6+
"aliases": [
7+
"CVE-2026-2671"
8+
],
9+
"details": "A vulnerability was detected in Mendi Neurofeedback Headset V4. Affected by this vulnerability is an unknown functionality of the component Bluetooth Low Energy Handler. Performing a manipulation results in cleartext transmission of sensitive information. The attack can only be performed from the local network. The attack's complexity is rated as high. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2671"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://ab3j.radio/mendi.pdf"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.349702"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.349702"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.766457"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [],
45+
"severity": "LOW",
46+
"github_reviewed": false,
47+
"github_reviewed_at": null,
48+
"nvd_published_at": "2026-03-07T18:16:05Z"
49+
}
50+
}

0 commit comments

Comments
 (0)