From 1d7a5bf1fa1791647bb56663a7198895ac83dfc1 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Tue, 21 Apr 2026 21:34:01 +0000 Subject: [PATCH 01/49] Advisory Database Sync --- .../GHSA-6497-prx7-gpmq.json | 6 ++- .../GHSA-25v6-95vv-c6qq.json | 34 ++++++++++++ .../GHSA-26v3-j7q3-5cqg.json | 34 ++++++++++++ .../GHSA-2rv4-33jh-89fc.json | 34 ++++++++++++ .../GHSA-2vgw-r373-m9qx.json | 15 ++++-- .../GHSA-2w37-mr53-59fv.json | 34 ++++++++++++ .../GHSA-376j-8f52-gp2x.json | 34 ++++++++++++ .../GHSA-3792-hr7r-4rr7.json | 33 ++++++++++++ .../GHSA-38r2-pp9w-hfh6.json | 15 ++++-- .../GHSA-3cff-g674-f8v5.json | 34 ++++++++++++ .../GHSA-3f4r-x789-hx5r.json | 34 ++++++++++++ .../GHSA-3f99-8qf2-g6v6.json | 34 ++++++++++++ .../GHSA-3fhh-pgvh-2w97.json | 34 ++++++++++++ .../GHSA-3gfg-g579-3wmq.json | 34 ++++++++++++ .../GHSA-3p9c-22jr-wq4x.json | 14 ++++- .../GHSA-3pw2-2fp4-54wm.json | 15 ++++-- .../GHSA-3qgj-9j4x-cvhx.json | 34 ++++++++++++ .../GHSA-3xqw-r49f-5rj8.json | 52 +++++++++++++++++++ .../GHSA-42m9-g5m6-v663.json | 34 ++++++++++++ .../GHSA-42q6-42c2-vcj7.json | 34 ++++++++++++ .../GHSA-45mv-v7v7-qcr2.json | 34 ++++++++++++ .../GHSA-4h9j-w885-pqx6.json | 34 ++++++++++++ .../GHSA-4mrw-82h5-p7hx.json | 15 ++++-- .../GHSA-55h4-p6x2-6526.json | 34 ++++++++++++ .../GHSA-564h-hx6x-wg47.json | 52 +++++++++++++++++++ .../GHSA-565v-jcgw-g7vh.json | 34 ++++++++++++ .../GHSA-572m-7g95-9x94.json | 34 ++++++++++++ .../GHSA-5qjr-2xxv-p9m9.json | 36 +++++++++++++ .../GHSA-5wvf-8jjj-7w99.json | 15 ++++-- .../GHSA-62mx-j2c2-7953.json | 34 ++++++++++++ .../GHSA-65fp-7g2v-658r.json | 52 +++++++++++++++++++ .../GHSA-6fj2-3r4w-jj8f.json | 34 ++++++++++++ .../GHSA-6fw3-qc3h-w7c9.json | 34 ++++++++++++ .../GHSA-6pg9-3wf4-7w8v.json | 15 ++++-- .../GHSA-6pjm-v57q-8qfm.json | 34 ++++++++++++ .../GHSA-6r7m-2wh8-438w.json | 6 ++- .../GHSA-729m-5x6m-wwxv.json | 15 ++++-- .../GHSA-75hh-423h-rvwg.json | 34 ++++++++++++ .../GHSA-75xc-fv5m-pprr.json | 15 ++++-- .../GHSA-7625-jhq2-5p8g.json | 15 ++++-- .../GHSA-7642-f8gh-qxjj.json | 34 ++++++++++++ .../GHSA-7mfh-vh4q-xgr5.json | 34 ++++++++++++ .../GHSA-7q78-vx6h-h3wf.json | 34 ++++++++++++ .../GHSA-829p-mc9m-7xhr.json | 11 ++-- .../GHSA-8833-3jph-2h9h.json | 34 ++++++++++++ .../GHSA-88fc-5m2g-g6q2.json | 15 ++++-- .../GHSA-8hfr-pcm2-774v.json | 34 ++++++++++++ .../GHSA-8j6w-gmm7-v874.json | 34 ++++++++++++ .../GHSA-8p5x-j4cx-8cwg.json | 15 ++++-- .../GHSA-8w4w-q822-g7ph.json | 15 ++++-- .../GHSA-93m8-r373-2q8w.json | 34 ++++++++++++ .../GHSA-94w8-x4g3-jq5m.json | 34 ++++++++++++ .../GHSA-98wp-jqw8-cr49.json | 34 ++++++++++++ .../GHSA-9grw-5h83-65p3.json | 34 ++++++++++++ .../GHSA-9m35-v5wh-m3xw.json | 15 ++++-- .../GHSA-9m62-hmpm-rr2m.json | 34 ++++++++++++ .../GHSA-9qx2-6rq5-w5jj.json | 34 ++++++++++++ .../GHSA-9v46-qvxf-wrwq.json | 34 ++++++++++++ .../GHSA-c26m-jpm8-jfvw.json | 34 ++++++++++++ .../GHSA-c2pf-f8x2-95m2.json | 34 ++++++++++++ .../GHSA-c2q7-642g-3vwr.json | 15 ++++-- .../GHSA-c6rq-x839-cgp6.json | 15 ++++-- .../GHSA-c9q5-q8r3-8m2c.json | 34 ++++++++++++ .../GHSA-cc6c-v4r7-vf9x.json | 34 ++++++++++++ .../GHSA-cccj-xpm5-2hpx.json | 34 ++++++++++++ .../GHSA-chmq-27rf-6923.json | 34 ++++++++++++ .../GHSA-cj86-2v89-gm24.json | 34 ++++++++++++ .../GHSA-crfw-8vvm-pm25.json | 48 +++++++++++++++++ .../GHSA-cv52-82gr-h293.json | 34 ++++++++++++ .../GHSA-f2mm-qgp8-rc9q.json | 34 ++++++++++++ .../GHSA-f82q-cjhg-c837.json | 48 +++++++++++++++++ .../GHSA-f84h-9pvq-86q2.json | 34 ++++++++++++ .../GHSA-ffgj-wmrh-m8fr.json | 34 ++++++++++++ .../GHSA-fh86-xhc3-24gr.json | 34 ++++++++++++ .../GHSA-fjgq-vg76-2mmp.json | 34 ++++++++++++ .../GHSA-fpcq-h389-8ggm.json | 34 ++++++++++++ .../GHSA-fpvh-cc34-gjmc.json | 34 ++++++++++++ .../GHSA-g233-f2vv-qw6j.json | 34 ++++++++++++ .../GHSA-g37f-4x54-mhgj.json | 34 ++++++++++++ .../GHSA-g44r-j9vh-rwm7.json | 34 ++++++++++++ .../GHSA-g74q-22gc-6974.json | 34 ++++++++++++ .../GHSA-gcgv-7762-j94g.json | 34 ++++++++++++ .../GHSA-gcr4-c2jq-4gr5.json | 34 ++++++++++++ .../GHSA-gjr3-4mw2-xv4h.json | 34 ++++++++++++ .../GHSA-gp49-6mc2-5x6f.json | 34 ++++++++++++ .../GHSA-gq3x-4cgf-f2fm.json | 34 ++++++++++++ .../GHSA-h2wx-vfx5-xwj8.json | 34 ++++++++++++ .../GHSA-h32f-9mwc-283m.json | 34 ++++++++++++ .../GHSA-h9wg-gp29-4whj.json | 15 ++++-- .../GHSA-hhjq-6g7f-p34r.json | 34 ++++++++++++ .../GHSA-hjxq-7w9q-2jw6.json | 6 ++- .../GHSA-hpm9-74qx-6x32.json | 34 ++++++++++++ .../GHSA-hwvq-xm42-wx99.json | 11 ++-- .../GHSA-j22w-pghr-4cvx.json | 34 ++++++++++++ .../GHSA-j2g9-rprv-hrhc.json | 15 ++++-- .../GHSA-j4r5-x8vx-whv5.json | 34 ++++++++++++ .../GHSA-j666-q429-qjc8.json | 34 ++++++++++++ .../GHSA-jfmq-5jhp-qf3w.json | 34 ++++++++++++ .../GHSA-jg6g-fp64-wgx2.json | 34 ++++++++++++ .../GHSA-jg6h-qcfc-fqx4.json | 34 ++++++++++++ .../GHSA-jgph-c6j5-5mm2.json | 15 ++++-- .../GHSA-jj2g-xq7w-gf88.json | 11 ++-- .../GHSA-jpmj-4mw9-x4gr.json | 34 ++++++++++++ .../GHSA-jpw8-46mw-jgq7.json | 34 ++++++++++++ .../GHSA-jqm5-j7h7-59w8.json | 34 ++++++++++++ .../GHSA-jvhw-jc32-v84v.json | 34 ++++++++++++ .../GHSA-jwr7-8589-p67w.json | 34 ++++++++++++ .../GHSA-m58j-v3j6-3hqq.json | 34 ++++++++++++ .../GHSA-mwrp-hhpc-x64f.json | 34 ++++++++++++ .../GHSA-mwvh-c89q-73j6.json | 15 ++++-- .../GHSA-p436-pgq7-fm99.json | 34 ++++++++++++ .../GHSA-p786-pp8p-8p3m.json | 15 ++++-- .../GHSA-p82p-w5j8-vgqq.json | 34 ++++++++++++ .../GHSA-prqq-qrc5-xvpr.json | 15 ++++-- .../GHSA-q23x-qvv8-gcm5.json | 34 ++++++++++++ .../GHSA-q4wq-4whj-cxhx.json | 34 ++++++++++++ .../GHSA-qhr7-4g47-87m7.json | 34 ++++++++++++ .../GHSA-r3gq-49p4-mmj6.json | 34 ++++++++++++ .../GHSA-r489-83w6-974f.json | 36 +++++++++++++ .../GHSA-r754-6jr2-2cg8.json | 34 ++++++++++++ .../GHSA-r8xp-m5j7-vp76.json | 34 ++++++++++++ .../GHSA-rj5j-26xx-hh3v.json | 34 ++++++++++++ .../GHSA-rmq8-6cxg-v467.json | 34 ++++++++++++ .../GHSA-rvfx-c797-vvhx.json | 36 +++++++++++++ .../GHSA-rwvq-ffmg-g3q5.json | 34 ++++++++++++ .../GHSA-v5vh-6mhh-h6gc.json | 15 ++++-- .../GHSA-v5wj-mfrc-9wrc.json | 34 ++++++++++++ .../GHSA-v7xm-xc3f-cxh9.json | 34 ++++++++++++ .../GHSA-v898-xg3c-w4rj.json | 11 ++-- .../GHSA-vxch-4r45-jhw9.json | 15 ++++-- .../GHSA-w2j6-p7c6-6cpj.json | 34 ++++++++++++ .../GHSA-w6p7-5x7m-cr7c.json | 34 ++++++++++++ .../GHSA-wcjc-hfgv-f5wc.json | 34 ++++++++++++ .../GHSA-wfvx-63xx-rq37.json | 34 ++++++++++++ .../GHSA-wj59-76w3-4fv9.json | 34 ++++++++++++ .../GHSA-wpg5-vr6r-jrcr.json | 15 ++++-- .../GHSA-wv9q-w2v5-wfhp.json | 34 ++++++++++++ .../GHSA-x2wq-9x2f-fhj7.json | 36 +++++++++++++ .../GHSA-x3f9-vcp2-hgcw.json | 52 +++++++++++++++++++ .../GHSA-x878-48g9-62p4.json | 34 ++++++++++++ .../GHSA-x9m8-mrxv-cvc8.json | 34 ++++++++++++ .../GHSA-xcgr-x2r4-j9mj.json | 34 ++++++++++++ .../GHSA-xmmc-cmm8-3rvm.json | 48 +++++++++++++++++ .../GHSA-xvmr-9p7m-jmwv.json | 34 ++++++++++++ .../GHSA-xwcp-9cqm-x4j8.json | 34 ++++++++++++ .../GHSA-xx92-xfrf-9xp3.json | 34 ++++++++++++ .../GHSA-xxc5-5ggq-v5qj.json | 6 ++- 147 files changed, 4326 insertions(+), 113 deletions(-) create mode 100644 advisories/unreviewed/2026/04/GHSA-25v6-95vv-c6qq/GHSA-25v6-95vv-c6qq.json create mode 100644 advisories/unreviewed/2026/04/GHSA-26v3-j7q3-5cqg/GHSA-26v3-j7q3-5cqg.json create mode 100644 advisories/unreviewed/2026/04/GHSA-2rv4-33jh-89fc/GHSA-2rv4-33jh-89fc.json create mode 100644 advisories/unreviewed/2026/04/GHSA-2w37-mr53-59fv/GHSA-2w37-mr53-59fv.json create mode 100644 advisories/unreviewed/2026/04/GHSA-376j-8f52-gp2x/GHSA-376j-8f52-gp2x.json create mode 100644 advisories/unreviewed/2026/04/GHSA-3792-hr7r-4rr7/GHSA-3792-hr7r-4rr7.json create mode 100644 advisories/unreviewed/2026/04/GHSA-3cff-g674-f8v5/GHSA-3cff-g674-f8v5.json create mode 100644 advisories/unreviewed/2026/04/GHSA-3f4r-x789-hx5r/GHSA-3f4r-x789-hx5r.json create mode 100644 advisories/unreviewed/2026/04/GHSA-3f99-8qf2-g6v6/GHSA-3f99-8qf2-g6v6.json create mode 100644 advisories/unreviewed/2026/04/GHSA-3fhh-pgvh-2w97/GHSA-3fhh-pgvh-2w97.json create mode 100644 advisories/unreviewed/2026/04/GHSA-3gfg-g579-3wmq/GHSA-3gfg-g579-3wmq.json create mode 100644 advisories/unreviewed/2026/04/GHSA-3qgj-9j4x-cvhx/GHSA-3qgj-9j4x-cvhx.json create mode 100644 advisories/unreviewed/2026/04/GHSA-3xqw-r49f-5rj8/GHSA-3xqw-r49f-5rj8.json create mode 100644 advisories/unreviewed/2026/04/GHSA-42m9-g5m6-v663/GHSA-42m9-g5m6-v663.json create mode 100644 advisories/unreviewed/2026/04/GHSA-42q6-42c2-vcj7/GHSA-42q6-42c2-vcj7.json create mode 100644 advisories/unreviewed/2026/04/GHSA-45mv-v7v7-qcr2/GHSA-45mv-v7v7-qcr2.json create mode 100644 advisories/unreviewed/2026/04/GHSA-4h9j-w885-pqx6/GHSA-4h9j-w885-pqx6.json create mode 100644 advisories/unreviewed/2026/04/GHSA-55h4-p6x2-6526/GHSA-55h4-p6x2-6526.json create mode 100644 advisories/unreviewed/2026/04/GHSA-564h-hx6x-wg47/GHSA-564h-hx6x-wg47.json create mode 100644 advisories/unreviewed/2026/04/GHSA-565v-jcgw-g7vh/GHSA-565v-jcgw-g7vh.json create mode 100644 advisories/unreviewed/2026/04/GHSA-572m-7g95-9x94/GHSA-572m-7g95-9x94.json create mode 100644 advisories/unreviewed/2026/04/GHSA-5qjr-2xxv-p9m9/GHSA-5qjr-2xxv-p9m9.json create mode 100644 advisories/unreviewed/2026/04/GHSA-62mx-j2c2-7953/GHSA-62mx-j2c2-7953.json create mode 100644 advisories/unreviewed/2026/04/GHSA-65fp-7g2v-658r/GHSA-65fp-7g2v-658r.json create mode 100644 advisories/unreviewed/2026/04/GHSA-6fj2-3r4w-jj8f/GHSA-6fj2-3r4w-jj8f.json create mode 100644 advisories/unreviewed/2026/04/GHSA-6fw3-qc3h-w7c9/GHSA-6fw3-qc3h-w7c9.json create mode 100644 advisories/unreviewed/2026/04/GHSA-6pjm-v57q-8qfm/GHSA-6pjm-v57q-8qfm.json create mode 100644 advisories/unreviewed/2026/04/GHSA-75hh-423h-rvwg/GHSA-75hh-423h-rvwg.json create mode 100644 advisories/unreviewed/2026/04/GHSA-7642-f8gh-qxjj/GHSA-7642-f8gh-qxjj.json create mode 100644 advisories/unreviewed/2026/04/GHSA-7mfh-vh4q-xgr5/GHSA-7mfh-vh4q-xgr5.json create mode 100644 advisories/unreviewed/2026/04/GHSA-7q78-vx6h-h3wf/GHSA-7q78-vx6h-h3wf.json create mode 100644 advisories/unreviewed/2026/04/GHSA-8833-3jph-2h9h/GHSA-8833-3jph-2h9h.json create mode 100644 advisories/unreviewed/2026/04/GHSA-8hfr-pcm2-774v/GHSA-8hfr-pcm2-774v.json create mode 100644 advisories/unreviewed/2026/04/GHSA-8j6w-gmm7-v874/GHSA-8j6w-gmm7-v874.json create mode 100644 advisories/unreviewed/2026/04/GHSA-93m8-r373-2q8w/GHSA-93m8-r373-2q8w.json create mode 100644 advisories/unreviewed/2026/04/GHSA-94w8-x4g3-jq5m/GHSA-94w8-x4g3-jq5m.json create mode 100644 advisories/unreviewed/2026/04/GHSA-98wp-jqw8-cr49/GHSA-98wp-jqw8-cr49.json create mode 100644 advisories/unreviewed/2026/04/GHSA-9grw-5h83-65p3/GHSA-9grw-5h83-65p3.json create mode 100644 advisories/unreviewed/2026/04/GHSA-9m62-hmpm-rr2m/GHSA-9m62-hmpm-rr2m.json create mode 100644 advisories/unreviewed/2026/04/GHSA-9qx2-6rq5-w5jj/GHSA-9qx2-6rq5-w5jj.json create mode 100644 advisories/unreviewed/2026/04/GHSA-9v46-qvxf-wrwq/GHSA-9v46-qvxf-wrwq.json create mode 100644 advisories/unreviewed/2026/04/GHSA-c26m-jpm8-jfvw/GHSA-c26m-jpm8-jfvw.json create mode 100644 advisories/unreviewed/2026/04/GHSA-c2pf-f8x2-95m2/GHSA-c2pf-f8x2-95m2.json create mode 100644 advisories/unreviewed/2026/04/GHSA-c9q5-q8r3-8m2c/GHSA-c9q5-q8r3-8m2c.json create mode 100644 advisories/unreviewed/2026/04/GHSA-cc6c-v4r7-vf9x/GHSA-cc6c-v4r7-vf9x.json create mode 100644 advisories/unreviewed/2026/04/GHSA-cccj-xpm5-2hpx/GHSA-cccj-xpm5-2hpx.json create mode 100644 advisories/unreviewed/2026/04/GHSA-chmq-27rf-6923/GHSA-chmq-27rf-6923.json create mode 100644 advisories/unreviewed/2026/04/GHSA-cj86-2v89-gm24/GHSA-cj86-2v89-gm24.json create mode 100644 advisories/unreviewed/2026/04/GHSA-crfw-8vvm-pm25/GHSA-crfw-8vvm-pm25.json create mode 100644 advisories/unreviewed/2026/04/GHSA-cv52-82gr-h293/GHSA-cv52-82gr-h293.json create mode 100644 advisories/unreviewed/2026/04/GHSA-f2mm-qgp8-rc9q/GHSA-f2mm-qgp8-rc9q.json create mode 100644 advisories/unreviewed/2026/04/GHSA-f82q-cjhg-c837/GHSA-f82q-cjhg-c837.json create mode 100644 advisories/unreviewed/2026/04/GHSA-f84h-9pvq-86q2/GHSA-f84h-9pvq-86q2.json create mode 100644 advisories/unreviewed/2026/04/GHSA-ffgj-wmrh-m8fr/GHSA-ffgj-wmrh-m8fr.json create mode 100644 advisories/unreviewed/2026/04/GHSA-fh86-xhc3-24gr/GHSA-fh86-xhc3-24gr.json create mode 100644 advisories/unreviewed/2026/04/GHSA-fjgq-vg76-2mmp/GHSA-fjgq-vg76-2mmp.json create mode 100644 advisories/unreviewed/2026/04/GHSA-fpcq-h389-8ggm/GHSA-fpcq-h389-8ggm.json create mode 100644 advisories/unreviewed/2026/04/GHSA-fpvh-cc34-gjmc/GHSA-fpvh-cc34-gjmc.json create mode 100644 advisories/unreviewed/2026/04/GHSA-g233-f2vv-qw6j/GHSA-g233-f2vv-qw6j.json create mode 100644 advisories/unreviewed/2026/04/GHSA-g37f-4x54-mhgj/GHSA-g37f-4x54-mhgj.json create mode 100644 advisories/unreviewed/2026/04/GHSA-g44r-j9vh-rwm7/GHSA-g44r-j9vh-rwm7.json create mode 100644 advisories/unreviewed/2026/04/GHSA-g74q-22gc-6974/GHSA-g74q-22gc-6974.json create mode 100644 advisories/unreviewed/2026/04/GHSA-gcgv-7762-j94g/GHSA-gcgv-7762-j94g.json create mode 100644 advisories/unreviewed/2026/04/GHSA-gcr4-c2jq-4gr5/GHSA-gcr4-c2jq-4gr5.json create mode 100644 advisories/unreviewed/2026/04/GHSA-gjr3-4mw2-xv4h/GHSA-gjr3-4mw2-xv4h.json create mode 100644 advisories/unreviewed/2026/04/GHSA-gp49-6mc2-5x6f/GHSA-gp49-6mc2-5x6f.json create mode 100644 advisories/unreviewed/2026/04/GHSA-gq3x-4cgf-f2fm/GHSA-gq3x-4cgf-f2fm.json create mode 100644 advisories/unreviewed/2026/04/GHSA-h2wx-vfx5-xwj8/GHSA-h2wx-vfx5-xwj8.json create mode 100644 advisories/unreviewed/2026/04/GHSA-h32f-9mwc-283m/GHSA-h32f-9mwc-283m.json create mode 100644 advisories/unreviewed/2026/04/GHSA-hhjq-6g7f-p34r/GHSA-hhjq-6g7f-p34r.json create mode 100644 advisories/unreviewed/2026/04/GHSA-hpm9-74qx-6x32/GHSA-hpm9-74qx-6x32.json create mode 100644 advisories/unreviewed/2026/04/GHSA-j22w-pghr-4cvx/GHSA-j22w-pghr-4cvx.json create mode 100644 advisories/unreviewed/2026/04/GHSA-j4r5-x8vx-whv5/GHSA-j4r5-x8vx-whv5.json create mode 100644 advisories/unreviewed/2026/04/GHSA-j666-q429-qjc8/GHSA-j666-q429-qjc8.json create mode 100644 advisories/unreviewed/2026/04/GHSA-jfmq-5jhp-qf3w/GHSA-jfmq-5jhp-qf3w.json create mode 100644 advisories/unreviewed/2026/04/GHSA-jg6g-fp64-wgx2/GHSA-jg6g-fp64-wgx2.json create mode 100644 advisories/unreviewed/2026/04/GHSA-jg6h-qcfc-fqx4/GHSA-jg6h-qcfc-fqx4.json create mode 100644 advisories/unreviewed/2026/04/GHSA-jpmj-4mw9-x4gr/GHSA-jpmj-4mw9-x4gr.json create mode 100644 advisories/unreviewed/2026/04/GHSA-jpw8-46mw-jgq7/GHSA-jpw8-46mw-jgq7.json create mode 100644 advisories/unreviewed/2026/04/GHSA-jqm5-j7h7-59w8/GHSA-jqm5-j7h7-59w8.json create mode 100644 advisories/unreviewed/2026/04/GHSA-jvhw-jc32-v84v/GHSA-jvhw-jc32-v84v.json create mode 100644 advisories/unreviewed/2026/04/GHSA-jwr7-8589-p67w/GHSA-jwr7-8589-p67w.json create mode 100644 advisories/unreviewed/2026/04/GHSA-m58j-v3j6-3hqq/GHSA-m58j-v3j6-3hqq.json create mode 100644 advisories/unreviewed/2026/04/GHSA-mwrp-hhpc-x64f/GHSA-mwrp-hhpc-x64f.json create mode 100644 advisories/unreviewed/2026/04/GHSA-p436-pgq7-fm99/GHSA-p436-pgq7-fm99.json create mode 100644 advisories/unreviewed/2026/04/GHSA-p82p-w5j8-vgqq/GHSA-p82p-w5j8-vgqq.json create mode 100644 advisories/unreviewed/2026/04/GHSA-q23x-qvv8-gcm5/GHSA-q23x-qvv8-gcm5.json create mode 100644 advisories/unreviewed/2026/04/GHSA-q4wq-4whj-cxhx/GHSA-q4wq-4whj-cxhx.json create mode 100644 advisories/unreviewed/2026/04/GHSA-qhr7-4g47-87m7/GHSA-qhr7-4g47-87m7.json create mode 100644 advisories/unreviewed/2026/04/GHSA-r3gq-49p4-mmj6/GHSA-r3gq-49p4-mmj6.json create mode 100644 advisories/unreviewed/2026/04/GHSA-r489-83w6-974f/GHSA-r489-83w6-974f.json create mode 100644 advisories/unreviewed/2026/04/GHSA-r754-6jr2-2cg8/GHSA-r754-6jr2-2cg8.json create mode 100644 advisories/unreviewed/2026/04/GHSA-r8xp-m5j7-vp76/GHSA-r8xp-m5j7-vp76.json create mode 100644 advisories/unreviewed/2026/04/GHSA-rj5j-26xx-hh3v/GHSA-rj5j-26xx-hh3v.json create mode 100644 advisories/unreviewed/2026/04/GHSA-rmq8-6cxg-v467/GHSA-rmq8-6cxg-v467.json create mode 100644 advisories/unreviewed/2026/04/GHSA-rvfx-c797-vvhx/GHSA-rvfx-c797-vvhx.json create mode 100644 advisories/unreviewed/2026/04/GHSA-rwvq-ffmg-g3q5/GHSA-rwvq-ffmg-g3q5.json create mode 100644 advisories/unreviewed/2026/04/GHSA-v5wj-mfrc-9wrc/GHSA-v5wj-mfrc-9wrc.json create mode 100644 advisories/unreviewed/2026/04/GHSA-v7xm-xc3f-cxh9/GHSA-v7xm-xc3f-cxh9.json create mode 100644 advisories/unreviewed/2026/04/GHSA-w2j6-p7c6-6cpj/GHSA-w2j6-p7c6-6cpj.json create mode 100644 advisories/unreviewed/2026/04/GHSA-w6p7-5x7m-cr7c/GHSA-w6p7-5x7m-cr7c.json create mode 100644 advisories/unreviewed/2026/04/GHSA-wcjc-hfgv-f5wc/GHSA-wcjc-hfgv-f5wc.json create mode 100644 advisories/unreviewed/2026/04/GHSA-wfvx-63xx-rq37/GHSA-wfvx-63xx-rq37.json create mode 100644 advisories/unreviewed/2026/04/GHSA-wj59-76w3-4fv9/GHSA-wj59-76w3-4fv9.json create mode 100644 advisories/unreviewed/2026/04/GHSA-wv9q-w2v5-wfhp/GHSA-wv9q-w2v5-wfhp.json create mode 100644 advisories/unreviewed/2026/04/GHSA-x2wq-9x2f-fhj7/GHSA-x2wq-9x2f-fhj7.json create mode 100644 advisories/unreviewed/2026/04/GHSA-x3f9-vcp2-hgcw/GHSA-x3f9-vcp2-hgcw.json create mode 100644 advisories/unreviewed/2026/04/GHSA-x878-48g9-62p4/GHSA-x878-48g9-62p4.json create mode 100644 advisories/unreviewed/2026/04/GHSA-x9m8-mrxv-cvc8/GHSA-x9m8-mrxv-cvc8.json create mode 100644 advisories/unreviewed/2026/04/GHSA-xcgr-x2r4-j9mj/GHSA-xcgr-x2r4-j9mj.json create mode 100644 advisories/unreviewed/2026/04/GHSA-xmmc-cmm8-3rvm/GHSA-xmmc-cmm8-3rvm.json create mode 100644 advisories/unreviewed/2026/04/GHSA-xvmr-9p7m-jmwv/GHSA-xvmr-9p7m-jmwv.json create mode 100644 advisories/unreviewed/2026/04/GHSA-xwcp-9cqm-x4j8/GHSA-xwcp-9cqm-x4j8.json create mode 100644 advisories/unreviewed/2026/04/GHSA-xx92-xfrf-9xp3/GHSA-xx92-xfrf-9xp3.json diff --git a/advisories/github-reviewed/2026/01/GHSA-6497-prx7-gpmq/GHSA-6497-prx7-gpmq.json b/advisories/github-reviewed/2026/01/GHSA-6497-prx7-gpmq/GHSA-6497-prx7-gpmq.json index 5d6ec2fc96526..cc008164952cf 100644 --- a/advisories/github-reviewed/2026/01/GHSA-6497-prx7-gpmq/GHSA-6497-prx7-gpmq.json +++ b/advisories/github-reviewed/2026/01/GHSA-6497-prx7-gpmq/GHSA-6497-prx7-gpmq.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-6497-prx7-gpmq", - "modified": "2026-02-01T18:09:10Z", + "modified": "2026-04-21T21:31:18Z", "published": "2026-01-30T21:30:22Z", "aliases": [ "CVE-2025-69662" @@ -63,6 +63,10 @@ { "type": "WEB", "url": "https://github.com/geopandas/geopandas/releases/tag/v1.1.2" + }, + { + "type": "WEB", + "url": "https://lists.debian.org/debian-lts-announce/2026/04/msg00025.html" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-25v6-95vv-c6qq/GHSA-25v6-95vv-c6qq.json b/advisories/unreviewed/2026/04/GHSA-25v6-95vv-c6qq/GHSA-25v6-95vv-c6qq.json new file mode 100644 index 0000000000000..20ac6cad5bca0 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-25v6-95vv-c6qq/GHSA-25v6-95vv-c6qq.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-25v6-95vv-c6qq", + "modified": "2026-04-21T21:31:28Z", + "published": "2026-04-21T21:31:28Z", + "aliases": [ + "CVE-2026-35247" + ], + "details": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35247" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:40Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-26v3-j7q3-5cqg/GHSA-26v3-j7q3-5cqg.json b/advisories/unreviewed/2026/04/GHSA-26v3-j7q3-5cqg/GHSA-26v3-j7q3-5cqg.json new file mode 100644 index 0000000000000..60b1373e12724 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-26v3-j7q3-5cqg/GHSA-26v3-j7q3-5cqg.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-26v3-j7q3-5cqg", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34274" + ], + "details": "Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.2.3-12.2.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Configurator, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Configurator accessible data as well as unauthorized read access to a subset of Oracle Configurator accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34274" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-2rv4-33jh-89fc/GHSA-2rv4-33jh-89fc.json b/advisories/unreviewed/2026/04/GHSA-2rv4-33jh-89fc/GHSA-2rv4-33jh-89fc.json new file mode 100644 index 0000000000000..fc0c97ed58e7f --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-2rv4-33jh-89fc/GHSA-2rv4-33jh-89fc.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2rv4-33jh-89fc", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34315" + ], + "details": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0 and 15.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34315" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-2vgw-r373-m9qx/GHSA-2vgw-r373-m9qx.json b/advisories/unreviewed/2026/04/GHSA-2vgw-r373-m9qx/GHSA-2vgw-r373-m9qx.json index ccee1633df9ba..06f620b8d97a5 100644 --- a/advisories/unreviewed/2026/04/GHSA-2vgw-r373-m9qx/GHSA-2vgw-r373-m9qx.json +++ b/advisories/unreviewed/2026/04/GHSA-2vgw-r373-m9qx/GHSA-2vgw-r373-m9qx.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-2vgw-r373-m9qx", - "modified": "2026-04-20T21:31:46Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-20T21:31:46Z", "aliases": [ "CVE-2026-29648" ], "details": "In OpenXiangShan NEMU, when Smstateen is enabled, clearing mstateen0.ENVCFG does not correctly restrict access to henvcfg and senvcfg. As a result, less-privileged code may read or write these CSRs without the required exception, potentially bypassing intended state-enable based isolation controls in virtualized or multi-privilege environments.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-269" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-20T21:16:19Z" diff --git a/advisories/unreviewed/2026/04/GHSA-2w37-mr53-59fv/GHSA-2w37-mr53-59fv.json b/advisories/unreviewed/2026/04/GHSA-2w37-mr53-59fv/GHSA-2w37-mr53-59fv.json new file mode 100644 index 0000000000000..e11651b0c74d0 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-2w37-mr53-59fv/GHSA-2w37-mr53-59fv.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2w37-mr53-59fv", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34299" + ], + "details": "Vulnerability in the PeopleSoft Enterprise FIN Maintenance Management product of Oracle PeopleSoft (component: Work Order Management). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Maintenance Management. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise FIN Maintenance Management accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34299" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-376j-8f52-gp2x/GHSA-376j-8f52-gp2x.json b/advisories/unreviewed/2026/04/GHSA-376j-8f52-gp2x/GHSA-376j-8f52-gp2x.json new file mode 100644 index 0000000000000..98dd5c53447ae --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-376j-8f52-gp2x/GHSA-376j-8f52-gp2x.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-376j-8f52-gp2x", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-22018" + ], + "details": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22018" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-3792-hr7r-4rr7/GHSA-3792-hr7r-4rr7.json b/advisories/unreviewed/2026/04/GHSA-3792-hr7r-4rr7/GHSA-3792-hr7r-4rr7.json new file mode 100644 index 0000000000000..347616604f259 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-3792-hr7r-4rr7/GHSA-3792-hr7r-4rr7.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3792-hr7r-4rr7", + "modified": "2026-04-21T21:31:24Z", + "published": "2026-04-21T21:31:24Z", + "aliases": [ + "CVE-2025-70420" + ], + "details": "A SQL injection vulnerability exists in Genesys Latitude v25.1.0.420 that allows an authenticated attacker to execute arbitrary SQL queries against the backend database. The vulnerability is caused by unsanitized user-supplied input being concatenated directly into SQL statements.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70420" + }, + { + "type": "WEB", + "url": "https://okunsec.com/research/cve-2025-70420" + }, + { + "type": "WEB", + "url": "http://genesys.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-38r2-pp9w-hfh6/GHSA-38r2-pp9w-hfh6.json b/advisories/unreviewed/2026/04/GHSA-38r2-pp9w-hfh6/GHSA-38r2-pp9w-hfh6.json index 1fe186bcb15ad..bd0da878eefeb 100644 --- a/advisories/unreviewed/2026/04/GHSA-38r2-pp9w-hfh6/GHSA-38r2-pp9w-hfh6.json +++ b/advisories/unreviewed/2026/04/GHSA-38r2-pp9w-hfh6/GHSA-38r2-pp9w-hfh6.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-38r2-pp9w-hfh6", - "modified": "2026-04-21T15:32:21Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6767" ], "details": "Other issue in the Libraries component in NSS. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-21T13:16:22Z" diff --git a/advisories/unreviewed/2026/04/GHSA-3cff-g674-f8v5/GHSA-3cff-g674-f8v5.json b/advisories/unreviewed/2026/04/GHSA-3cff-g674-f8v5/GHSA-3cff-g674-f8v5.json new file mode 100644 index 0000000000000..d0c756b6f9a49 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-3cff-g674-f8v5/GHSA-3cff-g674-f8v5.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3cff-g674-f8v5", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35232" + ], + "details": "Vulnerability in Oracle Fusion Middleware (component: Dynamic Monitoring Service). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Fusion Middleware. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Fusion Middleware, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Fusion Middleware accessible data as well as unauthorized read access to a subset of Oracle Fusion Middleware accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35232" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:38Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-3f4r-x789-hx5r/GHSA-3f4r-x789-hx5r.json b/advisories/unreviewed/2026/04/GHSA-3f4r-x789-hx5r/GHSA-3f4r-x789-hx5r.json new file mode 100644 index 0000000000000..dabc09e133812 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-3f4r-x789-hx5r/GHSA-3f4r-x789-hx5r.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3f4r-x789-hx5r", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-22017" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22017" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-3f99-8qf2-g6v6/GHSA-3f99-8qf2-g6v6.json b/advisories/unreviewed/2026/04/GHSA-3f99-8qf2-g6v6/GHSA-3f99-8qf2-g6v6.json new file mode 100644 index 0000000000000..e579c9008ed69 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-3f99-8qf2-g6v6/GHSA-3f99-8qf2-g6v6.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3f99-8qf2-g6v6", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35230" + ], + "details": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35230" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:38Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-3fhh-pgvh-2w97/GHSA-3fhh-pgvh-2w97.json b/advisories/unreviewed/2026/04/GHSA-3fhh-pgvh-2w97/GHSA-3fhh-pgvh-2w97.json new file mode 100644 index 0000000000000..d0e4f5b42da37 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-3fhh-pgvh-2w97/GHSA-3fhh-pgvh-2w97.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3fhh-pgvh-2w97", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34272" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.6.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34272" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-3gfg-g579-3wmq/GHSA-3gfg-g579-3wmq.json b/advisories/unreviewed/2026/04/GHSA-3gfg-g579-3wmq/GHSA-3gfg-g579-3wmq.json new file mode 100644 index 0000000000000..5183c57b3985f --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-3gfg-g579-3wmq/GHSA-3gfg-g579-3wmq.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3gfg-g579-3wmq", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34267" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.45. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34267" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-3p9c-22jr-wq4x/GHSA-3p9c-22jr-wq4x.json b/advisories/unreviewed/2026/04/GHSA-3p9c-22jr-wq4x/GHSA-3p9c-22jr-wq4x.json index d2309c2e4370b..e09a01bded07a 100644 --- a/advisories/unreviewed/2026/04/GHSA-3p9c-22jr-wq4x/GHSA-3p9c-22jr-wq4x.json +++ b/advisories/unreviewed/2026/04/GHSA-3p9c-22jr-wq4x/GHSA-3p9c-22jr-wq4x.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-3p9c-22jr-wq4x", - "modified": "2026-04-21T15:32:22Z", + "modified": "2026-04-21T21:31:23Z", "published": "2026-04-21T15:32:22Z", "aliases": [ "CVE-2026-3298" @@ -27,6 +27,18 @@ "type": "WEB", "url": "https://github.com/python/cpython/pull/148809" }, + { + "type": "WEB", + "url": "https://github.com/python/cpython/commit/1274766d3c29007ab77245a72abbf8dce2a9db4d" + }, + { + "type": "WEB", + "url": "https://github.com/python/cpython/commit/27522b7d6e6588f03e61099dd858cd5a9314e2f2" + }, + { + "type": "WEB", + "url": "https://github.com/python/cpython/commit/95633d2aad4721e25e4dfd9f43dfb6e1edcbd741" + }, { "type": "WEB", "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/KWTPIQBOOOUNQP7UFSLBI437NJDFLA3F" diff --git a/advisories/unreviewed/2026/04/GHSA-3pw2-2fp4-54wm/GHSA-3pw2-2fp4-54wm.json b/advisories/unreviewed/2026/04/GHSA-3pw2-2fp4-54wm/GHSA-3pw2-2fp4-54wm.json index 457e8b713b4c8..965036059d3e5 100644 --- a/advisories/unreviewed/2026/04/GHSA-3pw2-2fp4-54wm/GHSA-3pw2-2fp4-54wm.json +++ b/advisories/unreviewed/2026/04/GHSA-3pw2-2fp4-54wm/GHSA-3pw2-2fp4-54wm.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-3pw2-2fp4-54wm", - "modified": "2026-04-21T18:31:57Z", + "modified": "2026-04-21T21:31:23Z", "published": "2026-04-21T18:31:57Z", "aliases": [ "CVE-2026-37748" ], "details": "Visitor Management System 1.0 by sanjay1313 is vulnerable to Unrestricted File Upload in vms/php/admin_user_insert.php and vms/php/update_1.php. The move_uploaded_file() function is called without any MIME type, extension, or content validation, allowing an authenticated admin to upload a PHP webshell and achieve Remote Code Execution on the server.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-434" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-21T16:16:20Z" diff --git a/advisories/unreviewed/2026/04/GHSA-3qgj-9j4x-cvhx/GHSA-3qgj-9j4x-cvhx.json b/advisories/unreviewed/2026/04/GHSA-3qgj-9j4x-cvhx/GHSA-3qgj-9j4x-cvhx.json new file mode 100644 index 0000000000000..af8e855614d76 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-3qgj-9j4x-cvhx/GHSA-3qgj-9j4x-cvhx.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3qgj-9j4x-cvhx", + "modified": "2026-04-21T21:31:24Z", + "published": "2026-04-21T21:31:24Z", + "aliases": [ + "CVE-2026-22010" + ], + "details": "Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Platform). Supported versions that are affected are 8.0.7.9, 8.0.8.7 and 8.1.2.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22010" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-3xqw-r49f-5rj8/GHSA-3xqw-r49f-5rj8.json b/advisories/unreviewed/2026/04/GHSA-3xqw-r49f-5rj8/GHSA-3xqw-r49f-5rj8.json new file mode 100644 index 0000000000000..d302881f59747 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-3xqw-r49f-5rj8/GHSA-3xqw-r49f-5rj8.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3xqw-r49f-5rj8", + "modified": "2026-04-21T21:31:24Z", + "published": "2026-04-21T21:31:24Z", + "aliases": [ + "CVE-2026-6819" + ], + "details": "HKUDS OpenHarness prior to PR #156 remediation exposes plugin lifecycle commands including /plugin install, /plugin enable, /plugin disable, and /reload-plugins to remote senders by default. Attackers who gain access through the channel layer can remotely manage plugin trust and activation state, enabling unauthorized plugin installation and activation on the system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6819" + }, + { + "type": "WEB", + "url": "https://github.com/HKUDS/OpenHarness/pull/156" + }, + { + "type": "WEB", + "url": "https://github.com/HKUDS/OpenHarness/commit/59017e09880fcf9a6f60456a84fb982900b2c0b2" + }, + { + "type": "WEB", + "url": "https://github.com/HKUDS/OpenHarness/releases/tag/v0.1.7" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/hkuds-openharness-plugin-management-command-exposure" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-276" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T20:17:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-42m9-g5m6-v663/GHSA-42m9-g5m6-v663.json b/advisories/unreviewed/2026/04/GHSA-42m9-g5m6-v663/GHSA-42m9-g5m6-v663.json new file mode 100644 index 0000000000000..8086e1b62e6e3 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-42m9-g5m6-v663/GHSA-42m9-g5m6-v663.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-42m9-g5m6-v663", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34293" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.0-8.0.45. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34293" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-42q6-42c2-vcj7/GHSA-42q6-42c2-vcj7.json b/advisories/unreviewed/2026/04/GHSA-42q6-42c2-vcj7/GHSA-42q6-42c2-vcj7.json new file mode 100644 index 0000000000000..b4ae13e303022 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-42q6-42c2-vcj7/GHSA-42q6-42c2-vcj7.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-42q6-42c2-vcj7", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34279" + ], + "details": "Vulnerability in the Oracle Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Event Management). Supported versions that are affected are 13.5 and 24.1. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Enterprise Manager Base Platform. While the vulnerability is in Oracle Enterprise Manager Base Platform, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Enterprise Manager Base Platform. CVSS 3.1 Base Score 9.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34279" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-45mv-v7v7-qcr2/GHSA-45mv-v7v7-qcr2.json b/advisories/unreviewed/2026/04/GHSA-45mv-v7v7-qcr2/GHSA-45mv-v7v7-qcr2.json new file mode 100644 index 0000000000000..4ccb602a52230 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-45mv-v7v7-qcr2/GHSA-45mv-v7v7-qcr2.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-45mv-v7v7-qcr2", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34314" + ], + "details": "Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Platform). Supported versions that are affected are 8.0.7.9, 8.0.8.7 and 8.1.2.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Analytical Applications Infrastructure accessible data as well as unauthorized access to critical data or complete access to all Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.1 Base Score 6.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34314" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-4h9j-w885-pqx6/GHSA-4h9j-w885-pqx6.json b/advisories/unreviewed/2026/04/GHSA-4h9j-w885-pqx6/GHSA-4h9j-w885-pqx6.json new file mode 100644 index 0000000000000..a240c1598847a --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-4h9j-w885-pqx6/GHSA-4h9j-w885-pqx6.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4h9j-w885-pqx6", + "modified": "2026-04-21T21:31:24Z", + "published": "2026-04-21T21:31:24Z", + "aliases": [ + "CVE-2026-22002" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22002" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-4mrw-82h5-p7hx/GHSA-4mrw-82h5-p7hx.json b/advisories/unreviewed/2026/04/GHSA-4mrw-82h5-p7hx/GHSA-4mrw-82h5-p7hx.json index 3ca37133a62e3..214625fe8ee6d 100644 --- a/advisories/unreviewed/2026/04/GHSA-4mrw-82h5-p7hx/GHSA-4mrw-82h5-p7hx.json +++ b/advisories/unreviewed/2026/04/GHSA-4mrw-82h5-p7hx/GHSA-4mrw-82h5-p7hx.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-4mrw-82h5-p7hx", - "modified": "2026-04-21T15:32:22Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-21T15:32:22Z", "aliases": [ "CVE-2026-31014" ], "details": "Dovestones Softwares AD Self Update <4.0.0.5 is vulnerable to Cross Site Request Forgery (CSRF). The affected endpoint processes state-changing requests without requiring a CSRF token or equivalent protection. The endpoint accepts application/x-www-form-urlencoded requests, and an originally POST-based request can be converted to a GET request while still successfully updating user details. This allows an attacker to craft a malicious request that, when visited by an authenticated user, can modify user account information without their consent.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-21T15:16:36Z" diff --git a/advisories/unreviewed/2026/04/GHSA-55h4-p6x2-6526/GHSA-55h4-p6x2-6526.json b/advisories/unreviewed/2026/04/GHSA-55h4-p6x2-6526/GHSA-55h4-p6x2-6526.json new file mode 100644 index 0000000000000..b15923c1fb0fc --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-55h4-p6x2-6526/GHSA-55h4-p6x2-6526.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-55h4-p6x2-6526", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-34320" + ], + "details": "Vulnerability in the Oracle Financial Services Customer Screening product of Oracle Financial Services Applications (component: User Interface). The supported version that is affected is 8.1.2.8.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Customer Screening. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Financial Services Customer Screening accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34320" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-564h-hx6x-wg47/GHSA-564h-hx6x-wg47.json b/advisories/unreviewed/2026/04/GHSA-564h-hx6x-wg47/GHSA-564h-hx6x-wg47.json new file mode 100644 index 0000000000000..299419da335e0 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-564h-hx6x-wg47/GHSA-564h-hx6x-wg47.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-564h-hx6x-wg47", + "modified": "2026-04-21T21:31:28Z", + "published": "2026-04-21T21:31:28Z", + "aliases": [ + "CVE-2026-6823" + ], + "details": "HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit allow_from = [\"*\"] permitting arbitrary remote senders to pass admission checks. Attackers who can reach the configured channel can bypass access controls and reach host-backed agent runtimes, potentially leading to unauthorized file disclosure and read access through default-enabled read-only tools.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6823" + }, + { + "type": "WEB", + "url": "https://github.com/HKUDS/OpenHarness/pull/147" + }, + { + "type": "WEB", + "url": "https://github.com/HKUDS/OpenHarness/commit/fab40c6eabfb15f2bdf23cddd3cfe66a64ea203d" + }, + { + "type": "WEB", + "url": "https://github.com/HKUDS/OpenHarness/releases/tag/v0.1.7" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/hkuds-openharness-insecure-default-remote-channel-allowlist" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-276" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:48Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-565v-jcgw-g7vh/GHSA-565v-jcgw-g7vh.json b/advisories/unreviewed/2026/04/GHSA-565v-jcgw-g7vh/GHSA-565v-jcgw-g7vh.json new file mode 100644 index 0000000000000..b549a8fce4bae --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-565v-jcgw-g7vh/GHSA-565v-jcgw-g7vh.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-565v-jcgw-g7vh", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34303" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34303" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-572m-7g95-9x94/GHSA-572m-7g95-9x94.json b/advisories/unreviewed/2026/04/GHSA-572m-7g95-9x94/GHSA-572m-7g95-9x94.json new file mode 100644 index 0000000000000..60a69af1bb56d --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-572m-7g95-9x94/GHSA-572m-7g95-9x94.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-572m-7g95-9x94", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34307" + ], + "details": "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Workflow). Supported versions that are affected are 8.61-8.62. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34307" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-5qjr-2xxv-p9m9/GHSA-5qjr-2xxv-p9m9.json b/advisories/unreviewed/2026/04/GHSA-5qjr-2xxv-p9m9/GHSA-5qjr-2xxv-p9m9.json new file mode 100644 index 0000000000000..e60c07f22ac55 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-5qjr-2xxv-p9m9/GHSA-5qjr-2xxv-p9m9.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5qjr-2xxv-p9m9", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-33518" + ], + "details": "An incorrect privilege assignment vulnerability exists in Esri Portal for ArcGIS 11.5 in Windows and Linux that allows highly privileged users to create developer credentials that may grant more privileges than expected.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33518" + }, + { + "type": "WEB", + "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/april2026_security_bulletin" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-266" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-5wvf-8jjj-7w99/GHSA-5wvf-8jjj-7w99.json b/advisories/unreviewed/2026/04/GHSA-5wvf-8jjj-7w99/GHSA-5wvf-8jjj-7w99.json index b32c620cb21d6..e2d3c99533334 100644 --- a/advisories/unreviewed/2026/04/GHSA-5wvf-8jjj-7w99/GHSA-5wvf-8jjj-7w99.json +++ b/advisories/unreviewed/2026/04/GHSA-5wvf-8jjj-7w99/GHSA-5wvf-8jjj-7w99.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-5wvf-8jjj-7w99", - "modified": "2026-04-21T15:32:19Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-21T15:32:19Z", "aliases": [ "CVE-2026-6752" ], "details": "Incorrect boundary conditions in the WebRTC component. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-21T13:16:21Z" diff --git a/advisories/unreviewed/2026/04/GHSA-62mx-j2c2-7953/GHSA-62mx-j2c2-7953.json b/advisories/unreviewed/2026/04/GHSA-62mx-j2c2-7953/GHSA-62mx-j2c2-7953.json new file mode 100644 index 0000000000000..fc9eaf177c587 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-62mx-j2c2-7953/GHSA-62mx-j2c2-7953.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-62mx-j2c2-7953", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-34323" + ], + "details": "Vulnerability in the Oracle Life Sciences InForm product of Oracle Life Science Applications (component: IDM Authentication). Supported versions that are affected are 7.0.1.0 and 7.0.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Life Sciences InForm. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Life Sciences InForm accessible data as well as unauthorized read access to a subset of Oracle Life Sciences InForm accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Life Sciences InForm. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34323" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-65fp-7g2v-658r/GHSA-65fp-7g2v-658r.json b/advisories/unreviewed/2026/04/GHSA-65fp-7g2v-658r/GHSA-65fp-7g2v-658r.json new file mode 100644 index 0000000000000..573b6f4b49590 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-65fp-7g2v-658r/GHSA-65fp-7g2v-658r.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-65fp-7g2v-658r", + "modified": "2026-04-21T21:31:23Z", + "published": "2026-04-21T21:31:23Z", + "aliases": [ + "CVE-2026-6745" + ], + "details": "A vulnerability was determined in Bagisto up to 2.3.15. Affected by this vulnerability is an unknown functionality of the component Custom Scripts Handler. This manipulation causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure and explains: \"We already replied on the github advisories. All the security issues are addressed through security advisory. We will fix this in our upcomming releases.\"", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6745" + }, + { + "type": "WEB", + "url": "https://drive.google.com/drive/folders/10p6SYcSVyfaaTg_dgItzMJvqixcmKnHR?usp=sharing" + }, + { + "type": "WEB", + "url": "https://vuldb.com/submit/794681" + }, + { + "type": "WEB", + "url": "https://vuldb.com/vuln/358436" + }, + { + "type": "WEB", + "url": "https://vuldb.com/vuln/358436/cti" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T19:16:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-6fj2-3r4w-jj8f/GHSA-6fj2-3r4w-jj8f.json b/advisories/unreviewed/2026/04/GHSA-6fj2-3r4w-jj8f/GHSA-6fj2-3r4w-jj8f.json new file mode 100644 index 0000000000000..9854e8fb8897f --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-6fj2-3r4w-jj8f/GHSA-6fj2-3r4w-jj8f.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6fj2-3r4w-jj8f", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34266" + ], + "details": "Vulnerability in the PeopleSoft Enterprise HCM Absence Management product of Oracle PeopleSoft (component: Absence Management). The supported version that is affected is 9.2. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Absence Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise HCM Absence Management accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise HCM Absence Management accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34266" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-6fw3-qc3h-w7c9/GHSA-6fw3-qc3h-w7c9.json b/advisories/unreviewed/2026/04/GHSA-6fw3-qc3h-w7c9/GHSA-6fw3-qc3h-w7c9.json new file mode 100644 index 0000000000000..bca661b4aca96 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-6fw3-qc3h-w7c9/GHSA-6fw3-qc3h-w7c9.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6fw3-qc3h-w7c9", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34312" + ], + "details": "Vulnerability in the RDBMS component of Oracle Database Server. Supported versions that are affected are 19.3-19.30. Easily exploitable vulnerability allows high privileged attacker having Row Access Method privilege with network access via multiple protocols to compromise RDBMS. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of RDBMS accessible data. CVSS 3.1 Base Score 2.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34312" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-6pg9-3wf4-7w8v/GHSA-6pg9-3wf4-7w8v.json b/advisories/unreviewed/2026/04/GHSA-6pg9-3wf4-7w8v/GHSA-6pg9-3wf4-7w8v.json index 2a8df11fea1ac..963abe55daba4 100644 --- a/advisories/unreviewed/2026/04/GHSA-6pg9-3wf4-7w8v/GHSA-6pg9-3wf4-7w8v.json +++ b/advisories/unreviewed/2026/04/GHSA-6pg9-3wf4-7w8v/GHSA-6pg9-3wf4-7w8v.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-6pg9-3wf4-7w8v", - "modified": "2026-04-21T00:32:14Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-21T00:32:14Z", "aliases": [ "CVE-2026-29643" ], "details": "XiangShan (Open-source high-performance RISC-V processor) commit edb1dfaf7d290ae99724594507dc46c2c2125384 (2024-11-28) contains an improper exceptional-condition handling flaw in its CSR subsystem (NewCSR). On affected versions, certain sequences of CSR operations targeting non-existent/custom CSR addresses may trigger an illegal-instruction exception but fail to reliably transfer control to the configured trap handler (mtvec), causing control-flow disruption and potentially leaving the core in a hung or unrecoverable state. This can be exploited by a local attacker able to execute code on the processor to cause a denial of service and potentially inconsistent architectural state.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-703" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-20T22:16:23Z" diff --git a/advisories/unreviewed/2026/04/GHSA-6pjm-v57q-8qfm/GHSA-6pjm-v57q-8qfm.json b/advisories/unreviewed/2026/04/GHSA-6pjm-v57q-8qfm/GHSA-6pjm-v57q-8qfm.json new file mode 100644 index 0000000000000..b7ee6bf02e443 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-6pjm-v57q-8qfm/GHSA-6pjm-v57q-8qfm.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6pjm-v57q-8qfm", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34283" + ], + "details": "Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: Identity Console). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Identity Manager. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Identity Manager, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Identity Manager accessible data as well as unauthorized read access to a subset of Oracle Identity Manager accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34283" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-6r7m-2wh8-438w/GHSA-6r7m-2wh8-438w.json b/advisories/unreviewed/2026/04/GHSA-6r7m-2wh8-438w/GHSA-6r7m-2wh8-438w.json index 15f3ee6ce23ed..2011d00c36a5b 100644 --- a/advisories/unreviewed/2026/04/GHSA-6r7m-2wh8-438w/GHSA-6r7m-2wh8-438w.json +++ b/advisories/unreviewed/2026/04/GHSA-6r7m-2wh8-438w/GHSA-6r7m-2wh8-438w.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-6r7m-2wh8-438w", - "modified": "2026-04-21T18:31:57Z", + "modified": "2026-04-21T21:31:23Z", "published": "2026-04-21T18:31:57Z", "aliases": [ "CVE-2017-20230" @@ -38,6 +38,10 @@ { "type": "WEB", "url": "https://www.nntp.perl.org/group/perl.perl5.porters/2017/01/msg242703.html" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2026/04/21/5" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-729m-5x6m-wwxv/GHSA-729m-5x6m-wwxv.json b/advisories/unreviewed/2026/04/GHSA-729m-5x6m-wwxv/GHSA-729m-5x6m-wwxv.json index c83a9fab04820..234ff1e025add 100644 --- a/advisories/unreviewed/2026/04/GHSA-729m-5x6m-wwxv/GHSA-729m-5x6m-wwxv.json +++ b/advisories/unreviewed/2026/04/GHSA-729m-5x6m-wwxv/GHSA-729m-5x6m-wwxv.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-729m-5x6m-wwxv", - "modified": "2026-04-20T21:31:45Z", + "modified": "2026-04-21T21:31:21Z", "published": "2026-04-20T21:31:45Z", "aliases": [ "CVE-2026-29646" ], "details": "In OpenXiangShan NEMU prior to 55295c4, when running with RVH (Hypervisor extension) enabled, a VS-mode guest write to the supervisor interrupt-enable CSR (sie) may be handled incorrectly and can influence machine-level interrupt enable state (mie). This breaks privilege/virtualization isolation and can lead to denial of service or privilege-boundary violation in environments relying on NEMU for correct interrupt virtualization.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -44,8 +49,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-267" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-20T21:16:19Z" diff --git a/advisories/unreviewed/2026/04/GHSA-75hh-423h-rvwg/GHSA-75hh-423h-rvwg.json b/advisories/unreviewed/2026/04/GHSA-75hh-423h-rvwg/GHSA-75hh-423h-rvwg.json new file mode 100644 index 0000000000000..d6fda2d537b7e --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-75hh-423h-rvwg/GHSA-75hh-423h-rvwg.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-75hh-423h-rvwg", + "modified": "2026-04-21T21:31:24Z", + "published": "2026-04-21T21:31:24Z", + "aliases": [ + "CVE-2026-22013" + ], + "details": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JGSS). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22013" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-75xc-fv5m-pprr/GHSA-75xc-fv5m-pprr.json b/advisories/unreviewed/2026/04/GHSA-75xc-fv5m-pprr/GHSA-75xc-fv5m-pprr.json index b7413c59b0755..4889f9df66537 100644 --- a/advisories/unreviewed/2026/04/GHSA-75xc-fv5m-pprr/GHSA-75xc-fv5m-pprr.json +++ b/advisories/unreviewed/2026/04/GHSA-75xc-fv5m-pprr/GHSA-75xc-fv5m-pprr.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-75xc-fv5m-pprr", - "modified": "2026-04-21T15:32:19Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-21T15:32:19Z", "aliases": [ "CVE-2026-6748" ], "details": "Uninitialized memory in the Audio/Video: Web Codecs component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-457" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-21T13:16:20Z" diff --git a/advisories/unreviewed/2026/04/GHSA-7625-jhq2-5p8g/GHSA-7625-jhq2-5p8g.json b/advisories/unreviewed/2026/04/GHSA-7625-jhq2-5p8g/GHSA-7625-jhq2-5p8g.json index 71c4db336e38f..56528e602711e 100644 --- a/advisories/unreviewed/2026/04/GHSA-7625-jhq2-5p8g/GHSA-7625-jhq2-5p8g.json +++ b/advisories/unreviewed/2026/04/GHSA-7625-jhq2-5p8g/GHSA-7625-jhq2-5p8g.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-7625-jhq2-5p8g", - "modified": "2026-04-21T15:32:21Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6773" ], "details": "Denial-of-service due to integer overflow in the Graphics: WebGPU component. This vulnerability was fixed in Firefox 150.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-190" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-21T13:16:23Z" diff --git a/advisories/unreviewed/2026/04/GHSA-7642-f8gh-qxjj/GHSA-7642-f8gh-qxjj.json b/advisories/unreviewed/2026/04/GHSA-7642-f8gh-qxjj/GHSA-7642-f8gh-qxjj.json new file mode 100644 index 0000000000000..a0ed4e6411604 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-7642-f8gh-qxjj/GHSA-7642-f8gh-qxjj.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7642-f8gh-qxjj", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34270" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34270" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-7mfh-vh4q-xgr5/GHSA-7mfh-vh4q-xgr5.json b/advisories/unreviewed/2026/04/GHSA-7mfh-vh4q-xgr5/GHSA-7mfh-vh4q-xgr5.json new file mode 100644 index 0000000000000..26333a6ae06cd --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-7mfh-vh4q-xgr5/GHSA-7mfh-vh4q-xgr5.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7mfh-vh4q-xgr5", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34296" + ], + "details": "Vulnerability in the Oracle Agile Product Lifecycle Management for Process product of Oracle Supply Chain (component: Product Quality Management). The supported version that is affected is 6.2.4. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile Product Lifecycle Management for Process. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Agile Product Lifecycle Management for Process accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34296" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-7q78-vx6h-h3wf/GHSA-7q78-vx6h-h3wf.json b/advisories/unreviewed/2026/04/GHSA-7q78-vx6h-h3wf/GHSA-7q78-vx6h-h3wf.json new file mode 100644 index 0000000000000..07067f364e458 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-7q78-vx6h-h3wf/GHSA-7q78-vx6h-h3wf.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7q78-vx6h-h3wf", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34309" + ], + "details": "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Security). Supported versions that are affected are 8.61-8.62. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34309" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-829p-mc9m-7xhr/GHSA-829p-mc9m-7xhr.json b/advisories/unreviewed/2026/04/GHSA-829p-mc9m-7xhr/GHSA-829p-mc9m-7xhr.json index 38731b29d3e35..a07c6c92cb846 100644 --- a/advisories/unreviewed/2026/04/GHSA-829p-mc9m-7xhr/GHSA-829p-mc9m-7xhr.json +++ b/advisories/unreviewed/2026/04/GHSA-829p-mc9m-7xhr/GHSA-829p-mc9m-7xhr.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-829p-mc9m-7xhr", - "modified": "2026-04-20T21:31:47Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-20T21:31:47Z", "aliases": [ "CVE-2026-5928" ], "details": "Calling the ungetwc function on a FILE stream with wide characters encoded in a character set that has overlaps between its single byte and multi-byte character encodings, in the GNU C Library version 2.43 or earlier, may result in an attempt to read bytes before an allocated buffer, potentially resulting in unintentional disclosure of neighboring data in the heap, or a program crash.\n\nA bug in the wide character pushback implementation (_IO_wdefault_pbackfail in libio/wgenops.c) causes ungetwc() to operate on the regular character buffer (fp->_IO_read_ptr) instead of the actual wide-stream read pointer (fp->_wide_data->_IO_read_ptr). The program crash may happen in cases where fp->_IO_read_ptr is not initialized and hence points to NULL. The buffer under-read requires a special situation where the input character encoding is such that there are overlaps between single byte representations and multibyte representations in that encoding, resulting in spurious matches. The spurious match case is not possible in the standard Unicode character sets.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -23,7 +28,7 @@ "cwe_ids": [ "CWE-127" ], - "severity": null, + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-20T21:16:36Z" diff --git a/advisories/unreviewed/2026/04/GHSA-8833-3jph-2h9h/GHSA-8833-3jph-2h9h.json b/advisories/unreviewed/2026/04/GHSA-8833-3jph-2h9h/GHSA-8833-3jph-2h9h.json new file mode 100644 index 0000000000000..35fb0ee7c3661 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-8833-3jph-2h9h/GHSA-8833-3jph-2h9h.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8833-3jph-2h9h", + "modified": "2026-04-21T21:31:24Z", + "published": "2026-04-21T21:31:24Z", + "aliases": [ + "CVE-2026-22005" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22005" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-88fc-5m2g-g6q2/GHSA-88fc-5m2g-g6q2.json b/advisories/unreviewed/2026/04/GHSA-88fc-5m2g-g6q2/GHSA-88fc-5m2g-g6q2.json index 572243694b46b..8d0aed1d434a9 100644 --- a/advisories/unreviewed/2026/04/GHSA-88fc-5m2g-g6q2/GHSA-88fc-5m2g-g6q2.json +++ b/advisories/unreviewed/2026/04/GHSA-88fc-5m2g-g6q2/GHSA-88fc-5m2g-g6q2.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-88fc-5m2g-g6q2", - "modified": "2026-04-21T15:32:21Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6771" ], "details": "Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-288" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-21T13:16:22Z" diff --git a/advisories/unreviewed/2026/04/GHSA-8hfr-pcm2-774v/GHSA-8hfr-pcm2-774v.json b/advisories/unreviewed/2026/04/GHSA-8hfr-pcm2-774v/GHSA-8hfr-pcm2-774v.json new file mode 100644 index 0000000000000..8fa248affa93d --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-8hfr-pcm2-774v/GHSA-8hfr-pcm2-774v.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8hfr-pcm2-774v", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34271" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34271" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-8j6w-gmm7-v874/GHSA-8j6w-gmm7-v874.json b/advisories/unreviewed/2026/04/GHSA-8j6w-gmm7-v874/GHSA-8j6w-gmm7-v874.json new file mode 100644 index 0000000000000..787e47ecf60c8 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-8j6w-gmm7-v874/GHSA-8j6w-gmm7-v874.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8j6w-gmm7-v874", + "modified": "2026-04-21T21:31:24Z", + "published": "2026-04-21T21:31:24Z", + "aliases": [ + "CVE-2026-21999" + ], + "details": "Vulnerability in the XML Database component of Oracle Database Server. Supported versions that are affected are 23.4.0-23.26.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise XML Database. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all XML Database accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21999" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-8p5x-j4cx-8cwg/GHSA-8p5x-j4cx-8cwg.json b/advisories/unreviewed/2026/04/GHSA-8p5x-j4cx-8cwg/GHSA-8p5x-j4cx-8cwg.json index 358ae3db98285..5e1b4c500cbc3 100644 --- a/advisories/unreviewed/2026/04/GHSA-8p5x-j4cx-8cwg/GHSA-8p5x-j4cx-8cwg.json +++ b/advisories/unreviewed/2026/04/GHSA-8p5x-j4cx-8cwg/GHSA-8p5x-j4cx-8cwg.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-8p5x-j4cx-8cwg", - "modified": "2026-04-21T18:31:57Z", + "modified": "2026-04-21T21:31:23Z", "published": "2026-04-21T18:31:57Z", "aliases": [ "CVE-2026-38834" ], "details": "Tenda W30E V2.0 V16.01.0.21 was found to contain a command injection vulnerability in the do_ping_action function via the hostName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-77" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-21T17:16:53Z" diff --git a/advisories/unreviewed/2026/04/GHSA-8w4w-q822-g7ph/GHSA-8w4w-q822-g7ph.json b/advisories/unreviewed/2026/04/GHSA-8w4w-q822-g7ph/GHSA-8w4w-q822-g7ph.json index 298a001945f80..295ded495c03d 100644 --- a/advisories/unreviewed/2026/04/GHSA-8w4w-q822-g7ph/GHSA-8w4w-q822-g7ph.json +++ b/advisories/unreviewed/2026/04/GHSA-8w4w-q822-g7ph/GHSA-8w4w-q822-g7ph.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-8w4w-q822-g7ph", - "modified": "2026-04-20T21:31:46Z", + "modified": "2026-04-21T21:31:21Z", "published": "2026-04-20T21:31:46Z", "aliases": [ "CVE-2026-29647" ], "details": "In OpenXiangShan NEMU, insufficient Smstateen permission enforcement allows lower-privileged code to access IMSIC state via stopei/vstopei CSRs even when mstateen0.IMSIC is cleared, potentially enabling cross-context information leakage or disruption of interrupt handling.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-269" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-20T21:16:19Z" diff --git a/advisories/unreviewed/2026/04/GHSA-93m8-r373-2q8w/GHSA-93m8-r373-2q8w.json b/advisories/unreviewed/2026/04/GHSA-93m8-r373-2q8w/GHSA-93m8-r373-2q8w.json new file mode 100644 index 0000000000000..1c9223f503944 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-93m8-r373-2q8w/GHSA-93m8-r373-2q8w.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-93m8-r373-2q8w", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35237" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35237" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:39Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-94w8-x4g3-jq5m/GHSA-94w8-x4g3-jq5m.json b/advisories/unreviewed/2026/04/GHSA-94w8-x4g3-jq5m/GHSA-94w8-x4g3-jq5m.json new file mode 100644 index 0000000000000..620f4a8e57471 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-94w8-x4g3-jq5m/GHSA-94w8-x4g3-jq5m.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-94w8-x4g3-jq5m", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35231" + ], + "details": "Vulnerability in the Oracle Financial Services Transaction Filtering product of Oracle Financial Services Applications (component: User Interface). The supported version that is affected is 8.1.2.8.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Transaction Filtering. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Financial Services Transaction Filtering accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35231" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:38Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-98wp-jqw8-cr49/GHSA-98wp-jqw8-cr49.json b/advisories/unreviewed/2026/04/GHSA-98wp-jqw8-cr49/GHSA-98wp-jqw8-cr49.json new file mode 100644 index 0000000000000..f634ab32f98f8 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-98wp-jqw8-cr49/GHSA-98wp-jqw8-cr49.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-98wp-jqw8-cr49", + "modified": "2026-04-21T21:31:28Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35248" + ], + "details": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 5.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35248" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:40Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-9grw-5h83-65p3/GHSA-9grw-5h83-65p3.json b/advisories/unreviewed/2026/04/GHSA-9grw-5h83-65p3/GHSA-9grw-5h83-65p3.json new file mode 100644 index 0000000000000..9d4428fd3d072 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-9grw-5h83-65p3/GHSA-9grw-5h83-65p3.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9grw-5h83-65p3", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-22021" + ], + "details": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22021" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-9m35-v5wh-m3xw/GHSA-9m35-v5wh-m3xw.json b/advisories/unreviewed/2026/04/GHSA-9m35-v5wh-m3xw/GHSA-9m35-v5wh-m3xw.json index 18c0e2ce916f8..2b3fc58ac7ede 100644 --- a/advisories/unreviewed/2026/04/GHSA-9m35-v5wh-m3xw/GHSA-9m35-v5wh-m3xw.json +++ b/advisories/unreviewed/2026/04/GHSA-9m35-v5wh-m3xw/GHSA-9m35-v5wh-m3xw.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-9m35-v5wh-m3xw", - "modified": "2026-04-20T21:31:45Z", + "modified": "2026-04-21T21:31:21Z", "published": "2026-04-20T21:31:45Z", "aliases": [ "CVE-2026-29642" ], "details": "A local attacker who can execute privileged CSR operations (or can induce firmware to do so) performs carefully crafted reads/writes to menvcfg (e.g., csrrs in M-mode). On affected XiangShan versions (commit aecf601e803bfd2371667a3fb60bfcd83c333027, 2024-11-19), these menvcfg accesses can unexpectedly set WPRI (reserved) bits in the status view (xstatus) to 1. RISC-V defines WPRI fields as \"writes preserve values, reads ignore values,\" i.e., they must not be modified by software manipulating other fields, and menvcfg itself contains multiple WPRI fields.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-1244" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-20T21:16:19Z" diff --git a/advisories/unreviewed/2026/04/GHSA-9m62-hmpm-rr2m/GHSA-9m62-hmpm-rr2m.json b/advisories/unreviewed/2026/04/GHSA-9m62-hmpm-rr2m/GHSA-9m62-hmpm-rr2m.json new file mode 100644 index 0000000000000..8a4be45bae109 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-9m62-hmpm-rr2m/GHSA-9m62-hmpm-rr2m.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9m62-hmpm-rr2m", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-22016" + ], + "details": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22016" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-9qx2-6rq5-w5jj/GHSA-9qx2-6rq5-w5jj.json b/advisories/unreviewed/2026/04/GHSA-9qx2-6rq5-w5jj/GHSA-9qx2-6rq5-w5jj.json new file mode 100644 index 0000000000000..f9f1614243dcc --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-9qx2-6rq5-w5jj/GHSA-9qx2-6rq5-w5jj.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9qx2-6rq5-w5jj", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35245" + ], + "details": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via RDP to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35245" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:40Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-9v46-qvxf-wrwq/GHSA-9v46-qvxf-wrwq.json b/advisories/unreviewed/2026/04/GHSA-9v46-qvxf-wrwq/GHSA-9v46-qvxf-wrwq.json new file mode 100644 index 0000000000000..3b1f4058df20d --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-9v46-qvxf-wrwq/GHSA-9v46-qvxf-wrwq.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9v46-qvxf-wrwq", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35239" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35239" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:39Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-c26m-jpm8-jfvw/GHSA-c26m-jpm8-jfvw.json b/advisories/unreviewed/2026/04/GHSA-c26m-jpm8-jfvw/GHSA-c26m-jpm8-jfvw.json new file mode 100644 index 0000000000000..190832616427d --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-c26m-jpm8-jfvw/GHSA-c26m-jpm8-jfvw.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c26m-jpm8-jfvw", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35235" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: GIS). Supported versions that are affected are 9.0.0-9.6.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35235" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:39Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-c2pf-f8x2-95m2/GHSA-c2pf-f8x2-95m2.json b/advisories/unreviewed/2026/04/GHSA-c2pf-f8x2-95m2/GHSA-c2pf-f8x2-95m2.json new file mode 100644 index 0000000000000..d5b299573e7ca --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-c2pf-f8x2-95m2/GHSA-c2pf-f8x2-95m2.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c2pf-f8x2-95m2", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35238" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35238" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:39Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-c2q7-642g-3vwr/GHSA-c2q7-642g-3vwr.json b/advisories/unreviewed/2026/04/GHSA-c2q7-642g-3vwr/GHSA-c2q7-642g-3vwr.json index e697047dd8531..b4a675efd0a41 100644 --- a/advisories/unreviewed/2026/04/GHSA-c2q7-642g-3vwr/GHSA-c2q7-642g-3vwr.json +++ b/advisories/unreviewed/2026/04/GHSA-c2q7-642g-3vwr/GHSA-c2q7-642g-3vwr.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-c2q7-642g-3vwr", - "modified": "2026-04-21T15:32:21Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6772" ], "details": "Incorrect boundary conditions in the Libraries component in NSS. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-754" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-21T13:16:23Z" diff --git a/advisories/unreviewed/2026/04/GHSA-c6rq-x839-cgp6/GHSA-c6rq-x839-cgp6.json b/advisories/unreviewed/2026/04/GHSA-c6rq-x839-cgp6/GHSA-c6rq-x839-cgp6.json index bf573d4010eab..95fb9604501f3 100644 --- a/advisories/unreviewed/2026/04/GHSA-c6rq-x839-cgp6/GHSA-c6rq-x839-cgp6.json +++ b/advisories/unreviewed/2026/04/GHSA-c6rq-x839-cgp6/GHSA-c6rq-x839-cgp6.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-c6rq-x839-cgp6", - "modified": "2026-04-21T15:32:20Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-21T15:32:20Z", "aliases": [ "CVE-2026-6764" ], "details": "Incorrect boundary conditions in the DOM: Device Interfaces component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-21T13:16:22Z" diff --git a/advisories/unreviewed/2026/04/GHSA-c9q5-q8r3-8m2c/GHSA-c9q5-q8r3-8m2c.json b/advisories/unreviewed/2026/04/GHSA-c9q5-q8r3-8m2c/GHSA-c9q5-q8r3-8m2c.json new file mode 100644 index 0000000000000..50ac3a4042dfd --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-c9q5-q8r3-8m2c/GHSA-c9q5-q8r3-8m2c.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c9q5-q8r3-8m2c", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34295" + ], + "details": "Vulnerability in the PeopleSoft Enterprise SCM Purchasing product of Oracle PeopleSoft (component: Purchasing). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise SCM Purchasing. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise SCM Purchasing accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34295" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-cc6c-v4r7-vf9x/GHSA-cc6c-v4r7-vf9x.json b/advisories/unreviewed/2026/04/GHSA-cc6c-v4r7-vf9x/GHSA-cc6c-v4r7-vf9x.json new file mode 100644 index 0000000000000..8262117734ad8 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-cc6c-v4r7-vf9x/GHSA-cc6c-v4r7-vf9x.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cc6c-v4r7-vf9x", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34291" + ], + "details": "Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HTTP Server. While the vulnerability is in Oracle HTTP Server, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle HTTP Server accessible data as well as unauthorized access to critical data or complete access to all Oracle HTTP Server accessible data. CVSS 3.1 Base Score 8.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34291" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-cccj-xpm5-2hpx/GHSA-cccj-xpm5-2hpx.json b/advisories/unreviewed/2026/04/GHSA-cccj-xpm5-2hpx/GHSA-cccj-xpm5-2hpx.json new file mode 100644 index 0000000000000..c080047bb3697 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-cccj-xpm5-2hpx/GHSA-cccj-xpm5-2hpx.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cccj-xpm5-2hpx", + "modified": "2026-04-21T21:31:24Z", + "published": "2026-04-21T21:31:24Z", + "aliases": [ + "CVE-2026-22004" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22004" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-chmq-27rf-6923/GHSA-chmq-27rf-6923.json b/advisories/unreviewed/2026/04/GHSA-chmq-27rf-6923/GHSA-chmq-27rf-6923.json new file mode 100644 index 0000000000000..b55d48a4cd1a1 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-chmq-27rf-6923/GHSA-chmq-27rf-6923.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-chmq-27rf-6923", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-22014" + ], + "details": "Vulnerability in the Oracle User Management product of Oracle E-Business Suite (component: Workflow and Business Events). Supported versions that are affected are 12.2.7-12.2.15. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle User Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle User Management accessible data as well as unauthorized read access to a subset of Oracle User Management accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22014" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-cj86-2v89-gm24/GHSA-cj86-2v89-gm24.json b/advisories/unreviewed/2026/04/GHSA-cj86-2v89-gm24/GHSA-cj86-2v89-gm24.json new file mode 100644 index 0000000000000..4b66068abf599 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-cj86-2v89-gm24/GHSA-cj86-2v89-gm24.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cj86-2v89-gm24", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-34324" + ], + "details": "Vulnerability in the Oracle Life Sciences InForm product of Oracle Life Science Applications (component: App Server). Supported versions that are affected are 7.0.1.0 and 7.0.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Life Sciences InForm. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Life Sciences InForm accessible data as well as unauthorized read access to a subset of Oracle Life Sciences InForm accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34324" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:38Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-crfw-8vvm-pm25/GHSA-crfw-8vvm-pm25.json b/advisories/unreviewed/2026/04/GHSA-crfw-8vvm-pm25/GHSA-crfw-8vvm-pm25.json new file mode 100644 index 0000000000000..5fe63572374d8 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-crfw-8vvm-pm25/GHSA-crfw-8vvm-pm25.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-crfw-8vvm-pm25", + "modified": "2026-04-21T21:31:28Z", + "published": "2026-04-21T21:31:28Z", + "aliases": [ + "CVE-2026-6796" + ], + "details": "A vulnerability was determined in Sanluan PublicCMS up to 6.202506.d. Affected is the function log_login of the file core/src/main/java/com/publiccms/controller/admin/LoginAdminController.java of the component Failed Login Handler. This manipulation of the argument errorPassword causes cleartext storage in a file or on disk. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6796" + }, + { + "type": "WEB", + "url": "https://vuldb.com/submit/794797" + }, + { + "type": "WEB", + "url": "https://vuldb.com/vuln/358490" + }, + { + "type": "WEB", + "url": "https://vuldb.com/vuln/358490/cti" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-312" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:48Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-cv52-82gr-h293/GHSA-cv52-82gr-h293.json b/advisories/unreviewed/2026/04/GHSA-cv52-82gr-h293/GHSA-cv52-82gr-h293.json new file mode 100644 index 0000000000000..1451d028e1e9f --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-cv52-82gr-h293/GHSA-cv52-82gr-h293.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cv52-82gr-h293", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35236" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35236" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:39Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-f2mm-qgp8-rc9q/GHSA-f2mm-qgp8-rc9q.json b/advisories/unreviewed/2026/04/GHSA-f2mm-qgp8-rc9q/GHSA-f2mm-qgp8-rc9q.json new file mode 100644 index 0000000000000..3f7944847c459 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-f2mm-qgp8-rc9q/GHSA-f2mm-qgp8-rc9q.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f2mm-qgp8-rc9q", + "modified": "2026-04-21T21:31:24Z", + "published": "2026-04-21T21:31:24Z", + "aliases": [ + "CVE-2026-22009" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22009" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-f82q-cjhg-c837/GHSA-f82q-cjhg-c837.json b/advisories/unreviewed/2026/04/GHSA-f82q-cjhg-c837/GHSA-f82q-cjhg-c837.json new file mode 100644 index 0000000000000..4f61ff9bcfb1f --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-f82q-cjhg-c837/GHSA-f82q-cjhg-c837.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f82q-cjhg-c837", + "modified": "2026-04-21T21:31:28Z", + "published": "2026-04-21T21:31:28Z", + "aliases": [ + "CVE-2026-6797" + ], + "details": "A vulnerability was identified in Sanluan PublicCMS up to 6.202506.d. Affected by this vulnerability is the function ZipSecureFile.setMinflateRatio of the file common/src/main/java/com/publiccms/common/tools/DocToHtmlUtils.java. Such manipulation leads to resource consumption. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6797" + }, + { + "type": "WEB", + "url": "https://vuldb.com/submit/794798" + }, + { + "type": "WEB", + "url": "https://vuldb.com/vuln/358491" + }, + { + "type": "WEB", + "url": "https://vuldb.com/vuln/358491/cti" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:48Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-f84h-9pvq-86q2/GHSA-f84h-9pvq-86q2.json b/advisories/unreviewed/2026/04/GHSA-f84h-9pvq-86q2/GHSA-f84h-9pvq-86q2.json new file mode 100644 index 0000000000000..007b2404b417f --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-f84h-9pvq-86q2/GHSA-f84h-9pvq-86q2.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f84h-9pvq-86q2", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-34325" + ], + "details": "Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: User Interface). Supported versions that are affected are 8.0.7.9, 8.0.8.7 and 8.1.2.5. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Financial Services Analytical Applications Infrastructure executes to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Financial Services Analytical Applications Infrastructure accessible data as well as unauthorized update, insert or delete access to some of Oracle Financial Services Analytical Applications Infrastructure accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Analytical Applications Infrastructure. CVSS 3.1 Base Score 6.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34325" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:38Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-ffgj-wmrh-m8fr/GHSA-ffgj-wmrh-m8fr.json b/advisories/unreviewed/2026/04/GHSA-ffgj-wmrh-m8fr/GHSA-ffgj-wmrh-m8fr.json new file mode 100644 index 0000000000000..bce1b53aea5eb --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-ffgj-wmrh-m8fr/GHSA-ffgj-wmrh-m8fr.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ffgj-wmrh-m8fr", + "modified": "2026-04-21T21:31:24Z", + "published": "2026-04-21T21:31:24Z", + "aliases": [ + "CVE-2026-22008" + ], + "details": "Vulnerability in Oracle Java SE (component: Libraries). The supported version that is affected is Oracle Java SE: 25.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22008" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-fh86-xhc3-24gr/GHSA-fh86-xhc3-24gr.json b/advisories/unreviewed/2026/04/GHSA-fh86-xhc3-24gr/GHSA-fh86-xhc3-24gr.json new file mode 100644 index 0000000000000..c46ea7595d206 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-fh86-xhc3-24gr/GHSA-fh86-xhc3-24gr.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fh86-xhc3-24gr", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34278" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.45. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34278" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-fjgq-vg76-2mmp/GHSA-fjgq-vg76-2mmp.json b/advisories/unreviewed/2026/04/GHSA-fjgq-vg76-2mmp/GHSA-fjgq-vg76-2mmp.json new file mode 100644 index 0000000000000..a5957222f21ed --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-fjgq-vg76-2mmp/GHSA-fjgq-vg76-2mmp.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fjgq-vg76-2mmp", + "modified": "2026-04-21T21:31:24Z", + "published": "2026-04-21T21:31:24Z", + "aliases": [ + "CVE-2026-21997" + ], + "details": "Vulnerability in the Oracle Life Sciences Empirica Signal product of Oracle Life Science Applications (component: Common Core). Supported versions that are affected are 9.2.1-9.2.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Life Sciences Empirica Signal. While the vulnerability is in Oracle Life Sciences Empirica Signal, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Life Sciences Empirica Signal accessible data as well as unauthorized read access to a subset of Oracle Life Sciences Empirica Signal accessible data. CVSS 3.1 Base Score 8.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21997" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-fpcq-h389-8ggm/GHSA-fpcq-h389-8ggm.json b/advisories/unreviewed/2026/04/GHSA-fpcq-h389-8ggm/GHSA-fpcq-h389-8ggm.json new file mode 100644 index 0000000000000..7b67419f9ded8 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-fpcq-h389-8ggm/GHSA-fpcq-h389-8ggm.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fpcq-h389-8ggm", + "modified": "2026-04-21T21:31:28Z", + "published": "2026-04-21T21:31:28Z", + "aliases": [ + "CVE-2026-35251" + ], + "details": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35251" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:41Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-fpvh-cc34-gjmc/GHSA-fpvh-cc34-gjmc.json b/advisories/unreviewed/2026/04/GHSA-fpvh-cc34-gjmc/GHSA-fpvh-cc34-gjmc.json new file mode 100644 index 0000000000000..3f5cf8292ce09 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-fpvh-cc34-gjmc/GHSA-fpvh-cc34-gjmc.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fpvh-cc34-gjmc", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35244" + ], + "details": "Vulnerability in the Oracle Hyperion Infrastructure Technology product of Oracle Hyperion (component: Lifecycle Management). The supported version that is affected is 11.2.24.0.000. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Hyperion Infrastructure Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Hyperion Infrastructure Technology accessible data as well as unauthorized read access to a subset of Oracle Hyperion Infrastructure Technology accessible data. CVSS 3.1 Base Score 5.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35244" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:40Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-g233-f2vv-qw6j/GHSA-g233-f2vv-qw6j.json b/advisories/unreviewed/2026/04/GHSA-g233-f2vv-qw6j/GHSA-g233-f2vv-qw6j.json new file mode 100644 index 0000000000000..0734ffa28831b --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-g233-f2vv-qw6j/GHSA-g233-f2vv-qw6j.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g233-f2vv-qw6j", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34287" + ], + "details": "Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Identity Manager Connector. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Identity Manager Connector accessible data as well as unauthorized access to critical data or complete access to all Oracle Identity Manager Connector accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34287" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-g37f-4x54-mhgj/GHSA-g37f-4x54-mhgj.json b/advisories/unreviewed/2026/04/GHSA-g37f-4x54-mhgj/GHSA-g37f-4x54-mhgj.json new file mode 100644 index 0000000000000..89a4f5d785418 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-g37f-4x54-mhgj/GHSA-g37f-4x54-mhgj.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g37f-4x54-mhgj", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34294" + ], + "details": "Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Microsoft Active Directory). The supported version that is affected is 12.2.1.4.0. Difficult to exploit vulnerability allows low privileged attacker with network access via LDAP to compromise Oracle Identity Manager Connector. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Identity Manager Connector accessible data as well as unauthorized read access to a subset of Oracle Identity Manager Connector accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34294" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-g44r-j9vh-rwm7/GHSA-g44r-j9vh-rwm7.json b/advisories/unreviewed/2026/04/GHSA-g44r-j9vh-rwm7/GHSA-g44r-j9vh-rwm7.json new file mode 100644 index 0000000000000..ab5b54ba348e5 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-g44r-j9vh-rwm7/GHSA-g44r-j9vh-rwm7.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g44r-j9vh-rwm7", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34281" + ], + "details": "Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34281" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-g74q-22gc-6974/GHSA-g74q-22gc-6974.json b/advisories/unreviewed/2026/04/GHSA-g74q-22gc-6974/GHSA-g74q-22gc-6974.json new file mode 100644 index 0000000000000..c1a218a964eba --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-g74q-22gc-6974/GHSA-g74q-22gc-6974.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g74q-22gc-6974", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34304" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34304" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-gcgv-7762-j94g/GHSA-gcgv-7762-j94g.json b/advisories/unreviewed/2026/04/GHSA-gcgv-7762-j94g/GHSA-gcgv-7762-j94g.json new file mode 100644 index 0000000000000..d2af01f7bd7b3 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-gcgv-7762-j94g/GHSA-gcgv-7762-j94g.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gcgv-7762-j94g", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35243" + ], + "details": "Vulnerability in the Oracle Application Development Framework (ADF) product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.0.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Application Development Framework (ADF) executes to compromise Oracle Application Development Framework (ADF). Successful attacks of this vulnerability can result in takeover of Oracle Application Development Framework (ADF). CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35243" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:40Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-gcr4-c2jq-4gr5/GHSA-gcr4-c2jq-4gr5.json b/advisories/unreviewed/2026/04/GHSA-gcr4-c2jq-4gr5/GHSA-gcr4-c2jq-4gr5.json new file mode 100644 index 0000000000000..2b9f2532c8d52 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-gcr4-c2jq-4gr5/GHSA-gcr4-c2jq-4gr5.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gcr4-c2jq-4gr5", + "modified": "2026-04-21T21:31:24Z", + "published": "2026-04-21T21:31:24Z", + "aliases": [ + "CVE-2026-22011" + ], + "details": "Vulnerability in the Oracle Applications DBA product of Oracle E-Business Suite (component: ADPatch). Supported versions that are affected are 12.2.3-12.2.15. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Applications DBA. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications DBA, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Applications DBA. CVSS 3.1 Base Score 7.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22011" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-gjr3-4mw2-xv4h/GHSA-gjr3-4mw2-xv4h.json b/advisories/unreviewed/2026/04/GHSA-gjr3-4mw2-xv4h/GHSA-gjr3-4mw2-xv4h.json new file mode 100644 index 0000000000000..e1306dfe75bdb --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-gjr3-4mw2-xv4h/GHSA-gjr3-4mw2-xv4h.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gjr3-4mw2-xv4h", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34277" + ], + "details": "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Fluid Core). Supported versions that are affected are 8.61-8.62. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. While the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise PeopleTools. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34277" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-gp49-6mc2-5x6f/GHSA-gp49-6mc2-5x6f.json b/advisories/unreviewed/2026/04/GHSA-gp49-6mc2-5x6f/GHSA-gp49-6mc2-5x6f.json new file mode 100644 index 0000000000000..1677ad5e32975 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-gp49-6mc2-5x6f/GHSA-gp49-6mc2-5x6f.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gp49-6mc2-5x6f", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34313" + ], + "details": "Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Platform). Supported versions that are affected are 8.0.7.9, 8.0.8.7 and 8.1.2.5. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34313" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-gq3x-4cgf-f2fm/GHSA-gq3x-4cgf-f2fm.json b/advisories/unreviewed/2026/04/GHSA-gq3x-4cgf-f2fm/GHSA-gq3x-4cgf-f2fm.json new file mode 100644 index 0000000000000..9e6c85ecffe40 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-gq3x-4cgf-f2fm/GHSA-gq3x-4cgf-f2fm.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gq3x-4cgf-f2fm", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34302" + ], + "details": "Vulnerability in the Oracle Workflow product of Oracle E-Business Suite (component: Workflow Loader). Supported versions that are affected are 12.2.3-12.2.15. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Workflow. While the vulnerability is in Oracle Workflow, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Workflow accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Workflow. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34302" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-h2wx-vfx5-xwj8/GHSA-h2wx-vfx5-xwj8.json b/advisories/unreviewed/2026/04/GHSA-h2wx-vfx5-xwj8/GHSA-h2wx-vfx5-xwj8.json new file mode 100644 index 0000000000000..58be4df53a075 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-h2wx-vfx5-xwj8/GHSA-h2wx-vfx5-xwj8.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h2wx-vfx5-xwj8", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34275" + ], + "details": "Vulnerability in the Oracle Advanced Inbound Telephony product of Oracle E-Business Suite (component: Setup and Administration). Supported versions that are affected are 12.2.3-12.2.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Inbound Telephony. Successful attacks of this vulnerability can result in takeover of Oracle Advanced Inbound Telephony. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34275" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-h32f-9mwc-283m/GHSA-h32f-9mwc-283m.json b/advisories/unreviewed/2026/04/GHSA-h32f-9mwc-283m/GHSA-h32f-9mwc-283m.json new file mode 100644 index 0000000000000..1f49f65df45c4 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-h32f-9mwc-283m/GHSA-h32f-9mwc-283m.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h32f-9mwc-283m", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34306" + ], + "details": "Vulnerability in the PeopleSoft Enterprise FIN Project Costing product of Oracle PeopleSoft (component: Projects). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Project Costing. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise FIN Project Costing accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34306" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-h9wg-gp29-4whj/GHSA-h9wg-gp29-4whj.json b/advisories/unreviewed/2026/04/GHSA-h9wg-gp29-4whj/GHSA-h9wg-gp29-4whj.json index c5791d1f496e6..19a8f925b61ff 100644 --- a/advisories/unreviewed/2026/04/GHSA-h9wg-gp29-4whj/GHSA-h9wg-gp29-4whj.json +++ b/advisories/unreviewed/2026/04/GHSA-h9wg-gp29-4whj/GHSA-h9wg-gp29-4whj.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-h9wg-gp29-4whj", - "modified": "2026-04-21T15:32:22Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-21T15:32:22Z", "aliases": [ "CVE-2026-31013" ], "details": "Dovestones Softwares ADPhonebook <4.0.1.1 has a reflected cross-site scripting (XSS) vulnerability in the search parameter of the /ADPhonebook?Department=HR endpoint. User-supplied input is reflected in the HTTP response without proper input validation or output encoding, allowing execution of arbitrary JavaScript in the victim's browser.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-21T15:16:36Z" diff --git a/advisories/unreviewed/2026/04/GHSA-hhjq-6g7f-p34r/GHSA-hhjq-6g7f-p34r.json b/advisories/unreviewed/2026/04/GHSA-hhjq-6g7f-p34r/GHSA-hhjq-6g7f-p34r.json new file mode 100644 index 0000000000000..5cd14ae750097 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-hhjq-6g7f-p34r/GHSA-hhjq-6g7f-p34r.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hhjq-6g7f-p34r", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34292" + ], + "details": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34292" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-hjxq-7w9q-2jw6/GHSA-hjxq-7w9q-2jw6.json b/advisories/unreviewed/2026/04/GHSA-hjxq-7w9q-2jw6/GHSA-hjxq-7w9q-2jw6.json index d785fc09520cf..72cd15fd37687 100644 --- a/advisories/unreviewed/2026/04/GHSA-hjxq-7w9q-2jw6/GHSA-hjxq-7w9q-2jw6.json +++ b/advisories/unreviewed/2026/04/GHSA-hjxq-7w9q-2jw6/GHSA-hjxq-7w9q-2jw6.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-hjxq-7w9q-2jw6", - "modified": "2026-04-11T06:31:14Z", + "modified": "2026-04-21T21:31:18Z", "published": "2026-04-10T18:31:20Z", "aliases": [ "CVE-2026-1502" @@ -31,6 +31,10 @@ "type": "WEB", "url": "https://github.com/python/cpython/commit/05ed7ce7ae9e17c23a04085b2539fe6d6d3cef69" }, + { + "type": "WEB", + "url": "https://github.com/python/cpython/commit/b1cf9016335cb637c5a425032e8274a224f4b2ed" + }, { "type": "WEB", "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/2IVPAEQWUJBCTQZEJEVTYCIKSMQPGRZ3" diff --git a/advisories/unreviewed/2026/04/GHSA-hpm9-74qx-6x32/GHSA-hpm9-74qx-6x32.json b/advisories/unreviewed/2026/04/GHSA-hpm9-74qx-6x32/GHSA-hpm9-74qx-6x32.json new file mode 100644 index 0000000000000..a4520abfde017 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-hpm9-74qx-6x32/GHSA-hpm9-74qx-6x32.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hpm9-74qx-6x32", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34282" + ], + "details": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34282" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-hwvq-xm42-wx99/GHSA-hwvq-xm42-wx99.json b/advisories/unreviewed/2026/04/GHSA-hwvq-xm42-wx99/GHSA-hwvq-xm42-wx99.json index 5e2a24afcf0e9..e9763dde11b1e 100644 --- a/advisories/unreviewed/2026/04/GHSA-hwvq-xm42-wx99/GHSA-hwvq-xm42-wx99.json +++ b/advisories/unreviewed/2026/04/GHSA-hwvq-xm42-wx99/GHSA-hwvq-xm42-wx99.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-hwvq-xm42-wx99", - "modified": "2026-04-08T09:31:31Z", + "modified": "2026-04-21T21:31:18Z", "published": "2026-04-08T09:31:31Z", "aliases": [ "CVE-2026-39486" ], "details": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Chill Download Monitor download-monitor allows Blind SQL Injection.This issue affects Download Monitor: from n/a through <= 5.1.8.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L" + } + ], "affected": [], "references": [ { @@ -23,7 +28,7 @@ "cwe_ids": [ "CWE-89" ], - "severity": null, + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-08T09:16:23Z" diff --git a/advisories/unreviewed/2026/04/GHSA-j22w-pghr-4cvx/GHSA-j22w-pghr-4cvx.json b/advisories/unreviewed/2026/04/GHSA-j22w-pghr-4cvx/GHSA-j22w-pghr-4cvx.json new file mode 100644 index 0000000000000..58d4419e24337 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-j22w-pghr-4cvx/GHSA-j22w-pghr-4cvx.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j22w-pghr-4cvx", + "modified": "2026-04-21T21:31:28Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35252" + ], + "details": "Vulnerability in the Oracle Security Service product of Oracle Fusion Middleware (component: C Oracle SSL API). Supported versions that are affected are 12.2.1.4.0 and 12.1.3.0.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTPS to compromise Oracle Security Service. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Security Service accessible data as well as unauthorized access to critical data or complete access to all Oracle Security Service accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35252" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:41Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-j2g9-rprv-hrhc/GHSA-j2g9-rprv-hrhc.json b/advisories/unreviewed/2026/04/GHSA-j2g9-rprv-hrhc/GHSA-j2g9-rprv-hrhc.json index 292a0f8568ef0..ddef0fe135e1a 100644 --- a/advisories/unreviewed/2026/04/GHSA-j2g9-rprv-hrhc/GHSA-j2g9-rprv-hrhc.json +++ b/advisories/unreviewed/2026/04/GHSA-j2g9-rprv-hrhc/GHSA-j2g9-rprv-hrhc.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-j2g9-rprv-hrhc", - "modified": "2026-04-21T15:32:22Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-21T15:32:22Z", "aliases": [ "CVE-2026-31019" ], "details": "In the Website module of Dolibarr ERP & CRM 22.0.4 and below, the application uses blacklist-based filtering to restrict dangerous PHP functions related to system command execution. An authenticated user with permission to edit PHP content can bypass this filtering, resulting in full remote code execution with the ability to execute arbitrary operating system commands on the server.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-21T15:16:36Z" diff --git a/advisories/unreviewed/2026/04/GHSA-j4r5-x8vx-whv5/GHSA-j4r5-x8vx-whv5.json b/advisories/unreviewed/2026/04/GHSA-j4r5-x8vx-whv5/GHSA-j4r5-x8vx-whv5.json new file mode 100644 index 0000000000000..5b7324ec88269 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-j4r5-x8vx-whv5/GHSA-j4r5-x8vx-whv5.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j4r5-x8vx-whv5", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34288" + ], + "details": "Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Identity Manager Connector. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Identity Manager Connector accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34288" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-j666-q429-qjc8/GHSA-j666-q429-qjc8.json b/advisories/unreviewed/2026/04/GHSA-j666-q429-qjc8/GHSA-j666-q429-qjc8.json new file mode 100644 index 0000000000000..447fc527afd70 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-j666-q429-qjc8/GHSA-j666-q429-qjc8.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j666-q429-qjc8", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34269" + ], + "details": "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.61-8.62. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34269" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-jfmq-5jhp-qf3w/GHSA-jfmq-5jhp-qf3w.json b/advisories/unreviewed/2026/04/GHSA-jfmq-5jhp-qf3w/GHSA-jfmq-5jhp-qf3w.json new file mode 100644 index 0000000000000..e2c466948293d --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-jfmq-5jhp-qf3w/GHSA-jfmq-5jhp-qf3w.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jfmq-5jhp-qf3w", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34297" + ], + "details": "Vulnerability in the Oracle HCM Common Architecture product of Oracle E-Business Suite (component: Knowledge Integration). Supported versions that are affected are 12.2.3-12.2.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HCM Common Architecture. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle HCM Common Architecture accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34297" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-jg6g-fp64-wgx2/GHSA-jg6g-fp64-wgx2.json b/advisories/unreviewed/2026/04/GHSA-jg6g-fp64-wgx2/GHSA-jg6g-fp64-wgx2.json new file mode 100644 index 0000000000000..02033ef2adec7 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-jg6g-fp64-wgx2/GHSA-jg6g-fp64-wgx2.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jg6g-fp64-wgx2", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34286" + ], + "details": "Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Identity Manager Connector. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Identity Manager Connector accessible data as well as unauthorized access to critical data or complete access to all Oracle Identity Manager Connector accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34286" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-jg6h-qcfc-fqx4/GHSA-jg6h-qcfc-fqx4.json b/advisories/unreviewed/2026/04/GHSA-jg6h-qcfc-fqx4/GHSA-jg6h-qcfc-fqx4.json new file mode 100644 index 0000000000000..a58d729b2b87c --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-jg6h-qcfc-fqx4/GHSA-jg6h-qcfc-fqx4.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jg6h-qcfc-fqx4", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-34321" + ], + "details": "Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: User Interface). Supported versions that are affected are 8.0.7.9, 8.0.8.7 and 8.1.2.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.1 Base Score 4.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34321" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-jgph-c6j5-5mm2/GHSA-jgph-c6j5-5mm2.json b/advisories/unreviewed/2026/04/GHSA-jgph-c6j5-5mm2/GHSA-jgph-c6j5-5mm2.json index 129d16ae4f4a7..cdb83cf1b8613 100644 --- a/advisories/unreviewed/2026/04/GHSA-jgph-c6j5-5mm2/GHSA-jgph-c6j5-5mm2.json +++ b/advisories/unreviewed/2026/04/GHSA-jgph-c6j5-5mm2/GHSA-jgph-c6j5-5mm2.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-jgph-c6j5-5mm2", - "modified": "2026-04-21T15:32:20Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-21T15:32:20Z", "aliases": [ "CVE-2026-6763" ], "details": "Mitigation bypass in the File Handling component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-693" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-21T13:16:22Z" diff --git a/advisories/unreviewed/2026/04/GHSA-jj2g-xq7w-gf88/GHSA-jj2g-xq7w-gf88.json b/advisories/unreviewed/2026/04/GHSA-jj2g-xq7w-gf88/GHSA-jj2g-xq7w-gf88.json index f2473359d1457..e3e06c5092800 100644 --- a/advisories/unreviewed/2026/04/GHSA-jj2g-xq7w-gf88/GHSA-jj2g-xq7w-gf88.json +++ b/advisories/unreviewed/2026/04/GHSA-jj2g-xq7w-gf88/GHSA-jj2g-xq7w-gf88.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-jj2g-xq7w-gf88", - "modified": "2026-04-20T21:31:46Z", + "modified": "2026-04-21T21:31:21Z", "published": "2026-04-20T21:31:46Z", "aliases": [ "CVE-2026-5358" ], "details": "The obsolete nis_local_principal function in the GNU C Library version 2.43 and older may overflow a buffer in the data section, which could allow an attacker to spoof a crafted response to a UDP request generated by this function and overwrite neighboring static data in the requesting application.\n\nNIS support is obsolete and has been deprecated in the GNU C Library since version 2.26 and is only maintained for legacy usage. Applications should port away from NIS to more modern identity and access management services.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -23,7 +28,7 @@ "cwe_ids": [ "CWE-120" ], - "severity": null, + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-20T21:16:36Z" diff --git a/advisories/unreviewed/2026/04/GHSA-jpmj-4mw9-x4gr/GHSA-jpmj-4mw9-x4gr.json b/advisories/unreviewed/2026/04/GHSA-jpmj-4mw9-x4gr/GHSA-jpmj-4mw9-x4gr.json new file mode 100644 index 0000000000000..9ff81cb2045d9 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-jpmj-4mw9-x4gr/GHSA-jpmj-4mw9-x4gr.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jpmj-4mw9-x4gr", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-22019" + ], + "details": "Vulnerability in the PeopleSoft Enterprise HCM Shared Components product of Oracle PeopleSoft (component: Person Search). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Shared Components. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise HCM Shared Components, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise HCM Shared Components accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise HCM Shared Components accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22019" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-jpw8-46mw-jgq7/GHSA-jpw8-46mw-jgq7.json b/advisories/unreviewed/2026/04/GHSA-jpw8-46mw-jgq7/GHSA-jpw8-46mw-jgq7.json new file mode 100644 index 0000000000000..3e47f5019c068 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-jpw8-46mw-jgq7/GHSA-jpw8-46mw-jgq7.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jpw8-46mw-jgq7", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34298" + ], + "details": "Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Personalization). Supported versions that are affected are 12.2.9-12.2.15. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data as well as unauthorized read access to a subset of Oracle Applications Framework accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Applications Framework. CVSS 3.1 Base Score 4.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34298" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-jqm5-j7h7-59w8/GHSA-jqm5-j7h7-59w8.json b/advisories/unreviewed/2026/04/GHSA-jqm5-j7h7-59w8/GHSA-jqm5-j7h7-59w8.json new file mode 100644 index 0000000000000..e592b2764d4ac --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-jqm5-j7h7-59w8/GHSA-jqm5-j7h7-59w8.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jqm5-j7h7-59w8", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34289" + ], + "details": "Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Identity Manager Connector. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Identity Manager Connector accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34289" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-jvhw-jc32-v84v/GHSA-jvhw-jc32-v84v.json b/advisories/unreviewed/2026/04/GHSA-jvhw-jc32-v84v/GHSA-jvhw-jc32-v84v.json new file mode 100644 index 0000000000000..8ea0e235bbd29 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-jvhw-jc32-v84v/GHSA-jvhw-jc32-v84v.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jvhw-jc32-v84v", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34273" + ], + "details": "Vulnerability in Oracle GoldenGate (component: Libraries). Supported versions that are affected are 23.4-23.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle GoldenGate. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle GoldenGate accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34273" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-jwr7-8589-p67w/GHSA-jwr7-8589-p67w.json b/advisories/unreviewed/2026/04/GHSA-jwr7-8589-p67w/GHSA-jwr7-8589-p67w.json new file mode 100644 index 0000000000000..d3c84a08d197b --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-jwr7-8589-p67w/GHSA-jwr7-8589-p67w.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jwr7-8589-p67w", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34310" + ], + "details": "Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Platform). Supported versions that are affected are 8.0.7.9, 8.0.8.7 and 8.1.2.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34310" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-m58j-v3j6-3hqq/GHSA-m58j-v3j6-3hqq.json b/advisories/unreviewed/2026/04/GHSA-m58j-v3j6-3hqq/GHSA-m58j-v3j6-3hqq.json new file mode 100644 index 0000000000000..651cac678fbcf --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-m58j-v3j6-3hqq/GHSA-m58j-v3j6-3hqq.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m58j-v3j6-3hqq", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-34318" + ], + "details": "Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: Core Client). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Shell. While the vulnerability is in MySQL Shell, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Shell accessible data. CVSS 3.1 Base Score 5.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34318" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-mwrp-hhpc-x64f/GHSA-mwrp-hhpc-x64f.json b/advisories/unreviewed/2026/04/GHSA-mwrp-hhpc-x64f/GHSA-mwrp-hhpc-x64f.json new file mode 100644 index 0000000000000..a3b40839d7bbb --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-mwrp-hhpc-x64f/GHSA-mwrp-hhpc-x64f.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mwrp-hhpc-x64f", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34276" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34276" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-mwvh-c89q-73j6/GHSA-mwvh-c89q-73j6.json b/advisories/unreviewed/2026/04/GHSA-mwvh-c89q-73j6/GHSA-mwvh-c89q-73j6.json index e0c9f7c85935d..102615024a5f6 100644 --- a/advisories/unreviewed/2026/04/GHSA-mwvh-c89q-73j6/GHSA-mwvh-c89q-73j6.json +++ b/advisories/unreviewed/2026/04/GHSA-mwvh-c89q-73j6/GHSA-mwvh-c89q-73j6.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-mwvh-c89q-73j6", - "modified": "2026-04-21T15:32:19Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-21T15:32:19Z", "aliases": [ "CVE-2026-6751" ], "details": "Uninitialized memory in the Audio/Video: Web Codecs component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-457" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-21T13:16:21Z" diff --git a/advisories/unreviewed/2026/04/GHSA-p436-pgq7-fm99/GHSA-p436-pgq7-fm99.json b/advisories/unreviewed/2026/04/GHSA-p436-pgq7-fm99/GHSA-p436-pgq7-fm99.json new file mode 100644 index 0000000000000..68430af4b87ce --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-p436-pgq7-fm99/GHSA-p436-pgq7-fm99.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p436-pgq7-fm99", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-34319" + ], + "details": "Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: Core Client). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Shell executes to compromise MySQL Shell. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Shell. CVSS 3.1 Base Score 5.0 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34319" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-p786-pp8p-8p3m/GHSA-p786-pp8p-8p3m.json b/advisories/unreviewed/2026/04/GHSA-p786-pp8p-8p3m/GHSA-p786-pp8p-8p3m.json index 4a78816e9f8e8..094fdcd1c009f 100644 --- a/advisories/unreviewed/2026/04/GHSA-p786-pp8p-8p3m/GHSA-p786-pp8p-8p3m.json +++ b/advisories/unreviewed/2026/04/GHSA-p786-pp8p-8p3m/GHSA-p786-pp8p-8p3m.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-p786-pp8p-8p3m", - "modified": "2026-04-20T21:31:44Z", + "modified": "2026-04-21T21:31:21Z", "published": "2026-04-20T21:31:44Z", "aliases": [ "CVE-2026-29649" ], "details": "NEMU contains an implementation flaw in its RISC-V Hypervisor CSR handling where henvcfg[7:4] (CBIE/CBCFE/CBZE-related fields) is incorrectly masked/updated based on menvcfg[7:4], so a machine-mode write to menvcfg can implicitly modify the hypervisor's environment configuration. This can lead to incorrect enforcement of virtualization configuration and may cause unexpected traps or denial of service when executing cache-block management instructions in virtualized contexts (V=1).", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-693" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-20T20:16:48Z" diff --git a/advisories/unreviewed/2026/04/GHSA-p82p-w5j8-vgqq/GHSA-p82p-w5j8-vgqq.json b/advisories/unreviewed/2026/04/GHSA-p82p-w5j8-vgqq/GHSA-p82p-w5j8-vgqq.json new file mode 100644 index 0000000000000..c401519f69723 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-p82p-w5j8-vgqq/GHSA-p82p-w5j8-vgqq.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p82p-w5j8-vgqq", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35234" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Partition). Supported versions that are affected are 9.0.0-9.6.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35234" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:38Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-prqq-qrc5-xvpr/GHSA-prqq-qrc5-xvpr.json b/advisories/unreviewed/2026/04/GHSA-prqq-qrc5-xvpr/GHSA-prqq-qrc5-xvpr.json index 6980f1d555dfb..0e3436085f524 100644 --- a/advisories/unreviewed/2026/04/GHSA-prqq-qrc5-xvpr/GHSA-prqq-qrc5-xvpr.json +++ b/advisories/unreviewed/2026/04/GHSA-prqq-qrc5-xvpr/GHSA-prqq-qrc5-xvpr.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-prqq-qrc5-xvpr", - "modified": "2026-04-20T21:31:44Z", + "modified": "2026-04-21T21:31:20Z", "published": "2026-04-20T21:31:44Z", "aliases": [ "CVE-2026-29645" ], "details": "NEMU (OpenXiangShan/NEMU) before v2025.12.r2 contains an improper instruction-validation flaw in its RISC-V Vector (RVV) decoder. The decoder does not correctly validate the funct3 field when decoding vsetvli/vsetivli/vsetvl, allowing certain invalid OP-V instruction encodings to be misinterpreted and executed as vset* configuration instructions rather than raising an illegal-instruction exception. This can be exploited by providing crafted RISC-V binaries to cause incorrect trap behavior, architectural state corruption/divergence, and potential denial of service in systems that rely on NEMU for correct execution or sandboxing.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-131" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-20T20:16:48Z" diff --git a/advisories/unreviewed/2026/04/GHSA-q23x-qvv8-gcm5/GHSA-q23x-qvv8-gcm5.json b/advisories/unreviewed/2026/04/GHSA-q23x-qvv8-gcm5/GHSA-q23x-qvv8-gcm5.json new file mode 100644 index 0000000000000..35f91b3df97c6 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-q23x-qvv8-gcm5/GHSA-q23x-qvv8-gcm5.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q23x-qvv8-gcm5", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34290" + ], + "details": "Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TCP to compromise Oracle Identity Manager Connector. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Identity Manager Connector. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34290" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-q4wq-4whj-cxhx/GHSA-q4wq-4whj-cxhx.json b/advisories/unreviewed/2026/04/GHSA-q4wq-4whj-cxhx/GHSA-q4wq-4whj-cxhx.json new file mode 100644 index 0000000000000..f8bab9f0945a7 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-q4wq-4whj-cxhx/GHSA-q4wq-4whj-cxhx.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q4wq-4whj-cxhx", + "modified": "2026-04-21T21:31:24Z", + "published": "2026-04-21T21:31:24Z", + "aliases": [ + "CVE-2026-22003" + ], + "details": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u481 and 8u481-b50; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 6.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22003" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-qhr7-4g47-87m7/GHSA-qhr7-4g47-87m7.json b/advisories/unreviewed/2026/04/GHSA-qhr7-4g47-87m7/GHSA-qhr7-4g47-87m7.json new file mode 100644 index 0000000000000..092f3cd53acf0 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-qhr7-4g47-87m7/GHSA-qhr7-4g47-87m7.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qhr7-4g47-87m7", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34317" + ], + "details": "Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: Core Client). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Shell executes to compromise MySQL Shell. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Shell. CVSS 3.1 Base Score 5.0 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34317" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-r3gq-49p4-mmj6/GHSA-r3gq-49p4-mmj6.json b/advisories/unreviewed/2026/04/GHSA-r3gq-49p4-mmj6/GHSA-r3gq-49p4-mmj6.json new file mode 100644 index 0000000000000..d07bd29e9b36b --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-r3gq-49p4-mmj6/GHSA-r3gq-49p4-mmj6.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r3gq-49p4-mmj6", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35246" + ], + "details": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35246" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:40Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-r489-83w6-974f/GHSA-r489-83w6-974f.json b/advisories/unreviewed/2026/04/GHSA-r489-83w6-974f/GHSA-r489-83w6-974f.json new file mode 100644 index 0000000000000..99844c1361721 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-r489-83w6-974f/GHSA-r489-83w6-974f.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r489-83w6-974f", + "modified": "2026-04-21T21:31:20Z", + "published": "2026-04-21T21:31:20Z", + "aliases": [ + "CVE-2026-40730" + ], + "details": "Missing Authorization vulnerability in ThemeGrill ThemeGrill Demo Importer themegrill-demo-importer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ThemeGrill Demo Importer: from n/a through <= 2.0.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-40730" + }, + { + "type": "WEB", + "url": "https://patchstack.com/database/Wordpress/Plugin/themegrill-demo-importer/vulnerability/wordpress-themegrill-demo-importer-plugin-2-0-0-6-broken-access-control-vulnerability?_s_id=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-15T11:16:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-r754-6jr2-2cg8/GHSA-r754-6jr2-2cg8.json b/advisories/unreviewed/2026/04/GHSA-r754-6jr2-2cg8/GHSA-r754-6jr2-2cg8.json new file mode 100644 index 0000000000000..72602c63f84de --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-r754-6jr2-2cg8/GHSA-r754-6jr2-2cg8.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r754-6jr2-2cg8", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35241" + ], + "details": "Vulnerability in the PeopleSoft Enterprise CS Student Records product of Oracle PeopleSoft (component: Research Tracking). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CS Student Records. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise CS Student Records accessible data. CVSS 3.1 Base Score 5.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35241" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:39Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-r8xp-m5j7-vp76/GHSA-r8xp-m5j7-vp76.json b/advisories/unreviewed/2026/04/GHSA-r8xp-m5j7-vp76/GHSA-r8xp-m5j7-vp76.json new file mode 100644 index 0000000000000..d6c538a8353b0 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-r8xp-m5j7-vp76/GHSA-r8xp-m5j7-vp76.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r8xp-m5j7-vp76", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34280" + ], + "details": "Vulnerability in the PeopleSoft Enterprise HCM Human Resources product of Oracle PeopleSoft (component: Job Profile Manager). The supported version that is affected is 9.2. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Human Resources. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise HCM Human Resources accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise HCM Human Resources accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34280" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-rj5j-26xx-hh3v/GHSA-rj5j-26xx-hh3v.json b/advisories/unreviewed/2026/04/GHSA-rj5j-26xx-hh3v/GHSA-rj5j-26xx-hh3v.json new file mode 100644 index 0000000000000..b2bc1bc645767 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-rj5j-26xx-hh3v/GHSA-rj5j-26xx-hh3v.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rj5j-26xx-hh3v", + "modified": "2026-04-21T21:31:24Z", + "published": "2026-04-21T21:31:24Z", + "aliases": [ + "CVE-2026-22007" + ], + "details": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 2.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22007" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-rmq8-6cxg-v467/GHSA-rmq8-6cxg-v467.json b/advisories/unreviewed/2026/04/GHSA-rmq8-6cxg-v467/GHSA-rmq8-6cxg-v467.json new file mode 100644 index 0000000000000..ff1b280d6c10e --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-rmq8-6cxg-v467/GHSA-rmq8-6cxg-v467.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rmq8-6cxg-v467", + "modified": "2026-04-21T21:31:28Z", + "published": "2026-04-21T21:31:28Z", + "aliases": [ + "CVE-2026-35250" + ], + "details": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 2.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35250" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:41Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-rvfx-c797-vvhx/GHSA-rvfx-c797-vvhx.json b/advisories/unreviewed/2026/04/GHSA-rvfx-c797-vvhx/GHSA-rvfx-c797-vvhx.json new file mode 100644 index 0000000000000..869a0d02c8679 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-rvfx-c797-vvhx/GHSA-rvfx-c797-vvhx.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rvfx-c797-vvhx", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-33519" + ], + "details": "An incorrect authorization vulnerability exists in Esri Portal for ArcGIS 11.4, 11.5 and 12.0 on Windows, Linux and Kubernetes that did not correctly check permissions assigned to developer credentials.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33519" + }, + { + "type": "WEB", + "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/april2026_security_bulletin" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-266" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-rwvq-ffmg-g3q5/GHSA-rwvq-ffmg-g3q5.json b/advisories/unreviewed/2026/04/GHSA-rwvq-ffmg-g3q5/GHSA-rwvq-ffmg-g3q5.json new file mode 100644 index 0000000000000..90e97e509e8d7 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-rwvq-ffmg-g3q5/GHSA-rwvq-ffmg-g3q5.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rwvq-ffmg-g3q5", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34308" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: JSON). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34308" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-v5vh-6mhh-h6gc/GHSA-v5vh-6mhh-h6gc.json b/advisories/unreviewed/2026/04/GHSA-v5vh-6mhh-h6gc/GHSA-v5vh-6mhh-h6gc.json index 6f095fd6de4ac..021b6fe037094 100644 --- a/advisories/unreviewed/2026/04/GHSA-v5vh-6mhh-h6gc/GHSA-v5vh-6mhh-h6gc.json +++ b/advisories/unreviewed/2026/04/GHSA-v5vh-6mhh-h6gc/GHSA-v5vh-6mhh-h6gc.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-v5vh-6mhh-h6gc", - "modified": "2026-04-21T15:32:20Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-21T15:32:20Z", "aliases": [ "CVE-2026-6765" ], "details": "Information disclosure in the Form Autofill component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-359" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-21T13:16:22Z" diff --git a/advisories/unreviewed/2026/04/GHSA-v5wj-mfrc-9wrc/GHSA-v5wj-mfrc-9wrc.json b/advisories/unreviewed/2026/04/GHSA-v5wj-mfrc-9wrc/GHSA-v5wj-mfrc-9wrc.json new file mode 100644 index 0000000000000..86a157d605954 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-v5wj-mfrc-9wrc/GHSA-v5wj-mfrc-9wrc.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v5wj-mfrc-9wrc", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34301" + ], + "details": "Vulnerability in the PeopleSoft Enterprise FIN Maintenance Management product of Oracle PeopleSoft (component: Work Order Management). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Maintenance Management. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise FIN Maintenance Management accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34301" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-v7xm-xc3f-cxh9/GHSA-v7xm-xc3f-cxh9.json b/advisories/unreviewed/2026/04/GHSA-v7xm-xc3f-cxh9/GHSA-v7xm-xc3f-cxh9.json new file mode 100644 index 0000000000000..9a27a3d048ad0 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-v7xm-xc3f-cxh9/GHSA-v7xm-xc3f-cxh9.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v7xm-xc3f-cxh9", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35229" + ], + "details": "Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.30 and 21.3-21.21. Easily exploitable vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java VM accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35229" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:38Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-v898-xg3c-w4rj/GHSA-v898-xg3c-w4rj.json b/advisories/unreviewed/2026/04/GHSA-v898-xg3c-w4rj/GHSA-v898-xg3c-w4rj.json index f36909bfae370..ba082805d87a1 100644 --- a/advisories/unreviewed/2026/04/GHSA-v898-xg3c-w4rj/GHSA-v898-xg3c-w4rj.json +++ b/advisories/unreviewed/2026/04/GHSA-v898-xg3c-w4rj/GHSA-v898-xg3c-w4rj.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-v898-xg3c-w4rj", - "modified": "2026-04-20T21:31:46Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-20T21:31:46Z", "aliases": [ "CVE-2026-5450" ], "details": "Calling the scanf family of functions with a %mc (malloc'd character match) in the GNU C Library version 2.7 to version 2.43 with a format width specifier with an explicit width greater than 1024 could result in a one byte heap buffer overflow.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -27,7 +32,7 @@ "cwe_ids": [ "CWE-122" ], - "severity": null, + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-20T21:16:36Z" diff --git a/advisories/unreviewed/2026/04/GHSA-vxch-4r45-jhw9/GHSA-vxch-4r45-jhw9.json b/advisories/unreviewed/2026/04/GHSA-vxch-4r45-jhw9/GHSA-vxch-4r45-jhw9.json index 28fd1e71d2371..eebec09a65983 100644 --- a/advisories/unreviewed/2026/04/GHSA-vxch-4r45-jhw9/GHSA-vxch-4r45-jhw9.json +++ b/advisories/unreviewed/2026/04/GHSA-vxch-4r45-jhw9/GHSA-vxch-4r45-jhw9.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-vxch-4r45-jhw9", - "modified": "2026-04-20T18:31:49Z", + "modified": "2026-04-21T21:31:20Z", "published": "2026-04-20T18:31:49Z", "aliases": [ "CVE-2026-26399" ], "details": "A stack-use-after-return issue exists in the Arduino_Core_STM32 library prior to version 1.7.0. The pwm_start() function allocates a TIM_HandleTypeDef structure on the stack and passes its address to HAL initialization routines, where it is stored in a global timer handle registry. After the function returns, interrupt service routines may dereference this dangling pointer, resulting in memory corruption.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-825" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-20T18:16:25Z" diff --git a/advisories/unreviewed/2026/04/GHSA-w2j6-p7c6-6cpj/GHSA-w2j6-p7c6-6cpj.json b/advisories/unreviewed/2026/04/GHSA-w2j6-p7c6-6cpj/GHSA-w2j6-p7c6-6cpj.json new file mode 100644 index 0000000000000..4eeb4b5599185 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-w2j6-p7c6-6cpj/GHSA-w2j6-p7c6-6cpj.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w2j6-p7c6-6cpj", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34285" + ], + "details": "Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Identity Manager Connector. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Identity Manager Connector accessible data as well as unauthorized access to critical data or complete access to all Oracle Identity Manager Connector accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34285" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-w6p7-5x7m-cr7c/GHSA-w6p7-5x7m-cr7c.json b/advisories/unreviewed/2026/04/GHSA-w6p7-5x7m-cr7c/GHSA-w6p7-5x7m-cr7c.json new file mode 100644 index 0000000000000..9509860c57bf9 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-w6p7-5x7m-cr7c/GHSA-w6p7-5x7m-cr7c.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w6p7-5x7m-cr7c", + "modified": "2026-04-21T21:31:24Z", + "published": "2026-04-21T21:31:24Z", + "aliases": [ + "CVE-2026-22006" + ], + "details": "Vulnerability in the PeopleSoft Enterprise HCM Human Resources product of Oracle PeopleSoft (component: Employee Snapshot). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Human Resources. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise HCM Human Resources, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise HCM Human Resources accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise HCM Human Resources accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22006" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-wcjc-hfgv-f5wc/GHSA-wcjc-hfgv-f5wc.json b/advisories/unreviewed/2026/04/GHSA-wcjc-hfgv-f5wc/GHSA-wcjc-hfgv-f5wc.json new file mode 100644 index 0000000000000..03dc093634e38 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-wcjc-hfgv-f5wc/GHSA-wcjc-hfgv-f5wc.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wcjc-hfgv-f5wc", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-22015" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22015" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-wfvx-63xx-rq37/GHSA-wfvx-63xx-rq37.json b/advisories/unreviewed/2026/04/GHSA-wfvx-63xx-rq37/GHSA-wfvx-63xx-rq37.json new file mode 100644 index 0000000000000..76ce5e2f38b0e --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-wfvx-63xx-rq37/GHSA-wfvx-63xx-rq37.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wfvx-63xx-rq37", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34305" + ], + "details": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0 and 15.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34305" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-wj59-76w3-4fv9/GHSA-wj59-76w3-4fv9.json b/advisories/unreviewed/2026/04/GHSA-wj59-76w3-4fv9/GHSA-wj59-76w3-4fv9.json new file mode 100644 index 0000000000000..42cd66207b27b --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-wj59-76w3-4fv9/GHSA-wj59-76w3-4fv9.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wj59-76w3-4fv9", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35240" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35240" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:39Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-wpg5-vr6r-jrcr/GHSA-wpg5-vr6r-jrcr.json b/advisories/unreviewed/2026/04/GHSA-wpg5-vr6r-jrcr/GHSA-wpg5-vr6r-jrcr.json index 19c2b0ee3b36f..1c4aa01866a2d 100644 --- a/advisories/unreviewed/2026/04/GHSA-wpg5-vr6r-jrcr/GHSA-wpg5-vr6r-jrcr.json +++ b/advisories/unreviewed/2026/04/GHSA-wpg5-vr6r-jrcr/GHSA-wpg5-vr6r-jrcr.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-wpg5-vr6r-jrcr", - "modified": "2026-04-21T15:32:21Z", + "modified": "2026-04-21T21:31:22Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6775" ], "details": "Incorrect boundary conditions in the WebRTC component. This vulnerability was fixed in Firefox 150.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-04-21T13:16:23Z" diff --git a/advisories/unreviewed/2026/04/GHSA-wv9q-w2v5-wfhp/GHSA-wv9q-w2v5-wfhp.json b/advisories/unreviewed/2026/04/GHSA-wv9q-w2v5-wfhp/GHSA-wv9q-w2v5-wfhp.json new file mode 100644 index 0000000000000..8b95c7180f6ca --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-wv9q-w2v5-wfhp/GHSA-wv9q-w2v5-wfhp.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wv9q-w2v5-wfhp", + "modified": "2026-04-21T21:31:28Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35249" + ], + "details": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.2 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35249" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:41Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-x2wq-9x2f-fhj7/GHSA-x2wq-9x2f-fhj7.json b/advisories/unreviewed/2026/04/GHSA-x2wq-9x2f-fhj7/GHSA-x2wq-9x2f-fhj7.json new file mode 100644 index 0000000000000..b9476bf4f4231 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-x2wq-9x2f-fhj7/GHSA-x2wq-9x2f-fhj7.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x2wq-9x2f-fhj7", + "modified": "2026-04-21T21:31:23Z", + "published": "2026-04-21T21:31:23Z", + "aliases": [ + "CVE-2026-22751" + ], + "details": "Vulnerability in Spring Spring Security. Applications that explicitly configure One-Time Token login with JdbcOneTimeTokenService are vulnerable to a Time-of-check Time-of-use (TOCTOU) race condition. This issue affects Spring Security: from 6.4.0 through 6.4.15, from 6.5.0 through 6.5.9, from 7.0.0 through 7.0.4.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22751" + }, + { + "type": "WEB", + "url": "https://spring.io/security/cve-2026-22751" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-367" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T19:16:16Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-x3f9-vcp2-hgcw/GHSA-x3f9-vcp2-hgcw.json b/advisories/unreviewed/2026/04/GHSA-x3f9-vcp2-hgcw/GHSA-x3f9-vcp2-hgcw.json new file mode 100644 index 0000000000000..a26ed3945f15b --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-x3f9-vcp2-hgcw/GHSA-x3f9-vcp2-hgcw.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x3f9-vcp2-hgcw", + "modified": "2026-04-21T21:31:23Z", + "published": "2026-04-21T21:31:23Z", + "aliases": [ + "CVE-2026-6744" + ], + "details": "A vulnerability was found in Bagisto up to 2.3.15. Affected is the function copy of the component Downloadable Link Handler. The manipulation results in server-side request forgery. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure and explains: \"We already replied on the github advisories. All the security issues are addressed through security advisory. We will fix this in our upcomming releases.\"", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6744" + }, + { + "type": "WEB", + "url": "https://drive.google.com/file/d/1pVSN3BYjI_rUE2Jms5EcIBGSMdrq6Wql/view?usp=sharing" + }, + { + "type": "WEB", + "url": "https://vuldb.com/submit/794680" + }, + { + "type": "WEB", + "url": "https://vuldb.com/vuln/358435" + }, + { + "type": "WEB", + "url": "https://vuldb.com/vuln/358435/cti" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T19:16:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-x878-48g9-62p4/GHSA-x878-48g9-62p4.json b/advisories/unreviewed/2026/04/GHSA-x878-48g9-62p4/GHSA-x878-48g9-62p4.json new file mode 100644 index 0000000000000..2dbb175eecdc5 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-x878-48g9-62p4/GHSA-x878-48g9-62p4.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x878-48g9-62p4", + "modified": "2026-04-21T21:31:24Z", + "published": "2026-04-21T21:31:24Z", + "aliases": [ + "CVE-2026-21998" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21998" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-x9m8-mrxv-cvc8/GHSA-x9m8-mrxv-cvc8.json b/advisories/unreviewed/2026/04/GHSA-x9m8-mrxv-cvc8/GHSA-x9m8-mrxv-cvc8.json new file mode 100644 index 0000000000000..8f5f04d1772ce --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-x9m8-mrxv-cvc8/GHSA-x9m8-mrxv-cvc8.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x9m8-mrxv-cvc8", + "modified": "2026-04-21T21:31:27Z", + "published": "2026-04-21T21:31:27Z", + "aliases": [ + "CVE-2026-35242" + ], + "details": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35242" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:40Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-xcgr-x2r4-j9mj/GHSA-xcgr-x2r4-j9mj.json b/advisories/unreviewed/2026/04/GHSA-xcgr-x2r4-j9mj/GHSA-xcgr-x2r4-j9mj.json new file mode 100644 index 0000000000000..d48ea138ecefe --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-xcgr-x2r4-j9mj/GHSA-xcgr-x2r4-j9mj.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xcgr-x2r4-j9mj", + "modified": "2026-04-21T21:31:24Z", + "published": "2026-04-21T21:31:24Z", + "aliases": [ + "CVE-2026-22001" + ], + "details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22001" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-xmmc-cmm8-3rvm/GHSA-xmmc-cmm8-3rvm.json b/advisories/unreviewed/2026/04/GHSA-xmmc-cmm8-3rvm/GHSA-xmmc-cmm8-3rvm.json new file mode 100644 index 0000000000000..f9025145f2063 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-xmmc-cmm8-3rvm/GHSA-xmmc-cmm8-3rvm.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xmmc-cmm8-3rvm", + "modified": "2026-04-21T21:31:23Z", + "published": "2026-04-21T21:31:23Z", + "aliases": [ + "CVE-2026-41456" + ], + "details": "Bludit CMS prior to commit 6732dde contains a reflected cross-site scripting vulnerability in the search plugin that allows unauthenticated attackers to inject arbitrary JavaScript by crafting a malicious search query. Attackers can execute malicious scripts in the browsers of users who visit crafted URLs containing the payload, potentially stealing session cookies or performing actions on behalf of affected users.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41456" + }, + { + "type": "WEB", + "url": "https://github.com/bludit/bludit/pull/1691" + }, + { + "type": "WEB", + "url": "https://github.com/bludit/bludit/commit/6732ddedda8b73ce0a017a1b6adf685100244e01" + }, + { + "type": "WEB", + "url": "https://gist.github.com/thepiyushkumarshukla/36b213cdb3c7d603e23fd23605cd681e" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/bludit-cms-reflected-xss-via-search-plugin" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T19:16:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-xvmr-9p7m-jmwv/GHSA-xvmr-9p7m-jmwv.json b/advisories/unreviewed/2026/04/GHSA-xvmr-9p7m-jmwv/GHSA-xvmr-9p7m-jmwv.json new file mode 100644 index 0000000000000..a4d51cdb95daa --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-xvmr-9p7m-jmwv/GHSA-xvmr-9p7m-jmwv.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xvmr-9p7m-jmwv", + "modified": "2026-04-21T21:31:25Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34268" + ], + "details": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 2.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34268" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-xwcp-9cqm-x4j8/GHSA-xwcp-9cqm-x4j8.json b/advisories/unreviewed/2026/04/GHSA-xwcp-9cqm-x4j8/GHSA-xwcp-9cqm-x4j8.json new file mode 100644 index 0000000000000..38b11d1b84724 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-xwcp-9cqm-x4j8/GHSA-xwcp-9cqm-x4j8.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xwcp-9cqm-x4j8", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:26Z", + "aliases": [ + "CVE-2026-34300" + ], + "details": "Vulnerability in the PeopleSoft Enterprise FIN Contracts product of Oracle PeopleSoft (component: Contracts). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Contracts. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise FIN Contracts accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34300" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-xx92-xfrf-9xp3/GHSA-xx92-xfrf-9xp3.json b/advisories/unreviewed/2026/04/GHSA-xx92-xfrf-9xp3/GHSA-xx92-xfrf-9xp3.json new file mode 100644 index 0000000000000..b2fcc27704e4a --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-xx92-xfrf-9xp3/GHSA-xx92-xfrf-9xp3.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xx92-xfrf-9xp3", + "modified": "2026-04-21T21:31:26Z", + "published": "2026-04-21T21:31:25Z", + "aliases": [ + "CVE-2026-34284" + ], + "details": "Vulnerability in the Oracle Business Process Management Suite product of Oracle Fusion Middleware (component: Human workflow 11g+). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Process Management Suite. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Process Management Suite, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Process Management Suite accessible data as well as unauthorized read access to a subset of Oracle Business Process Management Suite accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34284" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2026.html" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T21:16:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-xxc5-5ggq-v5qj/GHSA-xxc5-5ggq-v5qj.json b/advisories/unreviewed/2026/04/GHSA-xxc5-5ggq-v5qj/GHSA-xxc5-5ggq-v5qj.json index 349975d6fbf0b..d0efbf43003cc 100644 --- a/advisories/unreviewed/2026/04/GHSA-xxc5-5ggq-v5qj/GHSA-xxc5-5ggq-v5qj.json +++ b/advisories/unreviewed/2026/04/GHSA-xxc5-5ggq-v5qj/GHSA-xxc5-5ggq-v5qj.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-xxc5-5ggq-v5qj", - "modified": "2026-04-09T15:35:06Z", + "modified": "2026-04-21T21:31:18Z", "published": "2026-04-07T21:32:38Z", "aliases": [ "CVE-2025-71058" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71058" }, + { + "type": "WEB", + "url": "https://github.com/FPokerFace/Security-Advisory/blob/main/CVE-2025-71058/poc.c" + }, { "type": "WEB", "url": "https://github.com/FPokerFace/Security-Advisory/tree/main/CVE-2025-71058" From c09a1ffffe3fdc5d18a5d1118dc5881e24dc2673 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Tue, 21 Apr 2026 22:53:16 +0000 Subject: [PATCH 02/49] Publish GHSA-6ffj-2wg2-w45j --- .../GHSA-6ffj-2wg2-w45j.json | 35 ++++++++++++++++--- 1 file changed, 30 insertions(+), 5 deletions(-) rename advisories/{unreviewed => github-reviewed}/2026/04/GHSA-6ffj-2wg2-w45j/GHSA-6ffj-2wg2-w45j.json (56%) diff --git a/advisories/unreviewed/2026/04/GHSA-6ffj-2wg2-w45j/GHSA-6ffj-2wg2-w45j.json b/advisories/github-reviewed/2026/04/GHSA-6ffj-2wg2-w45j/GHSA-6ffj-2wg2-w45j.json similarity index 56% rename from advisories/unreviewed/2026/04/GHSA-6ffj-2wg2-w45j/GHSA-6ffj-2wg2-w45j.json rename to advisories/github-reviewed/2026/04/GHSA-6ffj-2wg2-w45j/GHSA-6ffj-2wg2-w45j.json index 916197a98cd0b..399a472669243 100644 --- a/advisories/unreviewed/2026/04/GHSA-6ffj-2wg2-w45j/GHSA-6ffj-2wg2-w45j.json +++ b/advisories/github-reviewed/2026/04/GHSA-6ffj-2wg2-w45j/GHSA-6ffj-2wg2-w45j.json @@ -1,19 +1,40 @@ { "schema_version": "1.4.0", "id": "GHSA-6ffj-2wg2-w45j", - "modified": "2026-04-20T18:31:45Z", + "modified": "2026-04-21T22:50:35Z", "published": "2026-04-18T09:30:20Z", "aliases": [ "CVE-2026-25917" ], - "details": "Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low.\n\nUsers are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue.", + "summary": "Apache Airflow allows code execution through crafted XCom payloads", + "details": "Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low. Users are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "apache-airflow-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.2.0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -23,6 +44,10 @@ "type": "WEB", "url": "https://github.com/apache/airflow/pull/61641" }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/airflow" + }, { "type": "WEB", "url": "https://lists.apache.org/thread/6whgpkqbh12rvpfmvcg8b0vwlv4hq3po" @@ -37,8 +62,8 @@ "CWE-502" ], "severity": "CRITICAL", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2026-04-21T22:50:35Z", "nvd_published_at": "2026-04-18T07:16:09Z" } } \ No newline at end of file From 1209e43cffc98026efaec85ec6e7568443f1c92b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 22 Apr 2026 00:33:30 +0000 Subject: [PATCH 03/49] Advisory Database Sync --- .../GHSA-28fv-vpxc-gmp4.json | 60 +++++++++++++++++++ .../GHSA-28xp-3gpw-3vvp.json | 6 +- .../GHSA-29qm-pmxx-2p86.json | 60 +++++++++++++++++++ .../GHSA-2gr8-2hf5-x695.json | 60 +++++++++++++++++++ .../GHSA-35h9-jh69-pc24.json | 10 +++- .../GHSA-38r2-pp9w-hfh6.json | 10 +++- .../GHSA-3h35-4gph-x5jr.json | 52 ++++++++++++++++ .../GHSA-47f5-x8gg-g88g.json | 6 +- .../GHSA-5mff-cxq5-82jv.json | 10 +++- .../GHSA-5wvf-8jjj-7w99.json | 10 +++- .../GHSA-68p2-8vqp-fwx7.json | 6 +- .../GHSA-6hg9-m8fv-wq83.json | 60 +++++++++++++++++++ .../GHSA-75xc-fv5m-pprr.json | 10 +++- .../GHSA-7625-jhq2-5p8g.json | 6 +- .../GHSA-7f6v-qrqr-m9gm.json | 44 ++++++++++++++ .../GHSA-7g2v-c3jv-qxhw.json | 25 ++++++++ .../GHSA-7gp8-9grp-c69x.json | 10 +++- .../GHSA-88fc-5m2g-g6q2.json | 10 +++- .../GHSA-8mxf-8wh9-g5pv.json | 10 +++- .../GHSA-99hh-xp2q-f3fc.json | 10 +++- .../GHSA-9mpg-26vj-7vx3.json | 60 +++++++++++++++++++ .../GHSA-c2q7-642g-3vwr.json | 10 +++- .../GHSA-c6rq-x839-cgp6.json | 10 +++- .../GHSA-cp9h-w8px-6q24.json | 6 +- .../GHSA-cr7m-q2pr-wwq7.json | 10 +++- .../GHSA-fcrv-8vh3-4pg3.json | 6 +- .../GHSA-g2r2-6v8v-5qgm.json | 44 ++++++++++++++ .../GHSA-g672-5549-fj5x.json | 6 +- .../GHSA-gcr4-c2jq-4gr5.json | 4 +- .../GHSA-gp6f-8rr3-wxrg.json | 6 +- .../GHSA-h3rr-2q6v-g8rc.json | 10 +++- .../GHSA-h5hc-2g7f-gxgj.json | 6 +- .../GHSA-hqjc-gx24-xhpp.json | 10 +++- .../GHSA-jgph-c6j5-5mm2.json | 10 +++- .../GHSA-mcp7-23p7-2v34.json | 60 +++++++++++++++++++ .../GHSA-mwvh-c89q-73j6.json | 10 +++- .../GHSA-pwfc-qm9r-p6h4.json | 60 +++++++++++++++++++ .../GHSA-q3c8-p5vp-wr87.json | 6 +- .../GHSA-q45f-ggxw-3qq8.json | 10 +++- .../GHSA-q5x7-w9rr-q429.json | 6 +- .../GHSA-q6qg-6fmg-jjcv.json | 10 +++- .../GHSA-r37m-3hw5-974w.json | 10 +++- .../GHSA-rm28-r39x-h3x2.json | 6 +- .../GHSA-rppv-5944-crmm.json | 52 ++++++++++++++++ .../GHSA-rx3r-9q8p-8rrj.json | 10 +++- .../GHSA-v5vh-6mhh-h6gc.json | 10 +++- .../GHSA-vvfr-g83f-8qcv.json | 56 +++++++++++++++++ .../GHSA-w4vh-g4vq-3rf9.json | 10 +++- .../GHSA-wpg5-vr6r-jrcr.json | 6 +- .../GHSA-wvr4-56pf-cc47.json | 10 +++- .../GHSA-xm94-m277-f852.json | 6 +- .../GHSA-xp4p-9mc9-5c47.json | 6 +- 52 files changed, 978 insertions(+), 39 deletions(-) create mode 100644 advisories/unreviewed/2026/04/GHSA-28fv-vpxc-gmp4/GHSA-28fv-vpxc-gmp4.json create mode 100644 advisories/unreviewed/2026/04/GHSA-29qm-pmxx-2p86/GHSA-29qm-pmxx-2p86.json create mode 100644 advisories/unreviewed/2026/04/GHSA-2gr8-2hf5-x695/GHSA-2gr8-2hf5-x695.json create mode 100644 advisories/unreviewed/2026/04/GHSA-3h35-4gph-x5jr/GHSA-3h35-4gph-x5jr.json create mode 100644 advisories/unreviewed/2026/04/GHSA-6hg9-m8fv-wq83/GHSA-6hg9-m8fv-wq83.json create mode 100644 advisories/unreviewed/2026/04/GHSA-7f6v-qrqr-m9gm/GHSA-7f6v-qrqr-m9gm.json create mode 100644 advisories/unreviewed/2026/04/GHSA-7g2v-c3jv-qxhw/GHSA-7g2v-c3jv-qxhw.json create mode 100644 advisories/unreviewed/2026/04/GHSA-9mpg-26vj-7vx3/GHSA-9mpg-26vj-7vx3.json create mode 100644 advisories/unreviewed/2026/04/GHSA-g2r2-6v8v-5qgm/GHSA-g2r2-6v8v-5qgm.json create mode 100644 advisories/unreviewed/2026/04/GHSA-mcp7-23p7-2v34/GHSA-mcp7-23p7-2v34.json create mode 100644 advisories/unreviewed/2026/04/GHSA-pwfc-qm9r-p6h4/GHSA-pwfc-qm9r-p6h4.json create mode 100644 advisories/unreviewed/2026/04/GHSA-rppv-5944-crmm/GHSA-rppv-5944-crmm.json create mode 100644 advisories/unreviewed/2026/04/GHSA-vvfr-g83f-8qcv/GHSA-vvfr-g83f-8qcv.json diff --git a/advisories/unreviewed/2026/04/GHSA-28fv-vpxc-gmp4/GHSA-28fv-vpxc-gmp4.json b/advisories/unreviewed/2026/04/GHSA-28fv-vpxc-gmp4/GHSA-28fv-vpxc-gmp4.json new file mode 100644 index 0000000000000..c3a5c9398af58 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-28fv-vpxc-gmp4/GHSA-28fv-vpxc-gmp4.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-28fv-vpxc-gmp4", + "modified": "2026-04-22T00:31:42Z", + "published": "2026-04-22T00:31:42Z", + "aliases": [ + "CVE-2026-5512" + ], + "details": "An improper authorization vulnerability was identified in GitHub Enterprise Server that allowed an authenticated attacker to determine the names of private repositories by their numeric ID. The mobile upload policy API endpoint did not perform an early authorization check, and validation error messages included the full repository name for repositories the caller did not have access to. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.21 and was fixed in versions 3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, 3.15.21, and 3.14.26. This vulnerability was reported via the GitHub Bug Bounty program.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5512" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.26" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.21" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.17" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.14" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.8" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.5" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.20/admin/release-notes#3.20.1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-201" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T23:16:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-28xp-3gpw-3vvp/GHSA-28xp-3gpw-3vvp.json b/advisories/unreviewed/2026/04/GHSA-28xp-3gpw-3vvp/GHSA-28xp-3gpw-3vvp.json index 60c30e55a765d..4e191bb799aa2 100644 --- a/advisories/unreviewed/2026/04/GHSA-28xp-3gpw-3vvp/GHSA-28xp-3gpw-3vvp.json +++ b/advisories/unreviewed/2026/04/GHSA-28xp-3gpw-3vvp/GHSA-28xp-3gpw-3vvp.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-28xp-3gpw-3vvp", - "modified": "2026-04-21T18:31:55Z", + "modified": "2026-04-22T00:31:37Z", "published": "2026-04-21T15:32:20Z", "aliases": [ "CVE-2026-6758" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-30" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-29qm-pmxx-2p86/GHSA-29qm-pmxx-2p86.json b/advisories/unreviewed/2026/04/GHSA-29qm-pmxx-2p86/GHSA-29qm-pmxx-2p86.json new file mode 100644 index 0000000000000..43acad2686f66 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-29qm-pmxx-2p86/GHSA-29qm-pmxx-2p86.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-29qm-pmxx-2p86", + "modified": "2026-04-22T00:31:41Z", + "published": "2026-04-22T00:31:41Z", + "aliases": [ + "CVE-2026-5845" + ], + "details": "An improper authorization vulnerability in scoped user-to-server (ghu_) token authorization in GitHub Enterprise Server allows an authenticated attacker to access private repositories outside the intended installation scope, which can include write operations, via an authorization fallback that treated a revoked/deleted installation as a global installation context, which could be chained with token revocation timing and SSH push attribution to obtain and reuse a victim-scoped token. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.21 and was fixed in versions 3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, 3.15.21, and 3.14.26. This vulnerability was reported via the GitHub Bug Bounty program.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5845" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.26" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.21" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.17" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.14" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.8" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.5" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.20/admin/release-notes#3.20.1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-639" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T23:16:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-2gr8-2hf5-x695/GHSA-2gr8-2hf5-x695.json b/advisories/unreviewed/2026/04/GHSA-2gr8-2hf5-x695/GHSA-2gr8-2hf5-x695.json new file mode 100644 index 0000000000000..742fb82d78919 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-2gr8-2hf5-x695/GHSA-2gr8-2hf5-x695.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2gr8-2hf5-x695", + "modified": "2026-04-22T00:31:42Z", + "published": "2026-04-22T00:31:42Z", + "aliases": [ + "CVE-2026-5921" + ], + "details": "A server-side request forgery (SSRF) vulnerability was identified in GitHub Enterprise Server that allowed an attacker to extract sensitive environment variables from the instance through a timing side-channel attack against the notebook rendering service. When private mode was disabled, the notebook viewer followed HTTP redirects without revalidating the destination host, enabling an unauthenticated SSRF to internal services. By chaining this with regex filter queries against an internal API and measuring response time differences, an attacker could infer secret values character by character. Exploitation required that private mode be disabled and that the attacker be able to chain the instance's open redirect endpoint through an external redirect to reach internal services. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.21 and was fixed in versions 3.14.26, 3.15.21, 3.16.17, 3.17.14, 3.18.8, 3.19.5, and 3.20.1. This vulnerability was reported via the GitHub Bug Bounty program.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5921" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.26" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.21" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.17" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.14" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.8" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.5" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.20/admin/release-notes#3.20.1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T23:16:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-35h9-jh69-pc24/GHSA-35h9-jh69-pc24.json b/advisories/unreviewed/2026/04/GHSA-35h9-jh69-pc24/GHSA-35h9-jh69-pc24.json index 7e341eafe0000..84094ebd8cbd8 100644 --- a/advisories/unreviewed/2026/04/GHSA-35h9-jh69-pc24/GHSA-35h9-jh69-pc24.json +++ b/advisories/unreviewed/2026/04/GHSA-35h9-jh69-pc24/GHSA-35h9-jh69-pc24.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-35h9-jh69-pc24", - "modified": "2026-04-21T18:31:56Z", + "modified": "2026-04-22T00:31:38Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6769" @@ -30,6 +30,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-38r2-pp9w-hfh6/GHSA-38r2-pp9w-hfh6.json b/advisories/unreviewed/2026/04/GHSA-38r2-pp9w-hfh6/GHSA-38r2-pp9w-hfh6.json index bd0da878eefeb..b1e08409a4e4c 100644 --- a/advisories/unreviewed/2026/04/GHSA-38r2-pp9w-hfh6/GHSA-38r2-pp9w-hfh6.json +++ b/advisories/unreviewed/2026/04/GHSA-38r2-pp9w-hfh6/GHSA-38r2-pp9w-hfh6.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-38r2-pp9w-hfh6", - "modified": "2026-04-21T21:31:22Z", + "modified": "2026-04-22T00:31:38Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6767" @@ -34,6 +34,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-3h35-4gph-x5jr/GHSA-3h35-4gph-x5jr.json b/advisories/unreviewed/2026/04/GHSA-3h35-4gph-x5jr/GHSA-3h35-4gph-x5jr.json new file mode 100644 index 0000000000000..8d70eec1367bb --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-3h35-4gph-x5jr/GHSA-3h35-4gph-x5jr.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3h35-4gph-x5jr", + "modified": "2026-04-22T00:31:40Z", + "published": "2026-04-22T00:31:40Z", + "aliases": [ + "CVE-2026-6799" + ], + "details": "A security flaw has been discovered in Comfast CF-N1-S 2.6.0.1. Affected by this issue is some unknown functionality of the file /cgi-bin/mbox-config?method=SET§ion=ping_config of the component Endpoint. Performing a manipulation of the argument destination results in command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6799" + }, + { + "type": "WEB", + "url": "https://github.com/Blackhole23-Lab/-/blob/main/Comfast-CF-N1-S-Router-VUDB.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/submit/795203" + }, + { + "type": "WEB", + "url": "https://vuldb.com/vuln/358492" + }, + { + "type": "WEB", + "url": "https://vuldb.com/vuln/358492/cti" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T22:16:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-47f5-x8gg-g88g/GHSA-47f5-x8gg-g88g.json b/advisories/unreviewed/2026/04/GHSA-47f5-x8gg-g88g/GHSA-47f5-x8gg-g88g.json index 134f4a0e4a920..46a3eaa0a6733 100644 --- a/advisories/unreviewed/2026/04/GHSA-47f5-x8gg-g88g/GHSA-47f5-x8gg-g88g.json +++ b/advisories/unreviewed/2026/04/GHSA-47f5-x8gg-g88g/GHSA-47f5-x8gg-g88g.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-47f5-x8gg-g88g", - "modified": "2026-04-21T18:31:56Z", + "modified": "2026-04-22T00:31:39Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6780" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-30" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-5mff-cxq5-82jv/GHSA-5mff-cxq5-82jv.json b/advisories/unreviewed/2026/04/GHSA-5mff-cxq5-82jv/GHSA-5mff-cxq5-82jv.json index 543acb805c8cd..d8492fb37054a 100644 --- a/advisories/unreviewed/2026/04/GHSA-5mff-cxq5-82jv/GHSA-5mff-cxq5-82jv.json +++ b/advisories/unreviewed/2026/04/GHSA-5mff-cxq5-82jv/GHSA-5mff-cxq5-82jv.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-5mff-cxq5-82jv", - "modified": "2026-04-21T18:31:55Z", + "modified": "2026-04-22T00:31:37Z", "published": "2026-04-21T15:32:20Z", "aliases": [ "CVE-2026-6761" @@ -30,6 +30,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-5wvf-8jjj-7w99/GHSA-5wvf-8jjj-7w99.json b/advisories/unreviewed/2026/04/GHSA-5wvf-8jjj-7w99/GHSA-5wvf-8jjj-7w99.json index e2d3c99533334..f4668482d675d 100644 --- a/advisories/unreviewed/2026/04/GHSA-5wvf-8jjj-7w99/GHSA-5wvf-8jjj-7w99.json +++ b/advisories/unreviewed/2026/04/GHSA-5wvf-8jjj-7w99/GHSA-5wvf-8jjj-7w99.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-5wvf-8jjj-7w99", - "modified": "2026-04-21T21:31:22Z", + "modified": "2026-04-22T00:31:37Z", "published": "2026-04-21T15:32:19Z", "aliases": [ "CVE-2026-6752" @@ -34,6 +34,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-68p2-8vqp-fwx7/GHSA-68p2-8vqp-fwx7.json b/advisories/unreviewed/2026/04/GHSA-68p2-8vqp-fwx7/GHSA-68p2-8vqp-fwx7.json index 5c02bd30b4c02..a893f67f5a7d5 100644 --- a/advisories/unreviewed/2026/04/GHSA-68p2-8vqp-fwx7/GHSA-68p2-8vqp-fwx7.json +++ b/advisories/unreviewed/2026/04/GHSA-68p2-8vqp-fwx7/GHSA-68p2-8vqp-fwx7.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-68p2-8vqp-fwx7", - "modified": "2026-04-21T18:31:56Z", + "modified": "2026-04-22T00:31:39Z", "published": "2026-04-21T15:32:22Z", "aliases": [ "CVE-2026-6781" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-30" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-6hg9-m8fv-wq83/GHSA-6hg9-m8fv-wq83.json b/advisories/unreviewed/2026/04/GHSA-6hg9-m8fv-wq83/GHSA-6hg9-m8fv-wq83.json new file mode 100644 index 0000000000000..175ca137c0aed --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-6hg9-m8fv-wq83/GHSA-6hg9-m8fv-wq83.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6hg9-m8fv-wq83", + "modified": "2026-04-22T00:31:41Z", + "published": "2026-04-22T00:31:41Z", + "aliases": [ + "CVE-2026-4821" + ], + "details": "An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an authenticated Management Console administrator to execute arbitrary OS commands via shell metacharacter injection in proxy configuration fields such as http_proxy. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and administrator privileges to the Management Console. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.21 and was fixed in versions 3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, 3.15.21, 3.14.26. This vulnerability was reported via the GitHub Bug Bounty program.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4821" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.24" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.21" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.17" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.14" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.8" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.5" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.20/admin/release-notes#3.20.1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T23:16:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-75xc-fv5m-pprr/GHSA-75xc-fv5m-pprr.json b/advisories/unreviewed/2026/04/GHSA-75xc-fv5m-pprr/GHSA-75xc-fv5m-pprr.json index 4889f9df66537..a674d0071de25 100644 --- a/advisories/unreviewed/2026/04/GHSA-75xc-fv5m-pprr/GHSA-75xc-fv5m-pprr.json +++ b/advisories/unreviewed/2026/04/GHSA-75xc-fv5m-pprr/GHSA-75xc-fv5m-pprr.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-75xc-fv5m-pprr", - "modified": "2026-04-21T21:31:22Z", + "modified": "2026-04-22T00:31:37Z", "published": "2026-04-21T15:32:19Z", "aliases": [ "CVE-2026-6748" @@ -30,6 +30,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-7625-jhq2-5p8g/GHSA-7625-jhq2-5p8g.json b/advisories/unreviewed/2026/04/GHSA-7625-jhq2-5p8g/GHSA-7625-jhq2-5p8g.json index 56528e602711e..a0fe2dd2694ea 100644 --- a/advisories/unreviewed/2026/04/GHSA-7625-jhq2-5p8g/GHSA-7625-jhq2-5p8g.json +++ b/advisories/unreviewed/2026/04/GHSA-7625-jhq2-5p8g/GHSA-7625-jhq2-5p8g.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-7625-jhq2-5p8g", - "modified": "2026-04-21T21:31:22Z", + "modified": "2026-04-22T00:31:38Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6773" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-30" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-7f6v-qrqr-m9gm/GHSA-7f6v-qrqr-m9gm.json b/advisories/unreviewed/2026/04/GHSA-7f6v-qrqr-m9gm/GHSA-7f6v-qrqr-m9gm.json new file mode 100644 index 0000000000000..c8a9e2a0baedd --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-7f6v-qrqr-m9gm/GHSA-7f6v-qrqr-m9gm.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7f6v-qrqr-m9gm", + "modified": "2026-04-22T00:31:40Z", + "published": "2026-04-22T00:31:39Z", + "aliases": [ + "CVE-2026-1354" + ], + "details": "Zero Motorcycles firmware versions 44 and prior enable an attacker to \nforcibly pair a device with the motorcycle via Bluetooth. Once paired, \nan attacker can utilize over-the-air firmware updating functionality to \npotentially upload malicious firmware to the motorcycle. The motorcycle \nmust first be in Bluetooth pairing mode, and the attacker must be in \nproximity of the vehicle and understand the full pairing process, to be \nable to pair their device with the vehicle. The attacker's device must \nremain paired with and in proximity of the motorcycle for the entire \nduration of the firmware update.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:P/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1354" + }, + { + "type": "WEB", + "url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-111-06.json" + }, + { + "type": "WEB", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-111-06" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-322" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T22:16:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-7g2v-c3jv-qxhw/GHSA-7g2v-c3jv-qxhw.json b/advisories/unreviewed/2026/04/GHSA-7g2v-c3jv-qxhw/GHSA-7g2v-c3jv-qxhw.json new file mode 100644 index 0000000000000..8f4fb40b44c06 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-7g2v-c3jv-qxhw/GHSA-7g2v-c3jv-qxhw.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7g2v-c3jv-qxhw", + "modified": "2026-04-22T00:31:41Z", + "published": "2026-04-22T00:31:41Z", + "aliases": [ + "CVE-2026-4872" + ], + "details": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4872" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T23:16:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-7gp8-9grp-c69x/GHSA-7gp8-9grp-c69x.json b/advisories/unreviewed/2026/04/GHSA-7gp8-9grp-c69x/GHSA-7gp8-9grp-c69x.json index 368a4fd2b1169..0c6f1055eb4c2 100644 --- a/advisories/unreviewed/2026/04/GHSA-7gp8-9grp-c69x/GHSA-7gp8-9grp-c69x.json +++ b/advisories/unreviewed/2026/04/GHSA-7gp8-9grp-c69x/GHSA-7gp8-9grp-c69x.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-7gp8-9grp-c69x", - "modified": "2026-04-21T18:31:55Z", + "modified": "2026-04-22T00:31:37Z", "published": "2026-04-21T15:32:19Z", "aliases": [ "CVE-2026-6749" @@ -34,6 +34,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-88fc-5m2g-g6q2/GHSA-88fc-5m2g-g6q2.json b/advisories/unreviewed/2026/04/GHSA-88fc-5m2g-g6q2/GHSA-88fc-5m2g-g6q2.json index 8d0aed1d434a9..6f890c9650630 100644 --- a/advisories/unreviewed/2026/04/GHSA-88fc-5m2g-g6q2/GHSA-88fc-5m2g-g6q2.json +++ b/advisories/unreviewed/2026/04/GHSA-88fc-5m2g-g6q2/GHSA-88fc-5m2g-g6q2.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-88fc-5m2g-g6q2", - "modified": "2026-04-21T21:31:22Z", + "modified": "2026-04-22T00:31:38Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6771" @@ -30,6 +30,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-8mxf-8wh9-g5pv/GHSA-8mxf-8wh9-g5pv.json b/advisories/unreviewed/2026/04/GHSA-8mxf-8wh9-g5pv/GHSA-8mxf-8wh9-g5pv.json index 323d18eb0f54f..f08c30786e087 100644 --- a/advisories/unreviewed/2026/04/GHSA-8mxf-8wh9-g5pv/GHSA-8mxf-8wh9-g5pv.json +++ b/advisories/unreviewed/2026/04/GHSA-8mxf-8wh9-g5pv/GHSA-8mxf-8wh9-g5pv.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-8mxf-8wh9-g5pv", - "modified": "2026-04-21T15:32:20Z", + "modified": "2026-04-22T00:31:37Z", "published": "2026-04-21T15:32:20Z", "aliases": [ "CVE-2026-6757" @@ -25,6 +25,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-99hh-xp2q-f3fc/GHSA-99hh-xp2q-f3fc.json b/advisories/unreviewed/2026/04/GHSA-99hh-xp2q-f3fc/GHSA-99hh-xp2q-f3fc.json index 3f8480c212b7a..cd985bf5d9723 100644 --- a/advisories/unreviewed/2026/04/GHSA-99hh-xp2q-f3fc/GHSA-99hh-xp2q-f3fc.json +++ b/advisories/unreviewed/2026/04/GHSA-99hh-xp2q-f3fc/GHSA-99hh-xp2q-f3fc.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-99hh-xp2q-f3fc", - "modified": "2026-04-21T18:31:55Z", + "modified": "2026-04-22T00:31:37Z", "published": "2026-04-21T15:32:20Z", "aliases": [ "CVE-2026-6754" @@ -34,6 +34,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-9mpg-26vj-7vx3/GHSA-9mpg-26vj-7vx3.json b/advisories/unreviewed/2026/04/GHSA-9mpg-26vj-7vx3/GHSA-9mpg-26vj-7vx3.json new file mode 100644 index 0000000000000..cadf1b929e89f --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-9mpg-26vj-7vx3/GHSA-9mpg-26vj-7vx3.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9mpg-26vj-7vx3", + "modified": "2026-04-22T00:31:41Z", + "published": "2026-04-22T00:31:41Z", + "aliases": [ + "CVE-2026-3307" + ], + "details": "An authorization bypass vulnerability was identified in GitHub Enterprise Server that allowed an attacker with admin access on one repository to modify the secret scanning push protection delegated bypass reviewer list on another repository by manipulating the owner_id parameter in the request body. Authorization was verified against the repository in the URL, but the action was applied to a different repository specified in the request body. The impact is limited to assigning existing trusted users as bypass reviewers; it does not allow adding arbitrary external users. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.21 and was fixed in versions 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.7, 3.19.4 and 3.20.1. This vulnerability was reported via the GitHub Bug Bounty program.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3307" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.25" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.20" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.16" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.13" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.7" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.4" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.20/admin/release-notes#3.20.1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-639" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T23:16:19Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-c2q7-642g-3vwr/GHSA-c2q7-642g-3vwr.json b/advisories/unreviewed/2026/04/GHSA-c2q7-642g-3vwr/GHSA-c2q7-642g-3vwr.json index b4a675efd0a41..8c61ce2b987f2 100644 --- a/advisories/unreviewed/2026/04/GHSA-c2q7-642g-3vwr/GHSA-c2q7-642g-3vwr.json +++ b/advisories/unreviewed/2026/04/GHSA-c2q7-642g-3vwr/GHSA-c2q7-642g-3vwr.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-c2q7-642g-3vwr", - "modified": "2026-04-21T21:31:22Z", + "modified": "2026-04-22T00:31:38Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6772" @@ -34,6 +34,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-c6rq-x839-cgp6/GHSA-c6rq-x839-cgp6.json b/advisories/unreviewed/2026/04/GHSA-c6rq-x839-cgp6/GHSA-c6rq-x839-cgp6.json index 95fb9604501f3..81b2f1073a3dc 100644 --- a/advisories/unreviewed/2026/04/GHSA-c6rq-x839-cgp6/GHSA-c6rq-x839-cgp6.json +++ b/advisories/unreviewed/2026/04/GHSA-c6rq-x839-cgp6/GHSA-c6rq-x839-cgp6.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-c6rq-x839-cgp6", - "modified": "2026-04-21T21:31:22Z", + "modified": "2026-04-22T00:31:38Z", "published": "2026-04-21T15:32:20Z", "aliases": [ "CVE-2026-6764" @@ -30,6 +30,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-cp9h-w8px-6q24/GHSA-cp9h-w8px-6q24.json b/advisories/unreviewed/2026/04/GHSA-cp9h-w8px-6q24/GHSA-cp9h-w8px-6q24.json index c9abaa6c216f0..11568ec5b6c0a 100644 --- a/advisories/unreviewed/2026/04/GHSA-cp9h-w8px-6q24/GHSA-cp9h-w8px-6q24.json +++ b/advisories/unreviewed/2026/04/GHSA-cp9h-w8px-6q24/GHSA-cp9h-w8px-6q24.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-cp9h-w8px-6q24", - "modified": "2026-04-21T18:31:56Z", + "modified": "2026-04-22T00:31:39Z", "published": "2026-04-21T15:32:22Z", "aliases": [ "CVE-2026-6783" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-30" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-cr7m-q2pr-wwq7/GHSA-cr7m-q2pr-wwq7.json b/advisories/unreviewed/2026/04/GHSA-cr7m-q2pr-wwq7/GHSA-cr7m-q2pr-wwq7.json index 5cd7d0be164ef..01c293e767a4d 100644 --- a/advisories/unreviewed/2026/04/GHSA-cr7m-q2pr-wwq7/GHSA-cr7m-q2pr-wwq7.json +++ b/advisories/unreviewed/2026/04/GHSA-cr7m-q2pr-wwq7/GHSA-cr7m-q2pr-wwq7.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-cr7m-q2pr-wwq7", - "modified": "2026-04-21T15:32:21Z", + "modified": "2026-04-22T00:31:39Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6776" @@ -30,6 +30,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-fcrv-8vh3-4pg3/GHSA-fcrv-8vh3-4pg3.json b/advisories/unreviewed/2026/04/GHSA-fcrv-8vh3-4pg3/GHSA-fcrv-8vh3-4pg3.json index cb0165e4f9846..df7767af655ba 100644 --- a/advisories/unreviewed/2026/04/GHSA-fcrv-8vh3-4pg3/GHSA-fcrv-8vh3-4pg3.json +++ b/advisories/unreviewed/2026/04/GHSA-fcrv-8vh3-4pg3/GHSA-fcrv-8vh3-4pg3.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-fcrv-8vh3-4pg3", - "modified": "2026-04-21T15:32:22Z", + "modified": "2026-04-22T00:31:39Z", "published": "2026-04-21T15:32:22Z", "aliases": [ "CVE-2026-6784" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-30" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-g2r2-6v8v-5qgm/GHSA-g2r2-6v8v-5qgm.json b/advisories/unreviewed/2026/04/GHSA-g2r2-6v8v-5qgm/GHSA-g2r2-6v8v-5qgm.json new file mode 100644 index 0000000000000..38627720540c4 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-g2r2-6v8v-5qgm/GHSA-g2r2-6v8v-5qgm.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g2r2-6v8v-5qgm", + "modified": "2026-04-22T00:31:40Z", + "published": "2026-04-22T00:31:40Z", + "aliases": [ + "CVE-2026-41527" + ], + "details": "KDE Kleopatra before 26.08.0 on Windows allows local users to obtain the privileges of a Kleopatra user, because there is an error in the mechanism (KUniqueService) for ensuring that only one instance is running.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41527" + }, + { + "type": "WEB", + "url": "https://commits.kde.org/kleopatra/73471abb92d99c56354adb582bfaec2764c22b79" + }, + { + "type": "WEB", + "url": "https://github.com/KDE/kleopatra/releases" + }, + { + "type": "WEB", + "url": "https://kde.org/info/security/advisory-20260408-1.txt" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-670" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T22:16:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-g672-5549-fj5x/GHSA-g672-5549-fj5x.json b/advisories/unreviewed/2026/04/GHSA-g672-5549-fj5x/GHSA-g672-5549-fj5x.json index b8f6e78c7d383..2d7bd81507f35 100644 --- a/advisories/unreviewed/2026/04/GHSA-g672-5549-fj5x/GHSA-g672-5549-fj5x.json +++ b/advisories/unreviewed/2026/04/GHSA-g672-5549-fj5x/GHSA-g672-5549-fj5x.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-g672-5549-fj5x", - "modified": "2026-04-21T15:32:20Z", + "modified": "2026-04-22T00:31:37Z", "published": "2026-04-21T15:32:20Z", "aliases": [ "CVE-2026-6755" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-30" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-gcr4-c2jq-4gr5/GHSA-gcr4-c2jq-4gr5.json b/advisories/unreviewed/2026/04/GHSA-gcr4-c2jq-4gr5/GHSA-gcr4-c2jq-4gr5.json index 2b9f2532c8d52..a38b33be713f1 100644 --- a/advisories/unreviewed/2026/04/GHSA-gcr4-c2jq-4gr5/GHSA-gcr4-c2jq-4gr5.json +++ b/advisories/unreviewed/2026/04/GHSA-gcr4-c2jq-4gr5/GHSA-gcr4-c2jq-4gr5.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-284" + ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/04/GHSA-gp6f-8rr3-wxrg/GHSA-gp6f-8rr3-wxrg.json b/advisories/unreviewed/2026/04/GHSA-gp6f-8rr3-wxrg/GHSA-gp6f-8rr3-wxrg.json index 1fae312351c8a..f3960e5e21e98 100644 --- a/advisories/unreviewed/2026/04/GHSA-gp6f-8rr3-wxrg/GHSA-gp6f-8rr3-wxrg.json +++ b/advisories/unreviewed/2026/04/GHSA-gp6f-8rr3-wxrg/GHSA-gp6f-8rr3-wxrg.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-gp6f-8rr3-wxrg", - "modified": "2026-04-21T15:32:21Z", + "modified": "2026-04-22T00:31:38Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6774" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-30" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-h3rr-2q6v-g8rc/GHSA-h3rr-2q6v-g8rc.json b/advisories/unreviewed/2026/04/GHSA-h3rr-2q6v-g8rc/GHSA-h3rr-2q6v-g8rc.json index f8a9dcb529c6e..e89fdc75b47de 100644 --- a/advisories/unreviewed/2026/04/GHSA-h3rr-2q6v-g8rc/GHSA-h3rr-2q6v-g8rc.json +++ b/advisories/unreviewed/2026/04/GHSA-h3rr-2q6v-g8rc/GHSA-h3rr-2q6v-g8rc.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-h3rr-2q6v-g8rc", - "modified": "2026-04-21T15:32:20Z", + "modified": "2026-04-22T00:31:37Z", "published": "2026-04-21T15:32:20Z", "aliases": [ "CVE-2026-6762" @@ -29,6 +29,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-h5hc-2g7f-gxgj/GHSA-h5hc-2g7f-gxgj.json b/advisories/unreviewed/2026/04/GHSA-h5hc-2g7f-gxgj/GHSA-h5hc-2g7f-gxgj.json index 52779de4daccb..5d48de5165eb4 100644 --- a/advisories/unreviewed/2026/04/GHSA-h5hc-2g7f-gxgj/GHSA-h5hc-2g7f-gxgj.json +++ b/advisories/unreviewed/2026/04/GHSA-h5hc-2g7f-gxgj/GHSA-h5hc-2g7f-gxgj.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-h5hc-2g7f-gxgj", - "modified": "2026-04-21T15:32:20Z", + "modified": "2026-04-22T00:31:37Z", "published": "2026-04-21T15:32:20Z", "aliases": [ "CVE-2026-6760" @@ -21,6 +21,10 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-30" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-hqjc-gx24-xhpp/GHSA-hqjc-gx24-xhpp.json b/advisories/unreviewed/2026/04/GHSA-hqjc-gx24-xhpp/GHSA-hqjc-gx24-xhpp.json index 729468da0f559..c99e925f9f5bc 100644 --- a/advisories/unreviewed/2026/04/GHSA-hqjc-gx24-xhpp/GHSA-hqjc-gx24-xhpp.json +++ b/advisories/unreviewed/2026/04/GHSA-hqjc-gx24-xhpp/GHSA-hqjc-gx24-xhpp.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-hqjc-gx24-xhpp", - "modified": "2026-04-21T18:31:55Z", + "modified": "2026-04-22T00:31:37Z", "published": "2026-04-21T15:32:19Z", "aliases": [ "CVE-2026-6750" @@ -34,6 +34,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-jgph-c6j5-5mm2/GHSA-jgph-c6j5-5mm2.json b/advisories/unreviewed/2026/04/GHSA-jgph-c6j5-5mm2/GHSA-jgph-c6j5-5mm2.json index cdb83cf1b8613..743a4145a970a 100644 --- a/advisories/unreviewed/2026/04/GHSA-jgph-c6j5-5mm2/GHSA-jgph-c6j5-5mm2.json +++ b/advisories/unreviewed/2026/04/GHSA-jgph-c6j5-5mm2/GHSA-jgph-c6j5-5mm2.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-jgph-c6j5-5mm2", - "modified": "2026-04-21T21:31:22Z", + "modified": "2026-04-22T00:31:37Z", "published": "2026-04-21T15:32:20Z", "aliases": [ "CVE-2026-6763" @@ -30,6 +30,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-mcp7-23p7-2v34/GHSA-mcp7-23p7-2v34.json b/advisories/unreviewed/2026/04/GHSA-mcp7-23p7-2v34/GHSA-mcp7-23p7-2v34.json new file mode 100644 index 0000000000000..075bd41222882 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-mcp7-23p7-2v34/GHSA-mcp7-23p7-2v34.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mcp7-23p7-2v34", + "modified": "2026-04-22T00:31:42Z", + "published": "2026-04-22T00:31:41Z", + "aliases": [ + "CVE-2026-4296" + ], + "details": "An incorrect regular expression vulnerability was identified in GitHub Enterprise Server that allowed an attacker to bypass OAuth redirect URI validation. An attacker with knowledge of a first-party OAuth application's registered callback URL could craft a malicious authorization link that, when clicked by a victim, would redirect the OAuth authorization code to an attacker-controlled domain. This could allow the attacker to gain unauthorized access to the victim's account with the scopes granted to the OAuth application. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.21 and was fixed in versions 3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, 3.15.21, 3.14.26. This vulnerability was reported via the GitHub Bug Bounty program.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4296" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.26" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.21" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.17" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.14" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.8" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.5" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.20/admin/release-notes#3.20.1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-185" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T23:16:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-mwvh-c89q-73j6/GHSA-mwvh-c89q-73j6.json b/advisories/unreviewed/2026/04/GHSA-mwvh-c89q-73j6/GHSA-mwvh-c89q-73j6.json index 102615024a5f6..157c58e5810fb 100644 --- a/advisories/unreviewed/2026/04/GHSA-mwvh-c89q-73j6/GHSA-mwvh-c89q-73j6.json +++ b/advisories/unreviewed/2026/04/GHSA-mwvh-c89q-73j6/GHSA-mwvh-c89q-73j6.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-mwvh-c89q-73j6", - "modified": "2026-04-21T21:31:22Z", + "modified": "2026-04-22T00:31:37Z", "published": "2026-04-21T15:32:19Z", "aliases": [ "CVE-2026-6751" @@ -30,6 +30,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-pwfc-qm9r-p6h4/GHSA-pwfc-qm9r-p6h4.json b/advisories/unreviewed/2026/04/GHSA-pwfc-qm9r-p6h4/GHSA-pwfc-qm9r-p6h4.json new file mode 100644 index 0000000000000..c0a0649ec5514 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-pwfc-qm9r-p6h4/GHSA-pwfc-qm9r-p6h4.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pwfc-qm9r-p6h4", + "modified": "2026-04-22T00:31:41Z", + "published": "2026-04-22T00:31:41Z", + "aliases": [ + "CVE-2026-6832" + ], + "details": "Hermes WebUI contains an arbitrary file deletion vulnerability in the /api/session/delete endpoint that allows authenticated attackers to delete files outside the session directory by supplying an absolute path or path traversal payload in the session_id parameter. Attackers can exploit unvalidated session identifiers to construct paths that bypass the SESSION_DIR boundary and delete writable JSON files on the host system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6832" + }, + { + "type": "WEB", + "url": "https://github.com/nesquena/hermes-webui/pull/409" + }, + { + "type": "WEB", + "url": "https://github.com/nesquena/hermes-webui/pull/412" + }, + { + "type": "WEB", + "url": "https://github.com/nesquena/hermes-webui/commit/3cc5839bf303fa6758bfdac538507407a2929655" + }, + { + "type": "WEB", + "url": "https://github.com/nesquena/hermes-webui/releases/tag/v0.50.132" + }, + { + "type": "WEB", + "url": "https://github.com/nesquena/hermes-webui/releases/tag/v0.50.32" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/nesquena-hermes-webui-arbitrary-file-deletion-via-unvalidated-session-id" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T22:16:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-q3c8-p5vp-wr87/GHSA-q3c8-p5vp-wr87.json b/advisories/unreviewed/2026/04/GHSA-q3c8-p5vp-wr87/GHSA-q3c8-p5vp-wr87.json index 4dc71e2b30b4c..c1403f3945025 100644 --- a/advisories/unreviewed/2026/04/GHSA-q3c8-p5vp-wr87/GHSA-q3c8-p5vp-wr87.json +++ b/advisories/unreviewed/2026/04/GHSA-q3c8-p5vp-wr87/GHSA-q3c8-p5vp-wr87.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-q3c8-p5vp-wr87", - "modified": "2026-04-21T18:31:56Z", + "modified": "2026-04-22T00:31:39Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6777" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-30" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-q45f-ggxw-3qq8/GHSA-q45f-ggxw-3qq8.json b/advisories/unreviewed/2026/04/GHSA-q45f-ggxw-3qq8/GHSA-q45f-ggxw-3qq8.json index 356836256f619..85afd7a45159b 100644 --- a/advisories/unreviewed/2026/04/GHSA-q45f-ggxw-3qq8/GHSA-q45f-ggxw-3qq8.json +++ b/advisories/unreviewed/2026/04/GHSA-q45f-ggxw-3qq8/GHSA-q45f-ggxw-3qq8.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-q45f-ggxw-3qq8", - "modified": "2026-04-21T15:32:19Z", + "modified": "2026-04-22T00:31:37Z", "published": "2026-04-21T15:32:19Z", "aliases": [ "CVE-2026-6753" @@ -25,6 +25,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-q5x7-w9rr-q429/GHSA-q5x7-w9rr-q429.json b/advisories/unreviewed/2026/04/GHSA-q5x7-w9rr-q429/GHSA-q5x7-w9rr-q429.json index b45ca4847b556..001f30365613d 100644 --- a/advisories/unreviewed/2026/04/GHSA-q5x7-w9rr-q429/GHSA-q5x7-w9rr-q429.json +++ b/advisories/unreviewed/2026/04/GHSA-q5x7-w9rr-q429/GHSA-q5x7-w9rr-q429.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-q5x7-w9rr-q429", - "modified": "2026-04-21T18:31:56Z", + "modified": "2026-04-22T00:31:38Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6768" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-30" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-q6qg-6fmg-jjcv/GHSA-q6qg-6fmg-jjcv.json b/advisories/unreviewed/2026/04/GHSA-q6qg-6fmg-jjcv/GHSA-q6qg-6fmg-jjcv.json index 108f373250de5..4436733414a3f 100644 --- a/advisories/unreviewed/2026/04/GHSA-q6qg-6fmg-jjcv/GHSA-q6qg-6fmg-jjcv.json +++ b/advisories/unreviewed/2026/04/GHSA-q6qg-6fmg-jjcv/GHSA-q6qg-6fmg-jjcv.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-q6qg-6fmg-jjcv", - "modified": "2026-04-21T18:31:56Z", + "modified": "2026-04-22T00:31:38Z", "published": "2026-04-21T15:32:20Z", "aliases": [ "CVE-2026-6766" @@ -30,6 +30,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-r37m-3hw5-974w/GHSA-r37m-3hw5-974w.json b/advisories/unreviewed/2026/04/GHSA-r37m-3hw5-974w/GHSA-r37m-3hw5-974w.json index 707774c9f170b..88675b999c706 100644 --- a/advisories/unreviewed/2026/04/GHSA-r37m-3hw5-974w/GHSA-r37m-3hw5-974w.json +++ b/advisories/unreviewed/2026/04/GHSA-r37m-3hw5-974w/GHSA-r37m-3hw5-974w.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-r37m-3hw5-974w", - "modified": "2026-04-21T18:31:55Z", + "modified": "2026-04-22T00:31:37Z", "published": "2026-04-21T15:32:19Z", "aliases": [ "CVE-2026-6746" @@ -34,6 +34,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-rm28-r39x-h3x2/GHSA-rm28-r39x-h3x2.json b/advisories/unreviewed/2026/04/GHSA-rm28-r39x-h3x2/GHSA-rm28-r39x-h3x2.json index e1517ecb369c2..950d0db677b6f 100644 --- a/advisories/unreviewed/2026/04/GHSA-rm28-r39x-h3x2/GHSA-rm28-r39x-h3x2.json +++ b/advisories/unreviewed/2026/04/GHSA-rm28-r39x-h3x2/GHSA-rm28-r39x-h3x2.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-rm28-r39x-h3x2", - "modified": "2026-04-21T18:31:56Z", + "modified": "2026-04-22T00:31:39Z", "published": "2026-04-21T15:32:22Z", "aliases": [ "CVE-2026-6782" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-30" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-rppv-5944-crmm/GHSA-rppv-5944-crmm.json b/advisories/unreviewed/2026/04/GHSA-rppv-5944-crmm/GHSA-rppv-5944-crmm.json new file mode 100644 index 0000000000000..58024e0287b1f --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-rppv-5944-crmm/GHSA-rppv-5944-crmm.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rppv-5944-crmm", + "modified": "2026-04-22T00:31:40Z", + "published": "2026-04-22T00:31:40Z", + "aliases": [ + "CVE-2026-6829" + ], + "details": "nesquena hermes-webui contains a trust-boundary failure vulnerability that allows authenticated attackers to set or change a session workspace to an arbitrary existing directory on disk by manipulating workspace path parameters in endpoints such as /api/session/new, /api/session/update, /api/chat/start, and /api/workspaces/add. Attackers can repoint a session workspace to a directory outside the intended trusted root and then use ordinary file read and write APIs to access or modify files outside the intended workspace boundary within the permissions of the hermes-webui process.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6829" + }, + { + "type": "WEB", + "url": "https://github.com/nesquena/hermes-webui/pull/416" + }, + { + "type": "WEB", + "url": "https://github.com/nesquena/hermes-webui/commit/2a7a5ddfaf39e3b0094b7ac37e9f1dbcf40a3918" + }, + { + "type": "WEB", + "url": "https://github.com/nesquena/hermes-webui/releases/tag/v0.50.34" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/nesquena-hermes-webui-arbitrary-workspace-directory-access" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T22:16:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-rx3r-9q8p-8rrj/GHSA-rx3r-9q8p-8rrj.json b/advisories/unreviewed/2026/04/GHSA-rx3r-9q8p-8rrj/GHSA-rx3r-9q8p-8rrj.json index 2e09b67ec8482..98038224ebbe8 100644 --- a/advisories/unreviewed/2026/04/GHSA-rx3r-9q8p-8rrj/GHSA-rx3r-9q8p-8rrj.json +++ b/advisories/unreviewed/2026/04/GHSA-rx3r-9q8p-8rrj/GHSA-rx3r-9q8p-8rrj.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-rx3r-9q8p-8rrj", - "modified": "2026-04-21T18:31:56Z", + "modified": "2026-04-22T00:31:38Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6770" @@ -30,6 +30,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-v5vh-6mhh-h6gc/GHSA-v5vh-6mhh-h6gc.json b/advisories/unreviewed/2026/04/GHSA-v5vh-6mhh-h6gc/GHSA-v5vh-6mhh-h6gc.json index 021b6fe037094..e59760b0e3d6a 100644 --- a/advisories/unreviewed/2026/04/GHSA-v5vh-6mhh-h6gc/GHSA-v5vh-6mhh-h6gc.json +++ b/advisories/unreviewed/2026/04/GHSA-v5vh-6mhh-h6gc/GHSA-v5vh-6mhh-h6gc.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-v5vh-6mhh-h6gc", - "modified": "2026-04-21T21:31:22Z", + "modified": "2026-04-22T00:31:38Z", "published": "2026-04-21T15:32:20Z", "aliases": [ "CVE-2026-6765" @@ -30,6 +30,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-vvfr-g83f-8qcv/GHSA-vvfr-g83f-8qcv.json b/advisories/unreviewed/2026/04/GHSA-vvfr-g83f-8qcv/GHSA-vvfr-g83f-8qcv.json new file mode 100644 index 0000000000000..33612ea7bca86 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-vvfr-g83f-8qcv/GHSA-vvfr-g83f-8qcv.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vvfr-g83f-8qcv", + "modified": "2026-04-22T00:31:40Z", + "published": "2026-04-22T00:31:40Z", + "aliases": [ + "CVE-2026-6830" + ], + "details": "nesquena hermes-webui contains an environment variable leakage vulnerability where profile switching does not clear environment variables from the previously active profile before loading the next profile. Attackers or users can exploit additive dotenv reload behavior to access provider API keys and other sensitive secrets from one profile context in another profile, breaking expected security isolation between profiles.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6830" + }, + { + "type": "WEB", + "url": "https://github.com/nesquena/hermes-webui/pull/351" + }, + { + "type": "WEB", + "url": "https://github.com/nesquena/hermes-webui/commit/88dc8bbe26a6055161d3251b70f5cd3d3c5831b0" + }, + { + "type": "WEB", + "url": "https://github.com/nesquena/hermes-webui/releases/tag/v0.50.12" + }, + { + "type": "WEB", + "url": "https://github.com/nesquena/hermes-webui/releases/tag/v0.50.132" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/nesquena-hermes-webui-environment-variable-credential-leakage-via-profile-switch" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-459" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-21T22:16:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-w4vh-g4vq-3rf9/GHSA-w4vh-g4vq-3rf9.json b/advisories/unreviewed/2026/04/GHSA-w4vh-g4vq-3rf9/GHSA-w4vh-g4vq-3rf9.json index d403796c0fedb..ae36d99ea9ada 100644 --- a/advisories/unreviewed/2026/04/GHSA-w4vh-g4vq-3rf9/GHSA-w4vh-g4vq-3rf9.json +++ b/advisories/unreviewed/2026/04/GHSA-w4vh-g4vq-3rf9/GHSA-w4vh-g4vq-3rf9.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-w4vh-g4vq-3rf9", - "modified": "2026-04-21T18:31:55Z", + "modified": "2026-04-22T00:31:37Z", "published": "2026-04-21T15:32:20Z", "aliases": [ "CVE-2026-6759" @@ -30,6 +30,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-wpg5-vr6r-jrcr/GHSA-wpg5-vr6r-jrcr.json b/advisories/unreviewed/2026/04/GHSA-wpg5-vr6r-jrcr/GHSA-wpg5-vr6r-jrcr.json index 1c4aa01866a2d..a452906844f7c 100644 --- a/advisories/unreviewed/2026/04/GHSA-wpg5-vr6r-jrcr/GHSA-wpg5-vr6r-jrcr.json +++ b/advisories/unreviewed/2026/04/GHSA-wpg5-vr6r-jrcr/GHSA-wpg5-vr6r-jrcr.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-wpg5-vr6r-jrcr", - "modified": "2026-04-21T21:31:22Z", + "modified": "2026-04-22T00:31:38Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6775" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-30" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-wvr4-56pf-cc47/GHSA-wvr4-56pf-cc47.json b/advisories/unreviewed/2026/04/GHSA-wvr4-56pf-cc47/GHSA-wvr4-56pf-cc47.json index 07c92b7db25bc..16023e7640a1e 100644 --- a/advisories/unreviewed/2026/04/GHSA-wvr4-56pf-cc47/GHSA-wvr4-56pf-cc47.json +++ b/advisories/unreviewed/2026/04/GHSA-wvr4-56pf-cc47/GHSA-wvr4-56pf-cc47.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-wvr4-56pf-cc47", - "modified": "2026-04-21T18:31:55Z", + "modified": "2026-04-22T00:31:37Z", "published": "2026-04-21T15:32:19Z", "aliases": [ "CVE-2026-6747" @@ -30,6 +30,14 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-32" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-34" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-xm94-m277-f852/GHSA-xm94-m277-f852.json b/advisories/unreviewed/2026/04/GHSA-xm94-m277-f852/GHSA-xm94-m277-f852.json index 1eced13f9ee8e..20ee332c2b9ac 100644 --- a/advisories/unreviewed/2026/04/GHSA-xm94-m277-f852/GHSA-xm94-m277-f852.json +++ b/advisories/unreviewed/2026/04/GHSA-xm94-m277-f852/GHSA-xm94-m277-f852.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-xm94-m277-f852", - "modified": "2026-04-21T18:31:56Z", + "modified": "2026-04-22T00:31:39Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6778" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-30" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-xp4p-9mc9-5c47/GHSA-xp4p-9mc9-5c47.json b/advisories/unreviewed/2026/04/GHSA-xp4p-9mc9-5c47/GHSA-xp4p-9mc9-5c47.json index a7c7d16c9e7bc..795402a646c3f 100644 --- a/advisories/unreviewed/2026/04/GHSA-xp4p-9mc9-5c47/GHSA-xp4p-9mc9-5c47.json +++ b/advisories/unreviewed/2026/04/GHSA-xp4p-9mc9-5c47/GHSA-xp4p-9mc9-5c47.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-xp4p-9mc9-5c47", - "modified": "2026-04-21T18:31:56Z", + "modified": "2026-04-22T00:31:39Z", "published": "2026-04-21T15:32:21Z", "aliases": [ "CVE-2026-6779" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2026-30" + }, + { + "type": "WEB", + "url": "https://www.mozilla.org/security/advisories/mfsa2026-33" } ], "database_specific": { From 1f36db8a8a8b65a4eaf313e37ba6ff7193211539 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 22 Apr 2026 03:33:35 +0000 Subject: [PATCH 04/49] Publish Advisories GHSA-337w-h8w7-m899 GHSA-6742-w24p-5jgf GHSA-7fxx-2q9x-8wqf GHSA-99g5-mwj2-6xjq GHSA-rr6f-r97f-hqg7 GHSA-rvqf-8mp6-8qjg GHSA-w6jx-7fh4-vggr GHSA-w9v4-7vpf-w2r4 --- .../GHSA-337w-h8w7-m899.json | 6 ++- .../GHSA-6742-w24p-5jgf.json | 40 +++++++++++++++++ .../GHSA-7fxx-2q9x-8wqf.json | 36 +++++++++++++++ .../GHSA-99g5-mwj2-6xjq.json | 31 +++++++++++++ .../GHSA-rr6f-r97f-hqg7.json | 36 +++++++++++++++ .../GHSA-rvqf-8mp6-8qjg.json | 44 +++++++++++++++++++ .../GHSA-w6jx-7fh4-vggr.json | 36 +++++++++++++++ .../GHSA-w9v4-7vpf-w2r4.json | 31 +++++++++++++ 8 files changed, 259 insertions(+), 1 deletion(-) create mode 100644 advisories/unreviewed/2026/04/GHSA-6742-w24p-5jgf/GHSA-6742-w24p-5jgf.json create mode 100644 advisories/unreviewed/2026/04/GHSA-7fxx-2q9x-8wqf/GHSA-7fxx-2q9x-8wqf.json create mode 100644 advisories/unreviewed/2026/04/GHSA-99g5-mwj2-6xjq/GHSA-99g5-mwj2-6xjq.json create mode 100644 advisories/unreviewed/2026/04/GHSA-rr6f-r97f-hqg7/GHSA-rr6f-r97f-hqg7.json create mode 100644 advisories/unreviewed/2026/04/GHSA-rvqf-8mp6-8qjg/GHSA-rvqf-8mp6-8qjg.json create mode 100644 advisories/unreviewed/2026/04/GHSA-w6jx-7fh4-vggr/GHSA-w6jx-7fh4-vggr.json create mode 100644 advisories/unreviewed/2026/04/GHSA-w9v4-7vpf-w2r4/GHSA-w9v4-7vpf-w2r4.json diff --git a/advisories/unreviewed/2026/01/GHSA-337w-h8w7-m899/GHSA-337w-h8w7-m899.json b/advisories/unreviewed/2026/01/GHSA-337w-h8w7-m899/GHSA-337w-h8w7-m899.json index 03a2510ddd465..97dad7407a70d 100644 --- a/advisories/unreviewed/2026/01/GHSA-337w-h8w7-m899/GHSA-337w-h8w7-m899.json +++ b/advisories/unreviewed/2026/01/GHSA-337w-h8w7-m899/GHSA-337w-h8w7-m899.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-337w-h8w7-m899", - "modified": "2026-04-09T18:31:22Z", + "modified": "2026-04-22T03:31:35Z", "published": "2026-01-26T21:30:36Z", "aliases": [ "CVE-2025-9820" @@ -47,6 +47,10 @@ "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:7329" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:7477" + }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2025-9820" diff --git a/advisories/unreviewed/2026/04/GHSA-6742-w24p-5jgf/GHSA-6742-w24p-5jgf.json b/advisories/unreviewed/2026/04/GHSA-6742-w24p-5jgf/GHSA-6742-w24p-5jgf.json new file mode 100644 index 0000000000000..44787ca0372cb --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-6742-w24p-5jgf/GHSA-6742-w24p-5jgf.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6742-w24p-5jgf", + "modified": "2026-04-22T03:31:35Z", + "published": "2026-04-22T03:31:35Z", + "aliases": [ + "CVE-2026-41457" + ], + "details": "OwnTone Server versions 28.4 through 29.0 contain a SQL injection vulnerability in DAAP query and filter handling that allows attackers to inject arbitrary SQL expressions by supplying malicious values through the query= and filter= parameters for integer-mapped DAAP fields. Attackers can exploit insufficient sanitization of these parameters to bypass filters and gain unauthorized access to media library data.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41457" + }, + { + "type": "WEB", + "url": "https://github.com/owntone/owntone-server/commit/d4784ebf2099ed1a4203333aee957e5c7553c217" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/owntone-server-sql-injection-via-query-and-filter-parameters" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T03:16:00Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-7fxx-2q9x-8wqf/GHSA-7fxx-2q9x-8wqf.json b/advisories/unreviewed/2026/04/GHSA-7fxx-2q9x-8wqf/GHSA-7fxx-2q9x-8wqf.json new file mode 100644 index 0000000000000..8c87c6f5b0057 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-7fxx-2q9x-8wqf/GHSA-7fxx-2q9x-8wqf.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7fxx-2q9x-8wqf", + "modified": "2026-04-22T03:31:36Z", + "published": "2026-04-22T03:31:36Z", + "aliases": [ + "CVE-2026-6416" + ], + "details": "Tanium addressed an uncontrolled resource consumption vulnerability in Interact.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6416" + }, + { + "type": "WEB", + "url": "https://security.tanium.com/TAN-2026-010" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T03:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-99g5-mwj2-6xjq/GHSA-99g5-mwj2-6xjq.json b/advisories/unreviewed/2026/04/GHSA-99g5-mwj2-6xjq/GHSA-99g5-mwj2-6xjq.json new file mode 100644 index 0000000000000..f060e4d6d89b4 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-99g5-mwj2-6xjq/GHSA-99g5-mwj2-6xjq.json @@ -0,0 +1,31 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-99g5-mwj2-6xjq", + "modified": "2026-04-22T03:31:36Z", + "published": "2026-04-22T03:31:36Z", + "aliases": [ + "CVE-2026-6386" + ], + "details": "In order to apply a particular protection key to an address range, the kernel must update the corresponding page table entries. The subroutine which handled this failed to take into account the presence of 1GB largepage mappings created using the shm_create_largepage(3) interface. In particular, it would always treat a page directory page entry as pointing to another page table page.\n\nThe bug can be abused by an unprivileged user to cause pmap_pkru_update_range() to treat userspace memory as a page table page, and thus overwrite memory to which the application would otherwise not have access.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6386" + }, + { + "type": "WEB", + "url": "https://security.freebsd.org/advisories/FreeBSD-SA-26:11.amd64.asc" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-269" + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T03:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-rr6f-r97f-hqg7/GHSA-rr6f-r97f-hqg7.json b/advisories/unreviewed/2026/04/GHSA-rr6f-r97f-hqg7/GHSA-rr6f-r97f-hqg7.json new file mode 100644 index 0000000000000..f76865a50e250 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-rr6f-r97f-hqg7/GHSA-rr6f-r97f-hqg7.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rr6f-r97f-hqg7", + "modified": "2026-04-22T03:31:36Z", + "published": "2026-04-22T03:31:36Z", + "aliases": [ + "CVE-2026-6408" + ], + "details": "Tanium addressed an information disclosure vulnerability in Tanium Server.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6408" + }, + { + "type": "WEB", + "url": "https://security.tanium.com/TAN-2026-012" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-522" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T03:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-rvqf-8mp6-8qjg/GHSA-rvqf-8mp6-8qjg.json b/advisories/unreviewed/2026/04/GHSA-rvqf-8mp6-8qjg/GHSA-rvqf-8mp6-8qjg.json new file mode 100644 index 0000000000000..c1b10133510b2 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-rvqf-8mp6-8qjg/GHSA-rvqf-8mp6-8qjg.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rvqf-8mp6-8qjg", + "modified": "2026-04-22T03:31:36Z", + "published": "2026-04-22T03:31:36Z", + "aliases": [ + "CVE-2026-41458" + ], + "details": "OwnTone Server versions 28.4 through 29.0 contain a race condition vulnerability in the DAAP login handler that allows unauthenticated attackers to crash the server by exploiting unsynchronized access to the global DAAP session list. Attackers can flood the DAAP /login endpoint with concurrent requests to trigger a remote denial of service condition without requiring authentication.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41458" + }, + { + "type": "WEB", + "url": "https://github.com/owntone/owntone-server/pull/1980" + }, + { + "type": "WEB", + "url": "https://github.com/owntone/owntone-server/commit/dca94641a5ed66500822dd51281774794cdb6c22" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/owntone-server-race-condition-dos-via-daap-login" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-362" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T03:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-w6jx-7fh4-vggr/GHSA-w6jx-7fh4-vggr.json b/advisories/unreviewed/2026/04/GHSA-w6jx-7fh4-vggr/GHSA-w6jx-7fh4-vggr.json new file mode 100644 index 0000000000000..bf275ef01edeb --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-w6jx-7fh4-vggr/GHSA-w6jx-7fh4-vggr.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w6jx-7fh4-vggr", + "modified": "2026-04-22T03:31:36Z", + "published": "2026-04-22T03:31:36Z", + "aliases": [ + "CVE-2026-6392" + ], + "details": "Tanium addressed an information disclosure vulnerability in Threat Response.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6392" + }, + { + "type": "WEB", + "url": "https://security.tanium.com/TAN-2026-011" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T03:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-w9v4-7vpf-w2r4/GHSA-w9v4-7vpf-w2r4.json b/advisories/unreviewed/2026/04/GHSA-w9v4-7vpf-w2r4/GHSA-w9v4-7vpf-w2r4.json new file mode 100644 index 0000000000000..206e362e77e18 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-w9v4-7vpf-w2r4/GHSA-w9v4-7vpf-w2r4.json @@ -0,0 +1,31 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w9v4-7vpf-w2r4", + "modified": "2026-04-22T03:31:36Z", + "published": "2026-04-22T03:31:36Z", + "aliases": [ + "CVE-2026-5398" + ], + "details": "The implementation of TIOCNOTTY failed to clear a back-pointer from the structure representing the controlling terminal to the calling process' session. If the invoking process then exits, the terminal structure may end up containing a pointer to freed memory.\n\nA malicious process can abuse the dangling pointer to grant itself root privileges.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5398" + }, + { + "type": "WEB", + "url": "https://security.freebsd.org/advisories/FreeBSD-SA-26:10.tty.asc" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-416" + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T03:16:01Z" + } +} \ No newline at end of file From 22abbb54c708f3aa0964fc3c473ea1d176830833 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 22 Apr 2026 06:32:25 +0000 Subject: [PATCH 05/49] Publish Advisories GHSA-2jrg-rf5x-568g GHSA-4vrc-j85c-598c GHSA-4wrg-8wpc-h923 GHSA-7fr2-w4c8-798j GHSA-c83x-948p-83gh GHSA-c8mf-x5fq-cwm5 GHSA-cvc6-q2cp-2xhw GHSA-m34r-4v3r-pp9v GHSA-vxf7-qj7q-83fh --- .../GHSA-2jrg-rf5x-568g.json | 34 ++++++++++++++ .../GHSA-4vrc-j85c-598c.json | 34 ++++++++++++++ .../GHSA-4wrg-8wpc-h923.json | 34 ++++++++++++++ .../GHSA-7fr2-w4c8-798j.json | 44 +++++++++++++++++++ .../GHSA-c83x-948p-83gh.json | 44 +++++++++++++++++++ .../GHSA-c8mf-x5fq-cwm5.json | 44 +++++++++++++++++++ .../GHSA-cvc6-q2cp-2xhw.json | 34 ++++++++++++++ .../GHSA-m34r-4v3r-pp9v.json | 6 ++- .../GHSA-vxf7-qj7q-83fh.json | 34 ++++++++++++++ 9 files changed, 307 insertions(+), 1 deletion(-) create mode 100644 advisories/unreviewed/2026/04/GHSA-2jrg-rf5x-568g/GHSA-2jrg-rf5x-568g.json create mode 100644 advisories/unreviewed/2026/04/GHSA-4vrc-j85c-598c/GHSA-4vrc-j85c-598c.json create mode 100644 advisories/unreviewed/2026/04/GHSA-4wrg-8wpc-h923/GHSA-4wrg-8wpc-h923.json create mode 100644 advisories/unreviewed/2026/04/GHSA-7fr2-w4c8-798j/GHSA-7fr2-w4c8-798j.json create mode 100644 advisories/unreviewed/2026/04/GHSA-c83x-948p-83gh/GHSA-c83x-948p-83gh.json create mode 100644 advisories/unreviewed/2026/04/GHSA-c8mf-x5fq-cwm5/GHSA-c8mf-x5fq-cwm5.json create mode 100644 advisories/unreviewed/2026/04/GHSA-cvc6-q2cp-2xhw/GHSA-cvc6-q2cp-2xhw.json create mode 100644 advisories/unreviewed/2026/04/GHSA-vxf7-qj7q-83fh/GHSA-vxf7-qj7q-83fh.json diff --git a/advisories/unreviewed/2026/04/GHSA-2jrg-rf5x-568g/GHSA-2jrg-rf5x-568g.json b/advisories/unreviewed/2026/04/GHSA-2jrg-rf5x-568g/GHSA-2jrg-rf5x-568g.json new file mode 100644 index 0000000000000..48dd20a5f8cf3 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-2jrg-rf5x-568g/GHSA-2jrg-rf5x-568g.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2jrg-rf5x-568g", + "modified": "2026-04-22T06:30:28Z", + "published": "2026-04-22T06:30:28Z", + "aliases": [ + "CVE-2026-22747" + ], + "details": "Vulnerability in Spring Spring Security. SubjectX500PrincipalExtractor does not correctly handle certain malformed X.509 certificate CN values, which can lead to reading the wrong value for the username. In a carefully crafted certificate, this can lead to an attacker impersonating another user.\nThis issue affects Spring Security: from 7.0.0 through 7.0.4.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22747" + }, + { + "type": "WEB", + "url": "https://spring.io/security/cve-2026-22747" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T06:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-4vrc-j85c-598c/GHSA-4vrc-j85c-598c.json b/advisories/unreviewed/2026/04/GHSA-4vrc-j85c-598c/GHSA-4vrc-j85c-598c.json new file mode 100644 index 0000000000000..bd03444ef4885 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-4vrc-j85c-598c/GHSA-4vrc-j85c-598c.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4vrc-j85c-598c", + "modified": "2026-04-22T06:30:29Z", + "published": "2026-04-22T06:30:29Z", + "aliases": [ + "CVE-2026-22754" + ], + "details": "Vulnerability in Spring Spring Security. If an application uses  to define the servlet path for computing a path matcher, then the servlet path is not included and the related authorization rules are not exercised. This can lead to an authorization bypass.This issue affects Spring Security: from 7.0.0 through 7.0.4.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22754" + }, + { + "type": "WEB", + "url": "https://spring.io/security/cve-2026-22754" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T06:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-4wrg-8wpc-h923/GHSA-4wrg-8wpc-h923.json b/advisories/unreviewed/2026/04/GHSA-4wrg-8wpc-h923/GHSA-4wrg-8wpc-h923.json new file mode 100644 index 0000000000000..3379ea1f1c482 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-4wrg-8wpc-h923/GHSA-4wrg-8wpc-h923.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4wrg-8wpc-h923", + "modified": "2026-04-22T06:30:29Z", + "published": "2026-04-22T06:30:29Z", + "aliases": [ + "CVE-2026-22753" + ], + "details": "Vulnerability in Spring Spring Security. If an application is using securityMatchers(String) and a PathPatternRequestMatcher.Builder bean to prepend a servlet path, matching requests to that filter chain may fail and its related security components will not be exercised as intended by the application. This can lead to the authentication, authorization, and other security controls being rendered inactive on intended requests.This issue affects Spring Security: from 7.0.0 through 7.0.4.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22753" + }, + { + "type": "WEB", + "url": "https://spring.io/security/cve-2026-22753" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T06:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-7fr2-w4c8-798j/GHSA-7fr2-w4c8-798j.json b/advisories/unreviewed/2026/04/GHSA-7fr2-w4c8-798j/GHSA-7fr2-w4c8-798j.json new file mode 100644 index 0000000000000..6308ff8ffcfb3 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-7fr2-w4c8-798j/GHSA-7fr2-w4c8-798j.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7fr2-w4c8-798j", + "modified": "2026-04-22T06:30:28Z", + "published": "2026-04-22T06:30:28Z", + "aliases": [ + "CVE-2026-6833" + ], + "details": "The a+HRD developed by aEnrich has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read database contents.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6833" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/en/cp-139-10834-eb3ee-2.html" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/tw/cp-132-10833-e3a53-1.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T04:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-c83x-948p-83gh/GHSA-c83x-948p-83gh.json b/advisories/unreviewed/2026/04/GHSA-c83x-948p-83gh/GHSA-c83x-948p-83gh.json new file mode 100644 index 0000000000000..e31658abd25a2 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-c83x-948p-83gh/GHSA-c83x-948p-83gh.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c83x-948p-83gh", + "modified": "2026-04-22T06:30:29Z", + "published": "2026-04-22T06:30:28Z", + "aliases": [ + "CVE-2026-6834" + ], + "details": "The a+HRD developed by aEnrich has a Missing Authorization vulnerability, allowing authenticated remote attackers to arbitrarily read database contents through a specific API method.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6834" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/en/cp-139-10834-eb3ee-2.html" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/tw/cp-132-10833-e3a53-1.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T04:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-c8mf-x5fq-cwm5/GHSA-c8mf-x5fq-cwm5.json b/advisories/unreviewed/2026/04/GHSA-c8mf-x5fq-cwm5/GHSA-c8mf-x5fq-cwm5.json new file mode 100644 index 0000000000000..2311ee868d3f7 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-c8mf-x5fq-cwm5/GHSA-c8mf-x5fq-cwm5.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c8mf-x5fq-cwm5", + "modified": "2026-04-22T06:30:29Z", + "published": "2026-04-22T06:30:28Z", + "aliases": [ + "CVE-2026-6835" + ], + "details": "The a+HCM developed by aEnrich has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload arbitrary files to any path, including HTML documents, which may result in a XSS-like effect.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6835" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/en/cp-139-10836-ed15f-2.html" + }, + { + "type": "WEB", + "url": "https://www.twcert.org.tw/tw/cp-132-10835-cb0c2-1.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T04:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-cvc6-q2cp-2xhw/GHSA-cvc6-q2cp-2xhw.json b/advisories/unreviewed/2026/04/GHSA-cvc6-q2cp-2xhw/GHSA-cvc6-q2cp-2xhw.json new file mode 100644 index 0000000000000..73c25fc02f09a --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-cvc6-q2cp-2xhw/GHSA-cvc6-q2cp-2xhw.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cvc6-q2cp-2xhw", + "modified": "2026-04-22T06:30:29Z", + "published": "2026-04-22T06:30:29Z", + "aliases": [ + "CVE-2026-22748" + ], + "details": "Vulnerability in Spring Spring Security. When an application configures JWT decoding with NimbusJwtDecoder  or NimbusReactiveJwtDecoder, it must configure an OAuth2TokenValidator separately, for example by calling setJwtValidator.This issue affects Spring Security: from 6.3.0 through 6.3.14, from 6.4.0 through 6.4.14, from 6.5.0 through 6.5.9, from 7.0.0 through 7.0.4.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22748" + }, + { + "type": "WEB", + "url": "https://spring.io/security/cve-2026-22748" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T06:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-m34r-4v3r-pp9v/GHSA-m34r-4v3r-pp9v.json b/advisories/unreviewed/2026/04/GHSA-m34r-4v3r-pp9v/GHSA-m34r-4v3r-pp9v.json index d1557543d8d02..b867464cd6572 100644 --- a/advisories/unreviewed/2026/04/GHSA-m34r-4v3r-pp9v/GHSA-m34r-4v3r-pp9v.json +++ b/advisories/unreviewed/2026/04/GHSA-m34r-4v3r-pp9v/GHSA-m34r-4v3r-pp9v.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-m34r-4v3r-pp9v", - "modified": "2026-04-16T21:31:12Z", + "modified": "2026-04-22T06:30:28Z", "published": "2026-04-16T09:31:44Z", "aliases": [ "CVE-2026-41035" @@ -34,6 +34,10 @@ { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2026/04/16/9" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2026/04/22/3" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-vxf7-qj7q-83fh/GHSA-vxf7-qj7q-83fh.json b/advisories/unreviewed/2026/04/GHSA-vxf7-qj7q-83fh/GHSA-vxf7-qj7q-83fh.json new file mode 100644 index 0000000000000..1d5911f9d987e --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-vxf7-qj7q-83fh/GHSA-vxf7-qj7q-83fh.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vxf7-qj7q-83fh", + "modified": "2026-04-22T06:30:29Z", + "published": "2026-04-22T06:30:28Z", + "aliases": [ + "CVE-2026-22746" + ], + "details": "Vulnerability in Spring Spring Security. If an application is using the UserDetails#isEnabled, #isAccountNonExpired, or #isAccountNonLocked user attributes, to enable, expire, or lock users, then DaoAuthenticationProvider's timing attack defense can be bypassed for users who are disabled, expired, or locked.This issue affects Spring Security: from 5.7.0 through 5.7.22, from 5.8.0 through 5.8.24, from 6.3.0 through 6.3.15, from 6.5.0 through 6.5.9, from 7.0.0 through 7.0.4.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22746" + }, + { + "type": "WEB", + "url": "https://spring.io/security/cve-2026-22746" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T06:16:02Z" + } +} \ No newline at end of file From decfb4c5af526a9d4a0c7af661d26e651ad544c5 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 22 Apr 2026 09:33:41 +0000 Subject: [PATCH 06/49] Advisory Database Sync --- .../GHSA-2vwv-vqpv-v8vc.json | 6 +- .../GHSA-c75f-55f6-f63q.json | 32 +++--- .../GHSA-2225-p3w2-pmwj.json | 44 ++++++++ .../GHSA-2274-3hgr-wxv6.json | 37 +++++++ .../GHSA-22p7-jgf7-772h.json | 100 ++++++++++++++++++ .../GHSA-2qxm-5chm-2w9c.json | 60 +++++++++++ .../GHSA-32xq-pcg8-hc33.json | 53 ++++++++++ .../GHSA-39pg-69jq-6vx9.json | 68 ++++++++++++ .../GHSA-4922-xr68-xjg8.json | 52 +++++++++ .../GHSA-4mj3-26h4-xjcm.json | 44 ++++++++ .../GHSA-4x86-c4g3-px96.json | 48 +++++++++ .../GHSA-5295-qq8m-4r9g.json | 36 +++++++ .../GHSA-59pf-538p-vw7w.json | 84 +++++++++++++++ .../GHSA-5mhq-hh7f-vmww.json | 60 +++++++++++ .../GHSA-68gc-c9cv-7m2c.json | 36 +++++++ .../GHSA-6g74-v723-hrch.json | 36 +++++++ .../GHSA-6jwx-v327-2xh9.json | 68 ++++++++++++ .../GHSA-84px-h8hx-j764.json | 44 ++++++++ .../GHSA-85g4-fxfm-w35m.json | 36 +++++++ .../GHSA-8h43-r57g-hmff.json | 44 ++++++++ .../GHSA-8qm3-xq92-849m.json | 52 +++++++++ .../GHSA-8w4w-mfg4-cvw8.json | 52 +++++++++ .../GHSA-95vj-cwqx-rpmc.json | 76 +++++++++++++ .../GHSA-9jvr-742w-rwph.json | 40 +++++++ .../GHSA-9p67-72c6-m54h.json | 60 +++++++++++ .../GHSA-9pfq-r2rw-3rwv.json | 36 +++++++ .../GHSA-c64w-hpm6-xx8w.json | 40 +++++++ .../GHSA-c973-mjq6-p7hj.json | 44 ++++++++ .../GHSA-ccfr-97mr-qq8g.json | 40 +++++++ .../GHSA-cfg6-vcc7-59p9.json | 36 +++++++ .../GHSA-chmq-57c3-4p7v.json | 40 +++++++ .../GHSA-f34c-54gc-hh3w.json | 52 +++++++++ .../GHSA-f4p3-578m-v245.json | 52 +++++++++ .../GHSA-f75p-6q8j-p2f2.json | 41 +++++++ .../GHSA-f7h9-vgfr-v594.json | 52 +++++++++ .../GHSA-g2qw-xxq7-4v3v.json | 68 ++++++++++++ .../GHSA-g34v-p67g-pv7m.json | 44 ++++++++ .../GHSA-g8vq-gpv7-9mmq.json | 52 +++++++++ .../GHSA-gg9v-56ph-3gr7.json | 84 +++++++++++++++ .../GHSA-gwg7-cjw3-gqff.json | 52 +++++++++ .../GHSA-hr8j-5xfh-rrg6.json | 44 ++++++++ .../GHSA-j4g7-gjv8-gvjh.json | 60 +++++++++++ .../GHSA-jpj9-vrh6-4wmc.json | 84 +++++++++++++++ .../GHSA-mcrv-gh25-252c.json | 36 +++++++ .../GHSA-mh5c-2v7r-xcxg.json | 60 +++++++++++ .../GHSA-mjqc-rj22-4rf2.json | 76 +++++++++++++ .../GHSA-mqr4-9x5m-973r.json | 36 +++++++ .../GHSA-p2vp-x377-3m3c.json | 52 +++++++++ .../GHSA-p33j-xffm-gxj7.json | 40 +++++++ .../GHSA-ppmh-rcj7-3qgj.json | 48 +++++++++ .../GHSA-qf7j-x97j-qhrf.json | 44 ++++++++ .../GHSA-qjcj-728w-wq7q.json | 36 +++++++ .../GHSA-qmqw-wp7g-jcp9.json | 44 ++++++++ .../GHSA-r256-59w3-3gr2.json | 52 +++++++++ .../GHSA-r68m-88g9-q2jq.json | 36 +++++++ .../GHSA-r8vc-r7mw-hrcg.json | 68 ++++++++++++ .../GHSA-v468-qcjx-r72w.json | 31 ++++++ .../GHSA-vf2r-6g4x-jc4h.json | 36 +++++++ .../GHSA-wfc4-vr66-fq9p.json | 52 +++++++++ .../GHSA-whv2-j4r9-wvjx.json | 40 +++++++ .../GHSA-wpp9-gmq8-vmx8.json | 84 +++++++++++++++ 61 files changed, 3045 insertions(+), 15 deletions(-) create mode 100644 advisories/unreviewed/2026/04/GHSA-2225-p3w2-pmwj/GHSA-2225-p3w2-pmwj.json create mode 100644 advisories/unreviewed/2026/04/GHSA-2274-3hgr-wxv6/GHSA-2274-3hgr-wxv6.json create mode 100644 advisories/unreviewed/2026/04/GHSA-22p7-jgf7-772h/GHSA-22p7-jgf7-772h.json create mode 100644 advisories/unreviewed/2026/04/GHSA-2qxm-5chm-2w9c/GHSA-2qxm-5chm-2w9c.json create mode 100644 advisories/unreviewed/2026/04/GHSA-32xq-pcg8-hc33/GHSA-32xq-pcg8-hc33.json create mode 100644 advisories/unreviewed/2026/04/GHSA-39pg-69jq-6vx9/GHSA-39pg-69jq-6vx9.json create mode 100644 advisories/unreviewed/2026/04/GHSA-4922-xr68-xjg8/GHSA-4922-xr68-xjg8.json create mode 100644 advisories/unreviewed/2026/04/GHSA-4mj3-26h4-xjcm/GHSA-4mj3-26h4-xjcm.json create mode 100644 advisories/unreviewed/2026/04/GHSA-4x86-c4g3-px96/GHSA-4x86-c4g3-px96.json create mode 100644 advisories/unreviewed/2026/04/GHSA-5295-qq8m-4r9g/GHSA-5295-qq8m-4r9g.json create mode 100644 advisories/unreviewed/2026/04/GHSA-59pf-538p-vw7w/GHSA-59pf-538p-vw7w.json create mode 100644 advisories/unreviewed/2026/04/GHSA-5mhq-hh7f-vmww/GHSA-5mhq-hh7f-vmww.json create mode 100644 advisories/unreviewed/2026/04/GHSA-68gc-c9cv-7m2c/GHSA-68gc-c9cv-7m2c.json create mode 100644 advisories/unreviewed/2026/04/GHSA-6g74-v723-hrch/GHSA-6g74-v723-hrch.json create mode 100644 advisories/unreviewed/2026/04/GHSA-6jwx-v327-2xh9/GHSA-6jwx-v327-2xh9.json create mode 100644 advisories/unreviewed/2026/04/GHSA-84px-h8hx-j764/GHSA-84px-h8hx-j764.json create mode 100644 advisories/unreviewed/2026/04/GHSA-85g4-fxfm-w35m/GHSA-85g4-fxfm-w35m.json create mode 100644 advisories/unreviewed/2026/04/GHSA-8h43-r57g-hmff/GHSA-8h43-r57g-hmff.json create mode 100644 advisories/unreviewed/2026/04/GHSA-8qm3-xq92-849m/GHSA-8qm3-xq92-849m.json create mode 100644 advisories/unreviewed/2026/04/GHSA-8w4w-mfg4-cvw8/GHSA-8w4w-mfg4-cvw8.json create mode 100644 advisories/unreviewed/2026/04/GHSA-95vj-cwqx-rpmc/GHSA-95vj-cwqx-rpmc.json create mode 100644 advisories/unreviewed/2026/04/GHSA-9jvr-742w-rwph/GHSA-9jvr-742w-rwph.json create mode 100644 advisories/unreviewed/2026/04/GHSA-9p67-72c6-m54h/GHSA-9p67-72c6-m54h.json create mode 100644 advisories/unreviewed/2026/04/GHSA-9pfq-r2rw-3rwv/GHSA-9pfq-r2rw-3rwv.json create mode 100644 advisories/unreviewed/2026/04/GHSA-c64w-hpm6-xx8w/GHSA-c64w-hpm6-xx8w.json create mode 100644 advisories/unreviewed/2026/04/GHSA-c973-mjq6-p7hj/GHSA-c973-mjq6-p7hj.json create mode 100644 advisories/unreviewed/2026/04/GHSA-ccfr-97mr-qq8g/GHSA-ccfr-97mr-qq8g.json create mode 100644 advisories/unreviewed/2026/04/GHSA-cfg6-vcc7-59p9/GHSA-cfg6-vcc7-59p9.json create mode 100644 advisories/unreviewed/2026/04/GHSA-chmq-57c3-4p7v/GHSA-chmq-57c3-4p7v.json create mode 100644 advisories/unreviewed/2026/04/GHSA-f34c-54gc-hh3w/GHSA-f34c-54gc-hh3w.json create mode 100644 advisories/unreviewed/2026/04/GHSA-f4p3-578m-v245/GHSA-f4p3-578m-v245.json create mode 100644 advisories/unreviewed/2026/04/GHSA-f75p-6q8j-p2f2/GHSA-f75p-6q8j-p2f2.json create mode 100644 advisories/unreviewed/2026/04/GHSA-f7h9-vgfr-v594/GHSA-f7h9-vgfr-v594.json create mode 100644 advisories/unreviewed/2026/04/GHSA-g2qw-xxq7-4v3v/GHSA-g2qw-xxq7-4v3v.json create mode 100644 advisories/unreviewed/2026/04/GHSA-g34v-p67g-pv7m/GHSA-g34v-p67g-pv7m.json create mode 100644 advisories/unreviewed/2026/04/GHSA-g8vq-gpv7-9mmq/GHSA-g8vq-gpv7-9mmq.json create mode 100644 advisories/unreviewed/2026/04/GHSA-gg9v-56ph-3gr7/GHSA-gg9v-56ph-3gr7.json create mode 100644 advisories/unreviewed/2026/04/GHSA-gwg7-cjw3-gqff/GHSA-gwg7-cjw3-gqff.json create mode 100644 advisories/unreviewed/2026/04/GHSA-hr8j-5xfh-rrg6/GHSA-hr8j-5xfh-rrg6.json create mode 100644 advisories/unreviewed/2026/04/GHSA-j4g7-gjv8-gvjh/GHSA-j4g7-gjv8-gvjh.json create mode 100644 advisories/unreviewed/2026/04/GHSA-jpj9-vrh6-4wmc/GHSA-jpj9-vrh6-4wmc.json create mode 100644 advisories/unreviewed/2026/04/GHSA-mcrv-gh25-252c/GHSA-mcrv-gh25-252c.json create mode 100644 advisories/unreviewed/2026/04/GHSA-mh5c-2v7r-xcxg/GHSA-mh5c-2v7r-xcxg.json create mode 100644 advisories/unreviewed/2026/04/GHSA-mjqc-rj22-4rf2/GHSA-mjqc-rj22-4rf2.json create mode 100644 advisories/unreviewed/2026/04/GHSA-mqr4-9x5m-973r/GHSA-mqr4-9x5m-973r.json create mode 100644 advisories/unreviewed/2026/04/GHSA-p2vp-x377-3m3c/GHSA-p2vp-x377-3m3c.json create mode 100644 advisories/unreviewed/2026/04/GHSA-p33j-xffm-gxj7/GHSA-p33j-xffm-gxj7.json create mode 100644 advisories/unreviewed/2026/04/GHSA-ppmh-rcj7-3qgj/GHSA-ppmh-rcj7-3qgj.json create mode 100644 advisories/unreviewed/2026/04/GHSA-qf7j-x97j-qhrf/GHSA-qf7j-x97j-qhrf.json create mode 100644 advisories/unreviewed/2026/04/GHSA-qjcj-728w-wq7q/GHSA-qjcj-728w-wq7q.json create mode 100644 advisories/unreviewed/2026/04/GHSA-qmqw-wp7g-jcp9/GHSA-qmqw-wp7g-jcp9.json create mode 100644 advisories/unreviewed/2026/04/GHSA-r256-59w3-3gr2/GHSA-r256-59w3-3gr2.json create mode 100644 advisories/unreviewed/2026/04/GHSA-r68m-88g9-q2jq/GHSA-r68m-88g9-q2jq.json create mode 100644 advisories/unreviewed/2026/04/GHSA-r8vc-r7mw-hrcg/GHSA-r8vc-r7mw-hrcg.json create mode 100644 advisories/unreviewed/2026/04/GHSA-v468-qcjx-r72w/GHSA-v468-qcjx-r72w.json create mode 100644 advisories/unreviewed/2026/04/GHSA-vf2r-6g4x-jc4h/GHSA-vf2r-6g4x-jc4h.json create mode 100644 advisories/unreviewed/2026/04/GHSA-wfc4-vr66-fq9p/GHSA-wfc4-vr66-fq9p.json create mode 100644 advisories/unreviewed/2026/04/GHSA-whv2-j4r9-wvjx/GHSA-whv2-j4r9-wvjx.json create mode 100644 advisories/unreviewed/2026/04/GHSA-wpp9-gmq8-vmx8/GHSA-wpp9-gmq8-vmx8.json diff --git a/advisories/unreviewed/2026/03/GHSA-2vwv-vqpv-v8vc/GHSA-2vwv-vqpv-v8vc.json b/advisories/unreviewed/2026/03/GHSA-2vwv-vqpv-v8vc/GHSA-2vwv-vqpv-v8vc.json index 92db43c9394a9..b8d69572c5c8d 100644 --- a/advisories/unreviewed/2026/03/GHSA-2vwv-vqpv-v8vc/GHSA-2vwv-vqpv-v8vc.json +++ b/advisories/unreviewed/2026/03/GHSA-2vwv-vqpv-v8vc/GHSA-2vwv-vqpv-v8vc.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-2vwv-vqpv-v8vc", - "modified": "2026-04-20T15:31:51Z", + "modified": "2026-04-22T09:31:31Z", "published": "2026-03-30T09:31:29Z", "aliases": [ "CVE-2026-5121" @@ -63,6 +63,10 @@ "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:9026" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:9592" + }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2026-5121" diff --git a/advisories/unreviewed/2026/03/GHSA-c75f-55f6-f63q/GHSA-c75f-55f6-f63q.json b/advisories/unreviewed/2026/03/GHSA-c75f-55f6-f63q/GHSA-c75f-55f6-f63q.json index d2b04bbbbc56c..bca0dca4f437d 100644 --- a/advisories/unreviewed/2026/03/GHSA-c75f-55f6-f63q/GHSA-c75f-55f6-f63q.json +++ b/advisories/unreviewed/2026/03/GHSA-c75f-55f6-f63q/GHSA-c75f-55f6-f63q.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-c75f-55f6-f63q", - "modified": "2026-04-20T15:31:51Z", + "modified": "2026-04-22T09:31:31Z", "published": "2026-03-19T15:31:21Z", "aliases": [ "CVE-2026-4424" @@ -25,31 +25,31 @@ }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:8492" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449006" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:8510" + "url": "https://access.redhat.com/security/cve/CVE-2026-4424" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:8517" + "url": "https://access.redhat.com/errata/RHSA-2026:9592" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:8521" + "url": "https://access.redhat.com/errata/RHSA-2026:9026" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:8534" + "url": "https://access.redhat.com/errata/RHSA-2026:8908" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:8864" + "url": "https://access.redhat.com/errata/RHSA-2026:8873" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:8865" + "url": "https://access.redhat.com/errata/RHSA-2026:8867" }, { "type": "WEB", @@ -57,27 +57,31 @@ }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:8867" + "url": "https://access.redhat.com/errata/RHSA-2026:8865" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:8873" + "url": "https://access.redhat.com/errata/RHSA-2026:8864" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:8908" + "url": "https://access.redhat.com/errata/RHSA-2026:8534" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:9026" + "url": "https://access.redhat.com/errata/RHSA-2026:8521" }, { "type": "WEB", - "url": "https://access.redhat.com/security/cve/CVE-2026-4424" + "url": "https://access.redhat.com/errata/RHSA-2026:8517" }, { "type": "WEB", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449006" + "url": "https://access.redhat.com/errata/RHSA-2026:8510" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:8492" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/04/GHSA-2225-p3w2-pmwj/GHSA-2225-p3w2-pmwj.json b/advisories/unreviewed/2026/04/GHSA-2225-p3w2-pmwj/GHSA-2225-p3w2-pmwj.json new file mode 100644 index 0000000000000..b02fc25545733 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-2225-p3w2-pmwj/GHSA-2225-p3w2-pmwj.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2225-p3w2-pmwj", + "modified": "2026-04-22T09:31:33Z", + "published": "2026-04-22T09:31:33Z", + "aliases": [ + "CVE-2026-5767" + ], + "details": "The SlideShowPro SC plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `slideShowProSC` shortcode in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5767" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/slideshowpro-shortcode/tags/1.0.2/slideshowpro_sc.php#L287" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/slideshowpro-shortcode/trunk/slideshowpro_sc.php#L287" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/51467cef-9624-4dd9-a368-d3b5fac7bb3d?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T09:16:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-2274-3hgr-wxv6/GHSA-2274-3hgr-wxv6.json b/advisories/unreviewed/2026/04/GHSA-2274-3hgr-wxv6/GHSA-2274-3hgr-wxv6.json new file mode 100644 index 0000000000000..b4db819d11f44 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-2274-3hgr-wxv6/GHSA-2274-3hgr-wxv6.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2274-3hgr-wxv6", + "modified": "2026-04-22T09:31:32Z", + "published": "2026-04-22T09:31:32Z", + "aliases": [ + "CVE-2026-31431" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: algif_aead - Revert to operating out-of-place\n\nThis mostly reverts commit 72548b093ee3 except for the copying of\nthe associated data.\n\nThere is no benefit in operating in-place in algif_aead since the\nsource and destination come from different mappings. Get rid of\nall the complexity added for in-place operation and just copy the\nAD directly.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31431" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ce42ee423e58dffa5ec03524054c9d8bfd4f6237" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T09:16:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-22p7-jgf7-772h/GHSA-22p7-jgf7-772h.json b/advisories/unreviewed/2026/04/GHSA-22p7-jgf7-772h/GHSA-22p7-jgf7-772h.json new file mode 100644 index 0000000000000..96f337bce152b --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-22p7-jgf7-772h/GHSA-22p7-jgf7-772h.json @@ -0,0 +1,100 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-22p7-jgf7-772h", + "modified": "2026-04-22T09:31:32Z", + "published": "2026-04-22T09:31:32Z", + "aliases": [ + "CVE-2026-4090" + ], + "details": "The Inquiry Cart plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.4.2. This is due to missing nonce verification in the rd_ic_settings_page function when processing settings form submissions. This makes it possible for unauthenticated attackers to update the plugin's settings, including injecting malicious scripts that will be stored and executed in the admin area, via a forged request granted they can trick an administrator into performing an action such as clicking on a link.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4090" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/inquiry-cart/tags/0.0.0.0/includes/inquiry-cart-shortcode.php#L32" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/inquiry-cart/tags/0.0.0.0/includes/inquiry-cart-shortcode.php#L34" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/inquiry-cart/tags/0.0.0.0/includes/settings-page.php#L21" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/inquiry-cart/tags/0.0.0.0/includes/settings-page.php#L46" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/inquiry-cart/tags/0.0.0.0/includes/settings-page.php#L47" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/inquiry-cart/tags/0.0.0.0/includes/settings-page.php#L48" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/inquiry-cart/tags/0.0.0.0/includes/settings-page.php#L49" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/inquiry-cart/tags/0.0.0.0/includes/settings-page.php#L6" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/inquiry-cart/trunk/includes/inquiry-cart-shortcode.php#L32" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/inquiry-cart/trunk/includes/inquiry-cart-shortcode.php#L34" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/inquiry-cart/trunk/includes/settings-page.php#L21" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/inquiry-cart/trunk/includes/settings-page.php#L46" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/inquiry-cart/trunk/includes/settings-page.php#L47" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/inquiry-cart/trunk/includes/settings-page.php#L48" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/inquiry-cart/trunk/includes/settings-page.php#L49" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/inquiry-cart/trunk/includes/settings-page.php#L6" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/772e9b2b-b2d5-4950-804b-d0914004710c?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T09:16:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-2qxm-5chm-2w9c/GHSA-2qxm-5chm-2w9c.json b/advisories/unreviewed/2026/04/GHSA-2qxm-5chm-2w9c/GHSA-2qxm-5chm-2w9c.json new file mode 100644 index 0000000000000..a76b0f52d8675 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-2qxm-5chm-2w9c/GHSA-2qxm-5chm-2w9c.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2qxm-5chm-2w9c", + "modified": "2026-04-22T09:31:33Z", + "published": "2026-04-22T09:31:32Z", + "aliases": [ + "CVE-2026-4126" + ], + "details": "The Table Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.0 via the 'table_manager' shortcode. The shortcode handler `tablemanager_render_table_shortcode()` takes a user-controlled `table` attribute, applies only `sanitize_key()` for sanitization, and concatenates the value with `$wpdb->prefix` to form a full database table name. It then executes `DESC` and `SELECT *` queries against this table and renders all rows and columns to the frontend. There is no allowlist check to ensure only plugin-created tables can be accessed — the `tablemanager_created_tables` option is only referenced in admin functions, never in the shortcode handler. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data from arbitrary WordPress database tables.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4126" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/table-manager/tags/1.0.0/table-manager.php#L561" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/table-manager/tags/1.0.0/table-manager.php#L572" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/table-manager/tags/1.0.0/table-manager.php#L573" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/table-manager/trunk/table-manager.php#L561" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/table-manager/trunk/table-manager.php#L572" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/table-manager/trunk/table-manager.php#L573" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/25b3607c-f99e-4359-8228-0f3452f80aac?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T09:16:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-32xq-pcg8-hc33/GHSA-32xq-pcg8-hc33.json b/advisories/unreviewed/2026/04/GHSA-32xq-pcg8-hc33/GHSA-32xq-pcg8-hc33.json new file mode 100644 index 0000000000000..b5fabc827aa03 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-32xq-pcg8-hc33/GHSA-32xq-pcg8-hc33.json @@ -0,0 +1,53 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-32xq-pcg8-hc33", + "modified": "2026-04-22T09:31:32Z", + "published": "2026-04-22T09:31:32Z", + "aliases": [ + "CVE-2026-31433" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix potencial OOB in get_file_all_info() for compound requests\n\nWhen a compound request consists of QUERY_DIRECTORY + QUERY_INFO\n(FILE_ALL_INFORMATION) and the first command consumes nearly the entire\nmax_trans_size, get_file_all_info() would blindly call smbConvertToUTF16()\nwith PATH_MAX, causing out-of-bounds write beyond the response buffer.\nIn get_file_all_info(), there was a missing validation check for\nthe client-provided OutputBufferLength before copying the filename into\nFileName field of the smb2_file_all_info structure.\nIf the filename length exceeds the available buffer space, it could lead to\npotential buffer overflows or memory corruption during smbConvertToUTF16\nconversion. This calculating the actual free buffer size using\nsmb2_calc_max_out_buf_len() and returning -EINVAL if the buffer is\ninsufficient and updating smbConvertToUTF16 to use the actual filename\nlength (clamped by PATH_MAX) to ensure a safe copy operation.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31433" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/358cdaa1f7fbf2712cb4c5f6b59cb9a5c673c5fe" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/3a852f9d1c981fb14f6bf4e24999e0ea8088a7d7" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/4cca3eff2099b18672934a39cee70aed835d652c" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7aec5a769d2356cbf344d85bcfd36de592ac96a5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/9d7032851d6f5adbe2739601ca456c0ad3b422f0" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b0cd9725fe2bcc9f37d096b132318a9060373f5d" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/beef2634f81f1c086208191f7228bce1d366493d" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T09:16:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-39pg-69jq-6vx9/GHSA-39pg-69jq-6vx9.json b/advisories/unreviewed/2026/04/GHSA-39pg-69jq-6vx9/GHSA-39pg-69jq-6vx9.json new file mode 100644 index 0000000000000..3be64355e6d8a --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-39pg-69jq-6vx9/GHSA-39pg-69jq-6vx9.json @@ -0,0 +1,68 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-39pg-69jq-6vx9", + "modified": "2026-04-22T09:31:32Z", + "published": "2026-04-22T09:31:32Z", + "aliases": [ + "CVE-2026-3362" + ], + "details": "The Short Comment Filter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Minimum Count' settings field in all versions up to and including 2.2. This is due to insufficient input sanitization (no sanitize callback on register_setting) and missing output escaping (no esc_attr() on the echoed value in the input's value attribute). The option value is stored via update_option() and rendered unescaped in an HTML attribute context. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in the settings page that will execute whenever a user accesses that page. This is particularly impactful in WordPress multisite installations or when DISALLOW_UNFILTERED_HTML is set, where administrators are not granted the unfiltered_html capability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3362" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/short-comment-filter/tags/2.2/classes/short-comment-filter-settings.php#L21" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/short-comment-filter/tags/2.2/classes/short-comment-filter-settings.php#L54" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/short-comment-filter/tags/2.2/classes/short-comment-filter-settings.php#L61" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/short-comment-filter/tags/2.2/views/settings.php#L25" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/short-comment-filter/trunk/classes/short-comment-filter-settings.php#L21" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/short-comment-filter/trunk/classes/short-comment-filter-settings.php#L54" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/short-comment-filter/trunk/classes/short-comment-filter-settings.php#L61" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/short-comment-filter/trunk/views/settings.php#L25" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4ba46475-bf54-49a8-9b0e-fae3fb4e1df9?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T09:16:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-4922-xr68-xjg8/GHSA-4922-xr68-xjg8.json b/advisories/unreviewed/2026/04/GHSA-4922-xr68-xjg8/GHSA-4922-xr68-xjg8.json new file mode 100644 index 0000000000000..6b74239544d44 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-4922-xr68-xjg8/GHSA-4922-xr68-xjg8.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4922-xr68-xjg8", + "modified": "2026-04-22T09:31:34Z", + "published": "2026-04-22T09:31:33Z", + "aliases": [ + "CVE-2026-6396" + ], + "details": "The Fast & Fancy Filter – 3F plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to and including 1.2.2. This is due to missing nonce verification in the saveFields() function, which handles the fff_save_settins AJAX action. This makes it possible for unauthenticated attackers to modify plugin filter settings, update arbitrary options, or create new filter posts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6396" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/fast-fancy-filter-3f/tags/1.2.2/includes/admin/class-admin.php#L24" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/fast-fancy-filter-3f/tags/1.2.2/includes/admin/class-admin.php#L419" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/fast-fancy-filter-3f/trunk/includes/admin/class-admin.php#L24" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/fast-fancy-filter-3f/trunk/includes/admin/class-admin.php#L419" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4b5fbf2c-1231-482f-b5a5-819f31da3524?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T09:16:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-4mj3-26h4-xjcm/GHSA-4mj3-26h4-xjcm.json b/advisories/unreviewed/2026/04/GHSA-4mj3-26h4-xjcm/GHSA-4mj3-26h4-xjcm.json new file mode 100644 index 0000000000000..ddcc4688c8b56 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-4mj3-26h4-xjcm/GHSA-4mj3-26h4-xjcm.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4mj3-26h4-xjcm", + "modified": "2026-04-22T09:31:32Z", + "published": "2026-04-22T09:31:31Z", + "aliases": [ + "CVE-2026-2714" + ], + "details": "The Institute Management plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Enquiry Form Title' setting in all versions up to, and including, 5.5. This is due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2714" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/institute-management/tags/5.5/admin/inc/wl_im_settings.php#L47" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/institute-management/trunk/admin/inc/wl_im_settings.php#L47" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1fd62c3d-2c15-4d1c-9210-4c2aca379fe3?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T09:16:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-4x86-c4g3-px96/GHSA-4x86-c4g3-px96.json b/advisories/unreviewed/2026/04/GHSA-4x86-c4g3-px96/GHSA-4x86-c4g3-px96.json new file mode 100644 index 0000000000000..040765f3705e9 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-4x86-c4g3-px96/GHSA-4x86-c4g3-px96.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4x86-c4g3-px96", + "modified": "2026-04-22T09:31:33Z", + "published": "2026-04-22T09:31:33Z", + "aliases": [ + "CVE-2026-6235" + ], + "details": "The Sendmachine for WordPress plugin for WordPress is vulnerable to authorization bypass via the 'manage_admin_requests' function in all versions up to, and including, 1.0.20. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to overwrite the plugin's SMTP configuration, which can be leveraged to intercept all outbound emails from the site (including password reset emails).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6235" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/sendmachine/tags/1.0.20/includes/sendmachine_email_manager.php#L39" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/sendmachine/tags/1.0.20/sendmachine_wp_admin.php#L174" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/sendmachine/tags/1.0.20/sendmachine_wp_admin.php#L183" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7889e071-84a8-46ec-abe5-5c98980ce275?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T09:16:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-5295-qq8m-4r9g/GHSA-5295-qq8m-4r9g.json b/advisories/unreviewed/2026/04/GHSA-5295-qq8m-4r9g/GHSA-5295-qq8m-4r9g.json new file mode 100644 index 0000000000000..e316c27aea988 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-5295-qq8m-4r9g/GHSA-5295-qq8m-4r9g.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5295-qq8m-4r9g", + "modified": "2026-04-22T09:31:31Z", + "published": "2026-04-22T09:31:31Z", + "aliases": [ + "CVE-2026-41665" + ], + "details": "Integer overflow in scratch buffer initialization size calculation in Samsung Open Source ONE cause incorrect memory initialization for large intermediate tensors.\nAffected version is prior to commit 1.30.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41665" + }, + { + "type": "WEB", + "url": "https://github.com/Samsung/ONE/pull/16481" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-190" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-22T07:16:13Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/04/GHSA-59pf-538p-vw7w/GHSA-59pf-538p-vw7w.json b/advisories/unreviewed/2026/04/GHSA-59pf-538p-vw7w/GHSA-59pf-538p-vw7w.json new file mode 100644 index 0000000000000..7a83161ebba82 --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-59pf-538p-vw7w/GHSA-59pf-538p-vw7w.json @@ -0,0 +1,84 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-59pf-538p-vw7w", + "modified": "2026-04-22T09:31:32Z", + "published": "2026-04-22T09:31:32Z", + "aliases": [ + "CVE-2026-4074" + ], + "details": "The Quran Live Multilanguage plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'cheikh' and 'lang' shortcode attributes in all versions up to, and including, 1.0.3. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes. The quran_live_render() function of quran-live.php receives shortcode attributes and passes them directly through shortcode_atts() and extract() without any sanitization. These values are then passed to Render_Quran_Live::render_verse_quran_live() where they are echoed directly into inline \n \n \n\n\n\n```\n\n## Impact\n\nAny application that sanitizes attacker-controlled HTML with `SAFE_FOR_TEMPLATES: true` and `RETURN_DOM: true` (or `RETURN_DOM_FRAGMENT: true`), then mounts the result into a template-evaluating framework, is vulnerable to XSS.\n\n## Recommendations\n\n### Fix\n\n`normalize()` merges the split text nodes, then the same regex from the string path catches the expression. Placed before the fragment logic, this fixes both `RETURN_DOM` and `RETURN_DOM_FRAGMENT`.\n\n```diff\n if (RETURN_DOM) {\n+ if (SAFE_FOR_TEMPLATES) {\n+ body.normalize();\n+ let html = body.innerHTML;\n+ arrayForEach([MUSTACHE_EXPR, ERB_EXPR, TMPLIT_EXPR], (expr: RegExp) => {\n+ html = stringReplace(html, expr, ' ');\n+ });\n+ body.innerHTML = html;\n+ }\n+\n if (RETURN_DOM_FRAGMENT) {\n returnNode = createDocumentFragment.call(body.ownerDocument);\n```", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "dompurify" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.0.10" + }, + { + "fixed": "3.4.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/cure53/DOMPurify/security/advisories/GHSA-crv5-9vww-q3g8" + }, + { + "type": "PACKAGE", + "url": "https://github.com/cure53/DOMPurify" + }, + { + "type": "WEB", + "url": "https://github.com/cure53/DOMPurify/releases/tag/3.4.0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1289", + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-04-22T17:32:54Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/04/GHSA-v9jr-rg53-9pgp/GHSA-v9jr-rg53-9pgp.json b/advisories/github-reviewed/2026/04/GHSA-v9jr-rg53-9pgp/GHSA-v9jr-rg53-9pgp.json new file mode 100644 index 0000000000000..2995d7f23b039 --- /dev/null +++ b/advisories/github-reviewed/2026/04/GHSA-v9jr-rg53-9pgp/GHSA-v9jr-rg53-9pgp.json @@ -0,0 +1,62 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v9jr-rg53-9pgp", + "modified": "2026-04-22T17:31:32Z", + "published": "2026-04-22T17:31:32Z", + "aliases": [ + "CVE-2026-41238" + ], + "summary": "DOMPurify: Prototype Pollution to XSS Bypass via CUSTOM_ELEMENT_HANDLING Fallback", + "details": "## Summary\n\nDOMPurify versions 3.0.1 through 3.3.3 (latest) are vulnerable to a prototype pollution-based XSS bypass. When an application uses `DOMPurify.sanitize()` with the default configuration (no `CUSTOM_ELEMENT_HANDLING` option), a prior prototype pollution gadget can inject permissive `tagNameCheck` and `attributeNameCheck` regex values into `Object.prototype`, causing DOMPurify to allow arbitrary custom elements with arbitrary attributes — including event handlers — through sanitization.\n\n## Affected Versions\n\n- **3.0.1 through 3.3.3** (current latest) — all affected\n- **3.0.0 and all 2.x versions** — NOT affected (used `Object.create(null)` for initialization, no `|| {}` reassignment)\n- The vulnerable `|| {}` reassignment was introduced in the 3.0.0→3.0.1 refactor\n- This is **distinct** from GHSA-cj63-jhhr-wcxv (USE_PROFILES Array.prototype pollution, fixed in 3.3.2)\n- This is **distinct** from CVE-2024-45801 / GHSA-mmhx-hmjr-r674 (__depth prototype pollution, fixed in 3.1.3)\n\n## Root Cause\n\nIn `purify.js` at line 590, during config parsing:\n\n```javascript\nCUSTOM_ELEMENT_HANDLING = cfg.CUSTOM_ELEMENT_HANDLING || {};\n```\n\nWhen no `CUSTOM_ELEMENT_HANDLING` is specified in the config (the default usage pattern), `cfg.CUSTOM_ELEMENT_HANDLING` is `undefined`, and the fallback `{}` is used. This plain object inherits from `Object.prototype`.\n\nLines 591-598 then check `cfg.CUSTOM_ELEMENT_HANDLING` (the original config property) — which is `undefined` — so the conditional blocks that would set `tagNameCheck` and `attributeNameCheck` from the config are never entered.\n\nAs a result, `CUSTOM_ELEMENT_HANDLING.tagNameCheck` and `CUSTOM_ELEMENT_HANDLING.attributeNameCheck` resolve via the prototype chain. If an attacker has polluted `Object.prototype.tagNameCheck` and `Object.prototype.attributeNameCheck` with permissive values (e.g., `/.*/`), these polluted values flow into DOMPurify's custom element validation at lines 973-977 and attribute validation, causing all custom elements and all attributes to be allowed.\n\n## Impact\n\n- **Attack type:** XSS bypass via prototype pollution chain\n- **Prerequisites:** Attacker must have a prototype pollution primitive in the same execution context (e.g., vulnerable version of lodash, jQuery.extend, query-string parser, deep merge utility, or any other PP gadget)\n- **Config required:** Default. No special DOMPurify configuration needed. The standard `DOMPurify.sanitize(userInput)` call is affected.\n- **Payload:** Any HTML custom element (name containing a hyphen) with event handler attributes survives sanitization\n\n## Proof of Concept\n\n```javascript\n// Step 1: Attacker exploits a prototype pollution gadget elsewhere in the application\nObject.prototype.tagNameCheck = /.*/;\nObject.prototype.attributeNameCheck = /.*/;\n\n// Step 2: Application sanitizes user input with DEFAULT config\nconst clean = DOMPurify.sanitize('');\n\n// Step 3: \"Sanitized\" output still contains the event handler\nconsole.log(clean);\n// Output: \n\n// Step 4: When injected into DOM, XSS executes\ndocument.body.innerHTML = clean; // alert() fires\n```\n\n### Tested configurations that are vulnerable:\n\n| Call Pattern | Vulnerable? |\n|---|---|\n| `DOMPurify.sanitize(input)` | YES |\n| `DOMPurify.sanitize(input, {})` | YES |\n| `DOMPurify.sanitize(input, { CUSTOM_ELEMENT_HANDLING: null })` | YES |\n| `DOMPurify.sanitize(input, { CUSTOM_ELEMENT_HANDLING: {} })` | NO (explicit object triggers L591 path) |\n\n## Suggested Fix\n\nChange line 590 from:\n```javascript\nCUSTOM_ELEMENT_HANDLING = cfg.CUSTOM_ELEMENT_HANDLING || {};\n```\n\nTo:\n```javascript\nCUSTOM_ELEMENT_HANDLING = cfg.CUSTOM_ELEMENT_HANDLING || create(null);\n```\n\nThe `create(null)` function (already used elsewhere in DOMPurify, e.g., in `clone()`) creates an object with no prototype, preventing prototype chain inheritance.\n\n### Alternative application-level mitigation:\n\nApplications can protect themselves by always providing an explicit `CUSTOM_ELEMENT_HANDLING` in their config:\n\n```javascript\nDOMPurify.sanitize(input, {\n CUSTOM_ELEMENT_HANDLING: {\n tagNameCheck: null,\n attributeNameCheck: null\n }\n});\n```\n\n## Timeline\n\n- **2026-04-04:** Vulnerability discovered during automated DOMPurify fuzzing research (Fermat project)\n- **2026-04-04:** Confirmed in Chrome browser with DOMPurify 3.3.3\n- **2026-04-04:** Verified distinct from GHSA-cj63-jhhr-wcxv and CVE-2024-45801\n- **2026-04-04:** Advisory drafted, responsible disclosure initiated\n\n## Credit\n\nhttps://github.com/trace37labs", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "dompurify" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.0.1" + }, + { + "fixed": "3.4.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/cure53/DOMPurify/security/advisories/GHSA-v9jr-rg53-9pgp" + }, + { + "type": "PACKAGE", + "url": "https://github.com/cure53/DOMPurify" + }, + { + "type": "WEB", + "url": "https://github.com/cure53/DOMPurify/releases/tag/3.4.0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1321", + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-04-22T17:31:32Z", + "nvd_published_at": null + } +} \ No newline at end of file From 6644dfa17e8cb5ed00ef2a6291136875c7e4b0aa Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 22 Apr 2026 17:37:54 +0000 Subject: [PATCH 21/49] Publish Advisories GHSA-5w6h-pjw6-wvc6 GHSA-h7mw-gpvr-xq4m --- .../GHSA-5w6h-pjw6-wvc6.json | 33 ++++++++-- .../GHSA-h7mw-gpvr-xq4m.json | 62 +++++++++++++++++++ 2 files changed, 91 insertions(+), 4 deletions(-) rename advisories/{unreviewed => github-reviewed}/2026/04/GHSA-5w6h-pjw6-wvc6/GHSA-5w6h-pjw6-wvc6.json (67%) create mode 100644 advisories/github-reviewed/2026/04/GHSA-h7mw-gpvr-xq4m/GHSA-h7mw-gpvr-xq4m.json diff --git a/advisories/unreviewed/2026/04/GHSA-5w6h-pjw6-wvc6/GHSA-5w6h-pjw6-wvc6.json b/advisories/github-reviewed/2026/04/GHSA-5w6h-pjw6-wvc6/GHSA-5w6h-pjw6-wvc6.json similarity index 67% rename from advisories/unreviewed/2026/04/GHSA-5w6h-pjw6-wvc6/GHSA-5w6h-pjw6-wvc6.json rename to advisories/github-reviewed/2026/04/GHSA-5w6h-pjw6-wvc6/GHSA-5w6h-pjw6-wvc6.json index 567517d35a263..3248d96b4d506 100644 --- a/advisories/unreviewed/2026/04/GHSA-5w6h-pjw6-wvc6/GHSA-5w6h-pjw6-wvc6.json +++ b/advisories/github-reviewed/2026/04/GHSA-5w6h-pjw6-wvc6/GHSA-5w6h-pjw6-wvc6.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-5w6h-pjw6-wvc6", - "modified": "2026-04-20T18:31:46Z", + "modified": "2026-04-22T17:36:41Z", "published": "2026-04-18T15:34:15Z", "aliases": [ "CVE-2026-40948" ], + "summary": "apache-airflow-providers-keycloak: Missing OAuth 2.0 State and PKCE Enables Login CSRF and Session Fixation", "details": "The Keycloak authentication manager in `apache-airflow-providers-keycloak` did not generate or validate the OAuth 2.0 `state` parameter on the login / login-callback flow, and did not use PKCE. An attacker with a Keycloak account in the same realm could deliver a crafted callback URL to a victim's browser and cause the victim to be logged into the attacker's Airflow session (login-CSRF / session fixation), where any credentials the victim subsequently stored in Airflow Connections would be harvestable by the attacker. Users are advised to upgrade `apache-airflow-providers-keycloak` to 0.7.0 or later.", "severity": [ { @@ -13,7 +14,27 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "apache-airflow-providers-keycloak" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.0.1" + }, + { + "fixed": "0.7.0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -23,6 +44,10 @@ "type": "WEB", "url": "https://github.com/apache/airflow/pull/64114" }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/airflow" + }, { "type": "WEB", "url": "https://lists.apache.org/thread/kc0odpr70hbqhdb9ksnz42fkqz2xld9q" @@ -37,8 +62,8 @@ "CWE-352" ], "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2026-04-22T17:36:41Z", "nvd_published_at": "2026-04-18T14:16:10Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/04/GHSA-h7mw-gpvr-xq4m/GHSA-h7mw-gpvr-xq4m.json b/advisories/github-reviewed/2026/04/GHSA-h7mw-gpvr-xq4m/GHSA-h7mw-gpvr-xq4m.json new file mode 100644 index 0000000000000..3fd7000994612 --- /dev/null +++ b/advisories/github-reviewed/2026/04/GHSA-h7mw-gpvr-xq4m/GHSA-h7mw-gpvr-xq4m.json @@ -0,0 +1,62 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h7mw-gpvr-xq4m", + "modified": "2026-04-22T17:34:17Z", + "published": "2026-04-22T17:34:17Z", + "aliases": [ + "CVE-2026-41240" + ], + "summary": "DOMPurify: FORBID_TAGS bypassed by function-based ADD_TAGS predicate (asymmetry with FORBID_ATTR fix)", + "details": "There is an inconsistency between FORBID_TAGS and FORBID_ATTR handling when function-based ADD_TAGS is used.\n\nCommit [c361baa](https://github.com/cure53/DOMPurify/commit/c361baa18dbdcb3344a41110f4c48ad85bf48f80) added an early exit for FORBID_ATTR at line 1214:\n\n /* FORBID_ATTR must always win, even if ADD_ATTR predicate would allow it */\n if (FORBID_ATTR[lcName]) {\n return false;\n }\n\nThe same fix was not applied to FORBID_TAGS. At line 1118-1123, when EXTRA_ELEMENT_HANDLING.tagCheck returns true, the short-circuit evaluation skips the FORBID_TAGS check entirely:\n\n if (\n !(\n EXTRA_ELEMENT_HANDLING.tagCheck instanceof Function &&\n EXTRA_ELEMENT_HANDLING.tagCheck(tagName) // true -> short-circuits\n ) &&\n (!ALLOWED_TAGS[tagName] || FORBID_TAGS[tagName]) // never evaluated\n ) {\n\nThis allows forbidden elements to survive sanitization with their attributes intact.\n\nPoC (tested against current HEAD in Node.js + jsdom):\n\n const DOMPurify = createDOMPurify(window);\n\n DOMPurify.sanitize(\n '',\n {\n ADD_TAGS: function(tag) { return true; },\n FORBID_TAGS: ['iframe']\n }\n );\n // Returns: ''\n // Expected: '' (iframe forbidden)\n\n DOMPurify.sanitize(\n '
',\n {\n ADD_TAGS: function(tag) { return true; },\n FORBID_TAGS: ['form']\n }\n );\n // Returns: '
'\n // Expected: '' (form forbidden)\n\nConfirmed affected: iframe, object, embed, form. The src/action/data attributes survive because attribute sanitization runs separately and allows these URLs.\n\nCompare with FORBID_ATTR which correctly wins:\n\n DOMPurify.sanitize(\n '

hello

',\n {\n ADD_ATTR: function(attr) { return true; },\n FORBID_ATTR: ['onclick']\n }\n );\n // Returns: '

hello

' (onclick correctly removed)\n\nSuggested fix: add FORBID_TAGS early exit before the tagCheck evaluation, mirroring line 1214:\n\n /* FORBID_TAGS must always win, even if ADD_TAGS predicate would allow it */\n if (FORBID_TAGS[tagName]) {\n // proceed to removal logic\n }\n\nThis requires function-based ADD_TAGS in the config, which is uncommon. But the asymmetry with the FORBID_ATTR fix is clear, and the impact includes iframe and form injection with external URLs.\n\nReporter: Koda Reef", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "dompurify" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.4.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/cure53/DOMPurify/security/advisories/GHSA-h7mw-gpvr-xq4m" + }, + { + "type": "PACKAGE", + "url": "https://github.com/cure53/DOMPurify" + }, + { + "type": "WEB", + "url": "https://github.com/cure53/DOMPurify/releases/tag/3.4.0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-183", + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-04-22T17:34:17Z", + "nvd_published_at": null + } +} \ No newline at end of file From 95583cf4a07681f59b1f29074fc152eace35d1a6 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 22 Apr 2026 17:41:12 +0000 Subject: [PATCH 22/49] Publish Advisories GHSA-5fgg-jcpf-8jjw GHSA-rw2c-8rfq-gwfv --- .../GHSA-5fgg-jcpf-8jjw.json | 60 ++++++++++++++++++ .../GHSA-rw2c-8rfq-gwfv.json | 61 +++++++++++++++++++ 2 files changed, 121 insertions(+) create mode 100644 advisories/github-reviewed/2026/04/GHSA-5fgg-jcpf-8jjw/GHSA-5fgg-jcpf-8jjw.json create mode 100644 advisories/github-reviewed/2026/04/GHSA-rw2c-8rfq-gwfv/GHSA-rw2c-8rfq-gwfv.json diff --git a/advisories/github-reviewed/2026/04/GHSA-5fgg-jcpf-8jjw/GHSA-5fgg-jcpf-8jjw.json b/advisories/github-reviewed/2026/04/GHSA-5fgg-jcpf-8jjw/GHSA-5fgg-jcpf-8jjw.json new file mode 100644 index 0000000000000..48f9243ac4942 --- /dev/null +++ b/advisories/github-reviewed/2026/04/GHSA-5fgg-jcpf-8jjw/GHSA-5fgg-jcpf-8jjw.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5fgg-jcpf-8jjw", + "modified": "2026-04-22T17:40:47Z", + "published": "2026-04-22T17:40:47Z", + "aliases": [], + "summary": "i18next-http-middleware: Prototype pollution and path traversal via user-controlled language and namespace parameters", + "details": "### Summary\n\nVersions of `i18next-http-middleware` prior to 3.9.3 pass user-controlled `lng` and `ns` parameters to two internal paths that use them in ways that enable prototype pollution and, depending on the configured backend, path traversal or SSRF.\n\nThe vulnerable entry points are unauthenticated HTTP handlers that are part of the middleware's public API:\n\n- `getResourcesHandler` — reads `lng`/`ns` from query parameters or route params and passes them unvalidated to:\n - `utils.setPath(resources, [lng, ns], ...)` — the `setPath` helper did not guard against `__proto__`, `constructor`, or `prototype` keys, writing into `Object.prototype` when those values were supplied.\n - `i18next.services.backendConnector.load(languages, namespaces, ...)` — depending on the configured backend, unvalidated path segments enabled filesystem path traversal (e.g. with `i18next-fs-backend`) or SSRF (e.g. with `i18next-http-backend`).\n - A `namespaces.forEach(ns => i18next.options.ns.push(ns))` loop additionally performed permanent, unbounded growth of the shared singleton namespace list.\n- `missingKeyHandler` — iterated the incoming request body with `for...in`, which traverses inherited prototype-chain properties. A POST body like `{\"__proto__\": {\"isAdmin\": true}}` was forwarded into `saveMissing`.\n\n### Impact\n\n- **Prototype pollution** — a single unauthenticated request of the form `GET /locales/resources.json?lng=__proto__&ns=isAdmin` writes into `Object.prototype`, affecting every plain object created subsequently in the Node.js process. This can break authorization checks (`if (user.isAdmin)`), cause denial of service via type confusion, or be chained into RCE depending on what downstream code reads from polluted objects.\n- **Path traversal / SSRF** — with filesystem or HTTP backends that interpolate `lng`/`ns` into paths or URLs, attacker-controlled values like `ns=../../etc/passwd` or `lng=internal-service` could reach resources outside the intended scope.\n- **Denial of service** — the unbounded `i18next.options.ns` growth, plus repeated backend load calls, enabled memory and CPU exhaustion from unique namespace payloads.\n\n### Affected versions\n\n`< 3.9.3`.\n\n### Patch\n\nFixed in **3.9.3**. The patch:\n\n1. Blocks `__proto__`, `constructor`, and `prototype` keys in `utils.setPath`.\n2. Replaces the `for...in` body iteration in `missingKeyHandler` with `Object.keys()` plus an explicit dangerous-keys guard.\n3. Introduces a `utils.isSafeIdentifier` helper (denylist approach — still permits any legitimate i18next language code shape) that filters `lng`/`ns` values for path-traversal, path separators, control characters, prototype keys, and over-long inputs before they reach the backend connector and before they are pushed into `i18next.options.ns`.\n\n### Workarounds\n\nNo workaround short of upgrading. Front-proxying the middleware with a WAF rule that rejects requests containing `__proto__`, `constructor`, `prototype`, `..`, or control characters in `lng`/`ns` query parameters or body keys is a partial mitigation.\n\n### Credits\n\nDiscovered via an internal security audit of the i18next ecosystem.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "i18next-http-middleware" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.9.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/i18next/i18next-http-middleware/security/advisories/GHSA-5fgg-jcpf-8jjw" + }, + { + "type": "PACKAGE", + "url": "https://github.com/i18next/i18next-http-middleware" + }, + { + "type": "WEB", + "url": "https://www.i18next.com/how-to/faq#how-should-the-language-codes-be-formatted" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1321", + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-04-22T17:40:47Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/04/GHSA-rw2c-8rfq-gwfv/GHSA-rw2c-8rfq-gwfv.json b/advisories/github-reviewed/2026/04/GHSA-rw2c-8rfq-gwfv/GHSA-rw2c-8rfq-gwfv.json new file mode 100644 index 0000000000000..ca63bc8d9d2ee --- /dev/null +++ b/advisories/github-reviewed/2026/04/GHSA-rw2c-8rfq-gwfv/GHSA-rw2c-8rfq-gwfv.json @@ -0,0 +1,61 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rw2c-8rfq-gwfv", + "modified": "2026-04-22T17:38:02Z", + "published": "2026-04-22T17:38:02Z", + "aliases": [ + "CVE-2026-41422" + ], + "summary": "Daptin: SQL injection via unvalidated goqu.L() calls in aggregate API", + "details": "## Summary\n\nThe `/aggregate/:typename` endpoint accepted `column` and `group` query parameters that were passed verbatim to `goqu.L()` — a raw SQL literal expression builder — without any validation. This bypassed all parameterization and allowed authenticated users with any valid session to inject arbitrary SQL expressions.\n\n## Impact\n\nAn authenticated low-privilege user could:\n- Extract data from any table via subquery: `(SELECT group_concat(email) FROM user_account) as leak`\n- Disclose database internals: `sqlite_version()`, `(SELECT sql FROM sqlite_master)`\n- Exfiltrate cross-table data via correlated subqueries\n\nThe vulnerability was confirmed locally; `user_account.email` values were extracted via a crafted `column` parameter by a non-admin user.\n\n## Root Cause\n\n`goqu.L(userInput)` in `server/resource/resource_aggregate.go` inserted user-supplied query parameters directly into the SQL string with no validation.\n\n## Fix (v0.11.4)\n\nAll `goqu.L()` calls on user-controlled input were eliminated and replaced with:\n- Structural expression parsing supporting all documented API forms\n- Schema-based column validation (column names checked against entity schema via `TableInfo().GetColumnByName()`)\n- Exact-match allowlist for aggregate functions (`count`, `sum`, `avg`, `min`, `max`, `first`, `last`) and scalar functions (`date`, `strftime`, `upper`, `lower`, etc.)\n- Safe goqu constructors (`goqu.I()`, `goqu.SUM()`, `goqu.Func()`) for all generated expressions\n- `allowedTables` scope enforcement: qualified column refs (`table.col`) validated against root entity + explicitly joined tables only\n\nTwo additional DoS bugs were fixed in the same commit: `uuid.MustParse` panic on malformed UUID input and an index-out-of-range panic in `ToOrderedExpressionArray` on empty sort expressions.\n\n## Credits\n\nReported by @VashuVats.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/daptin/daptin" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.11.4" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/daptin/daptin/security/advisories/GHSA-rw2c-8rfq-gwfv" + }, + { + "type": "PACKAGE", + "url": "https://github.com/daptin/daptin" + }, + { + "type": "WEB", + "url": "https://github.com/daptin/daptin/releases/tag/v0.11.4" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-04-22T17:38:02Z", + "nvd_published_at": null + } +} \ No newline at end of file From c3aba5c76c77f0a06878188988581965e9db675e Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 22 Apr 2026 17:44:37 +0000 Subject: [PATCH 23/49] Publish Advisories GHSA-6457-mxpq-4fqq GHSA-8847-338w-5hcj GHSA-q89c-q3h5-w34g --- .../GHSA-6457-mxpq-4fqq.json | 56 +++++++++++++++++++ .../GHSA-8847-338w-5hcj.json | 56 +++++++++++++++++++ .../GHSA-q89c-q3h5-w34g.json | 56 +++++++++++++++++++ 3 files changed, 168 insertions(+) create mode 100644 advisories/github-reviewed/2026/04/GHSA-6457-mxpq-4fqq/GHSA-6457-mxpq-4fqq.json create mode 100644 advisories/github-reviewed/2026/04/GHSA-8847-338w-5hcj/GHSA-8847-338w-5hcj.json create mode 100644 advisories/github-reviewed/2026/04/GHSA-q89c-q3h5-w34g/GHSA-q89c-q3h5-w34g.json diff --git a/advisories/github-reviewed/2026/04/GHSA-6457-mxpq-4fqq/GHSA-6457-mxpq-4fqq.json b/advisories/github-reviewed/2026/04/GHSA-6457-mxpq-4fqq/GHSA-6457-mxpq-4fqq.json new file mode 100644 index 0000000000000..fad312fb6215e --- /dev/null +++ b/advisories/github-reviewed/2026/04/GHSA-6457-mxpq-4fqq/GHSA-6457-mxpq-4fqq.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6457-mxpq-4fqq", + "modified": "2026-04-22T17:42:24Z", + "published": "2026-04-22T17:42:24Z", + "aliases": [], + "summary": "i18nextify has DOM XSS via javascript:/data: URL schemes in translated href/src attributes", + "details": "### Summary\n\nVersions of `i18nextify` prior to 4.0.8 substitute `{{key}}` interpolation tokens inside `src` and `href` attribute values with the raw string returned by `i18next.t()`. The substitution logic in `src/localize.js` (`replaceInside` handler around line 122) only guards against a duplicated `http://` origin prefix — it does not validate the URL scheme of the substituted value. A translated value such as `javascript:alert(1)` or `data:text/html,` is applied unchanged to the live DOM attribute.\n\n### Impact\n\nWhen an attacker can influence the content of a translation file or the translation-backend response — compromised translation CDN, user-contributed locales, MITM on a plain-HTTP backend, write access to the translation JSON — they can:\n\n- Set any `href` on an anchor to a `javascript:` URI, executing arbitrary JavaScript when the victim clicks the link.\n- Set any `src` on `