Skip to content

Commit c0b440d

Browse files

File tree

6 files changed

+106
-18
lines changed

6 files changed

+106
-18
lines changed

advisories/unreviewed/2025/07/GHSA-3pvj-q7qj-89fg/GHSA-3pvj-q7qj-89fg.json

Lines changed: 19 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3pvj-q7qj-89fg",
4-
"modified": "2026-02-05T21:32:35Z",
4+
"modified": "2026-03-05T12:30:30Z",
55
"published": "2025-07-07T15:30:39Z",
66
"aliases": [
77
"CVE-2025-5987"
@@ -21,63 +21,67 @@
2121
},
2222
{
2323
"type": "WEB",
24-
"url": "https://access.redhat.com/errata/RHSA-2025:23483"
24+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2376219"
2525
},
2626
{
2727
"type": "WEB",
28-
"url": "https://access.redhat.com/errata/RHSA-2025:23484"
28+
"url": "https://access.redhat.com/security/cve/CVE-2025-5987"
2929
},
3030
{
3131
"type": "WEB",
32-
"url": "https://access.redhat.com/errata/RHSA-2026:0427"
32+
"url": "https://access.redhat.com/errata/RHSA-2026:3415"
3333
},
3434
{
3535
"type": "WEB",
36-
"url": "https://access.redhat.com/errata/RHSA-2026:0428"
36+
"url": "https://access.redhat.com/errata/RHSA-2026:1541"
3737
},
3838
{
3939
"type": "WEB",
40-
"url": "https://access.redhat.com/errata/RHSA-2026:0430"
40+
"url": "https://access.redhat.com/errata/RHSA-2026:1539"
4141
},
4242
{
4343
"type": "WEB",
44-
"url": "https://access.redhat.com/errata/RHSA-2026:0431"
44+
"url": "https://access.redhat.com/errata/RHSA-2026:0996"
4545
},
4646
{
4747
"type": "WEB",
48-
"url": "https://access.redhat.com/errata/RHSA-2026:0702"
48+
"url": "https://access.redhat.com/errata/RHSA-2026:0985"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://access.redhat.com/errata/RHSA-2026:0980"
4953
},
5054
{
5155
"type": "WEB",
5256
"url": "https://access.redhat.com/errata/RHSA-2026:0978"
5357
},
5458
{
5559
"type": "WEB",
56-
"url": "https://access.redhat.com/errata/RHSA-2026:0980"
60+
"url": "https://access.redhat.com/errata/RHSA-2026:0702"
5761
},
5862
{
5963
"type": "WEB",
60-
"url": "https://access.redhat.com/errata/RHSA-2026:0985"
64+
"url": "https://access.redhat.com/errata/RHSA-2026:0431"
6165
},
6266
{
6367
"type": "WEB",
64-
"url": "https://access.redhat.com/errata/RHSA-2026:0996"
68+
"url": "https://access.redhat.com/errata/RHSA-2026:0430"
6569
},
6670
{
6771
"type": "WEB",
68-
"url": "https://access.redhat.com/errata/RHSA-2026:1539"
72+
"url": "https://access.redhat.com/errata/RHSA-2026:0428"
6973
},
7074
{
7175
"type": "WEB",
72-
"url": "https://access.redhat.com/errata/RHSA-2026:1541"
76+
"url": "https://access.redhat.com/errata/RHSA-2026:0427"
7377
},
7478
{
7579
"type": "WEB",
76-
"url": "https://access.redhat.com/security/cve/CVE-2025-5987"
80+
"url": "https://access.redhat.com/errata/RHSA-2025:23484"
7781
},
7882
{
7983
"type": "WEB",
80-
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2376219"
84+
"url": "https://access.redhat.com/errata/RHSA-2025:23483"
8185
}
8286
],
8387
"database_specific": {

advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v6c5-9mp4-mwq4",
4-
"modified": "2026-02-26T18:31:34Z",
4+
"modified": "2026-03-05T12:30:30Z",
55
"published": "2025-11-26T15:34:12Z",
66
"aliases": [
77
"CVE-2025-13601"
@@ -35,6 +35,10 @@
3535
"type": "WEB",
3636
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
3737
},
38+
{
39+
"type": "WEB",
40+
"url": "https://access.redhat.com/errata/RHSA-2026:3415"
41+
},
3842
{
3943
"type": "WEB",
4044
"url": "https://access.redhat.com/errata/RHSA-2026:2974"

advisories/unreviewed/2026/03/GHSA-32fg-c88m-mcrv/GHSA-32fg-c88m-mcrv.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-32fg-c88m-mcrv",
4-
"modified": "2026-03-05T03:31:26Z",
4+
"modified": "2026-03-05T12:30:30Z",
55
"published": "2026-03-05T03:31:26Z",
66
"aliases": [
77
"CVE-2025-40931"
@@ -21,6 +21,10 @@
2121
{
2222
"type": "WEB",
2323
"url": "https://security.metacpan.org/docs/guides/random-data-for-security.html"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "http://www.openwall.com/lists/oss-security/2026/03/05/3"
2428
}
2529
],
2630
"database_specific": {

advisories/unreviewed/2026/03/GHSA-98r5-r223-6xwf/GHSA-98r5-r223-6xwf.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-98r5-r223-6xwf",
4-
"modified": "2026-03-05T03:31:26Z",
4+
"modified": "2026-03-05T12:30:30Z",
55
"published": "2026-03-05T03:31:26Z",
66
"aliases": [
77
"CVE-2024-57854"
@@ -21,6 +21,10 @@
2121
{
2222
"type": "WEB",
2323
"url": "https://patch-diff.githubusercontent.com/raw/dougwilson/perl5-net-nsca-client/pull/2.patch"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "http://www.openwall.com/lists/oss-security/2026/03/05/1"
2428
}
2529
],
2630
"database_specific": {
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-9g4r-rvq7-7xrq",
4+
"modified": "2026-03-05T12:30:30Z",
5+
"published": "2026-03-05T12:30:30Z",
6+
"aliases": [
7+
"CVE-2026-21628"
8+
],
9+
"details": "A improperly secured file management feature allows uploads of dangerous data types for unauthenticated users, leading to remote code execution.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:A/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21628"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://astroidframe.work"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-434"
30+
],
31+
"severity": "CRITICAL",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-03-05T10:15:57Z"
35+
}
36+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-mj9m-c5pr-rxw7",
4+
"modified": "2026-03-05T12:30:30Z",
5+
"published": "2026-03-05T12:30:30Z",
6+
"aliases": [
7+
"CVE-2026-3236"
8+
],
9+
"details": "In affected versions of Octopus Server it was possible to create a new API key from an existing access token resulting in the new API key having a lifetime exceeding the original API key used to mint the access token.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V4",
13+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3236"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://advisories.octopus.com/post/2026/sa2026-02"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-863"
30+
],
31+
"severity": "LOW",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2026-03-05T11:15:54Z"
35+
}
36+
}

0 commit comments

Comments
 (0)