Skip to content

Commit 1cfd06f

Browse files
Advisory Database Sync
1 parent 6b58c89 commit 1cfd06f

63 files changed

Lines changed: 2236 additions & 10 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/github-reviewed/2025/08/GHSA-856v-8qm2-9wjv/GHSA-856v-8qm2-9wjv.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-856v-8qm2-9wjv",
4-
"modified": "2026-02-11T18:31:25Z",
4+
"modified": "2026-03-24T15:30:24Z",
55
"published": "2025-08-07T21:31:08Z",
66
"aliases": [
77
"CVE-2025-7195"
@@ -52,6 +52,10 @@
5252
"type": "WEB",
5353
"url": "https://access.redhat.com/security/cve/CVE-2025-7195"
5454
},
55+
{
56+
"type": "WEB",
57+
"url": "https://access.redhat.com/errata/RHSA-2026:5633"
58+
},
5559
{
5660
"type": "WEB",
5761
"url": "https://access.redhat.com/errata/RHSA-2026:2572"

advisories/unreviewed/2026/03/GHSA-25fg-84xv-353x/GHSA-25fg-84xv-353x.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-25fg-84xv-353x",
4-
"modified": "2026-03-23T21:30:51Z",
4+
"modified": "2026-03-24T15:30:26Z",
55
"published": "2026-03-23T21:30:51Z",
66
"aliases": [
77
"CVE-2026-2298"
88
],
99
"details": "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement allows Web Services Protocol Manipulation. This issue affects Marketing Cloud Engagement: before January 30th, 2026.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -23,7 +28,7 @@
2328
"cwe_ids": [
2429
"CWE-88"
2530
],
26-
"severity": null,
31+
"severity": "CRITICAL",
2732
"github_reviewed": false,
2833
"github_reviewed_at": null,
2934
"nvd_published_at": "2026-03-23T20:16:25Z"
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2mf6-25gq-26v8",
4+
"modified": "2026-03-24T15:30:28Z",
5+
"published": "2026-03-24T15:30:28Z",
6+
"aliases": [
7+
"CVE-2026-4704"
8+
],
9+
"details": "Denial-of-service in the WebRTC: Signaling component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4704"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2014868"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://www.mozilla.org/security/advisories/mfsa2026-20"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://www.mozilla.org/security/advisories/mfsa2026-22"
28+
}
29+
],
30+
"database_specific": {
31+
"cwe_ids": [],
32+
"severity": null,
33+
"github_reviewed": false,
34+
"github_reviewed_at": null,
35+
"nvd_published_at": "2026-03-24T13:16:06Z"
36+
}
37+
}
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2qjw-h8g8-r86f",
4+
"modified": "2026-03-24T15:30:28Z",
5+
"published": "2026-03-24T15:30:28Z",
6+
"aliases": [
7+
"CVE-2026-4699"
8+
],
9+
"details": "Incorrect boundary conditions in the Layout: Text and Fonts component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4699"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2021863"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://www.mozilla.org/security/advisories/mfsa2026-20"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://www.mozilla.org/security/advisories/mfsa2026-21"
28+
},
29+
{
30+
"type": "WEB",
31+
"url": "https://www.mozilla.org/security/advisories/mfsa2026-22"
32+
}
33+
],
34+
"database_specific": {
35+
"cwe_ids": [],
36+
"severity": null,
37+
"github_reviewed": false,
38+
"github_reviewed_at": null,
39+
"nvd_published_at": "2026-03-24T13:16:05Z"
40+
}
41+
}
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2r77-x4qh-mhc3",
4+
"modified": "2026-03-24T15:30:29Z",
5+
"published": "2026-03-24T15:30:29Z",
6+
"aliases": [
7+
"CVE-2026-4726"
8+
],
9+
"details": "Denial-of-service in the XML component. This vulnerability affects Firefox < 149.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4726"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1955311"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://www.mozilla.org/security/advisories/mfsa2026-20"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [],
28+
"severity": null,
29+
"github_reviewed": false,
30+
"github_reviewed_at": null,
31+
"nvd_published_at": "2026-03-24T13:16:08Z"
32+
}
33+
}
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-382w-q5p9-3f2h",
4+
"modified": "2026-03-24T15:30:29Z",
5+
"published": "2026-03-24T15:30:29Z",
6+
"aliases": [
7+
"CVE-2026-33554"
8+
],
9+
"details": "ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: \"ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers,\" \"ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers,\" and \"ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers.\"",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33554"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://ftp.gnu.org/gnu/freeipmi"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://savannah.gnu.org/bugs/?68140"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://savannah.gnu.org/bugs/?68141"
28+
},
29+
{
30+
"type": "WEB",
31+
"url": "https://savannah.gnu.org/bugs/?68142"
32+
}
33+
],
34+
"database_specific": {
35+
"cwe_ids": [],
36+
"severity": null,
37+
"github_reviewed": false,
38+
"github_reviewed_at": null,
39+
"nvd_published_at": "2026-03-24T15:16:35Z"
40+
}
41+
}

advisories/unreviewed/2026/03/GHSA-3qwq-q9vm-5j42/GHSA-3qwq-q9vm-5j42.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@
2525
}
2626
],
2727
"database_specific": {
28-
"cwe_ids": [],
28+
"cwe_ids": [
29+
"CWE-22"
30+
],
2931
"severity": "HIGH",
3032
"github_reviewed": false,
3133
"github_reviewed_at": null,
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3rrq-fwhx-9wq4",
4+
"modified": "2026-03-24T15:30:27Z",
5+
"published": "2026-03-24T15:30:27Z",
6+
"aliases": [
7+
"CVE-2026-4684"
8+
],
9+
"details": "Race condition, use-after-free in the Graphics: WebRender component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4684"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2011129"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.mozilla.org/security/advisories/mfsa2026-20"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://www.mozilla.org/security/advisories/mfsa2026-21"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.mozilla.org/security/advisories/mfsa2026-22"
37+
}
38+
],
39+
"database_specific": {
40+
"cwe_ids": [
41+
"CWE-362"
42+
],
43+
"severity": "HIGH",
44+
"github_reviewed": false,
45+
"github_reviewed_at": null,
46+
"nvd_published_at": "2026-03-24T13:16:04Z"
47+
}
48+
}
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4pf4-jp4v-4g5c",
4+
"modified": "2026-03-24T15:30:28Z",
5+
"published": "2026-03-24T15:30:28Z",
6+
"aliases": [
7+
"CVE-2026-4700"
8+
],
9+
"details": "Mitigation bypass in the Networking: HTTP component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4700"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2003766"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://www.mozilla.org/security/advisories/mfsa2026-20"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://www.mozilla.org/security/advisories/mfsa2026-22"
28+
}
29+
],
30+
"database_specific": {
31+
"cwe_ids": [],
32+
"severity": null,
33+
"github_reviewed": false,
34+
"github_reviewed_at": null,
35+
"nvd_published_at": "2026-03-24T13:16:06Z"
36+
}
37+
}
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-5cgm-h8qg-5h77",
4+
"modified": "2026-03-24T15:30:28Z",
5+
"published": "2026-03-24T15:30:28Z",
6+
"aliases": [
7+
"CVE-2026-4708"
8+
],
9+
"details": "Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4708"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2015268"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://www.mozilla.org/security/advisories/mfsa2026-20"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://www.mozilla.org/security/advisories/mfsa2026-22"
28+
}
29+
],
30+
"database_specific": {
31+
"cwe_ids": [],
32+
"severity": null,
33+
"github_reviewed": false,
34+
"github_reviewed_at": null,
35+
"nvd_published_at": "2026-03-24T13:16:06Z"
36+
}
37+
}

0 commit comments

Comments
 (0)