Skip to content

Commit 2920c23

Browse files
Advisory Database Sync
1 parent 13e40d1 commit 2920c23

File tree

62 files changed

+1880
-35
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

62 files changed

+1880
-35
lines changed

advisories/unreviewed/2021/11/GHSA-69h8-fh92-ch8q/GHSA-69h8-fh92-ch8q.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-69h8-fh92-ch8q",
4-
"modified": "2022-10-24T19:00:24Z",
4+
"modified": "2026-04-15T21:30:13Z",
55
"published": "2021-11-30T00:00:52Z",
66
"aliases": [
77
"CVE-2019-8921"

advisories/unreviewed/2021/11/GHSA-r763-g6p5-r323/GHSA-r763-g6p5-r323.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-r763-g6p5-r323",
4-
"modified": "2022-10-24T19:00:24Z",
4+
"modified": "2026-04-15T21:30:13Z",
55
"published": "2021-11-30T00:00:51Z",
66
"aliases": [
77
"CVE-2019-8922"

advisories/unreviewed/2022/05/GHSA-32q7-x7q9-wcf9/GHSA-32q7-x7q9-wcf9.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-32q7-x7q9-wcf9",
4-
"modified": "2022-05-13T01:48:36Z",
4+
"modified": "2026-04-15T21:30:13Z",
55
"published": "2022-05-13T01:48:35Z",
66
"aliases": [
77
"CVE-2018-1000301"

advisories/unreviewed/2022/05/GHSA-pfc3-2w85-9453/GHSA-pfc3-2w85-9453.json

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pfc3-2w85-9453",
4-
"modified": "2022-05-24T16:45:54Z",
4+
"modified": "2026-04-15T21:30:13Z",
55
"published": "2022-05-24T16:45:54Z",
66
"aliases": [
77
"CVE-2019-12098"
@@ -31,6 +31,14 @@
3131
"type": "WEB",
3232
"url": "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0"
3333
},
34+
{
35+
"type": "WEB",
36+
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB"
41+
},
3442
{
3543
"type": "WEB",
3644
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD"
@@ -65,7 +73,9 @@
6573
}
6674
],
6775
"database_specific": {
68-
"cwe_ids": [],
76+
"cwe_ids": [
77+
"CWE-295"
78+
],
6979
"severity": "HIGH",
7080
"github_reviewed": false,
7181
"github_reviewed_at": null,

advisories/unreviewed/2025/12/GHSA-vqjp-fh8j-rf3j/GHSA-vqjp-fh8j-rf3j.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vqjp-fh8j-rf3j",
4-
"modified": "2025-12-17T18:31:32Z",
4+
"modified": "2026-04-15T21:30:13Z",
55
"published": "2025-12-05T18:31:12Z",
66
"aliases": [
77
"CVE-2025-34256"
@@ -35,6 +35,10 @@
3535
"type": "WEB",
3636
"url": "https://docs.deviceon.advantech.com/docs/resource"
3737
},
38+
{
39+
"type": "WEB",
40+
"url": "https://pellera.com/blog/advantech-wise-deviceon-cve-2025-34256-vulnerability"
41+
},
3842
{
3943
"type": "WEB",
4044
"url": "https://www.vulncheck.com/advisories/advantech-wise-deviceon-server-hardcoded-jwt-key-authentication-bypass"
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2rw5-37w7-549x",
4+
"modified": "2026-04-15T21:30:19Z",
5+
"published": "2026-04-15T21:30:19Z",
6+
"aliases": [
7+
"CVE-2026-6359"
8+
],
9+
"details": "Use after free in Video in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6359"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://issues.chromium.org/issues/490251701"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-416"
34+
],
35+
"severity": "HIGH",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-04-15T20:16:42Z"
39+
}
40+
}

advisories/unreviewed/2026/04/GHSA-2xm3-5jp9-423w/GHSA-2xm3-5jp9-423w.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2xm3-5jp9-423w",
4-
"modified": "2026-04-14T03:31:40Z",
4+
"modified": "2026-04-15T21:30:16Z",
55
"published": "2026-04-14T00:31:12Z",
66
"aliases": [
77
"CVE-2026-5086"
88
],
99
"details": "Crypt::SecretBuffer versions before 0.019 for Perl is suseceptible to timing attacks.\n\nFor example, if Crypt::SecretBuffer was used to store and compare plaintext passwords, then discrepencies in timing could be used to guess the secret password.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -27,7 +32,7 @@
2732
"cwe_ids": [
2833
"CWE-208"
2934
],
30-
"severity": null,
35+
"severity": "HIGH",
3136
"github_reviewed": false,
3237
"github_reviewed_at": null,
3338
"nvd_published_at": "2026-04-13T23:16:27Z"
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3347-qjpp-457v",
4+
"modified": "2026-04-15T21:30:18Z",
5+
"published": "2026-04-15T21:30:18Z",
6+
"aliases": [
7+
"CVE-2026-6299"
8+
],
9+
"details": "Use after free in Prerender in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6299"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://issues.chromium.org/issues/497053588"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-416"
34+
],
35+
"severity": "HIGH",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-04-15T20:16:38Z"
39+
}
40+
}
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3m3g-56cx-59q7",
4+
"modified": "2026-04-15T21:30:19Z",
5+
"published": "2026-04-15T21:30:19Z",
6+
"aliases": [
7+
"CVE-2026-6307"
8+
],
9+
"details": "Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6307"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://issues.chromium.org/issues/497404188"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-843"
34+
],
35+
"severity": "HIGH",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-04-15T20:16:39Z"
39+
}
40+
}
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3p5h-985r-gw4g",
4+
"modified": "2026-04-15T21:30:18Z",
5+
"published": "2026-04-15T21:30:18Z",
6+
"aliases": [
7+
"CVE-2026-6298"
8+
],
9+
"details": "Heap buffer overflow in Skia in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Critical)",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6298"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://issues.chromium.org/issues/495700484"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-122"
34+
],
35+
"severity": "MODERATE",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-04-15T20:16:38Z"
39+
}
40+
}

0 commit comments

Comments
 (0)