Skip to content

File tree

14 files changed

+312
-15
lines changed

14 files changed

+312
-15
lines changed

advisories/unreviewed/2022/05/GHSA-2738-x33m-p89q/GHSA-2738-x33m-p89q.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2738-x33m-p89q",
4-
"modified": "2022-05-17T04:51:45Z",
4+
"modified": "2026-04-03T00:31:08Z",
55
"published": "2022-05-17T04:51:45Z",
66
"aliases": [
77
"CVE-2011-2927"
88
],
99
"details": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via vectors related to Search forms.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{

advisories/unreviewed/2022/05/GHSA-fvhw-hg3x-xxxp/GHSA-fvhw-hg3x-xxxp.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fvhw-hg3x-xxxp",
4-
"modified": "2022-05-17T04:51:45Z",
4+
"modified": "2026-04-03T00:31:08Z",
55
"published": "2022-05-17T04:51:45Z",
66
"aliases": [
77
"CVE-2011-3344"
88
],
99
"details": "Cross-site scripting (XSS) vulnerability in the Lookup Login/Password form in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the URI.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{

advisories/unreviewed/2022/05/GHSA-gqj9-6pwj-7952/GHSA-gqj9-6pwj-7952.json

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,28 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gqj9-6pwj-7952",
4-
"modified": "2022-05-04T00:27:49Z",
4+
"modified": "2026-04-03T00:31:08Z",
55
"published": "2022-05-04T00:27:49Z",
66
"aliases": [
77
"CVE-2012-0059"
88
],
99
"details": "Spacewalk-backend in Red Hat Network (RHN) Satellite and Proxy 5.4 includes cleartext user passwords in an error message when a system registration XML-RPC call fails, which allows remote administrators to obtain the password by reading (1) the server log and (2) an email.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
1419
"type": "ADVISORY",
1520
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0059"
1621
},
22+
{
23+
"type": "WEB",
24+
"url": "https://access.redhat.com/security/cve/CVE-2012-0059"
25+
},
1726
{
1827
"type": "WEB",
1928
"url": "http://rhn.redhat.com/errata/RHSA-2012-0101.html"
@@ -24,7 +33,9 @@
2433
}
2534
],
2635
"database_specific": {
27-
"cwe_ids": [],
36+
"cwe_ids": [
37+
"CWE-209"
38+
],
2839
"severity": "MODERATE",
2940
"github_reviewed": false,
3041
"github_reviewed_at": null,

advisories/unreviewed/2022/05/GHSA-pqp9-2cmp-fx98/GHSA-pqp9-2cmp-fx98.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pqp9-2cmp-fx98",
4-
"modified": "2022-05-17T04:51:45Z",
4+
"modified": "2026-04-03T00:31:08Z",
55
"published": "2022-05-17T04:51:45Z",
66
"aliases": [
77
"CVE-2011-2920"
88
],
99
"details": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the \"Filter by Synopsis\" field and other unspecified filter forms.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{

advisories/unreviewed/2022/05/GHSA-v4fr-cg8r-vwm7/GHSA-v4fr-cg8r-vwm7.json

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,28 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v4fr-cg8r-vwm7",
4-
"modified": "2022-05-17T04:51:45Z",
4+
"modified": "2026-04-03T00:31:08Z",
55
"published": "2022-05-17T04:51:45Z",
66
"aliases": [
77
"CVE-2011-1594"
88
],
99
"details": "Open redirect vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url_bounce parameter.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
1419
"type": "ADVISORY",
1520
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1594"
1621
},
22+
{
23+
"type": "WEB",
24+
"url": "https://access.redhat.com/security/cve/CVE-2011-1594"
25+
},
1726
{
1827
"type": "WEB",
1928
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=672167"
@@ -29,7 +38,8 @@
2938
],
3039
"database_specific": {
3140
"cwe_ids": [
32-
"CWE-20"
41+
"CWE-20",
42+
"CWE-601"
3343
],
3444
"severity": "MODERATE",
3545
"github_reviewed": false,

advisories/unreviewed/2025/05/GHSA-r93p-9jjr-wjhj/GHSA-r93p-9jjr-wjhj.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-r93p-9jjr-wjhj",
4-
"modified": "2025-05-14T21:31:18Z",
4+
"modified": "2026-04-03T00:31:08Z",
55
"published": "2025-05-14T21:31:17Z",
66
"aliases": [
77
"CVE-2025-0133"
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-5w7p-v6h9-q8c5",
4+
"modified": "2026-04-03T00:31:09Z",
5+
"published": "2026-04-03T00:31:09Z",
6+
"aliases": [
7+
"CVE-2026-32211"
8+
],
9+
"details": "Missing authentication for critical function in Azure MCP Server allows an unauthorized attacker to disclose information over a network.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32211"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32211"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-306"
30+
],
31+
"severity": "CRITICAL",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-04-03T00:16:04Z"
35+
}
36+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-85hw-hqj5-m956",
4+
"modified": "2026-04-03T00:31:09Z",
5+
"published": "2026-04-03T00:31:09Z",
6+
"aliases": [
7+
"CVE-2026-32173"
8+
],
9+
"details": "Improper authentication in Azure SRE Agent allows an unauthorized attacker to disclose information over a network.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32173"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32173"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-287"
30+
],
31+
"severity": "HIGH",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-04-03T00:16:04Z"
35+
}
36+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-88cw-hhx8-8crw",
4+
"modified": "2026-04-03T00:31:09Z",
5+
"published": "2026-04-03T00:31:09Z",
6+
"aliases": [
7+
"CVE-2026-26135"
8+
],
9+
"details": "Server-side request forgery (ssrf) in Azure Custom Locations Resource Provider (RP) allows an authorized attacker to elevate privileges over a network.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26135"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26135"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-918"
30+
],
31+
"severity": "CRITICAL",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-04-03T00:16:04Z"
35+
}
36+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-ccr7-c63m-8vgm",
4+
"modified": "2026-04-03T00:31:09Z",
5+
"published": "2026-04-03T00:31:09Z",
6+
"aliases": [
7+
"CVE-2026-32213"
8+
],
9+
"details": "Improper authorization in Azure AI Foundry allows an unauthorized attacker to elevate privileges over a network.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32213"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32213"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-285"
30+
],
31+
"severity": "CRITICAL",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-04-03T00:16:04Z"
35+
}
36+
}

0 commit comments

Comments
 (0)