Skip to content

Commit ae38eab

Browse files
Advisory Database Sync
1 parent f7efaab commit ae38eab

57 files changed

Lines changed: 1937 additions & 47 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/github-reviewed/2026/03/GHSA-752w-5fwx-jx9f/GHSA-752w-5fwx-jx9f.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-752w-5fwx-jx9f",
4-
"modified": "2026-03-16T17:07:33Z",
4+
"modified": "2026-05-05T18:33:22Z",
55
"published": "2026-03-13T20:05:04Z",
66
"aliases": [
77
"CVE-2026-32597"
@@ -50,6 +50,10 @@
5050
{
5151
"type": "PACKAGE",
5252
"url": "https://github.com/jpadilla/pyjwt"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://lists.debian.org/debian-lts-announce/2026/05/msg00008.html"
5357
}
5458
],
5559
"database_specific": {

advisories/unreviewed/2026/02/GHSA-f57j-h7qc-9fq9/GHSA-f57j-h7qc-9fq9.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f57j-h7qc-9fq9",
4-
"modified": "2026-02-17T15:31:35Z",
4+
"modified": "2026-05-05T18:33:22Z",
55
"published": "2026-02-16T18:31:28Z",
66
"aliases": [
77
"CVE-2025-65717"
@@ -15,6 +15,10 @@
1515
],
1616
"affected": [],
1717
"references": [
18+
{
19+
"type": "WEB",
20+
"url": "https://github.com/ritwickdey/vscode-live-server/security/advisories/GHSA-9qrh-552f-x896"
21+
},
1822
{
1923
"type": "ADVISORY",
2024
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65717"

advisories/unreviewed/2026/02/GHSA-pm8w-jq9r-x5rp/GHSA-pm8w-jq9r-x5rp.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pm8w-jq9r-x5rp",
4-
"modified": "2026-04-22T21:31:17Z",
4+
"modified": "2026-05-05T18:33:22Z",
55
"published": "2026-02-09T15:30:31Z",
66
"aliases": [
77
"CVE-2025-14831"
@@ -94,6 +94,10 @@
9494
{
9595
"type": "WEB",
9696
"url": "https://access.redhat.com/errata/RHSA-2026:3477"
97+
},
98+
{
99+
"type": "WEB",
100+
"url": "https://access.redhat.com/errata/RHSA-2026:13812"
97101
}
98102
],
99103
"database_specific": {

advisories/unreviewed/2026/03/GHSA-2vwv-vqpv-v8vc/GHSA-2vwv-vqpv-v8vc.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2vwv-vqpv-v8vc",
4-
"modified": "2026-04-30T15:30:32Z",
4+
"modified": "2026-05-05T18:33:22Z",
55
"published": "2026-03-30T09:31:29Z",
66
"aliases": [
77
"CVE-2026-5121"
@@ -87,6 +87,10 @@
8787
"type": "WEB",
8888
"url": "https://access.redhat.com/errata/RHSA-2026:8510"
8989
},
90+
{
91+
"type": "WEB",
92+
"url": "https://access.redhat.com/errata/RHSA-2026:13812"
93+
},
9094
{
9195
"type": "WEB",
9296
"url": "https://access.redhat.com/errata/RHSA-2026:11768"

advisories/unreviewed/2026/03/GHSA-c75f-55f6-f63q/GHSA-c75f-55f6-f63q.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c75f-55f6-f63q",
4-
"modified": "2026-04-30T15:30:31Z",
4+
"modified": "2026-05-05T18:33:22Z",
55
"published": "2026-03-19T15:31:21Z",
66
"aliases": [
77
"CVE-2026-4424"
@@ -91,6 +91,10 @@
9191
"type": "WEB",
9292
"url": "https://access.redhat.com/errata/RHSA-2026:8492"
9393
},
94+
{
95+
"type": "WEB",
96+
"url": "https://access.redhat.com/errata/RHSA-2026:13812"
97+
},
9498
{
9599
"type": "WEB",
96100
"url": "https://access.redhat.com/errata/RHSA-2026:11768"

advisories/unreviewed/2026/04/GHSA-g4g9-h6f9-v5x2/GHSA-g4g9-h6f9-v5x2.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g4g9-h6f9-v5x2",
4-
"modified": "2026-05-05T12:31:37Z",
4+
"modified": "2026-05-05T18:33:22Z",
55
"published": "2026-04-01T15:31:15Z",
66
"aliases": [
77
"CVE-2026-35092"
@@ -27,6 +27,10 @@
2727
"type": "WEB",
2828
"url": "https://access.redhat.com/errata/RHSA-2026:13657"
2929
},
30+
{
31+
"type": "WEB",
32+
"url": "https://access.redhat.com/errata/RHSA-2026:13673"
33+
},
3034
{
3135
"type": "WEB",
3236
"url": "https://access.redhat.com/security/cve/CVE-2026-35092"

advisories/unreviewed/2026/04/GHSA-hmg2-5h4j-37m9/GHSA-hmg2-5h4j-37m9.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hmg2-5h4j-37m9",
4-
"modified": "2026-05-05T12:31:37Z",
4+
"modified": "2026-05-05T18:33:22Z",
55
"published": "2026-04-01T15:31:15Z",
66
"aliases": [
77
"CVE-2026-35091"
@@ -27,6 +27,10 @@
2727
"type": "WEB",
2828
"url": "https://access.redhat.com/errata/RHSA-2026:13657"
2929
},
30+
{
31+
"type": "WEB",
32+
"url": "https://access.redhat.com/errata/RHSA-2026:13673"
33+
},
3034
{
3135
"type": "WEB",
3236
"url": "https://access.redhat.com/security/cve/CVE-2026-35091"
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2q6x-pg74-2276",
4+
"modified": "2026-05-05T18:33:24Z",
5+
"published": "2026-05-05T18:33:24Z",
6+
"aliases": [
7+
"CVE-2026-34002"
8+
],
9+
"details": "A flaw was found in the X.Org X server. This vulnerability, an out-of-bounds read, affects the XKB (X Keyboard Extension) modifier map handling. An attacker with access to the X11 server can exploit this by sending a malformed request, which causes the server to read beyond its intended memory boundaries. This can lead to the exposure of sensitive information or cause the server to crash, resulting in a denial of service.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34002"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://access.redhat.com/security/cve/CVE-2026-34002"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451112"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-805"
34+
],
35+
"severity": "MODERATE",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-05-05T16:16:11Z"
39+
}
40+
}

advisories/unreviewed/2026/05/GHSA-2rrx-2h24-9hm6/GHSA-2rrx-2h24-9hm6.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2rrx-2h24-9hm6",
4-
"modified": "2026-05-04T18:30:29Z",
4+
"modified": "2026-05-05T18:33:22Z",
55
"published": "2026-05-04T18:30:29Z",
66
"aliases": [
77
"CVE-2026-36365"
88
],
99
"details": "An issue in Lymphatus caesium-image-compressor All versions up to and including commit 02da2c6 allows a local attacker to execute arbitrary code via the shutdownMachine and putMachineToSleep functions in PostCompressionActions.cpp",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -32,8 +37,10 @@
3237
}
3338
],
3439
"database_specific": {
35-
"cwe_ids": [],
36-
"severity": null,
40+
"cwe_ids": [
41+
"CWE-77"
42+
],
43+
"severity": "HIGH",
3744
"github_reviewed": false,
3845
"github_reviewed_at": null,
3946
"nvd_published_at": "2026-05-04T16:16:02Z"
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-386p-v9x3-gxpm",
4+
"modified": "2026-05-05T18:33:24Z",
5+
"published": "2026-05-05T18:33:24Z",
6+
"aliases": [
7+
"CVE-2025-66369"
8+
],
9+
"details": "An issue was discovered in MM in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. Incorrect handling of 5G NR NAS registration accept messages leads to a Denial of Service.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66369"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-66369"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [],
28+
"severity": null,
29+
"github_reviewed": false,
30+
"github_reviewed_at": null,
31+
"nvd_published_at": "2026-05-05T16:16:10Z"
32+
}
33+
}

0 commit comments

Comments
 (0)